input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: ezCourses - 'admin.asp' Security Bypass
|
This is a webapps exploit for php platform. Description: ezCourses - 'admin.asp' Security Bypass. Author: J.O
|
Analyze the security implications of: ezCourses - 'admin.asp' Security Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: e-Soft24 Flash Games Script 1.0 - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: e-Soft24 Flash Games Script 1.0 - Cross-Site Scripting. Author: 599eme Man
|
Analyze the security implications of: e-Soft24 Flash Games Script 1.0 - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CF Image Hosting Script 1.1 - 'upload.php' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: CF Image Hosting Script 1.1 - 'upload.php' Arbitrary File Upload. Author: The.Morpheus
|
Analyze the security implications of: CF Image Hosting Script 1.1 - 'upload.php' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_mygallery - 'cid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_mygallery - 'cid' SQL Injection. Author: S@BUN
|
Analyze the security implications of: Joomla! Component com_mygallery - 'cid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ICT Protege GX/WX 2.08 - Stored Cross-Site Scripting (XSS)
|
This is a remote exploit for hardware platform. Description: ICT Protege GX/WX 2.08 - Stored Cross-Site Scripting (XSS). Author: LiquidWorm
|
Analyze the security implications of: ICT Protege GX/WX 2.08 - Stored Cross-Site Scripting (XSS)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Blue Angel Software Suite - Command Execution
|
This is a remote exploit for linux platform. Description: Blue Angel Software Suite - Command Execution. Author: Paolo Serracino_ Pietro Minniti_ Damiano Proietti
|
Analyze the security implications of: Blue Angel Software Suite - Command Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Global In - SQL Injection
|
This is a webapps exploit for php platform. Description: Global In - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Global In - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: [WS] upload - Arbitrary File Upload
|
This is a webapps exploit for linux platform. Description: [WS] upload - Arbitrary File Upload. Author: ViRuSMaN
|
Analyze the security implications of: [WS] upload - Arbitrary File Upload
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Linux Kernel 4.3.3 (Ubuntu 14.04/15.10) - 'overlayfs' Local Privilege Escalation (1)
|
This is a local exploit for linux platform. Description: Linux Kernel 4.3.3 (Ubuntu 14.04/15.10) - 'overlayfs' Local Privilege Escalation (1). Author: rebel
|
Analyze the security implications of: Linux Kernel 4.3.3 (Ubuntu 14.04/15.10) - 'overlayfs' Local Privilege Escalation (1)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component Abstract 2.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Abstract 2.1 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Abstract 2.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adobe Reader DC 15.010.20060 - Memory Corruption
|
This is a dos exploit for multiple platform. Description: Adobe Reader DC 15.010.20060 - Memory Corruption. Author: Pier-Luc Maltais
|
Analyze the security implications of: Adobe Reader DC 15.010.20060 - Memory Corruption
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ASP-DEV Discussion Forum 2.0 - Admin Directory Weak Default Permissions
|
This is a webapps exploit for asp platform. Description: ASP-DEV Discussion Forum 2.0 - Admin Directory Weak Default Permissions. Author: G00db0y
|
Analyze the security implications of: ASP-DEV Discussion Forum 2.0 - Admin Directory Weak Default Permissions
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: SuSE 6.x/7.0 - MkDir Error Handling rctab Race Condition (2)
|
This is a local exploit for linux platform. Description: SuSE 6.x/7.0 - MkDir Error Handling rctab Race Condition (2). Author: IhaQueR
|
Analyze the security implications of: SuSE 6.x/7.0 - MkDir Error Handling rctab Race Condition (2)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Arcadem 2.01 - 'index.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Arcadem 2.01 - 'index.php' Remote File Inclusion. Author: sm0k3
|
Analyze the security implications of: Arcadem 2.01 - 'index.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Datenator 0.3.0 - 'event.php?id' SQL Injection
|
This is a webapps exploit for php platform. Description: Datenator 0.3.0 - 'event.php?id' SQL Injection. Author: The_HuliGun
|
Analyze the security implications of: Datenator 0.3.0 - 'event.php?id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ImageMagick 6.x - '.SGI' Image File Remote Heap Buffer Overflow
|
This is a dos exploit for linux platform. Description: ImageMagick 6.x - '.SGI' Image File Remote Heap Buffer Overflow. Author: Damian Put
|
Analyze the security implications of: ImageMagick 6.x - '.SGI' Image File Remote Heap Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Oracle Reports Server 10g 9.0.2 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a remote exploit for multiple platform. Description: Oracle Reports Server 10g 9.0.2 - Multiple Cross-Site Scripting Vulnerabilities. Author: Alexander Kornbrust
|
Analyze the security implications of: Oracle Reports Server 10g 9.0.2 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: C99Shell (Web Shell) - 'c99.php' Authentication Bypass
|
This is a webapps exploit for php platform. Description: C99Shell (Web Shell) - 'c99.php' Authentication Bypass. Author: Mandat0ry
|
Analyze the security implications of: C99Shell (Web Shell) - 'c99.php' Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AXIS 70U - Network Document Server Privilege Escalation / Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: AXIS 70U - Network Document Server Privilege Escalation / Cross-Site Scripting. Author: DSecRG
|
Analyze the security implications of: AXIS 70U - Network Document Server Privilege Escalation / Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Clipbucket 2.6 - 'view_collection.php?type' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Clipbucket 2.6 - 'view_collection.php?type' Cross-Site Scripting. Author: YaDoY666
|
Analyze the security implications of: Clipbucket 2.6 - 'view_collection.php?type' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Learning with Texts 1.6.2 - 'start' SQL Injection
|
This is a webapps exploit for php platform. Description: Learning with Texts 1.6.2 - 'start' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Learning with Texts 1.6.2 - 'start' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM Lotus Domino Server Controller - Authentication Bypass
|
This is a remote exploit for jsp platform. Description: IBM Lotus Domino Server Controller - Authentication Bypass. Author: Alexey Sintsov
|
Analyze the security implications of: IBM Lotus Domino Server Controller - Authentication Bypass
|
This exploit targets jsp systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Eventy Online Scheduler 1.8 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Eventy Online Scheduler 1.8 - Multiple Vulnerabilities. Author: AtT4CKxT3rR0r1ST
|
Analyze the security implications of: Eventy Online Scheduler 1.8 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sun Java Applet2ClassLoader - Remote Code Execution (Metasploit)
|
This is a remote exploit for multiple platform. Description: Sun Java Applet2ClassLoader - Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Sun Java Applet2ClassLoader - Remote Code Execution (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ECommerce-TIBSECART - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: ECommerce-TIBSECART - Arbitrary File Upload. Author: Ihsan Sencan
|
Analyze the security implications of: ECommerce-TIBSECART - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DELTAScripts PHPLinks - 'catid' SQL Injection
|
This is a webapps exploit for php platform. Description: DELTAScripts PHPLinks - 'catid' SQL Injection. Author: Hamza 'MizoZ' N.
|
Analyze the security implications of: DELTAScripts PHPLinks - 'catid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Exim Internet Mailer 3.35/3.36/4.10 - Format String
|
This is a local exploit for linux platform. Description: Exim Internet Mailer 3.35/3.36/4.10 - Format String. Author: Thomas Wana
|
Analyze the security implications of: Exim Internet Mailer 3.35/3.36/4.10 - Format String
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: LANGO Codeigniter Multilingual Script 1.0 - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: LANGO Codeigniter Multilingual Script 1.0 - Cross-Site Scripting. Author: Ismail Tasdelen
|
Analyze the security implications of: LANGO Codeigniter Multilingual Script 1.0 - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mozilla Firefox - 'table' Use-After-Free
|
This is a dos exploit for multiple platform. Description: Mozilla Firefox - 'table' Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: Mozilla Firefox - 'table' Use-After-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_jcalpro 1.5.3.6 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_jcalpro 1.5.3.6 - Remote File Inclusion. Author: kaMtiEz
|
Analyze the security implications of: Joomla! Component com_jcalpro 1.5.3.6 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Seagate BlackArmor NAS sg2000-2000.1331 - Command Injection
|
This is a webapps exploit for hardware platform. Description: Seagate BlackArmor NAS sg2000-2000.1331 - Command Injection. Author: Metin Yunus Kandemir
|
Analyze the security implications of: Seagate BlackArmor NAS sg2000-2000.1331 - Command Injection
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: FCKEditor Core 2.x 2.4.3 - 'FileManager upload.php' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: FCKEditor Core 2.x 2.4.3 - 'FileManager upload.php' Arbitrary File Upload. Author: grabz
|
Analyze the security implications of: FCKEditor Core 2.x 2.4.3 - 'FileManager upload.php' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: docmint 2.0 - '/engine/require.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: docmint 2.0 - '/engine/require.php' Remote File Inclusion. Author: K-159
|
Analyze the security implications of: docmint 2.0 - '/engine/require.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.