input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Cacti 0.8.6d - Remote Command Execution
|
This is a webapps exploit for php platform. Description: Cacti 0.8.6d - Remote Command Execution. Author: Alberto Trivero
|
Analyze the security implications of: Cacti 0.8.6d - Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 - Hidden Backdoor Account (Write Access)
|
This is a webapps exploit for hardware platform. Description: FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 - Hidden Backdoor Account (Write Access). Author: LiquidWorm
|
Analyze the security implications of: FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 - Hidden Backdoor Account (Write Access)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Link Trader - 'lnkid' SQL Injection
|
This is a webapps exploit for php platform. Description: Link Trader - 'lnkid' SQL Injection. Author: Hussin X
|
Analyze the security implications of: Link Trader - 'lnkid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alice Gate2 Plus Wi-Fi Router - Cross-Site Request Forgery
|
This is a webapps exploit for cgi platform. Description: Alice Gate2 Plus Wi-Fi Router - Cross-Site Request Forgery. Author: WarGame
|
Analyze the security implications of: Alice Gate2 Plus Wi-Fi Router - Cross-Site Request Forgery
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: LinksCaffe 3.0 - 'menu.inc.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: LinksCaffe 3.0 - 'menu.inc.php' Multiple Cross-Site Scripting Vulnerabilities. Author: simo64
|
Analyze the security implications of: LinksCaffe 3.0 - 'menu.inc.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AppServ Open Project 2.5.10 - 'appservlang' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: AppServ Open Project 2.5.10 - 'appservlang' Cross-Site Scripting. Author: CWH Underground
|
Analyze the security implications of: AppServ Open Project 2.5.10 - 'appservlang' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: blogBuddies 0.3 - 'magpie_slashbox.php?rss_url' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: blogBuddies 0.3 - 'magpie_slashbox.php?rss_url' Cross-Site Scripting. Author: gb.network
|
Analyze the security implications of: blogBuddies 0.3 - 'magpie_slashbox.php?rss_url' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_adds - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_adds - Blind SQL Injection. Author: DevilZ TM
|
Analyze the security implications of: Joomla! Component com_adds - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eXtremail 2.1.1 - PLAIN Authentication Remote Stack Overflow
|
This is a remote exploit for linux platform. Description: eXtremail 2.1.1 - PLAIN Authentication Remote Stack Overflow. Author: mu-b
|
Analyze the security implications of: eXtremail 2.1.1 - PLAIN Authentication Remote Stack Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Outblaze Webmail - Cookie Authentication Bypass
|
This is a webapps exploit for cgi platform. Description: Outblaze Webmail - Cookie Authentication Bypass. Author: dong-h0un U
|
Analyze the security implications of: Outblaze Webmail - Cookie Authentication Bypass
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: PHP 5.3.6 - Local Buffer Overflow (ROP)
|
This is a local exploit for multiple platform. Description: PHP 5.3.6 - Local Buffer Overflow (ROP). Author: Jonathan Salwan
|
Analyze the security implications of: PHP 5.3.6 - Local Buffer Overflow (ROP)
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apache Tomcat < 6.0.18 - 'utf8' Directory Traversal (PoC)
|
This is a remote exploit for multiple platform. Description: Apache Tomcat < 6.0.18 - 'utf8' Directory Traversal (PoC). Author: Simon Ryeo
|
Analyze the security implications of: Apache Tomcat < 6.0.18 - 'utf8' Directory Traversal (PoC)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: BandSite CMS 1.1 - 'help_news.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: BandSite CMS 1.1 - 'help_news.php' Cross-Site Scripting. Author: HACKERS PAL
|
Analyze the security implications of: BandSite CMS 1.1 - 'help_news.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link DWL-G700AP 2.00/2.01 - HTTPd Denial of Service
|
This is a dos exploit for hardware platform. Description: D-Link DWL-G700AP 2.00/2.01 - HTTPd Denial of Service. Author: l0om
|
Analyze the security implications of: D-Link DWL-G700AP 2.00/2.01 - HTTPd Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: DMSEasy 0.9.7 - 'FCKeditor' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: DMSEasy 0.9.7 - 'FCKeditor' Arbitrary File Upload. Author: sh00t0ut
|
Analyze the security implications of: DMSEasy 0.9.7 - 'FCKeditor' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: zlog 1.2.15 - Buffer Overflow
|
This is a local exploit for multiple platform. Description: zlog 1.2.15 - Buffer Overflow. Author: LIWEI
|
Analyze the security implications of: zlog 1.2.15 - Buffer Overflow
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Hotel Management System 1.0 - Cross-Site Scripting (XSS) Arbitrary File Upload Remote Code Execution (RCE)
|
This is a webapps exploit for php platform. Description: Hotel Management System 1.0 - Cross-Site Scripting (XSS) Arbitrary File Upload Remote Code Execution (RCE). Author: Merbin Russel
|
Analyze the security implications of: Hotel Management System 1.0 - Cross-Site Scripting (XSS) Arbitrary File Upload Remote Code Execution (RCE)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dbltek GoIP - Local File Inclusion
|
This is a webapps exploit for hardware platform. Description: Dbltek GoIP - Local File Inclusion. Author: Valtteri Lehtinen
|
Analyze the security implications of: Dbltek GoIP - Local File Inclusion
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Carel pCOWeb < B1.2.1 - Credentials Disclosure
|
This is a webapps exploit for hardware platform. Description: Carel pCOWeb < B1.2.1 - Credentials Disclosure. Author: Luca.Chiou
|
Analyze the security implications of: Carel pCOWeb < B1.2.1 - Credentials Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Mambo Component com_downloads - SQL Injection
|
This is a webapps exploit for php platform. Description: Mambo Component com_downloads - SQL Injection. Author: S@BUN
|
Analyze the security implications of: Mambo Component com_downloads - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LiveStreet 0.2 - '/include/ajax/blogInfo.php?asd' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: LiveStreet 0.2 - '/include/ajax/blogInfo.php?asd' Cross-Site Scripting. Author: Inj3ct0r
|
Analyze the security implications of: LiveStreet 0.2 - '/include/ajax/blogInfo.php?asd' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_dshop - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_dshop - SQL Injection. Author: CoBRa_21
|
Analyze the security implications of: Joomla! Component com_dshop - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Web Ofisi E-Ticaret 3 - 'a' SQL Injection
|
This is a webapps exploit for linux platform. Description: Web Ofisi E-Ticaret 3 - 'a' SQL Injection. Author: Ahmet Ümit BAYRAM
|
Analyze the security implications of: Web Ofisi E-Ticaret 3 - 'a' SQL Injection
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: P5 FNIP-8x16A FNIP-4xSH 1.0.20 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for hardware platform. Description: P5 FNIP-8x16A FNIP-4xSH 1.0.20 - Cross-Site Request Forgery (Add Admin). Author: LiquidWorm
|
Analyze the security implications of: P5 FNIP-8x16A FNIP-4xSH 1.0.20 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Android DRM Services - Buffer Overflow
|
This is a dos exploit for android platform. Description: Android DRM Services - Buffer Overflow. Author: Tamir Zahavi-Brunner
|
Analyze the security implications of: Android DRM Services - Buffer Overflow
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: MySQL 4.x/5.x - Server Date_Format Denial of Service
|
This is a dos exploit for linux platform. Description: MySQL 4.x/5.x - Server Date_Format Denial of Service. Author: Christian Hammers
|
Analyze the security implications of: MySQL 4.x/5.x - Server Date_Format Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: WebRTC - Private IP Leakage (Metasploit)
|
This is a webapps exploit for multiple platform. Description: WebRTC - Private IP Leakage (Metasploit). Author: Dhiraj Mishra
|
Analyze the security implications of: WebRTC - Private IP Leakage (Metasploit)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_doqment - 'cid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_doqment - 'cid' SQL Injection. Author: Gamoscu
|
Analyze the security implications of: Joomla! Component com_doqment - 'cid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Fenice Oms server 1.10 - exec-shield Remote Buffer Overflow
|
This is a remote exploit for linux platform. Description: Fenice Oms server 1.10 - exec-shield Remote Buffer Overflow. Author: Xpl017Elz
|
Analyze the security implications of: Fenice Oms server 1.10 - exec-shield Remote Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Harland Scripts 11 - Products Remote Command Execution
|
This is a webapps exploit for php platform. Description: Harland Scripts 11 - Products Remote Command Execution. Author: G4N0K
|
Analyze the security implications of: Harland Scripts 11 - Products Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: cPanel - HTTP Response Splitting
|
This is a webapps exploit for multiple platform. Description: cPanel - HTTP Response Splitting. Author: Trancer
|
Analyze the security implications of: cPanel - HTTP Response Splitting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Jax PHP Scripts 1.0/1.34/2.14/3.31 - 'sign_in.php?language' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Jax PHP Scripts 1.0/1.34/2.14/3.31 - 'sign_in.php?language' Cross-Site Scripting. Author: Lostmon
|
Analyze the security implications of: Jax PHP Scripts 1.0/1.34/2.14/3.31 - 'sign_in.php?language' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sony Playstation 4 (PS4) < 6.72 - WebKit Code Execution (PoC)
|
This is a webapps exploit for hardware platform. Description: Sony Playstation 4 (PS4) < 6.72 - WebKit Code Execution (PoC). Author: TJ Corley
|
Analyze the security implications of: Sony Playstation 4 (PS4) < 6.72 - WebKit Code Execution (PoC)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.