input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Auto Car 1.2 - 'car_title' SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Auto Car 1.2 - 'car_title' SQL Injection / Cross-Site Scripting. Author: L0RD |
Analyze the security implications of: Auto Car 1.2 - 'car_title' SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FS Foodpanda Clone 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: FS Foodpanda Clone 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: FS Foodpanda Clone 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Eagle Software Aeries Student Information System 3.7.2.2/3.8.2.8 - 'ClassList.asp?Term' SQL Injection | This is a webapps exploit for php platform. Description: Eagle Software Aeries Student Information System 3.7.2.2/3.8.2.8 - 'ClassList.asp?Term' SQL Injection. Author: Arsalan Emamjomehkashan |
Analyze the security implications of: Eagle Software Aeries Student Information System 3.7.2.2/3.8.2.8 - 'ClassList.asp?Term' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iWebNegar 1.1 - Configuration Nullification Denial of Service | This is a dos exploit for php platform. Description: iWebNegar 1.1 - Configuration Nullification Denial of Service. Author: c0d3r |
Analyze the security implications of: iWebNegar 1.1 - Configuration Nullification Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 4/5 - 'addslashes()' Null Byte Bypass | This is a remote exploit for php platform. Description: PHP 4/5 - 'addslashes()' Null Byte Bypass. Author: Daniel Fabian |
Analyze the security implications of: PHP 4/5 - 'addslashes()' Null Byte Bypass | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe 8.1.4/9.1 - 'customDictionaryOpen()' Code Execution | This is a remote exploit for linux platform. Description: Adobe 8.1.4/9.1 - 'customDictionaryOpen()' Code Execution. Author: Arr1val |
Analyze the security implications of: Adobe 8.1.4/9.1 - 'customDictionaryOpen()' Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Orion-Blog 2.0 - Remote Authentication Bypass | This is a webapps exploit for asp platform. Description: Orion-Blog 2.0 - Remote Authentication Bypass. Author: WiLdBoY |
Analyze the security implications of: Orion-Blog 2.0 - Remote Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: QNX - '.Phgrafx' File Enumeration | This is a local exploit for linux platform. Description: QNX - '.Phgrafx' File Enumeration. Author: cenobyte |
Analyze the security implications of: QNX - '.Phgrafx' File Enumeration | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BluSky CMS - 'news_id' SQL Injection | This is a webapps exploit for php platform. Description: BluSky CMS - 'news_id' SQL Injection. Author: snakespc |
Analyze the security implications of: BluSky CMS - 'news_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: fuel CMS 1.4.1 - Remote Code Execution (1) | This is a webapps exploit for linux platform. Description: fuel CMS 1.4.1 - Remote Code Execution (1). Author: 0xd0ff9 |
Analyze the security implications of: fuel CMS 1.4.1 - Remote Code Execution (1) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Anote 1.0 - Persistent Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Anote 1.0 - Persistent Cross-Site Scripting. Author: TaurusOmar |
Analyze the security implications of: Anote 1.0 - Persistent Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: RSA ClearTrust 4.6/4.7 - Login Page Cross-Site Scripting | This is a webapps exploit for asp platform. Description: RSA ClearTrust 4.6/4.7 - Login Page Cross-Site Scripting. Author: sir.mordred@hushmail.com |
Analyze the security implications of: RSA ClearTrust 4.6/4.7 - Login Page Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Dolphin 7.3.0 - Error-Based SQL Injection | This is a webapps exploit for php platform. Description: Dolphin 7.3.0 - Error-Based SQL Injection. Author: Kacper Szurek |
Analyze the security implications of: Dolphin 7.3.0 - Error-Based SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ignite Solutions CMS - 'car-details.php' SQL Injection | This is a webapps exploit for php platform. Description: Ignite Solutions CMS - 'car-details.php' SQL Injection. Author: Am!r |
Analyze the security implications of: Ignite Solutions CMS - 'car-details.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.x - 'inotify_init()' Memory Leak Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - 'inotify_init()' Memory Leak Local Denial of Service. Author: Vegard Nossum |
Analyze the security implications of: Linux Kernel 2.6.x - 'inotify_init()' Memory Leak Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: OpenSSL - Padding Oracle in AES-NI CBC MAC Check | This is a dos exploit for multiple platform. Description: OpenSSL - Padding Oracle in AES-NI CBC MAC Check. Author: Juraj Somorovsky |
Analyze the security implications of: OpenSSL - Padding Oracle in AES-NI CBC MAC Check | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FaceSentry Access Control System 6.4.8 - Remote Command Injection | This is a webapps exploit for hardware platform. Description: FaceSentry Access Control System 6.4.8 - Remote Command Injection. Author: LiquidWorm |
Analyze the security implications of: FaceSentry Access Control System 6.4.8 - Remote Command Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AVE.CMS 2.09 - 'index.php?module' Blind SQL Injection | This is a webapps exploit for php platform. Description: AVE.CMS 2.09 - 'index.php?module' Blind SQL Injection. Author: mr.pr0n |
Analyze the security implications of: AVE.CMS 2.09 - 'index.php?module' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DSL-2750B - OS Command Injection (Metasploit) | This is a remote exploit for hardware platform. Description: D-Link DSL-2750B - OS Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: D-Link DSL-2750B - OS Command Injection (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AspBB - Active Server Page Bulletin Board Database Disclosure | This is a webapps exploit for asp platform. Description: AspBB - Active Server Page Bulletin Board Database Disclosure. Author: indoushka |
Analyze the security implications of: AspBB - Active Server Page Bulletin Board Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Multilaser Router RE018 AC1200 - Cross-Site Request Forgery (Enable Remote Access) | This is a webapps exploit for hardware platform. Description: Multilaser Router RE018 AC1200 - Cross-Site Request Forgery (Enable Remote Access). Author: Rodolfo Mariano |
Analyze the security implications of: Multilaser Router RE018 AC1200 - Cross-Site Request Forgery (Enable Remote Access) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Abuse 2.0 - Local Buffer Overflow | This is a local exploit for linux platform. Description: Abuse 2.0 - Local Buffer Overflow. Author: Girish |
Analyze the security implications of: Abuse 2.0 - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: OpenNMS - Java Object Unserialization Remote Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: OpenNMS - Java Object Unserialization Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: OpenNMS - Java Object Unserialization Remote Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Netgear D6300B - '/diag.cgi?IPAddr4' Remote Command Execution | This is a remote exploit for hardware platform. Description: Netgear D6300B - '/diag.cgi?IPAddr4' Remote Command Execution. Author: Marcel Mangold |
Analyze the security implications of: Netgear D6300B - '/diag.cgi?IPAddr4' Remote Command Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: MPlayer - '.OGM' File Handling Denial of Service | This is a dos exploit for linux platform. Description: MPlayer - '.OGM' File Handling Denial of Service. Author: Hanno Bock |
Analyze the security implications of: MPlayer - '.OGM' File Handling Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Netgear WNAP320 2.0.3 - 'macAddress' Remote Code Execution (RCE) (Unauthenticated) | This is a webapps exploit for hardware platform. Description: Netgear WNAP320 2.0.3 - 'macAddress' Remote Code Execution (RCE) (Unauthenticated). Author: Bryan Leong |
Analyze the security implications of: Netgear WNAP320 2.0.3 - 'macAddress' Remote Code Execution (RCE) (Unauthenticated) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apple iTunes 10.6.1.7 - '.m3u' Walking Heap Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: Apple iTunes 10.6.1.7 - '.m3u' Walking Heap Buffer Overflow (PoC). Author: LiquidWorm |
Analyze the security implications of: Apple iTunes 10.6.1.7 - '.m3u' Walking Heap Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: KubeLabs PHPDug 2.0 - 'upcoming.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: KubeLabs PHPDug 2.0 - 'upcoming.php' Cross-Site Scripting. Author: indoushka |
Analyze the security implications of: KubeLabs PHPDug 2.0 - 'upcoming.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LISTSERV 17 - Reflected Cross Site Scripting (XSS) | This is a webapps exploit for cgi platform. Description: LISTSERV 17 - Reflected Cross Site Scripting (XSS). Author: Shaunt Der-Grigorian |
Analyze the security implications of: LISTSERV 17 - Reflected Cross Site Scripting (XSS) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Campus Bulletin Board 3.4 - '/post3/book.asp?review' SQL Injection | This is a webapps exploit for asp platform. Description: Campus Bulletin Board 3.4 - '/post3/book.asp?review' SQL Injection. Author: Unohope |
Analyze the security implications of: Campus Bulletin Board 3.4 - '/post3/book.asp?review' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Alstrasoft SendIt Pro - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Alstrasoft SendIt Pro - Arbitrary File Upload. Author: ZoRLu |
Analyze the security implications of: Alstrasoft SendIt Pro - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SysAid Help Desk Administrator Portal < 14.4 - Arbitrary File Upload (Metasploit) | This is a webapps exploit for multiple platform. Description: SysAid Help Desk Administrator Portal < 14.4 - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: SysAid Help Desk Administrator Portal < 14.4 - Arbitrary File Upload (Metasploit) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache Superset < 0.23 - Remote Code Execution | This is a webapps exploit for linux platform. Description: Apache Superset < 0.23 - Remote Code Execution. Author: David May |
Analyze the security implications of: Apache Superset < 0.23 - Remote Code Execution | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Microsoft Remote Desktop Client for Mac 8.0.36 - Code Execution | This is a local exploit for osx platform. Description: Microsoft Remote Desktop Client for Mac 8.0.36 - Code Execution. Author: Filippo Cavallarin |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.