input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Akka HTTP 10.1.14 - Denial of Service
|
This is a remote exploit for multiple platform. Description: Akka HTTP 10.1.14 - Denial of Service. Author: cxosmo
|
Analyze the security implications of: Akka HTTP 10.1.14 - Denial of Service
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Jan Erdmann Jebuch 1.0 - HTML Injection
|
This is a webapps exploit for php platform. Description: Jan Erdmann Jebuch 1.0 - HTML Injection. Author: PuWu
|
Analyze the security implications of: Jan Erdmann Jebuch 1.0 - HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AdaptCMS Lite 1.4 - Cross-Site Scripting / Remote File Inclusion
|
This is a webapps exploit for php platform. Description: AdaptCMS Lite 1.4 - Cross-Site Scripting / Remote File Inclusion. Author: RoMaNcYxHaCkEr
|
Analyze the security implications of: AdaptCMS Lite 1.4 - Cross-Site Scripting / Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP 5.2.8 - 'popen()' Function Buffer Overflow
|
This is a dos exploit for php platform. Description: PHP 5.2.8 - 'popen()' Function Buffer Overflow. Author: e.wiZz!
|
Analyze the security implications of: PHP 5.2.8 - 'popen()' Function Buffer Overflow
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EasyService Billing 1.0 - 'q' SQL Injection
|
This is a webapps exploit for php platform. Description: EasyService Billing 1.0 - 'q' SQL Injection. Author: Divya Jain
|
Analyze the security implications of: EasyService Billing 1.0 - 'q' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HP Intelligent Management Center - 'topoContent.jsf' Cross-Site Scripting
|
This is a webapps exploit for java platform. Description: HP Intelligent Management Center - 'topoContent.jsf' Cross-Site Scripting. Author: Julien Ahrens
|
Analyze the security implications of: HP Intelligent Management Center - 'topoContent.jsf' Cross-Site Scripting
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: KubeSphere 3.4.0 - Insecure Direct Object Reference (IDOR)
|
This is a webapps exploit for multiple platform. Description: KubeSphere 3.4.0 - Insecure Direct Object Reference (IDOR). Author: Okan Kurtulus
|
Analyze the security implications of: KubeSphere 3.4.0 - Insecure Direct Object Reference (IDOR)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component RWCards 2.4.3 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component RWCards 2.4.3 - SQL Injection. Author: ajann
|
Analyze the security implications of: Joomla! Component RWCards 2.4.3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Authenex A-Key/ASAS Web Management Control 3.1.0.2 - Blind SQL Injection
|
This is a webapps exploit for multiple platform. Description: Authenex A-Key/ASAS Web Management Control 3.1.0.2 - Blind SQL Injection. Author: Jose Carlos de Arriba
|
Analyze the security implications of: Authenex A-Key/ASAS Web Management Control 3.1.0.2 - Blind SQL Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Mozilla Firefox/Thunderbird/SeaMonkey - Multiple Memory Corruption Vulnerabilities
|
This is a dos exploit for linux platform. Description: Mozilla Firefox/Thunderbird/SeaMonkey - Multiple Memory Corruption Vulnerabilities. Author: Bob Clary
|
Analyze the security implications of: Mozilla Firefox/Thunderbird/SeaMonkey - Multiple Memory Corruption Vulnerabilities
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: DUdForum 3.0 - 'iFor' SQL Injection
|
This is a webapps exploit for asp platform. Description: DUdForum 3.0 - 'iFor' SQL Injection. Author: Bl@ckbe@rD
|
Analyze the security implications of: DUdForum 3.0 - 'iFor' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: WiFi HD 7.3.0 iOS - Multiple Vulnerabilities
|
This is a webapps exploit for ios platform. Description: WiFi HD 7.3.0 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: WiFi HD 7.3.0 iOS - Multiple Vulnerabilities
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: CMSimple 5.4 - Cross Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: CMSimple 5.4 - Cross Site Scripting (XSS). Author: heinjame
|
Analyze the security implications of: CMSimple 5.4 - Cross Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LILDBI - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: LILDBI - Arbitrary File Upload. Author: EraGoN
|
Analyze the security implications of: LILDBI - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CF_Auction - Blind SQL Injection
|
This is a webapps exploit for asp platform. Description: CF_Auction - Blind SQL Injection. Author: AlpHaNiX
|
Analyze the security implications of: CF_Auction - Blind SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Belkin Wireless G Router / ADSL2 Modem - Authentication Bypass
|
This is a remote exploit for hardware platform. Description: Belkin Wireless G Router / ADSL2 Modem - Authentication Bypass. Author: noensr
|
Analyze the security implications of: Belkin Wireless G Router / ADSL2 Modem - Authentication Bypass
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Bs Realtor_Web Script - SQL Injection
|
This is a webapps exploit for php platform. Description: Bs Realtor_Web Script - SQL Injection. Author: Sid3^effects
|
Analyze the security implications of: Bs Realtor_Web Script - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Integria IMS 5.0.86 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Integria IMS 5.0.86 - Arbitrary File Upload. Author: Greg.Priest
|
Analyze the security implications of: Integria IMS 5.0.86 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FestOS 2.3 - 'contents' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: FestOS 2.3 - 'contents' Cross-Site Scripting. Author: High-Tech Bridge SA
|
Analyze the security implications of: FestOS 2.3 - 'contents' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LightNEasy 1.2 - no database Remote Hash Retrieve
|
This is a webapps exploit for php platform. Description: LightNEasy 1.2 - no database Remote Hash Retrieve. Author: girex
|
Analyze the security implications of: LightNEasy 1.2 - no database Remote Hash Retrieve
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DCP-Portal 5.0.1 - 'editor.php?Root' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: DCP-Portal 5.0.1 - 'editor.php?Root' Remote File Inclusion. Author: frog
|
Analyze the security implications of: DCP-Portal 5.0.1 - 'editor.php?Root' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Joomla-Visites 1.1 RC2 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Joomla-Visites 1.1 RC2 - Remote File Inclusion. Author: NoGe
|
Analyze the security implications of: Joomla! Component Joomla-Visites 1.1 RC2 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alumni Management System 1.0 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Alumni Management System 1.0 - Authentication Bypass. Author: Ankita Pal
|
Analyze the security implications of: Alumni Management System 1.0 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Netman 204 - Remote command without authentication
|
This is a hardware exploit for multiple platform. Description: Netman 204 - Remote command without authentication. Author: Parsa Rezaie Khiabanloo
|
Analyze the security implications of: Netman 204 - Remote command without authentication
|
This exploit targets multiple systems. Type: hardware. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Chameleon Social Networking Software - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Chameleon Social Networking Software - Persistent Cross-Site Scripting. Author: Dr-mosta
|
Analyze the security implications of: Chameleon Social Networking Software - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Chyrp 2.x swfupload Extension - 'upload_handler.php' Arbitrary File Upload / Arbitrary PHP Code Execution
|
This is a webapps exploit for php platform. Description: Chyrp 2.x swfupload Extension - 'upload_handler.php' Arbitrary File Upload / Arbitrary PHP Code Execution. Author: Wireghoul
|
Analyze the security implications of: Chyrp 2.x swfupload Extension - 'upload_handler.php' Arbitrary File Upload / Arbitrary PHP Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IP3 NetAccess < 4.1.9.6 - Arbitrary File Disclosure
|
This is a remote exploit for hardware platform. Description: IP3 NetAccess < 4.1.9.6 - Arbitrary File Disclosure. Author: Sebastian Wolfgarten
|
Analyze the security implications of: IP3 NetAccess < 4.1.9.6 - Arbitrary File Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Skype Technologies Skype 1.5 - NSRunAlertPanel Remote Format String
|
This is a remote exploit for osx platform. Description: Skype Technologies Skype 1.5 - NSRunAlertPanel Remote Format String. Author: Tom Ferris
|
Analyze the security implications of: Skype Technologies Skype 1.5 - NSRunAlertPanel Remote Format String
|
This exploit targets osx systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: mySCADA myPRO 7 - Hardcoded Credentials
|
This is a remote exploit for hardware platform. Description: mySCADA myPRO 7 - Hardcoded Credentials. Author: Emre ÖVÜNÇ
|
Analyze the security implications of: mySCADA myPRO 7 - Hardcoded Credentials
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: IBM GCM16/32 1.20.0.22575 - Multiple Vulnerabilities
|
This is a remote exploit for php platform. Description: IBM GCM16/32 1.20.0.22575 - Multiple Vulnerabilities. Author: Alejandro Alvarez Bravo
|
Analyze the security implications of: IBM GCM16/32 1.20.0.22575 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_alfresco - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_alfresco - SQL Injection. Author: FL0RiX
|
Analyze the security implications of: Joomla! Component com_alfresco - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM Tivoli Access Manager 6.1.1 for E-Business - Directory Traversal
|
This is a remote exploit for linux platform. Description: IBM Tivoli Access Manager 6.1.1 for E-Business - Directory Traversal. Author: anonymous
|
Analyze the security implications of: IBM Tivoli Access Manager 6.1.1 for E-Business - Directory Traversal
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Linux Kernel - 'AF_PACKET' Use-After-Free (1)
|
This is a dos exploit for linux platform. Description: Linux Kernel - 'AF_PACKET' Use-After-Free (1). Author: SecuriTeam
|
Analyze the security implications of: Linux Kernel - 'AF_PACKET' Use-After-Free (1)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.