input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Active Bids 3.5 - 'itemID' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Active Bids 3.5 - 'itemID' Blind SQL Injection. Author: Stack
|
Analyze the security implications of: Active Bids 3.5 - 'itemID' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Campsite 2.6.1 - 'IssuePublish.php?g_documentRoot' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'IssuePublish.php?g_documentRoot' Remote File Inclusion. Author: anonymous
|
Analyze the security implications of: Campsite 2.6.1 - 'IssuePublish.php?g_documentRoot' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Fixit iDms Pro Image Gallery - 'showfile.asp?fid' SQL Injection
|
This is a webapps exploit for asp platform. Description: Fixit iDms Pro Image Gallery - 'showfile.asp?fid' SQL Injection. Author: Aria-Security Team
|
Analyze the security implications of: Fixit iDms Pro Image Gallery - 'showfile.asp?fid' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Visale 1.0 - 'pblsmb.cgi?listno' Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: Visale 1.0 - 'pblsmb.cgi?listno' Cross-Site Scripting. Author: r0t
|
Analyze the security implications of: Visale 1.0 - 'pblsmb.cgi?listno' Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Microsoft Windows - 'gdi32.dll' Heap Buffer Overflow in ExtEscape() Triggerable via EMR_EXTESCAPE EMF Record (MS16-055)
|
This is a dos exploit for multiple platform. Description: Microsoft Windows - 'gdi32.dll' Heap Buffer Overflow in ExtEscape() Triggerable via EMR_EXTESCAPE EMF Record (MS16-055). Author: Google Security Research
|
Analyze the security implications of: Microsoft Windows - 'gdi32.dll' Heap Buffer Overflow in ExtEscape() Triggerable via EMR_EXTESCAPE EMF Record (MS16-055)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Milesight Routers UR5X_ UR32L_ UR32_ UR35_ UR41 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption
|
This is a remote exploit for hardware platform. Description: Milesight Routers UR5X_ UR32L_ UR32_ UR35_ UR41 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption. Author: Bipin Jitiya
|
Analyze the security implications of: Milesight Routers UR5X_ UR32L_ UR32_ UR35_ UR41 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: DragDropCart - 'search.php?search' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DragDropCart - 'search.php?search' Cross-Site Scripting. Author: Moudi
|
Analyze the security implications of: DragDropCart - 'search.php?search' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apache Tomcat 5 - Information Disclosure
|
This is a remote exploit for multiple platform. Description: Apache Tomcat 5 - Information Disclosure. Author: ScanAlert Security
|
Analyze the security implications of: Apache Tomcat 5 - Information Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Dokeos 1.x - 'viewtopic.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Dokeos 1.x - 'viewtopic.php' SQL Injection. Author: Alvaro Olavarria
|
Analyze the security implications of: Dokeos 1.x - 'viewtopic.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Mac OSX Software Update - Command Execution (Metasploit)
|
This is a remote exploit for osx platform. Description: Apple Mac OSX Software Update - Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Apple Mac OSX Software Update - Command Execution (Metasploit)
|
This exploit targets osx systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Joomla! Component Cookex Agency CKForms - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Cookex Agency CKForms - Local File Inclusion. Author: ALTBTA
|
Analyze the security implications of: Joomla! Component Cookex Agency CKForms - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: RedStar 3.0 Desktop - Enable sudo Privilege Escalation
|
This is a local exploit for linux platform. Description: RedStar 3.0 Desktop - Enable sudo Privilege Escalation. Author: prdelka & sfan55
|
Analyze the security implications of: RedStar 3.0 Desktop - Enable sudo Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component Jobads - 'type' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Jobads - 'type' SQL Injection. Author: N0KT4
|
Analyze the security implications of: Joomla! Component Jobads - 'type' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DO-CMS 3.0 - 'p' Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: DO-CMS 3.0 - 'p' Multiple SQL Injections. Author: crash over
|
Analyze the security implications of: DO-CMS 3.0 - 'p' Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MySQL 4/5/6 - UDF for Command Execution
|
This is a local exploit for linux platform. Description: MySQL 4/5/6 - UDF for Command Execution. Author: Bernardo Damele
|
Analyze the security implications of: MySQL 4/5/6 - UDF for Command Execution
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Chipmunk Blog - 'archive.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Chipmunk Blog - 'archive.php' Cross-Site Scripting. Author: sl4xUz
|
Analyze the security implications of: Chipmunk Blog - 'archive.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Clantools 1.2.3 - Multiple Blind SQL Injections
|
This is a webapps exploit for php platform. Description: Joomla! Component Clantools 1.2.3 - Multiple Blind SQL Injections. Author: Solidmedia
|
Analyze the security implications of: Joomla! Component Clantools 1.2.3 - Multiple Blind SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: e107 < 0.7.8 - 'photograph' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: e107 < 0.7.8 - 'photograph' Arbitrary File Upload. Author: g00ns
|
Analyze the security implications of: e107 < 0.7.8 - 'photograph' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mobile USB Drive HD - Multiple Local File Inclusion / Arbitrary File Upload Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Mobile USB Drive HD - Multiple Local File Inclusion / Arbitrary File Upload Vulnerabilities. Author: Benjamin Kunz Mejri
|
Analyze the security implications of: Mobile USB Drive HD - Multiple Local File Inclusion / Arbitrary File Upload Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Jax Petition 3.06 Book - 'smileys.php?languagepack' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Jax Petition 3.06 Book - 'smileys.php?languagepack' Local File Inclusion. Author: ilker Kandemir
|
Analyze the security implications of: Jax Petition 3.06 Book - 'smileys.php?languagepack' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Check Point Security Gateway - Information Disclosure (Unauthenticated)
|
This is a webapps exploit for hardware platform. Description: Check Point Security Gateway - Information Disclosure (Unauthenticated). Author: Yesith Alvarez
|
Analyze the security implications of: Check Point Security Gateway - Information Disclosure (Unauthenticated)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Airia - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Airia - Arbitrary File Upload. Author: HaHwul
|
Analyze the security implications of: Airia - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AMSN 0.96 - Malformed Message Denial of Service
|
This is a dos exploit for multiple platform. Description: AMSN 0.96 - Malformed Message Denial of Service. Author: Levent Kayan
|
Analyze the security implications of: AMSN 0.96 - Malformed Message Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: eStara SoftPhone 3.0.1 SIP Packet - Multiple Malformed Field Denial of Service Vulnerabilities
|
This is a dos exploit for multiple platform. Description: eStara SoftPhone 3.0.1 SIP Packet - Multiple Malformed Field Denial of Service Vulnerabilities. Author: ZwelL
|
Analyze the security implications of: eStara SoftPhone 3.0.1 SIP Packet - Multiple Malformed Field Denial of Service Vulnerabilities
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Genexis PLATINUM 4410 2.1 P4410-V2-1.28 - RCE
|
This is a webapps exploit for hardware platform. Description: Genexis PLATINUM 4410 2.1 P4410-V2-1.28 - RCE. Author: Jay Sharma
|
Analyze the security implications of: Genexis PLATINUM 4410 2.1 P4410-V2-1.28 - RCE
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: PlaySms 0.7 - SQL Injection
|
This is a remote exploit for linux platform. Description: PlaySms 0.7 - SQL Injection. Author: Noam Rathaus
|
Analyze the security implications of: PlaySms 0.7 - SQL Injection
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Qualcomm Android - Kernel Use-After-Free via Incorrect set_page_dirty() in KGSL
|
This is a dos exploit for android platform. Description: Qualcomm Android - Kernel Use-After-Free via Incorrect set_page_dirty() in KGSL. Author: Google Security Research
|
Analyze the security implications of: Qualcomm Android - Kernel Use-After-Free via Incorrect set_page_dirty() in KGSL
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Totem Movie Player 3.4.3 (Ubuntu) - Stack Corruption
|
This is a dos exploit for linux platform. Description: Totem Movie Player 3.4.3 (Ubuntu) - Stack Corruption. Author: coolkaveh
|
Analyze the security implications of: Totem Movie Player 3.4.3 (Ubuntu) - Stack Corruption
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: iGreeting Cards 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: iGreeting Cards 1.0 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: iGreeting Cards 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Logoshows BBS 2.0 - 'forumid' SQL Injection
|
This is a webapps exploit for php platform. Description: Logoshows BBS 2.0 - 'forumid' SQL Injection. Author: Ruzgarin_Oglu
|
Analyze the security implications of: Logoshows BBS 2.0 - 'forumid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: glFusion 1.x - SQL Injection
|
This is a webapps exploit for php platform. Description: glFusion 1.x - SQL Injection. Author: KedAns-Dz
|
Analyze the security implications of: glFusion 1.x - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GNU bash 4.3.11 - Environment Variable dhclient
|
This is a remote exploit for linux platform. Description: GNU bash 4.3.11 - Environment Variable dhclient. Author: @0x00string
|
Analyze the security implications of: GNU bash 4.3.11 - Environment Variable dhclient
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Dolibarr ERP 11.0.4 - File Upload Restrictions Bypass (Authenticated RCE)
|
This is a webapps exploit for php platform. Description: Dolibarr ERP 11.0.4 - File Upload Restrictions Bypass (Authenticated RCE). Author: Andrea Gonzalez
|
Analyze the security implications of: Dolibarr ERP 11.0.4 - File Upload Restrictions Bypass (Authenticated RCE)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iOS iFTPStorage 1.3 - Directory Traversal
|
This is a remote exploit for ios platform. Description: iOS iFTPStorage 1.3 - Directory Traversal. Author: XEL
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.