input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets irix platform
|
What is this exploit about: Ninja Privilege Escalation Detection and Prevention System 0.1.3 - Race Condition Privilege Escalation
|
This is a local exploit for linux platform. Description: Ninja Privilege Escalation Detection and Prevention System 0.1.3 - Race Condition Privilege Escalation. Author: Ben Sheppard
|
Analyze the security implications of: Ninja Privilege Escalation Detection and Prevention System 0.1.3 - Race Condition Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component Agenda Address Book 1.0.1 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Agenda Address Book 1.0.1 - 'id' SQL Injection. Author: v3n0m
|
Analyze the security implications of: Joomla! Component Agenda Address Book 1.0.1 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Blog System 1.x - 'note' SQL Injection
|
This is a webapps exploit for php platform. Description: Blog System 1.x - 'note' SQL Injection. Author: h4ck3r
|
Analyze the security implications of: Blog System 1.x - 'note' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HIOX GUEST BOOK (HGB) 4.0 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: HIOX GUEST BOOK (HGB) 4.0 - Remote Code Execution. Author: Dj7xpl
|
Analyze the security implications of: HIOX GUEST BOOK (HGB) 4.0 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 724CMS Enterprise 4.59 - SQL Injection
|
This is a webapps exploit for php platform. Description: 724CMS Enterprise 4.59 - SQL Injection. Author: cyberlog
|
Analyze the security implications of: 724CMS Enterprise 4.59 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Advneced Management For Services Sites - File Disclosure
|
This is a webapps exploit for php platform. Description: Advneced Management For Services Sites - File Disclosure. Author: indoushka
|
Analyze the security implications of: Advneced Management For Services Sites - File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_sef - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_sef - Remote File Inclusion. Author: Li0n-PaL
|
Analyze the security implications of: Joomla! Component com_sef - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Fast FAQs System - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Fast FAQs System - Authentication Bypass. Author: x0r
|
Analyze the security implications of: Fast FAQs System - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Yosoro 1.0.4 - Remote Code Execution
|
This is a webapps exploit for macos platform. Description: Yosoro 1.0.4 - Remote Code Execution. Author: Carlo Pelliccioni
|
Analyze the security implications of: Yosoro 1.0.4 - Remote Code Execution
|
This exploit targets macos systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: Fez 1.3/2.0 RC1 - 'list.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Fez 1.3/2.0 RC1 - 'list.php' SQL Injection. Author: d3v1l
|
Analyze the security implications of: Fez 1.3/2.0 RC1 - 'list.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Safari 10.0.3 - 'JSC::CachedCall' Use-After-Free
|
This is a remote exploit for macos platform. Description: Apple Safari 10.0.3 - 'JSC::CachedCall' Use-After-Free. Author: saelo & niklasb
|
Analyze the security implications of: Apple Safari 10.0.3 - 'JSC::CachedCall' Use-After-Free
|
This exploit targets macos systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: Joomla! / Mambo Component com_team - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_team - SQL Injection. Author: S@BUN
|
Analyze the security implications of: Joomla! / Mambo Component com_team - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Pixelimity 1.0 - 'password' Cross-Site Request Forgery
|
This is a webapps exploit for multiple platform. Description: Pixelimity 1.0 - 'password' Cross-Site Request Forgery. Author: Noth
|
Analyze the security implications of: Pixelimity 1.0 - 'password' Cross-Site Request Forgery
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: dotCMS 1.6 - 'id' Local File Inclusion
|
This is a webapps exploit for php platform. Description: dotCMS 1.6 - 'id' Local File Inclusion. Author: Don
|
Analyze the security implications of: dotCMS 1.6 - 'id' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: NuSchool 1.0 - 'CampusNewsDetails.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: NuSchool 1.0 - 'CampusNewsDetails.asp' SQL Injection. Author: ajann
|
Analyze the security implications of: NuSchool 1.0 - 'CampusNewsDetails.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: infoware - SQL Injection
|
This is a webapps exploit for php platform. Description: infoware - SQL Injection. Author: cyberlog
|
Analyze the security implications of: infoware - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Creasito E-Commerce Content Manager - 'admin' Authentication Bypass
|
This is a webapps exploit for php platform. Description: Creasito E-Commerce Content Manager - 'admin' Authentication Bypass. Author: SlimTim10
|
Analyze the security implications of: Creasito E-Commerce Content Manager - 'admin' Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Net-SNMP 4.2.3 - snmpnetstat Remote Heap Overflow
|
This is a remote exploit for linux platform. Description: Net-SNMP 4.2.3 - snmpnetstat Remote Heap Overflow. Author: Juan M. de la Torre
|
Analyze the security implications of: Net-SNMP 4.2.3 - snmpnetstat Remote Heap Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: WU-FTPD 2.6.1 - Remote Command Execution
|
This is a remote exploit for linux platform. Description: WU-FTPD 2.6.1 - Remote Command Execution. Author: Teso
|
Analyze the security implications of: WU-FTPD 2.6.1 - Remote Command Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AdminBot 9.0.5 - 'live_status.lib.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: AdminBot 9.0.5 - 'live_status.lib.php' Remote File Inclusion. Author: ThE TiGeR
|
Analyze the security implications of: AdminBot 9.0.5 - 'live_status.lib.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Rae Media Real Estate Single Agent - SQL Injection
|
This is a webapps exploit for asp platform. Description: Rae Media Real Estate Single Agent - SQL Injection. Author: R4dc0re
|
Analyze the security implications of: Rae Media Real Estate Single Agent - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: GZ Forum Script 1.8 - Stored Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: GZ Forum Script 1.8 - Stored Cross-Site Scripting (XSS). Author: CraCkEr
|
Analyze the security implications of: GZ Forum Script 1.8 - Stored Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Advanced Guestbook 2.x - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Advanced Guestbook 2.x - Multiple Cross-Site Scripting Vulnerabilities. Author: Handrix
|
Analyze the security implications of: Advanced Guestbook 2.x - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Atmail WebMail - Message Attachment File Name Reflected Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Atmail WebMail - Message Attachment File Name Reflected Cross-Site Scripting. Author: Vicente Aguilera Diaz
|
Analyze the security implications of: Atmail WebMail - Message Attachment File Name Reflected Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link DIR-880L - Multiple Buffer Overflow Vulnerabilities
|
This is a remote exploit for hardware platform. Description: D-Link DIR-880L - Multiple Buffer Overflow Vulnerabilities. Author: Samuel Huntley
|
Analyze the security implications of: D-Link DIR-880L - Multiple Buffer Overflow Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - '/admin/index.php?base_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - '/admin/index.php?base_path' Remote File Inclusion. Author: indoushka
|
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - '/admin/index.php?base_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BSA Radar 1.6.7234.24750 - Cross-Site Request Forgery (Change Password)
|
This is a webapps exploit for hardware platform. Description: BSA Radar 1.6.7234.24750 - Cross-Site Request Forgery (Change Password). Author: William Summerhill
|
Analyze the security implications of: BSA Radar 1.6.7234.24750 - Cross-Site Request Forgery (Change Password)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: FreeWebShop.org 2.2.9 RC2 - 'lang_file' Local File Inclusion
|
This is a webapps exploit for php platform. Description: FreeWebShop.org 2.2.9 RC2 - 'lang_file' Local File Inclusion. Author: ahmadbady
|
Analyze the security implications of: FreeWebShop.org 2.2.9 RC2 - 'lang_file' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Enthrallweb eNews 1.0 - Remote User Pass Change
|
This is a webapps exploit for asp platform. Description: Enthrallweb eNews 1.0 - Remote User Pass Change. Author: ajann
|
Analyze the security implications of: Enthrallweb eNews 1.0 - Remote User Pass Change
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: AHG Search Engine 1.0 - 'search.cgi' Arbitrary Command Execution
|
This is a webapps exploit for cgi platform. Description: AHG Search Engine 1.0 - 'search.cgi' Arbitrary Command Execution. Author: Aleksey Sintsov
|
Analyze the security implications of: AHG Search Engine 1.0 - 'search.cgi' Arbitrary Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Hosting Controller 6.1 Hotfix 3.2 - Access
|
This is a webapps exploit for asp platform. Description: Hosting Controller 6.1 Hotfix 3.2 - Access. Author: Soroush Dalili
|
Analyze the security implications of: Hosting Controller 6.1 Hotfix 3.2 - Access
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ngIRCd 0.6/0.7/0.8 - Remote Buffer Overflow
|
This is a dos exploit for linux platform. Description: ngIRCd 0.6/0.7/0.8 - Remote Buffer Overflow. Author: Florian Westphal
|
Analyze the security implications of: ngIRCd 0.6/0.7/0.8 - Remote Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: burnCMS 0.2 - 'root' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: burnCMS 0.2 - 'root' Remote File Inclusion. Author: GoLd_M
|
Analyze the security implications of: burnCMS 0.2 - 'root' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.