input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: TalentSoft Web+ Shop 5.0 - 'Deptname' Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: TalentSoft Web+ Shop 5.0 - 'Deptname' Cross-Site Scripting. Author: r0t
|
Analyze the security implications of: TalentSoft Web+ Shop 5.0 - 'Deptname' Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Fiyo CMS 2.0_1.9.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: Fiyo CMS 2.0_1.9.1 - SQL Injection. Author: cfreer
|
Analyze the security implications of: Fiyo CMS 2.0_1.9.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GForge < 4.6b2 - 'skill_delete' SQL Injection
|
This is a webapps exploit for php platform. Description: GForge < 4.6b2 - 'skill_delete' SQL Injection. Author: Sumit Siddharth
|
Analyze the security implications of: GForge < 4.6b2 - 'skill_delete' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 4Images 1.7.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: 4Images 1.7.1 - SQL Injection. Author: Master Mind
|
Analyze the security implications of: 4Images 1.7.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: html-edit CMS 3.1.x - 'html_output' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: html-edit CMS 3.1.x - 'html_output' Cross-Site Scripting. Author: KedAns-Dz
|
Analyze the security implications of: html-edit CMS 3.1.x - 'html_output' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: b2evolution 6.11.6 - 'redirect_to' Open Redirect
|
This is a webapps exploit for php platform. Description: b2evolution 6.11.6 - 'redirect_to' Open Redirect. Author: Nakul Ratti
|
Analyze the security implications of: b2evolution 6.11.6 - 'redirect_to' Open Redirect
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: postecards - SQL Injection / File Disclosure
|
This is a webapps exploit for asp platform. Description: postecards - SQL Injection / File Disclosure. Author: AlpHaNiX
|
Analyze the security implications of: postecards - SQL Injection / File Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: FOSS Gallery Admin 1.0 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: FOSS Gallery Admin 1.0 - Arbitrary File Upload. Author: Pepelux
|
Analyze the security implications of: FOSS Gallery Admin 1.0 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component NeoRecruit 1.4 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component NeoRecruit 1.4 - SQL Injection. Author: v3n0m
|
Analyze the security implications of: Joomla! Component NeoRecruit 1.4 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Musicqueue 1.2 - SIGSEGV Signal Handler Insecure File Creation
|
This is a local exploit for linux platform. Description: Musicqueue 1.2 - SIGSEGV Signal Handler Insecure File Creation. Author: dong-h0un U
|
Analyze the security implications of: Musicqueue 1.2 - SIGSEGV Signal Handler Insecure File Creation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: leaftec CMS - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: leaftec CMS - Multiple Vulnerabilities. Author: Valentin
|
Analyze the security implications of: leaftec CMS - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Geeklog 1.3.5 - HTML Attribute Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Geeklog 1.3.5 - HTML Attribute Cross-Site Scripting. Author: Ulf Harnhammar
|
Analyze the security implications of: Geeklog 1.3.5 - HTML Attribute Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BlackBerry Enterprise Service < 12.4 (BES12) Self-Service - Multiple Vulnerabilities
|
This is a webapps exploit for java platform. Description: BlackBerry Enterprise Service < 12.4 (BES12) Self-Service - Multiple Vulnerabilities. Author: Security-Assessment.com
|
Analyze the security implications of: BlackBerry Enterprise Service < 12.4 (BES12) Self-Service - Multiple Vulnerabilities
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: NetWin DBabble 2.5 i - Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: NetWin DBabble 2.5 i - Cross-Site Scripting. Author: dr_insane
|
Analyze the security implications of: NetWin DBabble 2.5 i - Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Edimax PS-1206MF - Web Admin Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Edimax PS-1206MF - Web Admin Authentication Bypass. Author: smash
|
Analyze the security implications of: Edimax PS-1206MF - Web Admin Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Linux Kernel 2.6.x (Sparc64) - '/proc/iomem' Local Denial of Service
|
This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x (Sparc64) - '/proc/iomem' Local Denial of Service. Author: Mikulas Patocka
|
Analyze the security implications of: Linux Kernel 2.6.x (Sparc64) - '/proc/iomem' Local Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: PHP 5.3.x < 5.3.2 - 'ext/phar/stream.c' / 'ext/phar/dirstream.c' Multiple Format String Vulnerabilities
|
This is a remote exploit for php platform. Description: PHP 5.3.x < 5.3.2 - 'ext/phar/stream.c' / 'ext/phar/dirstream.c' Multiple Format String Vulnerabilities. Author: Stefan Esser
|
Analyze the security implications of: PHP 5.3.x < 5.3.2 - 'ext/phar/stream.c' / 'ext/phar/dirstream.c' Multiple Format String Vulnerabilities
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Eir D1000 Wireless Router - WAN Side Remote Command Injection (Metasploit)
|
This is a remote exploit for linux_mips platform. Description: Eir D1000 Wireless Router - WAN Side Remote Command Injection (Metasploit). Author: Kenzo
|
Analyze the security implications of: Eir D1000 Wireless Router - WAN Side Remote Command Injection (Metasploit)
|
This exploit targets linux_mips systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux_mips platform
|
What is this exploit about: Lms 1.5.x - 'RTMessageAdd.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Lms 1.5.x - 'RTMessageAdd.php' Remote File Inclusion. Author: InyeXion
|
Analyze the security implications of: Lms 1.5.x - 'RTMessageAdd.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SecurEnvoy SecurMail 9.1.501 - Multiple Vulnerabilities
|
This is a webapps exploit for aspx platform. Description: SecurEnvoy SecurMail 9.1.501 - Multiple Vulnerabilities. Author: SEC Consult
|
Analyze the security implications of: SecurEnvoy SecurMail 9.1.501 - Multiple Vulnerabilities
|
This exploit targets aspx systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aspx platform
|
What is this exploit about: Tenda W3002R/A302/w309r Wireless Router v5.07.64_en - Remote DNS Change (PoC)
|
This is a webapps exploit for asp platform. Description: Tenda W3002R/A302/w309r Wireless Router v5.07.64_en - Remote DNS Change (PoC). Author: Todor Donev
|
Analyze the security implications of: Tenda W3002R/A302/w309r Wireless Router v5.07.64_en - Remote DNS Change (PoC)
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: YaBB 1 - Invalid Topic Error Page Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: YaBB 1 - Invalid Topic Error Page Cross-Site Scripting. Author: methodic
|
Analyze the security implications of: YaBB 1 - Invalid Topic Error Page Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: PHP 5.3 - 'preg_match()' Full Path Disclosure
|
This is a remote exploit for php platform. Description: PHP 5.3 - 'preg_match()' Full Path Disclosure. Author: David Vieira-Kurz
|
Analyze the security implications of: PHP 5.3 - 'preg_match()' Full Path Disclosure
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Docker - Container Escape
|
This is a local exploit for linux platform. Description: Docker - Container Escape. Author: dominikczarnotatob
|
Analyze the security implications of: Docker - Container Escape
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Banana Dance CMS and Wiki - SQL Injection
|
This is a webapps exploit for php platform. Description: Banana Dance CMS and Wiki - SQL Injection. Author: Aodrulez
|
Analyze the security implications of: Banana Dance CMS and Wiki - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Flat Chat 2.0 - 'include online.txt' Remote Code Execution
|
This is a webapps exploit for php platform. Description: Flat Chat 2.0 - 'include online.txt' Remote Code Execution. Author: Dj7xpl
|
Analyze the security implications of: Flat Chat 2.0 - 'include online.txt' Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Youbin 2.5/3.0/3.4 - 'HOME' Buffer Overflow
|
This is a local exploit for freebsd platform. Description: Youbin 2.5/3.0/3.4 - 'HOME' Buffer Overflow. Author: Knud Erik Hojgaard
|
Analyze the security implications of: Youbin 2.5/3.0/3.4 - 'HOME' Buffer Overflow
|
This exploit targets freebsd systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: DIGITAL UNIX 4.0 d/f / AIX 4.3.2 / CDE 2.1 / IRIX 6.5.14 / Solaris 7.0 / SunOS 4.1.4 - Local Buffer Overflow
|
This is a local exploit for linux platform. Description: DIGITAL UNIX 4.0 d/f / AIX 4.3.2 / CDE 2.1 / IRIX 6.5.14 / Solaris 7.0 / SunOS 4.1.4 - Local Buffer Overflow. Author: Job de Haas of ITSX
|
Analyze the security implications of: DIGITAL UNIX 4.0 d/f / AIX 4.3.2 / CDE 2.1 / IRIX 6.5.14 / Solaris 7.0 / SunOS 4.1.4 - Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: GlassFish Application Server - '/resourceNode/jmsDestinationNew.jsf' Multiple Cross-Site Scripting Vulnerabilities
|
This is a remote exploit for multiple platform. Description: GlassFish Application Server - '/resourceNode/jmsDestinationNew.jsf' Multiple Cross-Site Scripting Vulnerabilities. Author: Eduardo Jorge
|
Analyze the security implications of: GlassFish Application Server - '/resourceNode/jmsDestinationNew.jsf' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: BoxBilling<=4.22.1.5 - Remote Code Execution (RCE)
|
This is a webapps exploit for php platform. Description: BoxBilling<=4.22.1.5 - Remote Code Execution (RCE). Author: zetc0de
|
Analyze the security implications of: BoxBilling<=4.22.1.5 - Remote Code Execution (RCE)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM Tivoli Access Manager for E-Business - '/ivt/ivtserver?parm1' Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: IBM Tivoli Access Manager for E-Business - '/ivt/ivtserver?parm1' Cross-Site Scripting. Author: IBM
|
Analyze the security implications of: IBM Tivoli Access Manager for E-Business - '/ivt/ivtserver?parm1' Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Linux Kernel 2.2 - 'ldd core' Force Reboot (Denial of Service)
|
This is a dos exploit for linux platform. Description: Linux Kernel 2.2 - 'ldd core' Force Reboot (Denial of Service). Author: Dan Burcaw
|
Analyze the security implications of: Linux Kernel 2.2 - 'ldd core' Force Reboot (Denial of Service)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Amanda 3.3.1 - 'amstar' Command Injection Privilege Escalation
|
This is a local exploit for linux platform. Description: Amanda 3.3.1 - 'amstar' Command Injection Privilege Escalation. Author: Hacker Fantastic
|
Analyze the security implications of: Amanda 3.3.1 - 'amstar' Command Injection Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.