input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AV Arcade Free Edition - 'add_rating.php?id' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: AV Arcade Free Edition - 'add_rating.php?id' Blind SQL Injection. Author: DaOne
|
Analyze the security implications of: AV Arcade Free Edition - 'add_rating.php?id' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel PPC64/IA64 (AIO) - Local Denial of Service
|
This is a dos exploit for linux platform. Description: Linux Kernel PPC64/IA64 (AIO) - Local Denial of Service. Author: Daniel McNeil
|
Analyze the security implications of: Linux Kernel PPC64/IA64 (AIO) - Local Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: TP-LINK TL-WR740N - Multiple HTML Injection
|
This is a webapps exploit for hardware platform. Description: TP-LINK TL-WR740N - Multiple HTML Injection. Author: Shujaat Amin (ZEROXINN)
|
Analyze the security implications of: TP-LINK TL-WR740N - Multiple HTML Injection
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: eStoreAff 0.1 - 'cid' SQL Injection
|
This is a webapps exploit for php platform. Description: eStoreAff 0.1 - 'cid' SQL Injection. Author: Mr.SQL
|
Analyze the security implications of: eStoreAff 0.1 - 'cid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HP JetDirect J3111A - Invalid FTP Command Denial of Service
|
This is a dos exploit for hardware platform. Description: HP JetDirect J3111A - Invalid FTP Command Denial of Service. Author: Peter Grundl
|
Analyze the security implications of: HP JetDirect J3111A - Invalid FTP Command Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ArticleLive (Interspire Website Publisher) - SQL Injection
|
This is a webapps exploit for asp platform. Description: ArticleLive (Interspire Website Publisher) - SQL Injection. Author: Ra3cH
|
Analyze the security implications of: ArticleLive (Interspire Website Publisher) - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: DomainMod 4.13 - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DomainMod 4.13 - Cross-Site Scripting. Author: Damian Ebelties
|
Analyze the security implications of: DomainMod 4.13 - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Centrify Deployment Manager 2.1.0.283 - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Centrify Deployment Manager 2.1.0.283 - Local Privilege Escalation. Author: Larry W. Cashdollar
|
Analyze the security implications of: Centrify Deployment Manager 2.1.0.283 - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: WEBgais 1.0 - Remote Command Execution
|
This is a remote exploit for cgi platform. Description: WEBgais 1.0 - Remote Command Execution. Author: Razvan Dragomirescu
|
Analyze the security implications of: WEBgais 1.0 - Remote Command Execution
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: mojoPortal forums 2.7.0.0 - 'Title' Persistent Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: mojoPortal forums 2.7.0.0 - 'Title' Persistent Cross-Site Scripting. Author: Sagar Banwa
|
Analyze the security implications of: mojoPortal forums 2.7.0.0 - 'Title' Persistent Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_gurujibook - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_gurujibook - SQL Injection. Author: snakespc
|
Analyze the security implications of: Joomla! Component com_gurujibook - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DClassifieds 0.1 final - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: DClassifieds 0.1 final - Cross-Site Request Forgery. Author: High-Tech Bridge SA
|
Analyze the security implications of: DClassifieds 0.1 final - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel < 3.5.0-23 (Ubuntu 12.04.2 x64) - 'SOCK_DIAG' SMEP Bypass Local Privilege Escalation
|
This is a local exploit for linux_x86-64 platform. Description: Linux Kernel < 3.5.0-23 (Ubuntu 12.04.2 x64) - 'SOCK_DIAG' SMEP Bypass Local Privilege Escalation. Author: Vitaly Nikolenko
|
Analyze the security implications of: Linux Kernel < 3.5.0-23 (Ubuntu 12.04.2 x64) - 'SOCK_DIAG' SMEP Bypass Local Privilege Escalation
|
This exploit targets linux_x86-64 systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux_x86-64 platform
|
What is this exploit about: Cab Management System 1.0 - 'id' SQLi (Authenticated)
|
This is a webapps exploit for php platform. Description: Cab Management System 1.0 - 'id' SQLi (Authenticated). Author: Alperen Ergel
|
Analyze the security implications of: Cab Management System 1.0 - 'id' SQLi (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! com_hdwplayer 4.2 - 'search.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! com_hdwplayer 4.2 - 'search.php' SQL Injection. Author: qw3rTyTy
|
Analyze the security implications of: Joomla! com_hdwplayer 4.2 - 'search.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component AgoraGroup 0.3.5.3 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component AgoraGroup 0.3.5.3 - Blind SQL Injection. Author: Chip d3 bi0s
|
Analyze the security implications of: Joomla! Component AgoraGroup 0.3.5.3 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WordPress Core 4.6 - Remote Code Execution
|
This is a webapps exploit for linux platform. Description: WordPress Core 4.6 - Remote Code Execution. Author: Dawid Golunski
|
Analyze the security implications of: WordPress Core 4.6 - Remote Code Execution
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Online Quiz System - 'prequiz.asp?exam' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Online Quiz System - 'prequiz.asp?exam' Cross-Site Scripting. Author: r0t
|
Analyze the security implications of: Online Quiz System - 'prequiz.asp?exam' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component com_people 1.0.0 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_people 1.0.0 - Local File Inclusion. Author: ALTBTA
|
Analyze the security implications of: Joomla! Component com_people 1.0.0 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle Database Server 11.1 - 'CREATE ANY Directory' Privilege Escalation
|
This is a remote exploit for multiple platform. Description: Oracle Database Server 11.1 - 'CREATE ANY Directory' Privilege Escalation. Author: Paul M. Wright
|
Analyze the security implications of: Oracle Database Server 11.1 - 'CREATE ANY Directory' Privilege Escalation
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Files Desk Pro 1.4 iOS - Local File Inclusion
|
This is a webapps exploit for ios platform. Description: Files Desk Pro 1.4 iOS - Local File Inclusion. Author: Vulnerability-Lab
|
Analyze the security implications of: Files Desk Pro 1.4 iOS - Local File Inclusion
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: AndoNET Blog 2004.9.2 - 'Comentarios.php' SQL Injection
|
This is a webapps exploit for php platform. Description: AndoNET Blog 2004.9.2 - 'Comentarios.php' SQL Injection. Author: Aliaksandr Hartsuyeu
|
Analyze the security implications of: AndoNET Blog 2004.9.2 - 'Comentarios.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Drummond Miles A1Stats 1.0 - 'a1disp3.cgi' Traversal Arbitrary File Read
|
This is a remote exploit for cgi platform. Description: Drummond Miles A1Stats 1.0 - 'a1disp3.cgi' Traversal Arbitrary File Read. Author: neme-dhc
|
Analyze the security implications of: Drummond Miles A1Stats 1.0 - 'a1disp3.cgi' Traversal Arbitrary File Read
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Apple iCal 3.0.1 - 'COUNT' Integer Overflow
|
This is a remote exploit for osx platform. Description: Apple iCal 3.0.1 - 'COUNT' Integer Overflow. Author: Core Security Technologies
|
Analyze the security implications of: Apple iCal 3.0.1 - 'COUNT' Integer Overflow
|
This exploit targets osx systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: webmin 0.91 - Directory Traversal
|
This is a remote exploit for cgi platform. Description: webmin 0.91 - Directory Traversal. Author: A. Ramos
|
Analyze the security implications of: webmin 0.91 - Directory Traversal
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: AnoBBS 1.0.1 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: AnoBBS 1.0.1 - Remote File Inclusion. Author: bd0rk
|
Analyze the security implications of: AnoBBS 1.0.1 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HP Client - Automation Command Injection (Metasploit)
|
This is a remote exploit for multiple platform. Description: HP Client - Automation Command Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: HP Client - Automation Command Injection (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Discuz! 6.0 - 'tid' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Discuz! 6.0 - 'tid' Cross-Site Scripting. Author: s4r4d0
|
Analyze the security implications of: Discuz! 6.0 - 'tid' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jobpilot v2.61 - SQL Injection
|
This is a webapps exploit for php platform. Description: Jobpilot v2.61 - SQL Injection. Author: Ahmet Ümit BAYRAM
|
Analyze the security implications of: Jobpilot v2.61 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linksys WAG200G - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Linksys WAG200G - Multiple Vulnerabilities. Author: m-1-k-3
|
Analyze the security implications of: Linksys WAG200G - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Library System 1.0 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Library System 1.0 - Authentication Bypass. Author: Himanshu Shukla
|
Analyze the security implications of: Library System 1.0 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apport/ABRT - 'chroot' Local Privilege Escalation (Metasploit)
|
This is a local exploit for linux platform. Description: Apport/ABRT - 'chroot' Local Privilege Escalation (Metasploit). Author: Metasploit
|
Analyze the security implications of: Apport/ABRT - 'chroot' Local Privilege Escalation (Metasploit)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Snort 2.8.5 - Multiple Denial of Service Vulnerabilities
|
This is a dos exploit for linux platform. Description: Snort 2.8.5 - Multiple Denial of Service Vulnerabilities. Author: laurent gaffie
|
Analyze the security implications of: Snort 2.8.5 - Multiple Denial of Service Vulnerabilities
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.