input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ARSC Really Simple Chat 3.3 - Remote File Inclusion / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: ARSC Really Simple Chat 3.3 - Remote File Inclusion / Cross-Site Scripting. Author: Zer0 Thunder
|
Analyze the security implications of: ARSC Really Simple Chat 3.3 - Remote File Inclusion / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DJ Calendar - 'DJcalendar.cgi TEMPLATE' File Disclosure
|
This is a webapps exploit for cgi platform. Description: DJ Calendar - 'DJcalendar.cgi TEMPLATE' File Disclosure. Author: cibbao
|
Analyze the security implications of: DJ Calendar - 'DJcalendar.cgi TEMPLATE' File Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: CMS Made Simple 1.6.6 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: CMS Made Simple 1.6.6 - Multiple Vulnerabilities. Author: Beenu Arora
|
Analyze the security implications of: CMS Made Simple 1.6.6 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sudo 1.6.8 - Information Disclosure
|
This is a local exploit for linux platform. Description: Sudo 1.6.8 - Information Disclosure. Author: Rosiello Security
|
Analyze the security implications of: Sudo 1.6.8 - Information Disclosure
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Wifi HD Wireless Disk Drive 11 - Local File Inclusion
|
This is a remote exploit for ios platform. Description: Wifi HD Wireless Disk Drive 11 - Local File Inclusion. Author: Chokri Hammedi
|
Analyze the security implications of: Wifi HD Wireless Disk Drive 11 - Local File Inclusion
|
This exploit targets ios systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Extreme phpBB 3.0.1 - 'functions.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Extreme phpBB 3.0.1 - 'functions.php' Remote File Inclusion. Author: Mehmet Ince
|
Analyze the security implications of: Extreme phpBB 3.0.1 - 'functions.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WordPress Plugin Responsive Thumbnail Slider - Arbitrary File Upload (Metasploit)
|
This is a remote exploit for php platform. Description: WordPress Plugin Responsive Thumbnail Slider - Arbitrary File Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: WordPress Plugin Responsive Thumbnail Slider - Arbitrary File Upload (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: dB Masters MultiMedia's Content Manager 4.5 - SQL Injection
|
This is a webapps exploit for php platform. Description: dB Masters MultiMedia's Content Manager 4.5 - SQL Injection. Author: NoGe
|
Analyze the security implications of: dB Masters MultiMedia's Content Manager 4.5 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Netopia Timbuktu Pro for Macintosh 6.0.1 - Denial of Service
|
This is a dos exploit for osx platform. Description: Netopia Timbuktu Pro for Macintosh 6.0.1 - Denial of Service. Author: Tekno pHReak
|
Analyze the security implications of: Netopia Timbuktu Pro for Macintosh 6.0.1 - Denial of Service
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: AJSquare Free Polling Script - 'DB' Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: AJSquare Free Polling Script - 'DB' Multiple Vulnerabilities. Author: G4N0K
|
Analyze the security implications of: AJSquare Free Polling Script - 'DB' Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Craigs Classified Ads CMS Theme 1.0.2 - SQL Injection
|
This is a webapps exploit for php platform. Description: Craigs Classified Ads CMS Theme 1.0.2 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Craigs Classified Ads CMS Theme 1.0.2 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Canteen 1.0 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Canteen 1.0 - Local File Inclusion. Author: Drosophila
|
Analyze the security implications of: Joomla! Component Canteen 1.0 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adobe Flash - ATF Parser Heap Corruption
|
This is a dos exploit for multiple platform. Description: Adobe Flash - ATF Parser Heap Corruption. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - ATF Parser Heap Corruption
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: JCMS 2010 - File Download
|
This is a webapps exploit for jsp platform. Description: JCMS 2010 - File Download. Author: Beach
|
Analyze the security implications of: JCMS 2010 - File Download
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Fusionphp Fusion News 3.3/3.6 - Administrator Command Execution
|
This is a webapps exploit for php platform. Description: Fusionphp Fusion News 3.3/3.6 - Administrator Command Execution. Author: Joseph Moniz
|
Analyze the security implications of: Fusionphp Fusion News 3.3/3.6 - Administrator Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CyBoards PHP Lite 1.21 - 'script_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: CyBoards PHP Lite 1.21 - 'script_path' Remote File Inclusion. Author: bd0rk
|
Analyze the security implications of: CyBoards PHP Lite 1.21 - 'script_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: pfSense - 'pkg.php?xml' Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: pfSense - 'pkg.php?xml' Cross-Site Scripting. Author: dave b
|
Analyze the security implications of: pfSense - 'pkg.php?xml' Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: QNAP TVS-663 QTS < 4.2.4 build 20170313 - Command Injection
|
This is a webapps exploit for cgi platform. Description: QNAP TVS-663 QTS < 4.2.4 build 20170313 - Command Injection. Author: Harry Sintonen
|
Analyze the security implications of: QNAP TVS-663 QTS < 4.2.4 build 20170313 - Command Injection
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: AlienVault OSSIM/USM < 5.3.1 - Remote Code Execution (Metasploit)
|
This is a webapps exploit for php platform. Description: AlienVault OSSIM/USM < 5.3.1 - Remote Code Execution (Metasploit). Author: Mehmet Ince
|
Analyze the security implications of: AlienVault OSSIM/USM < 5.3.1 - Remote Code Execution (Metasploit)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: greeting card - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: greeting card - Arbitrary File Upload. Author: Mr.Benladen
|
Analyze the security implications of: greeting card - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Zilab Chat and Instant Messaging (ZIM) 2.0/2.1 Server - Multiple Vulnerabilities
|
This is a dos exploit for multiple platform. Description: Zilab Chat and Instant Messaging (ZIM) 2.0/2.1 Server - Multiple Vulnerabilities. Author: Luigi Auriemma
|
Analyze the security implications of: Zilab Chat and Instant Messaging (ZIM) 2.0/2.1 Server - Multiple Vulnerabilities
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: DIGIT CENTRIS 4 ERP - 'datum1' SQL Injection
|
This is a webapps exploit for php platform. Description: DIGIT CENTRIS 4 ERP - 'datum1' SQL Injection. Author: n1x_
|
Analyze the security implications of: DIGIT CENTRIS 4 ERP - 'datum1' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Google Android - IOMX 'getConfig'/'getParameter' Information Disclosure
|
This is a dos exploit for android platform. Description: Google Android - IOMX 'getConfig'/'getParameter' Information Disclosure. Author: Google Security Research
|
Analyze the security implications of: Google Android - IOMX 'getConfig'/'getParameter' Information Disclosure
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Joomla! Component com_rd_download - Local File Disclosure
|
This is a webapps exploit for php platform. Description: Joomla! Component com_rd_download - Local File Disclosure. Author: FL0RiX
|
Analyze the security implications of: Joomla! Component com_rd_download - Local File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 2.4/2.6 - Sigqueue Blocking Denial of Service
|
This is a dos exploit for linux platform. Description: Linux Kernel 2.4/2.6 - Sigqueue Blocking Denial of Service. Author: Nikita V. Youshchenko
|
Analyze the security implications of: Linux Kernel 2.4/2.6 - Sigqueue Blocking Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_joomdocs - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Joomla! Component com_joomdocs - Cross-Site Scripting. Author: Sid3^effects
|
Analyze the security implications of: Joomla! Component com_joomdocs - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LibGuides - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: LibGuides - Multiple Cross-Site Scripting Vulnerabilities. Author: Crim3R
|
Analyze the security implications of: LibGuides - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Elite Gaming Ladders 3.6 - SQL Injection
|
This is a webapps exploit for php platform. Description: Elite Gaming Ladders 3.6 - SQL Injection. Author: J.O
|
Analyze the security implications of: Elite Gaming Ladders 3.6 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CMS Made Simple Module Antz Toolkit 1.02 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: CMS Made Simple Module Antz Toolkit 1.02 - Arbitrary File Upload. Author: John Leitch
|
Analyze the security implications of: CMS Made Simple Module Antz Toolkit 1.02 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HostAdmin - Full Path Disclosure
|
This is a webapps exploit for php platform. Description: HostAdmin - Full Path Disclosure. Author: G00db0y
|
Analyze the security implications of: HostAdmin - Full Path Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: APT-WEBSHOP-SYSTEM - 'modules.php' SQL Injection
|
This is a webapps exploit for php platform. Description: APT-WEBSHOP-SYSTEM - 'modules.php' SQL Injection. Author: secret
|
Analyze the security implications of: APT-WEBSHOP-SYSTEM - 'modules.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Calendar Event Multi View 1.4.07 - Unauthenticated Arbitrary Event Creation to Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Calendar Event Multi View 1.4.07 - Unauthenticated Arbitrary Event Creation to Cross-Site Scripting (XSS). Author: Mostafa Farzaneh
|
Analyze the security implications of: Calendar Event Multi View 1.4.07 - Unauthenticated Arbitrary Event Creation to Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CMS Made Simple 1.0.5 - 'Stylesheet.php' SQL Injection
|
This is a webapps exploit for php platform. Description: CMS Made Simple 1.0.5 - 'Stylesheet.php' SQL Injection. Author: Daniel Lucq
|
Analyze the security implications of: CMS Made Simple 1.0.5 - 'Stylesheet.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.