input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component com_K2 -q 1.0.1b - 'category' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_K2 -q 1.0.1b - 'category' SQL Injection. Author: Chip d3 bi0s
|
Analyze the security implications of: Joomla! Component com_K2 -q 1.0.1b - 'category' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CuteNews 1.4.6 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: CuteNews 1.4.6 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Andrew Horton
|
Analyze the security implications of: CuteNews 1.4.6 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Portrait Software Portrait Campaign Manager 4.6.1.22 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for asp platform. Description: Portrait Software Portrait Campaign Manager 4.6.1.22 - Multiple Cross-Site Scripting Vulnerabilities. Author: Roel Schouten
|
Analyze the security implications of: Portrait Software Portrait Campaign Manager 4.6.1.22 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Daily Habit Tracker 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Daily Habit Tracker 1.0 - SQL Injection. Author: Yevhenii Butenko
|
Analyze the security implications of: Daily Habit Tracker 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LinPHA 1.3.2 - 'rotate.php' Remote Command Execution
|
This is a webapps exploit for php platform. Description: LinPHA 1.3.2 - 'rotate.php' Remote Command Execution. Author: Sn!pEr.S!Te Hacker
|
Analyze the security implications of: LinPHA 1.3.2 - 'rotate.php' Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AfterLogic WebMail Pro 4.7.10 - Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: AfterLogic WebMail Pro 4.7.10 - Cross-Site Scripting. Author: Sébastien Duquette
|
Analyze the security implications of: AfterLogic WebMail Pro 4.7.10 - Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: BoutikOne - 'rss_top10.php?lang' SQL Injection
|
This is a webapps exploit for php platform. Description: BoutikOne - 'rss_top10.php?lang' SQL Injection. Author: cdx.security
|
Analyze the security implications of: BoutikOne - 'rss_top10.php?lang' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Contao 4.13.2 - Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Contao 4.13.2 - Cross-Site Scripting (XSS). Author: Chetanya Sharma
|
Analyze the security implications of: Contao 4.13.2 - Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Sponsor Wall 1.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Sponsor Wall 1.1 - SQL Injection. Author: FL0RiX
|
Analyze the security implications of: Joomla! Component Sponsor Wall 1.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux libc 5.3.12 (RedHat Linux 4.0 / Slackware Linux 3.1) - libc NLSPATH
|
This is a local exploit for linux platform. Description: Linux libc 5.3.12 (RedHat Linux 4.0 / Slackware Linux 3.1) - libc NLSPATH. Author: Solar
|
Analyze the security implications of: Linux libc 5.3.12 (RedHat Linux 4.0 / Slackware Linux 3.1) - libc NLSPATH
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ZYXEL ZyWALL 2 3.62 - '/Forms/General_1?sysSystemName' Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: ZYXEL ZyWALL 2 3.62 - '/Forms/General_1?sysSystemName' Cross-Site Scripting. Author: Henri Lindberg
|
Analyze the security implications of: ZYXEL ZyWALL 2 3.62 - '/Forms/General_1?sysSystemName' Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Crea-Book 1.0 - Admin Access Bypass / Database Disclosure / Code Execution
|
This is a webapps exploit for php platform. Description: Crea-Book 1.0 - Admin Access Bypass / Database Disclosure / Code Execution. Author: Xst3nZ
|
Analyze the security implications of: Crea-Book 1.0 - Admin Access Bypass / Database Disclosure / Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EnterpriseGS 1.0 rc4 - Remote Command Execution
|
This is a webapps exploit for php platform. Description: EnterpriseGS 1.0 rc4 - Remote Command Execution. Author: rgod
|
Analyze the security implications of: EnterpriseGS 1.0 rc4 - Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Tenda ADSL2/2+ Modem 963281TAN - DNS Change
|
This is a webapps exploit for cgi platform. Description: Tenda ADSL2/2+ Modem 963281TAN - DNS Change. Author: Todor Donev
|
Analyze the security implications of: Tenda ADSL2/2+ Modem 963281TAN - DNS Change
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: LEPTON 2.2.2 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: LEPTON 2.2.2 - Remote Code Execution. Author: Curesec Research Team
|
Analyze the security implications of: LEPTON 2.2.2 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Google Urchin 5.7.03 - Local File Inclusion
|
This is a webapps exploit for cgi platform. Description: Google Urchin 5.7.03 - Local File Inclusion. Author: Kristian Erik Hermansen
|
Analyze the security implications of: Google Urchin 5.7.03 - Local File Inclusion
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Cisco Data Center Network Manager - Unauthenticated Remote Code Execution (Metasploit)
|
This is a remote exploit for java platform. Description: Cisco Data Center Network Manager - Unauthenticated Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Cisco Data Center Network Manager - Unauthenticated Remote Code Execution (Metasploit)
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Entrepreneur B2B Script 2.0.4 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Entrepreneur B2B Script 2.0.4 - 'id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Entrepreneur B2B Script 2.0.4 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AzeoTech DaqFactory - Denial of Service
|
This is a dos exploit for multiple platform. Description: AzeoTech DaqFactory - Denial of Service. Author: Knud Erik Hojgaard
|
Analyze the security implications of: AzeoTech DaqFactory - Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CyberBuild - 'result.asp' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for asp platform. Description: CyberBuild - 'result.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t
|
Analyze the security implications of: CyberBuild - 'result.asp' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: BES-CMS 0.4/0.5 - 'start.php' File Inclusion
|
This is a webapps exploit for php platform. Description: BES-CMS 0.4/0.5 - 'start.php' File Inclusion. Author: frog
|
Analyze the security implications of: BES-CMS 0.4/0.5 - 'start.php' File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OverlayFS inode Security Checks - 'inode.c' Local Security Bypass
|
This is a local exploit for linux platform. Description: OverlayFS inode Security Checks - 'inode.c' Local Security Bypass. Author: Gary Poster
|
Analyze the security implications of: OverlayFS inode Security Checks - 'inode.c' Local Security Bypass
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: DD-WRT 45723 - UPNP Buffer Overflow (PoC)
|
This is a dos exploit for hardware platform. Description: DD-WRT 45723 - UPNP Buffer Overflow (PoC). Author: Enesdex
|
Analyze the security implications of: DD-WRT 45723 - UPNP Buffer Overflow (PoC)
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: IPFire - 'Shellshock' Bash Environment Variable Command Injection (Metasploit)
|
This is a remote exploit for cgi platform. Description: IPFire - 'Shellshock' Bash Environment Variable Command Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: IPFire - 'Shellshock' Bash Environment Variable Command Injection (Metasploit)
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Apple macOS 10.13.1 (High Sierra) - 'Blank Root' Local Privilege Escalation
|
This is a local exploit for macos platform. Description: Apple macOS 10.13.1 (High Sierra) - 'Blank Root' Local Privilege Escalation. Author: Lemiorhan
|
Analyze the security implications of: Apple macOS 10.13.1 (High Sierra) - 'Blank Root' Local Privilege Escalation
|
This exploit targets macos systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: Affiliate Directory - 'cat_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Affiliate Directory - 'cat_id' SQL Injection. Author: t0pP8uZz
|
Analyze the security implications of: Affiliate Directory - 'cat_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FS Realtor Clone - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: FS Realtor Clone - 'id' SQL Injection. Author: 8bitsec
|
Analyze the security implications of: FS Realtor Clone - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Mac OSX 10.4.7 - Mach Exception Handling Local (10.3.x)
|
This is a local exploit for osx platform. Description: Apple Mac OSX 10.4.7 - Mach Exception Handling Local (10.3.x). Author: Kevin Finisterre
|
Analyze the security implications of: Apple Mac OSX 10.4.7 - Mach Exception Handling Local (10.3.x)
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: ATutor 1.5.1 - 'login.php?course' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: ATutor 1.5.1 - 'login.php?course' Cross-Site Scripting. Author: matrix_killer
|
Analyze the security implications of: ATutor 1.5.1 - 'login.php?course' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Web Host Automation Ltd. Helm 3.2.10 Beta - 'default.asp' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for asp platform. Description: Web Host Automation Ltd. Helm 3.2.10 Beta - 'default.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t
|
Analyze the security implications of: Web Host Automation Ltd. Helm 3.2.10 Beta - 'default.asp' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: BDSMIS TraX with Payroll - SQL Injection
|
This is a webapps exploit for asp platform. Description: BDSMIS TraX with Payroll - SQL Injection. Author: L0rd CrusAd3r
|
Analyze the security implications of: BDSMIS TraX with Payroll - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: TP-Link VN020 F3v(T) TT_V6.2.1021) - DHCP Stack Buffer Overflow
|
This is a local exploit for multiple platform. Description: TP-Link VN020 F3v(T) TT_V6.2.1021) - DHCP Stack Buffer Overflow. Author: Mohamed Maatallah
|
Analyze the security implications of: TP-Link VN020 F3v(T) TT_V6.2.1021) - DHCP Stack Buffer Overflow
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Invision Power Board 2.0.3 - 'login.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Invision Power Board 2.0.3 - 'login.php' SQL Injection. Author: Petey Beege
|
Analyze the security implications of: Invision Power Board 2.0.3 - 'login.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.