input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sitecore 9.0 rev 171002 - Persistent Cross-Site Scripting
|
This is a webapps exploit for aspx platform. Description: Sitecore 9.0 rev 171002 - Persistent Cross-Site Scripting. Author: Owais Mehtab
|
Analyze the security implications of: Sitecore 9.0 rev 171002 - Persistent Cross-Site Scripting
|
This exploit targets aspx systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aspx platform
|
What is this exploit about: CuteNews 1.4.6 - 'ip ban' Authorized Cross-Site Scripting / Command Execution
|
This is a webapps exploit for php platform. Description: CuteNews 1.4.6 - 'ip ban' Authorized Cross-Site Scripting / Command Execution. Author: StAkeR
|
Analyze the security implications of: CuteNews 1.4.6 - 'ip ban' Authorized Cross-Site Scripting / Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Basic B2B Script 2.0.8 - 'product_details.php?id' SQL Injection
|
This is a webapps exploit for php platform. Description: Basic B2B Script 2.0.8 - 'product_details.php?id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Basic B2B Script 2.0.8 - 'product_details.php?id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LightRO CMS 1.0 - 'inhalt.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: LightRO CMS 1.0 - 'inhalt.php' Remote File Inclusion. Author: ajann
|
Analyze the security implications of: LightRO CMS 1.0 - 'inhalt.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Google Android - android.util.MemoryIntArray Ashmem Race Conditions
|
This is a dos exploit for android platform. Description: Google Android - android.util.MemoryIntArray Ashmem Race Conditions. Author: Google Security Research
|
Analyze the security implications of: Google Android - android.util.MemoryIntArray Ashmem Race Conditions
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Setelsa Conacwin 3.7.1.2 - Local File Inclusion
|
This is a webapps exploit for multiple platform. Description: Setelsa Conacwin 3.7.1.2 - Local File Inclusion. Author: Bryan Rodriguez Martin
|
Analyze the security implications of: Setelsa Conacwin 3.7.1.2 - Local File Inclusion
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Oracle 10g - 'LT.FINDRICSET' SQL Injection (IDS Evasion)
|
This is a local exploit for multiple platform. Description: Oracle 10g - 'LT.FINDRICSET' SQL Injection (IDS Evasion). Author: sh2kerr
|
Analyze the security implications of: Oracle 10g - 'LT.FINDRICSET' SQL Injection (IDS Evasion)
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: SurgeLDAP 1.0 - 'User.cgi' Directory Traversal
|
This is a remote exploit for cgi platform. Description: SurgeLDAP 1.0 - 'User.cgi' Directory Traversal. Author: dr_insane
|
Analyze the security implications of: SurgeLDAP 1.0 - 'User.cgi' Directory Traversal
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 64-bit - Remote Code Execution (RCE)
|
This is a remote exploit for multiple platform. Description: Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 64-bit - Remote Code Execution (RCE). Author: nu11secur1ty
|
Analyze the security implications of: Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 64-bit - Remote Code Execution (RCE)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Neo4j 3.4.18 - RMI based Remote Code Execution (RCE)
|
This is a remote exploit for java platform. Description: Neo4j 3.4.18 - RMI based Remote Code Execution (RCE). Author: Christopher Ellis
|
Analyze the security implications of: Neo4j 3.4.18 - RMI based Remote Code Execution (RCE)
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Alstrasoft Template Seller Pro 3.25 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: Alstrasoft Template Seller Pro 3.25 - Remote Code Execution. Author: BlackHawk
|
Analyze the security implications of: Alstrasoft Template Seller Pro 3.25 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Transferable Remote 1.1 iPad iPhone - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Transferable Remote 1.1 iPad iPhone - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: Transferable Remote 1.1 iPad iPhone - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component MCQuiz 0.9 Final - 'tid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component MCQuiz 0.9 Final - 'tid' SQL Injection. Author: S@BUN
|
Analyze the security implications of: Joomla! Component MCQuiz 0.9 Final - 'tid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Groone's GLink ORGanizer - 'index.php?cat' SQL Injection
|
This is a webapps exploit for php platform. Description: Groone's GLink ORGanizer - 'index.php?cat' SQL Injection. Author: nuclear
|
Analyze the security implications of: Groone's GLink ORGanizer - 'index.php?cat' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LXR 0.9.x - Cross Referencer Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: LXR 0.9.x - Cross Referencer Multiple Cross-Site Scripting Vulnerabilities. Author: Dan Rosenberg
|
Analyze the security implications of: LXR 0.9.x - Cross Referencer Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ewire Payment Client 1.60/1.70 - Command Execution
|
This is a webapps exploit for php platform. Description: ewire Payment Client 1.60/1.70 - Command Execution. Author: anonymous
|
Analyze the security implications of: ewire Payment Client 1.60/1.70 - Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Check Point Software Firewall-1 3.0/1 4.0/1 4.1 - Session Agent Dictionary Attack (1)
|
This is a remote exploit for multiple platform. Description: Check Point Software Firewall-1 3.0/1 4.0/1 4.1 - Session Agent Dictionary Attack (1). Author: Nelson Brito
|
Analyze the security implications of: Check Point Software Firewall-1 3.0/1 4.0/1 4.1 - Session Agent Dictionary Attack (1)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Digital Crime Report Management System 1.0 - SQL Injection (Authentication Bypass)
|
This is a webapps exploit for php platform. Description: Digital Crime Report Management System 1.0 - SQL Injection (Authentication Bypass). Author: GaluhID
|
Analyze the security implications of: Digital Crime Report Management System 1.0 - SQL Injection (Authentication Bypass)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AShop Deluxe 4.5 - 'salesadmin.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: AShop Deluxe 4.5 - 'salesadmin.php' Cross-Site Scripting. Author: Hackers Center Security
|
Analyze the security implications of: AShop Deluxe 4.5 - 'salesadmin.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection
|
This is a webapps exploit for hardware platform. Description: RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection. Author: Olga Villagran
|
Analyze the security implications of: RICOH Aficio SP 5210SF Printer - 'entryNameIn' HTML Injection
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: OpenFiler 2.99.1 - Arbitrary Code Execution
|
This is a webapps exploit for hardware platform. Description: OpenFiler 2.99.1 - Arbitrary Code Execution. Author: Dolev Farhi
|
Analyze the security implications of: OpenFiler 2.99.1 - Arbitrary Code Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: EmbryoCore 1.03 - 'index.php' SQL Injection
|
This is a webapps exploit for php platform. Description: EmbryoCore 1.03 - 'index.php' SQL Injection. Author: KedAns-Dz
|
Analyze the security implications of: EmbryoCore 1.03 - 'index.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Xpdf 3.01 - Local Heap Overflow / Null Pointer Dereference
|
This is a local exploit for multiple platform. Description: Xpdf 3.01 - Local Heap Overflow / Null Pointer Dereference. Author: Adam Zabrocki
|
Analyze the security implications of: Xpdf 3.01 - Local Heap Overflow / Null Pointer Dereference
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: GaleriaSHQIP 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: GaleriaSHQIP 1.0 - SQL Injection. Author: Valentin
|
Analyze the security implications of: GaleriaSHQIP 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Aspee Ziyaretci Defteri - 'giris.asp' Multiple Field SQL Injections
|
This is a webapps exploit for asp platform. Description: Aspee Ziyaretci Defteri - 'giris.asp' Multiple Field SQL Injections. Author: ShaFuq31
|
Analyze the security implications of: Aspee Ziyaretci Defteri - 'giris.asp' Multiple Field SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Linux Kernel 3.13 - SGID Privilege Escalation
|
This is a local exploit for linux platform. Description: Linux Kernel 3.13 - SGID Privilege Escalation. Author: Vitaly Nikolenko
|
Analyze the security implications of: Linux Kernel 3.13 - SGID Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: impleo music Collection 2.0 - SQL Injection / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: impleo music Collection 2.0 - SQL Injection / Cross-Site Scripting. Author: SirGod
|
Analyze the security implications of: impleo music Collection 2.0 - SQL Injection / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dooblou WiFi File Explorer 1.13.3 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Dooblou WiFi File Explorer 1.13.3 - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: Dooblou WiFi File Explorer 1.13.3 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 2.6.31-rc7 - 'AF_LLC getsockname' 5-Byte Stack Disclosure
|
This is a local exploit for linux platform. Description: Linux Kernel 2.6.31-rc7 - 'AF_LLC getsockname' 5-Byte Stack Disclosure. Author: Jon Oberheide
|
Analyze the security implications of: Linux Kernel 2.6.31-rc7 - 'AF_LLC getsockname' 5-Byte Stack Disclosure
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_hotspots - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_hotspots - SQL Injection. Author: cOndemned
|
Analyze the security implications of: Joomla! Component com_hotspots - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
|
This is a webapps exploit for hardware platform. Description: OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution. Author: Jonatas Fil
|
Analyze the security implications of: OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: getaphpsite Real Estate - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: getaphpsite Real Estate - Arbitrary File Upload. Author: ZoRLu
|
Analyze the security implications of: getaphpsite Real Estate - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ABB Cylon Aspect 3.08.02 (uploadDb.php) - Remote Code Execution
|
This is a hardware exploit for multiple platform. Description: ABB Cylon Aspect 3.08.02 (uploadDb.php) - Remote Code Execution. Author: LiquidWorm
|
Analyze the security implications of: ABB Cylon Aspect 3.08.02 (uploadDb.php) - Remote Code Execution
|
This exploit targets multiple systems. Type: hardware. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.