input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ArrowChat 1.5.61 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: ArrowChat 1.5.61 - Multiple Vulnerabilities. Author: kallimero |
Analyze the security implications of: ArrowChat 1.5.61 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Drupal Module Coder < 7.x-1.3/7.x-2.6 - Remote Code Execution | This is a remote exploit for php platform. Description: Drupal Module Coder < 7.x-1.3/7.x-2.6 - Remote Code Execution. Author: Raz0r |
Analyze the security implications of: Drupal Module Coder < 7.x-1.3/7.x-2.6 - Remote Code Execution | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component CW Article Attachments 1.0.6 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component CW Article Attachments 1.0.6 - 'id' SQL Injection. Author: Haboob Team |
Analyze the security implications of: Joomla! Component CW Article Attachments 1.0.6 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fancy Clone Script - 'search_browse_product' SQL Injection | This is a webapps exploit for php platform. Description: Fancy Clone Script - 'search_browse_product' SQL Injection. Author: 8bitsec |
Analyze the security implications of: Fancy Clone Script - 'search_browse_product' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Gadget Factory 1.0.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Gadget Factory 1.0.0 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Gadget Factory 1.0.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Horde Application Framework 3.3.8 - 'icon_browser.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Horde Application Framework 3.3.8 - 'icon_browser.php' Cross-Site Scripting. Author: Moritz Naumann |
Analyze the security implications of: Horde Application Framework 3.3.8 - 'icon_browser.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gate Pass Management System 2.1 - 'login' SQL Injection | This is a webapps exploit for php platform. Description: Gate Pass Management System 2.1 - 'login' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Gate Pass Management System 2.1 - 'login' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Arescom NetDSL-1000 - 'TelnetD' Remote Denial of Service | This is a dos exploit for hardware platform. Description: Arescom NetDSL-1000 - 'TelnetD' Remote Denial of Service. Author: Fabian Ramirez |
Analyze the security implications of: Arescom NetDSL-1000 - 'TelnetD' Remote Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: KTP Computer Customer Database CMS 1.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: KTP Computer Customer Database CMS 1.0 - Local File Inclusion. Author: CWH Underground |
Analyze the security implications of: KTP Computer Customer Database CMS 1.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lynx Message Server - Multiple Vulnerabilities | This is a webapps exploit for cgi platform. Description: Lynx Message Server - Multiple Vulnerabilities. Author: Mark Lachniet |
Analyze the security implications of: Lynx Message Server - Multiple Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: LinBit Technologies LINBOX Officeserver - Remote Authentication Bypass | This is a webapps exploit for cgi platform. Description: LinBit Technologies LINBOX Officeserver - Remote Authentication Bypass. Author: Martin Eiszner |
Analyze the security implications of: LinBit Technologies LINBOX Officeserver - Remote Authentication Bypass | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! Component com_surveymanager 1.5.0 - 'stype' SQL Injection | This is a webapps exploit for multiple platform. Description: Joomla! Component com_surveymanager 1.5.0 - 'stype' SQL Injection. Author: kaMtiEz |
Analyze the security implications of: Joomla! Component com_surveymanager 1.5.0 - 'stype' SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linksys SPA-2102 Phone Adapter Packet Handling - Denial of Service | This is a dos exploit for hardware platform. Description: Linksys SPA-2102 Phone Adapter Packet Handling - Denial of Service. Author: sipherr |
Analyze the security implications of: Linksys SPA-2102 Phone Adapter Packet Handling - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Eudora WorldMail 2.0 - Search Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Eudora WorldMail 2.0 - Search Cross-Site Scripting. Author: Donnie Werner |
Analyze the security implications of: Eudora WorldMail 2.0 - Search Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! Component com_tophotelmodule 1.0 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_tophotelmodule 1.0 - Blind SQL Injection. Author: boom3rang |
Analyze the security implications of: Joomla! Component com_tophotelmodule 1.0 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Power Board (IP.Board) 4.2.1 - 'searchText' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) 4.2.1 - 'searchText' Cross-Site Scripting. Author: sonyy |
Analyze the security implications of: Invision Power Board (IP.Board) 4.2.1 - 'searchText' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: VideoLAN VLC Media Player 1.1.11 - '.NSV' File Denial of Service | This is a dos exploit for multiple platform. Description: VideoLAN VLC Media Player 1.1.11 - '.NSV' File Denial of Service. Author: Dan Fosco |
Analyze the security implications of: VideoLAN VLC Media Player 1.1.11 - '.NSV' File Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Basic-CMS - 'q' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Basic-CMS - 'q' Cross-Site Scripting. Author: Pouya_Server |
Analyze the security implications of: Basic-CMS - 'q' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eRoom 6.0 PlugIn - Insecure File Download Handling | This is a webapps exploit for cgi platform. Description: eRoom 6.0 PlugIn - Insecure File Download Handling. Author: c0ntex |
Analyze the security implications of: eRoom 6.0 PlugIn - Insecure File Download Handling | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: BackupPC 3.x - 'index.cgi' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cgi platform. Description: BackupPC 3.x - 'index.cgi' Multiple Cross-Site Scripting Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: BackupPC 3.x - 'index.cgi' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: CUPS 1.1.x - Cupsd Request Method Denial of Service | This is a dos exploit for linux platform. Description: CUPS 1.1.x - Cupsd Request Method Denial of Service. Author: Phil D'Amore |
Analyze the security implications of: CUPS 1.1.x - Cupsd Request Method Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Coaster CMS 5.5.0 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Coaster CMS 5.5.0 - Cross-Site Scripting. Author: Ismail Tasdelen |
Analyze the security implications of: Coaster CMS 5.5.0 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ClanSphere 2011.0 - Local File Inclusion / Arbitrary File Upload | This is a webapps exploit for php platform. Description: ClanSphere 2011.0 - Local File Inclusion / Arbitrary File Upload. Author: KedAns-Dz |
Analyze the security implications of: ClanSphere 2011.0 - Local File Inclusion / Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DSL-2750u / DSL-2730u - (Authenticated) Local File Disclosure | This is a webapps exploit for hardware platform. Description: D-Link DSL-2750u / DSL-2730u - (Authenticated) Local File Disclosure. Author: SATHISH ARTHAR |
Analyze the security implications of: D-Link DSL-2750u / DSL-2730u - (Authenticated) Local File Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Blender 2.36 - '.BVF' File Import Python Code Execution | This is a webapps exploit for cgi platform. Description: Blender 2.36 - '.BVF' File Import Python Code Execution. Author: Joxean Koret |
Analyze the security implications of: Blender 2.36 - '.BVF' File Import Python Code Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: The Matt Wright Guestbook.pl - Arbitrary Command Execution (Metasploit) | This is a webapps exploit for cgi platform. Description: The Matt Wright Guestbook.pl - Arbitrary Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: The Matt Wright Guestbook.pl - Arbitrary Command Execution (Metasploit) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: ProFTPd 1.3.0 - 'sreplace' Remote Stack Overflow (Metasploit) | This is a remote exploit for linux platform. Description: ProFTPd 1.3.0 - 'sreplace' Remote Stack Overflow (Metasploit). Author: Evgeny Legerov |
Analyze the security implications of: ProFTPd 1.3.0 - 'sreplace' Remote Stack Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PHP 7.1 < 7.3 - 'json serializer' disable_functions Bypass | This is a webapps exploit for multiple platform. Description: PHP 7.1 < 7.3 - 'json serializer' disable_functions Bypass. Author: mm0r1 |
Analyze the security implications of: PHP 7.1 < 7.3 - 'json serializer' disable_functions Bypass | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Free PHP photo Gallery script - Remote Command Execution | This is a webapps exploit for php platform. Description: Free PHP photo Gallery script - Remote Command Execution. Author: ViRuS Qalaa |
Analyze the security implications of: Free PHP photo Gallery script - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Full PHP Emlak Script - 'landsee.php' SQL Injection | This is a webapps exploit for php platform. Description: Full PHP Emlak Script - 'landsee.php' SQL Injection. Author: Hussin X |
Analyze the security implications of: Full PHP Emlak Script - 'landsee.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OPMANAGER - Blind SQL Injection / XPath Injection | This is a webapps exploit for aix platform. Description: OPMANAGER - Blind SQL Injection / XPath Injection. Author: Asheesh kumar Mani Tripathi |
Analyze the security implications of: OPMANAGER - Blind SQL Injection / XPath Injection | This exploit targets aix systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: AShop Deluxe 4.5 - 'catalogue.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: AShop Deluxe 4.5 - 'catalogue.php' Cross-Site Scripting. Author: Hackers Center Security |
Analyze the security implications of: AShop Deluxe 4.5 - 'catalogue.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Calcium 3.10/4.0.4 - 'Calcium40.pl' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Calcium 3.10/4.0.4 - 'Calcium40.pl' Cross-Site Scripting. Author: Marvin Simkin |
Analyze the security implications of: Calcium 3.10/4.0.4 - 'Calcium40.pl' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.