input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Camera Life 2.6.2b4 - SQL Injection / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Camera Life 2.6.2b4 - SQL Injection / Cross-Site Scripting. Author: BackDoor
|
Analyze the security implications of: Camera Life 2.6.2b4 - SQL Injection / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Huawei SmartAX MT880 - Multiple Cross-Site Request Forgery Vulnerabilities
|
This is a remote exploit for hardware platform. Description: Huawei SmartAX MT880 - Multiple Cross-Site Request Forgery Vulnerabilities. Author: Jerome Athias
|
Analyze the security implications of: Huawei SmartAX MT880 - Multiple Cross-Site Request Forgery Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: N-able N-central - Cross-Site Request Forgery
|
This is a webapps exploit for java platform. Description: N-able N-central - Cross-Site Request Forgery. Author: Cartel
|
Analyze the security implications of: N-able N-central - Cross-Site Request Forgery
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: ironwebmail 6.1.1 - Directory Traversal Information Disclosure
|
This is a webapps exploit for php platform. Description: ironwebmail 6.1.1 - Directory Traversal Information Disclosure. Author: Derek Callaway
|
Analyze the security implications of: ironwebmail 6.1.1 - Directory Traversal Information Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Efestech Shop 2.0 - 'cat_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Efestech Shop 2.0 - 'cat_id' SQL Injection. Author: Kacak
|
Analyze the security implications of: Efestech Shop 2.0 - 'cat_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Claroline 1.8.9 - '/phpBB/newtopic.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Claroline 1.8.9 - '/phpBB/newtopic.php' Cross-Site Scripting. Author: Digital Security Research Group
|
Analyze the security implications of: Claroline 1.8.9 - '/phpBB/newtopic.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ActiveWeb Contentserver CMS 5.6.2929 - Client-Side Filtering Bypass
|
This is a webapps exploit for php platform. Description: ActiveWeb Contentserver CMS 5.6.2929 - Client-Side Filtering Bypass. Author: RedTeam Pentesting
|
Analyze the security implications of: ActiveWeb Contentserver CMS 5.6.2929 - Client-Side Filtering Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Blog Calendar - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Blog Calendar - SQL Injection. Author: X-Cisadane
|
Analyze the security implications of: Joomla! Component Blog Calendar - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Python 2.4.2 - 'realpath()' Local Stack Overflow
|
This is a local exploit for linux platform. Description: Python 2.4.2 - 'realpath()' Local Stack Overflow. Author: Gotfault Security
|
Analyze the security implications of: Python 2.4.2 - 'realpath()' Local Stack Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: eSmile Script - 'index.php' SQL Injection
|
This is a webapps exploit for php platform. Description: eSmile Script - 'index.php' SQL Injection. Author: AtT4CKxT3rR0r1ST
|
Analyze the security implications of: eSmile Script - 'index.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ManageEngine ADSelfService Build prior to 6003 - Remote Code Execution (Unauthenticated)
|
This is a webapps exploit for java platform. Description: ManageEngine ADSelfService Build prior to 6003 - Remote Code Execution (Unauthenticated). Author: Bhadresh Patel
|
Analyze the security implications of: ManageEngine ADSelfService Build prior to 6003 - Remote Code Execution (Unauthenticated)
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 SP2 - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 SP2 - Multiple Vulnerabilities. Author: SlidingWindow
|
Analyze the security implications of: Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 SP2 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Netgear FM114P Wireless Firewall - File Disclosure
|
This is a remote exploit for hardware platform. Description: Netgear FM114P Wireless Firewall - File Disclosure. Author: stickler
|
Analyze the security implications of: Netgear FM114P Wireless Firewall - File Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ClearContent - '/image.php?url' Local/Remote File Inclusion
|
This is a webapps exploit for php platform. Description: ClearContent - '/image.php?url' Local/Remote File Inclusion. Author: MizoZ
|
Analyze the security implications of: ClearContent - '/image.php?url' Local/Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FlatNuke 2.5.6 - 'USR' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: FlatNuke 2.5.6 - 'USR' Cross-Site Scripting. Author: rgod
|
Analyze the security implications of: FlatNuke 2.5.6 - 'USR' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Eternal Lines Web Server 1.0 - Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Eternal Lines Web Server 1.0 - Remote Denial of Service. Author: Ziv Kamir
|
Analyze the security implications of: Eternal Lines Web Server 1.0 - Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Juniper Networks SA2000 SSL VPN Appliance - 'welcome.cgi' Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: Juniper Networks SA2000 SSL VPN Appliance - 'welcome.cgi' Cross-Site Scripting. Author: Richard Brain
|
Analyze the security implications of: Juniper Networks SA2000 SSL VPN Appliance - 'welcome.cgi' Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: 7Shop 1.1 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: 7Shop 1.1 - Arbitrary File Upload. Author: t0pP8uZz
|
Analyze the security implications of: 7Shop 1.1 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Controller - 'Itemid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Controller - 'Itemid' SQL Injection. Author: SOLVER
|
Analyze the security implications of: Joomla! Component Controller - 'Itemid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AnimaGallery 2.6 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: AnimaGallery 2.6 - Local File Inclusion. Author: d4rkr0id
|
Analyze the security implications of: AnimaGallery 2.6 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle Forms 6i/9i/4.5.10/5.0/6.0.8/10g Services - Unauthorized Form Execution
|
This is a remote exploit for multiple platform. Description: Oracle Forms 6i/9i/4.5.10/5.0/6.0.8/10g Services - Unauthorized Form Execution. Author: Alexander Kornbrust
|
Analyze the security implications of: Oracle Forms 6i/9i/4.5.10/5.0/6.0.8/10g Services - Unauthorized Form Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: WiFi Camera Roll 1.2 iOS - Multiple Vulnerabilities
|
This is a webapps exploit for ios platform. Description: WiFi Camera Roll 1.2 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: WiFi Camera Roll 1.2 iOS - Multiple Vulnerabilities
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: ProFTPd 1.2.9 rc2 - '.ASCII' File Remote Code Execution (2)
|
This is a remote exploit for linux platform. Description: ProFTPd 1.2.9 rc2 - '.ASCII' File Remote Code Execution (2). Author: Solar Eclipse
|
Analyze the security implications of: ProFTPd 1.2.9 rc2 - '.ASCII' File Remote Code Execution (2)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Guppy 4.5.9 - 'REMOTE_ADDR' Remote Command Execution
|
This is a webapps exploit for php platform. Description: Guppy 4.5.9 - 'REMOTE_ADDR' Remote Command Execution. Author: rgod
|
Analyze the security implications of: Guppy 4.5.9 - 'REMOTE_ADDR' Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Exero CMS 1.0.1 - 'theme' Multiple Local File Inclusions
|
This is a webapps exploit for php platform. Description: Exero CMS 1.0.1 - 'theme' Multiple Local File Inclusions. Author: GoLd_M
|
Analyze the security implications of: Exero CMS 1.0.1 - 'theme' Multiple Local File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP 5.0.0 - 'domxml_open_file()' Local Denial of Service
|
This is a dos exploit for php platform. Description: PHP 5.0.0 - 'domxml_open_file()' Local Denial of Service. Author: Yakir Wizman
|
Analyze the security implications of: PHP 5.0.0 - 'domxml_open_file()' Local Denial of Service
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Best pos Management System v1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Best pos Management System v1.0 - SQL Injection. Author: Ahmed Ismail
|
Analyze the security implications of: Best pos Management System v1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Netis ADSL Router DL4322D RTK 2.1.1 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for hardware platform. Description: Netis ADSL Router DL4322D RTK 2.1.1 - Cross-Site Request Forgery (Add Admin). Author: cakes
|
Analyze the security implications of: Netis ADSL Router DL4322D RTK 2.1.1 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: eGroupWare 1.8.006 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: eGroupWare 1.8.006 - Multiple Vulnerabilities. Author: High-Tech Bridge SA
|
Analyze the security implications of: eGroupWare 1.8.006 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ABUS Security Camera TVIP 20000-21150 - LFI_ RCE and SSH Root Access
|
This is a remote exploit for hardware platform. Description: ABUS Security Camera TVIP 20000-21150 - LFI_ RCE and SSH Root Access. Author: d1g@segfault.net
|
Analyze the security implications of: ABUS Security Camera TVIP 20000-21150 - LFI_ RCE and SSH Root Access
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: xterm - DECRQSS Remote Command Execution
|
This is a remote exploit for linux platform. Description: xterm - DECRQSS Remote Command Execution. Author: Paul Szabo
|
Analyze the security implications of: xterm - DECRQSS Remote Command Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: FuguHub 8.1 - Remote Code Execution
|
This is a webapps exploit for multiple platform. Description: FuguHub 8.1 - Remote Code Execution. Author: redfire359
|
Analyze the security implications of: FuguHub 8.1 - Remote Code Execution
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_state_criteria.inc.php?base_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_state_criteria.inc.php?base_path' Remote File Inclusion. Author: indoushka
|
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_state_criteria.inc.php?base_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.