input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ARSC Really Simple Chat 3.3 - Remote File Inclusion / Cross-Site Scripting | This is a webapps exploit for php platform. Description: ARSC Really Simple Chat 3.3 - Remote File Inclusion / Cross-Site Scripting. Author: Zer0 Thunder |
Analyze the security implications of: ARSC Really Simple Chat 3.3 - Remote File Inclusion / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DJ Calendar - 'DJcalendar.cgi TEMPLATE' File Disclosure | This is a webapps exploit for cgi platform. Description: DJ Calendar - 'DJcalendar.cgi TEMPLATE' File Disclosure. Author: cibbao |
Analyze the security implications of: DJ Calendar - 'DJcalendar.cgi TEMPLATE' File Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: CMS Made Simple 1.6.6 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: CMS Made Simple 1.6.6 - Multiple Vulnerabilities. Author: Beenu Arora |
Analyze the security implications of: CMS Made Simple 1.6.6 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sudo 1.6.8 - Information Disclosure | This is a local exploit for linux platform. Description: Sudo 1.6.8 - Information Disclosure. Author: Rosiello Security |
Analyze the security implications of: Sudo 1.6.8 - Information Disclosure | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Wifi HD Wireless Disk Drive 11 - Local File Inclusion | This is a remote exploit for ios platform. Description: Wifi HD Wireless Disk Drive 11 - Local File Inclusion. Author: Chokri Hammedi |
Analyze the security implications of: Wifi HD Wireless Disk Drive 11 - Local File Inclusion | This exploit targets ios systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Extreme phpBB 3.0.1 - 'functions.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Extreme phpBB 3.0.1 - 'functions.php' Remote File Inclusion. Author: Mehmet Ince |
Analyze the security implications of: Extreme phpBB 3.0.1 - 'functions.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WordPress Plugin Responsive Thumbnail Slider - Arbitrary File Upload (Metasploit) | This is a remote exploit for php platform. Description: WordPress Plugin Responsive Thumbnail Slider - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: WordPress Plugin Responsive Thumbnail Slider - Arbitrary File Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: dB Masters MultiMedia's Content Manager 4.5 - SQL Injection | This is a webapps exploit for php platform. Description: dB Masters MultiMedia's Content Manager 4.5 - SQL Injection. Author: NoGe |
Analyze the security implications of: dB Masters MultiMedia's Content Manager 4.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Netopia Timbuktu Pro for Macintosh 6.0.1 - Denial of Service | This is a dos exploit for osx platform. Description: Netopia Timbuktu Pro for Macintosh 6.0.1 - Denial of Service. Author: Tekno pHReak |
Analyze the security implications of: Netopia Timbuktu Pro for Macintosh 6.0.1 - Denial of Service | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: AJSquare Free Polling Script - 'DB' Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: AJSquare Free Polling Script - 'DB' Multiple Vulnerabilities. Author: G4N0K |
Analyze the security implications of: AJSquare Free Polling Script - 'DB' Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Craigs Classified Ads CMS Theme 1.0.2 - SQL Injection | This is a webapps exploit for php platform. Description: Craigs Classified Ads CMS Theme 1.0.2 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Craigs Classified Ads CMS Theme 1.0.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Canteen 1.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Canteen 1.0 - Local File Inclusion. Author: Drosophila |
Analyze the security implications of: Joomla! Component Canteen 1.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash - ATF Parser Heap Corruption | This is a dos exploit for multiple platform. Description: Adobe Flash - ATF Parser Heap Corruption. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - ATF Parser Heap Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: JCMS 2010 - File Download | This is a webapps exploit for jsp platform. Description: JCMS 2010 - File Download. Author: Beach |
Analyze the security implications of: JCMS 2010 - File Download | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Fusionphp Fusion News 3.3/3.6 - Administrator Command Execution | This is a webapps exploit for php platform. Description: Fusionphp Fusion News 3.3/3.6 - Administrator Command Execution. Author: Joseph Moniz |
Analyze the security implications of: Fusionphp Fusion News 3.3/3.6 - Administrator Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CyBoards PHP Lite 1.21 - 'script_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: CyBoards PHP Lite 1.21 - 'script_path' Remote File Inclusion. Author: bd0rk |
Analyze the security implications of: CyBoards PHP Lite 1.21 - 'script_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: pfSense - 'pkg.php?xml' Cross-Site Scripting | This is a remote exploit for hardware platform. Description: pfSense - 'pkg.php?xml' Cross-Site Scripting. Author: dave b |
Analyze the security implications of: pfSense - 'pkg.php?xml' Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: QNAP TVS-663 QTS < 4.2.4 build 20170313 - Command Injection | This is a webapps exploit for cgi platform. Description: QNAP TVS-663 QTS < 4.2.4 build 20170313 - Command Injection. Author: Harry Sintonen |
Analyze the security implications of: QNAP TVS-663 QTS < 4.2.4 build 20170313 - Command Injection | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: AlienVault OSSIM/USM < 5.3.1 - Remote Code Execution (Metasploit) | This is a webapps exploit for php platform. Description: AlienVault OSSIM/USM < 5.3.1 - Remote Code Execution (Metasploit). Author: Mehmet Ince |
Analyze the security implications of: AlienVault OSSIM/USM < 5.3.1 - Remote Code Execution (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: greeting card - Arbitrary File Upload | This is a webapps exploit for php platform. Description: greeting card - Arbitrary File Upload. Author: Mr.Benladen |
Analyze the security implications of: greeting card - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zilab Chat and Instant Messaging (ZIM) 2.0/2.1 Server - Multiple Vulnerabilities | This is a dos exploit for multiple platform. Description: Zilab Chat and Instant Messaging (ZIM) 2.0/2.1 Server - Multiple Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: Zilab Chat and Instant Messaging (ZIM) 2.0/2.1 Server - Multiple Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DIGIT CENTRIS 4 ERP - 'datum1' SQL Injection | This is a webapps exploit for php platform. Description: DIGIT CENTRIS 4 ERP - 'datum1' SQL Injection. Author: n1x_ |
Analyze the security implications of: DIGIT CENTRIS 4 ERP - 'datum1' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Android - IOMX 'getConfig'/'getParameter' Information Disclosure | This is a dos exploit for android platform. Description: Google Android - IOMX 'getConfig'/'getParameter' Information Disclosure. Author: Google Security Research |
Analyze the security implications of: Google Android - IOMX 'getConfig'/'getParameter' Information Disclosure | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Joomla! Component com_rd_download - Local File Disclosure | This is a webapps exploit for php platform. Description: Joomla! Component com_rd_download - Local File Disclosure. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_rd_download - Local File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.4/2.6 - Sigqueue Blocking Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.4/2.6 - Sigqueue Blocking Denial of Service. Author: Nikita V. Youshchenko |
Analyze the security implications of: Linux Kernel 2.4/2.6 - Sigqueue Blocking Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_joomdocs - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component com_joomdocs - Cross-Site Scripting. Author: Sid3^effects |
Analyze the security implications of: Joomla! Component com_joomdocs - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LibGuides - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: LibGuides - Multiple Cross-Site Scripting Vulnerabilities. Author: Crim3R |
Analyze the security implications of: LibGuides - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Elite Gaming Ladders 3.6 - SQL Injection | This is a webapps exploit for php platform. Description: Elite Gaming Ladders 3.6 - SQL Injection. Author: J.O |
Analyze the security implications of: Elite Gaming Ladders 3.6 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Made Simple Module Antz Toolkit 1.02 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: CMS Made Simple Module Antz Toolkit 1.02 - Arbitrary File Upload. Author: John Leitch |
Analyze the security implications of: CMS Made Simple Module Antz Toolkit 1.02 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HostAdmin - Full Path Disclosure | This is a webapps exploit for php platform. Description: HostAdmin - Full Path Disclosure. Author: G00db0y |
Analyze the security implications of: HostAdmin - Full Path Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: APT-WEBSHOP-SYSTEM - 'modules.php' SQL Injection | This is a webapps exploit for php platform. Description: APT-WEBSHOP-SYSTEM - 'modules.php' SQL Injection. Author: secret |
Analyze the security implications of: APT-WEBSHOP-SYSTEM - 'modules.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Calendar Event Multi View 1.4.07 - Unauthenticated Arbitrary Event Creation to Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Calendar Event Multi View 1.4.07 - Unauthenticated Arbitrary Event Creation to Cross-Site Scripting (XSS). Author: Mostafa Farzaneh |
Analyze the security implications of: Calendar Event Multi View 1.4.07 - Unauthenticated Arbitrary Event Creation to Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Made Simple 1.0.5 - 'Stylesheet.php' SQL Injection | This is a webapps exploit for php platform. Description: CMS Made Simple 1.0.5 - 'Stylesheet.php' SQL Injection. Author: Daniel Lucq |
Analyze the security implications of: CMS Made Simple 1.0.5 - 'Stylesheet.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.