input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Camera Life 2.6.2b4 - SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Camera Life 2.6.2b4 - SQL Injection / Cross-Site Scripting. Author: BackDoor |
Analyze the security implications of: Camera Life 2.6.2b4 - SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Huawei SmartAX MT880 - Multiple Cross-Site Request Forgery Vulnerabilities | This is a remote exploit for hardware platform. Description: Huawei SmartAX MT880 - Multiple Cross-Site Request Forgery Vulnerabilities. Author: Jerome Athias |
Analyze the security implications of: Huawei SmartAX MT880 - Multiple Cross-Site Request Forgery Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: N-able N-central - Cross-Site Request Forgery | This is a webapps exploit for java platform. Description: N-able N-central - Cross-Site Request Forgery. Author: Cartel |
Analyze the security implications of: N-able N-central - Cross-Site Request Forgery | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: ironwebmail 6.1.1 - Directory Traversal Information Disclosure | This is a webapps exploit for php platform. Description: ironwebmail 6.1.1 - Directory Traversal Information Disclosure. Author: Derek Callaway |
Analyze the security implications of: ironwebmail 6.1.1 - Directory Traversal Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Efestech Shop 2.0 - 'cat_id' SQL Injection | This is a webapps exploit for php platform. Description: Efestech Shop 2.0 - 'cat_id' SQL Injection. Author: Kacak |
Analyze the security implications of: Efestech Shop 2.0 - 'cat_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Claroline 1.8.9 - '/phpBB/newtopic.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Claroline 1.8.9 - '/phpBB/newtopic.php' Cross-Site Scripting. Author: Digital Security Research Group |
Analyze the security implications of: Claroline 1.8.9 - '/phpBB/newtopic.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ActiveWeb Contentserver CMS 5.6.2929 - Client-Side Filtering Bypass | This is a webapps exploit for php platform. Description: ActiveWeb Contentserver CMS 5.6.2929 - Client-Side Filtering Bypass. Author: RedTeam Pentesting |
Analyze the security implications of: ActiveWeb Contentserver CMS 5.6.2929 - Client-Side Filtering Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Blog Calendar - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Blog Calendar - SQL Injection. Author: X-Cisadane |
Analyze the security implications of: Joomla! Component Blog Calendar - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Python 2.4.2 - 'realpath()' Local Stack Overflow | This is a local exploit for linux platform. Description: Python 2.4.2 - 'realpath()' Local Stack Overflow. Author: Gotfault Security |
Analyze the security implications of: Python 2.4.2 - 'realpath()' Local Stack Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: eSmile Script - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: eSmile Script - 'index.php' SQL Injection. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: eSmile Script - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ManageEngine ADSelfService Build prior to 6003 - Remote Code Execution (Unauthenticated) | This is a webapps exploit for java platform. Description: ManageEngine ADSelfService Build prior to 6003 - Remote Code Execution (Unauthenticated). Author: Bhadresh Patel |
Analyze the security implications of: ManageEngine ADSelfService Build prior to 6003 - Remote Code Execution (Unauthenticated) | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 SP2 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 SP2 - Multiple Vulnerabilities. Author: SlidingWindow |
Analyze the security implications of: Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 SP2 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Netgear FM114P Wireless Firewall - File Disclosure | This is a remote exploit for hardware platform. Description: Netgear FM114P Wireless Firewall - File Disclosure. Author: stickler |
Analyze the security implications of: Netgear FM114P Wireless Firewall - File Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ClearContent - '/image.php?url' Local/Remote File Inclusion | This is a webapps exploit for php platform. Description: ClearContent - '/image.php?url' Local/Remote File Inclusion. Author: MizoZ |
Analyze the security implications of: ClearContent - '/image.php?url' Local/Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FlatNuke 2.5.6 - 'USR' Cross-Site Scripting | This is a webapps exploit for php platform. Description: FlatNuke 2.5.6 - 'USR' Cross-Site Scripting. Author: rgod |
Analyze the security implications of: FlatNuke 2.5.6 - 'USR' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Eternal Lines Web Server 1.0 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Eternal Lines Web Server 1.0 - Remote Denial of Service. Author: Ziv Kamir |
Analyze the security implications of: Eternal Lines Web Server 1.0 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Juniper Networks SA2000 SSL VPN Appliance - 'welcome.cgi' Cross-Site Scripting | This is a remote exploit for hardware platform. Description: Juniper Networks SA2000 SSL VPN Appliance - 'welcome.cgi' Cross-Site Scripting. Author: Richard Brain |
Analyze the security implications of: Juniper Networks SA2000 SSL VPN Appliance - 'welcome.cgi' Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: 7Shop 1.1 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: 7Shop 1.1 - Arbitrary File Upload. Author: t0pP8uZz |
Analyze the security implications of: 7Shop 1.1 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Controller - 'Itemid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Controller - 'Itemid' SQL Injection. Author: SOLVER |
Analyze the security implications of: Joomla! Component Controller - 'Itemid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AnimaGallery 2.6 - Local File Inclusion | This is a webapps exploit for php platform. Description: AnimaGallery 2.6 - Local File Inclusion. Author: d4rkr0id |
Analyze the security implications of: AnimaGallery 2.6 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle Forms 6i/9i/4.5.10/5.0/6.0.8/10g Services - Unauthorized Form Execution | This is a remote exploit for multiple platform. Description: Oracle Forms 6i/9i/4.5.10/5.0/6.0.8/10g Services - Unauthorized Form Execution. Author: Alexander Kornbrust |
Analyze the security implications of: Oracle Forms 6i/9i/4.5.10/5.0/6.0.8/10g Services - Unauthorized Form Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: WiFi Camera Roll 1.2 iOS - Multiple Vulnerabilities | This is a webapps exploit for ios platform. Description: WiFi Camera Roll 1.2 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: WiFi Camera Roll 1.2 iOS - Multiple Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: ProFTPd 1.2.9 rc2 - '.ASCII' File Remote Code Execution (2) | This is a remote exploit for linux platform. Description: ProFTPd 1.2.9 rc2 - '.ASCII' File Remote Code Execution (2). Author: Solar Eclipse |
Analyze the security implications of: ProFTPd 1.2.9 rc2 - '.ASCII' File Remote Code Execution (2) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Guppy 4.5.9 - 'REMOTE_ADDR' Remote Command Execution | This is a webapps exploit for php platform. Description: Guppy 4.5.9 - 'REMOTE_ADDR' Remote Command Execution. Author: rgod |
Analyze the security implications of: Guppy 4.5.9 - 'REMOTE_ADDR' Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Exero CMS 1.0.1 - 'theme' Multiple Local File Inclusions | This is a webapps exploit for php platform. Description: Exero CMS 1.0.1 - 'theme' Multiple Local File Inclusions. Author: GoLd_M |
Analyze the security implications of: Exero CMS 1.0.1 - 'theme' Multiple Local File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.0.0 - 'domxml_open_file()' Local Denial of Service | This is a dos exploit for php platform. Description: PHP 5.0.0 - 'domxml_open_file()' Local Denial of Service. Author: Yakir Wizman |
Analyze the security implications of: PHP 5.0.0 - 'domxml_open_file()' Local Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Best pos Management System v1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Best pos Management System v1.0 - SQL Injection. Author: Ahmed Ismail |
Analyze the security implications of: Best pos Management System v1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Netis ADSL Router DL4322D RTK 2.1.1 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for hardware platform. Description: Netis ADSL Router DL4322D RTK 2.1.1 - Cross-Site Request Forgery (Add Admin). Author: cakes |
Analyze the security implications of: Netis ADSL Router DL4322D RTK 2.1.1 - Cross-Site Request Forgery (Add Admin) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: eGroupWare 1.8.006 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: eGroupWare 1.8.006 - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: eGroupWare 1.8.006 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ABUS Security Camera TVIP 20000-21150 - LFI_ RCE and SSH Root Access | This is a remote exploit for hardware platform. Description: ABUS Security Camera TVIP 20000-21150 - LFI_ RCE and SSH Root Access. Author: d1g@segfault.net |
Analyze the security implications of: ABUS Security Camera TVIP 20000-21150 - LFI_ RCE and SSH Root Access | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: xterm - DECRQSS Remote Command Execution | This is a remote exploit for linux platform. Description: xterm - DECRQSS Remote Command Execution. Author: Paul Szabo |
Analyze the security implications of: xterm - DECRQSS Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FuguHub 8.1 - Remote Code Execution | This is a webapps exploit for multiple platform. Description: FuguHub 8.1 - Remote Code Execution. Author: redfire359 |
Analyze the security implications of: FuguHub 8.1 - Remote Code Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_state_criteria.inc.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_state_criteria.inc.php?base_path' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_state_criteria.inc.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.