input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_ninjamonial 1.1 - 'testimID' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_ninjamonial 1.1 - 'testimID' SQL Injection. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component com_ninjamonial 1.1 - 'testimID' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Atlassian HipChat for Jira Plugin - Velocity Template Injection (Metasploit) | This is a remote exploit for multiple platform. Description: Atlassian HipChat for Jira Plugin - Velocity Template Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Atlassian HipChat for Jira Plugin - Velocity Template Injection (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Adobe Flash - Use-After-Free in Applying Bitmap Filter | This is a dos exploit for multiple platform. Description: Adobe Flash - Use-After-Free in Applying Bitmap Filter. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Use-After-Free in Applying Bitmap Filter | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: LaCie 5big Network 2.2.8 - Command Injection | This is a remote exploit for cgi platform. Description: LaCie 5big Network 2.2.8 - Command Injection. Author: Timo Sablowski |
Analyze the security implications of: LaCie 5big Network 2.2.8 - Command Injection | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Alienvault OSSIM/USM 4.14/4.15/5.0 - Multiple Vulnerabilities | This is a webapps exploit for linux platform. Description: Alienvault OSSIM/USM 4.14/4.15/5.0 - Multiple Vulnerabilities. Author: Peter Lapp |
Analyze the security implications of: Alienvault OSSIM/USM 4.14/4.15/5.0 - Multiple Vulnerabilities | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WU-FTPD 2.4.2 / SCO Open Server 5.0.5 / ProFTPd 1.2 pre1 - 'realpath' Remote Buffer Overflow (1) | This is a remote exploit for linux platform. Description: WU-FTPD 2.4.2 / SCO Open Server 5.0.5 / ProFTPd 1.2 pre1 - 'realpath' Remote Buffer Overflow (1). Author: smiler & cossack |
Analyze the security implications of: WU-FTPD 2.4.2 / SCO Open Server 5.0.5 / ProFTPd 1.2 pre1 - 'realpath' Remote Buffer Overflow (1) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: VestaCP 0.9.8 - 'v_interface' Add IP Stored XSS | This is a webapps exploit for multiple platform. Description: VestaCP 0.9.8 - 'v_interface' Add IP Stored XSS. Author: numan türle |
Analyze the security implications of: VestaCP 0.9.8 - 'v_interface' Add IP Stored XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: cPanel - 'account' Cross-Site Scripting | This is a webapps exploit for php platform. Description: cPanel - 'account' Cross-Site Scripting. Author: Rafay Baloch |
Analyze the security implications of: cPanel - 'account' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FubarForum 1.6 - Arbitrary Authentication Bypass | This is a webapps exploit for php platform. Description: FubarForum 1.6 - Arbitrary Authentication Bypass. Author: k3yv4n |
Analyze the security implications of: FubarForum 1.6 - Arbitrary Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hughes Technologies DSL_Vdns 1.0 - Denial of Service | This is a dos exploit for multiple platform. Description: Hughes Technologies DSL_Vdns 1.0 - Denial of Service. Author: neme-dhc |
Analyze the security implications of: Hughes Technologies DSL_Vdns 1.0 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Web-APP.net WebAPP 0.9.x - 'index.cgi' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cgi platform. Description: Web-APP.net WebAPP 0.9.x - 'index.cgi' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t |
Analyze the security implications of: Web-APP.net WebAPP 0.9.x - 'index.cgi' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: DokuWiki 2006-03-09b - 'dwpage.php' Remote Code Execution | This is a webapps exploit for php platform. Description: DokuWiki 2006-03-09b - 'dwpage.php' Remote Code Execution. Author: rgod |
Analyze the security implications of: DokuWiki 2006-03-09b - 'dwpage.php' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: living Local 1.1 - Cross-Site Scripting / Arbitrary File Upload | This is a webapps exploit for php platform. Description: living Local 1.1 - Cross-Site Scripting / Arbitrary File Upload. Author: Bgh7 |
Analyze the security implications of: living Local 1.1 - Cross-Site Scripting / Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Claroline 1.5/1.6 - 'toolaccess_details.php?tool' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Claroline 1.5/1.6 - 'toolaccess_details.php?tool' Cross-Site Scripting. Author: Sieg Fried |
Analyze the security implications of: Claroline 1.5/1.6 - 'toolaccess_details.php?tool' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SOS JobScheduler 1.13.3 - Stored Password Decryption | This is a remote exploit for multiple platform. Description: SOS JobScheduler 1.13.3 - Stored Password Decryption. Author: Sander Ubink |
Analyze the security implications of: SOS JobScheduler 1.13.3 - Stored Password Decryption | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DT_Guestbook 1.0 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DT_Guestbook 1.0 - 'index.php' Cross-Site Scripting. Author: Jesper Jurcenoks |
Analyze the security implications of: DT_Guestbook 1.0 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TP-Link Tapo c200 1.1.15 - Remote Code Execution (RCE) | This is a webapps exploit for hardware platform. Description: TP-Link Tapo c200 1.1.15 - Remote Code Execution (RCE). Author: hacefresko |
Analyze the security implications of: TP-Link Tapo c200 1.1.15 - Remote Code Execution (RCE) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: File Replication Pro 7.2.0 - Multiple Vulnerabilities | This is a remote exploit for jsp platform. Description: File Replication Pro 7.2.0 - Multiple Vulnerabilities. Author: Vantage Point Security |
Analyze the security implications of: File Replication Pro 7.2.0 - Multiple Vulnerabilities | This exploit targets jsp systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Libc - 'regcomp()' Stack Exhaustion Denial of Service | This is a dos exploit for multiple platform. Description: Libc - 'regcomp()' Stack Exhaustion Denial of Service. Author: Maksymilian Arciemowicz |
Analyze the security implications of: Libc - 'regcomp()' Stack Exhaustion Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Galilery 1.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Galilery 1.0 - Local File Inclusion. Author: lemlajt |
Analyze the security implications of: Galilery 1.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Atom CMS v2.0 - SQL Injection (no auth) | This is a webapps exploit for php platform. Description: Atom CMS v2.0 - SQL Injection (no auth). Author: Hubert Wojciechowski |
Analyze the security implications of: Atom CMS v2.0 - SQL Injection (no auth) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ptunnel 0.72 - Remote Denial of Service | This is a dos exploit for linux platform. Description: ptunnel 0.72 - Remote Denial of Service. Author: st3n |
Analyze the security implications of: ptunnel 0.72 - Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Coppermine Photo Gallery 1.4.3 - Remote Command Execution | This is a webapps exploit for php platform. Description: Coppermine Photo Gallery 1.4.3 - Remote Command Execution. Author: rgod |
Analyze the security implications of: Coppermine Photo Gallery 1.4.3 - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ECOA Building Automation System - Arbitrary File Deletion | This is a webapps exploit for hardware platform. Description: ECOA Building Automation System - Arbitrary File Deletion. Author: Neurogenesia |
Analyze the security implications of: ECOA Building Automation System - Arbitrary File Deletion | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BXCP 0.3.0.4 - 'where' SQL Injection | This is a webapps exploit for php platform. Description: BXCP 0.3.0.4 - 'where' SQL Injection. Author: x23 |
Analyze the security implications of: BXCP 0.3.0.4 - 'where' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Advanced Guestbook 2.4.0 - 'phpBB' File Inclusion | This is a webapps exploit for php platform. Description: Advanced Guestbook 2.4.0 - 'phpBB' File Inclusion. Author: [Oo] |
Analyze the security implications of: Advanced Guestbook 2.4.0 - 'phpBB' File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: kon2 - Local Buffer Overflow (2) | This is a local exploit for linux platform. Description: kon2 - Local Buffer Overflow (2). Author: c0ntex |
Analyze the security implications of: kon2 - Local Buffer Overflow (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ATutor 1.4.3 - '/inbox/index.php?view' Cross-Site Scripting | This is a webapps exploit for php platform. Description: ATutor 1.4.3 - '/inbox/index.php?view' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: ATutor 1.4.3 - '/inbox/index.php?view' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ProjectForum 8.4.2.1 - Find Request Denial of Service | This is a dos exploit for php platform. Description: ProjectForum 8.4.2.1 - Find Request Denial of Service. Author: Peter Winter-Smith |
Analyze the security implications of: ProjectForum 8.4.2.1 - Find Request Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TIPS MailPost 5.1.1 - Error Message Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: TIPS MailPost 5.1.1 - Error Message Cross-Site Scripting. Author: Procheckup |
Analyze the security implications of: TIPS MailPost 5.1.1 - Error Message Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: flinx 1.3 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: flinx 1.3 - 'id' SQL Injection. Author: Houssamix |
Analyze the security implications of: flinx 1.3 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: kubix 0.7 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: kubix 0.7 - Multiple Vulnerabilities. Author: BlackHawk |
Analyze the security implications of: kubix 0.7 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LuxCal 3.2.2 - Cross-Site Request Forgery / Blind SQL Injection | This is a webapps exploit for php platform. Description: LuxCal 3.2.2 - Cross-Site Request Forgery / Blind SQL Injection. Author: TUNISIAN CYBER |
Analyze the security implications of: LuxCal 3.2.2 - Cross-Site Request Forgery / Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.