input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sitenet BBS 2.0 - 'netboardr.cgi' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cgi platform. Description: Sitenet BBS 2.0 - 'netboardr.cgi' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t3d3Vil |
Analyze the security implications of: Sitenet BBS 2.0 - 'netboardr.cgi' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! Component Feederator 1.0.5 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Joomla! Component Feederator 1.0.5 - Multiple Remote File Inclusions. Author: NoGe |
Analyze the security implications of: Joomla! Component Feederator 1.0.5 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Church Management System 1.0 - Remote Code Execution (RCE) (Unauthenticated) | This is a webapps exploit for php platform. Description: Church Management System 1.0 - Remote Code Execution (RCE) (Unauthenticated). Author: Abdullah Khawaja |
Analyze the security implications of: Church Management System 1.0 - Remote Code Execution (RCE) (Unauthenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 68kb 68KB Base 1.0.0rc3 - Cross-Site Request Forgery (Admin) | This is a webapps exploit for php platform. Description: 68kb 68KB Base 1.0.0rc3 - Cross-Site Request Forgery (Admin). Author: Jelmer de Hen |
Analyze the security implications of: 68kb 68KB Base 1.0.0rc3 - Cross-Site Request Forgery (Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_noticias 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_noticias 1.0 - SQL Injection. Author: xcorpitx |
Analyze the security implications of: Joomla! Component com_noticias 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gr8 Tutorial Script - SQL Injection | This is a webapps exploit for php platform. Description: Gr8 Tutorial Script - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Gr8 Tutorial Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Axis Communications 207W Network Camera - Web Interface 'axis-cgi/admin/pwdgrp.cgi' Multiple Cross-Site Request Forgery Vulnerabilities | This is a webapps exploit for cgi platform. Description: Axis Communications 207W Network Camera - Web Interface 'axis-cgi/admin/pwdgrp.cgi' Multiple Cross-Site Request Forgery Vulnerabilities. Author: Seth Fogie |
Analyze the security implications of: Axis Communications 207W Network Camera - Web Interface 'axis-cgi/admin/pwdgrp.cgi' Multiple Cross-Site Request Forgery Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! Component com_avosbillets - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_avosbillets - SQL Injection. Author: snakespc |
Analyze the security implications of: Joomla! Component com_avosbillets - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Intego FileGuard 2.0/4.0 - Weak Password Encryption | This is a local exploit for osx platform. Description: Intego FileGuard 2.0/4.0 - Weak Password Encryption. Author: MacSec |
Analyze the security implications of: Intego FileGuard 2.0/4.0 - Weak Password Encryption | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Nagios Plugins check_dhcp 2.0.2 - Arbitrary Option File Read Race Condition | This is a local exploit for linux platform. Description: Nagios Plugins check_dhcp 2.0.2 - Arbitrary Option File Read Race Condition. Author: Dawid Golunski |
Analyze the security implications of: Nagios Plugins check_dhcp 2.0.2 - Arbitrary Option File Read Race Condition | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: XLineSoft ASPRunner 1.0/2.x - '[TABLE-NAME]_search.asp?Typeen' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: XLineSoft ASPRunner 1.0/2.x - '[TABLE-NAME]_search.asp?Typeen' Cross-Site Scripting. Author: Ferruh Mavituna |
Analyze the security implications of: XLineSoft ASPRunner 1.0/2.x - '[TABLE-NAME]_search.asp?Typeen' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component com_cb - 'cat' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_cb - 'cat' SQL Injection. Author: DevilZ TM |
Analyze the security implications of: Joomla! Component com_cb - 'cat' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_jtickets - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_jtickets - SQL Injection. Author: Sid3^effects |
Analyze the security implications of: Joomla! Component com_jtickets - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNU GTypist 2.9.5-2 - Local Buffer Overflow | This is a local exploit for linux platform. Description: GNU GTypist 2.9.5-2 - Local Buffer Overflow. Author: Juan Sacco |
Analyze the security implications of: GNU GTypist 2.9.5-2 - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Positron Broadcast Signal Processor TRA7005 v1.20 - Authentication Bypass | This is a remote exploit for hardware platform. Description: Positron Broadcast Signal Processor TRA7005 v1.20 - Authentication Bypass. Author: LiquidWorm |
Analyze the security implications of: Positron Broadcast Signal Processor TRA7005 v1.20 - Authentication Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: 68 Classifieds 4.1 - 'category.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: 68 Classifieds 4.1 - 'category.php' Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: 68 Classifieds 4.1 - 'category.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Horoscope 1.5.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Horoscope 1.5.0 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Horoscope 1.5.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreePBX 16 - Remote Code Execution (RCE) (Authenticated) | This is a webapps exploit for php platform. Description: FreePBX 16 - Remote Code Execution (RCE) (Authenticated). Author: Cold z3ro |
Analyze the security implications of: FreePBX 16 - Remote Code Execution (RCE) (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ikon ADManager 2.1 - Remote Database Disclosure | This is a webapps exploit for asp platform. Description: Ikon ADManager 2.1 - Remote Database Disclosure. Author: Ghost Hacker |
Analyze the security implications of: Ikon ADManager 2.1 - Remote Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linux 4.8.0 < 4.8.0-46 - AF_PACKET packet_set_ring Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: Linux 4.8.0 < 4.8.0-46 - AF_PACKET packet_set_ring Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Linux 4.8.0 < 4.8.0-46 - AF_PACKET packet_set_ring Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Gatesoft Docusafe 4.1.0 - SQL Injection | This is a webapps exploit for asp platform. Description: Gatesoft Docusafe 4.1.0 - SQL Injection. Author: R4dc0re |
Analyze the security implications of: Gatesoft Docusafe 4.1.0 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linux Kernel < 4.16.11 - 'ext4_read_inline_data()' Memory Corruption | This is a dos exploit for linux platform. Description: Linux Kernel < 4.16.11 - 'ext4_read_inline_data()' Memory Corruption. Author: Google Security Research |
Analyze the security implications of: Linux Kernel < 4.16.11 - 'ext4_read_inline_data()' Memory Corruption | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Jinzora 2.1 - 'media.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Jinzora 2.1 - 'media.php' Remote File Inclusion. Author: k1tk4t |
Analyze the security implications of: Jinzora 2.1 - 'media.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Live For Speed S2 - Duplicate Join Packet Remote Denial of Service | This is a dos exploit for multiple platform. Description: Live For Speed S2 - Duplicate Join Packet Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Live For Speed S2 - Duplicate Join Packet Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_jbook - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_jbook - Blind SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_jbook - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pre Jobo.NET - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Pre Jobo.NET - Multiple SQL Injections. Author: bi0 |
Analyze the security implications of: Pre Jobo.NET - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: BPStudent 1.0 - Blind SQL Injection | This is a webapps exploit for php platform. Description: BPStudent 1.0 - Blind SQL Injection. Author: OoN Boy |
Analyze the security implications of: BPStudent 1.0 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BuildaGate5library v5 - Reflected Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: BuildaGate5library v5 - Reflected Cross-Site Scripting (XSS). Author: Idan Malihi |
Analyze the security implications of: BuildaGate5library v5 - Reflected Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Libmimedir - '.VCF' Memory Corruption (PoC) | This is a dos exploit for linux platform. Description: Libmimedir - '.VCF' Memory Corruption (PoC). Author: Jeremy Brown |
Analyze the security implications of: Libmimedir - '.VCF' Memory Corruption (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Anata CMS 1.0b5 - 'change.php' Arbitrary Add Admin | This is a webapps exploit for php platform. Description: Anata CMS 1.0b5 - 'change.php' Arbitrary Add Admin. Author: CWH Underground |
Analyze the security implications of: Anata CMS 1.0b5 - 'change.php' Arbitrary Add Admin | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASP Product Catalog 1.0 - 'default.asp' SQL Injection | This is a webapps exploit for asp platform. Description: ASP Product Catalog 1.0 - 'default.asp' SQL Injection. Author: joseph.giron13 |
Analyze the security implications of: ASP Product Catalog 1.0 - 'default.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: E-Pay - Remote File Inclusion | This is a webapps exploit for php platform. Description: E-Pay - Remote File Inclusion. Author: indoushka |
Analyze the security implications of: E-Pay - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iSoft-Solutions QuikStore Shopping Cart 2.12 - 'store' Full Path Disclosure | This is a webapps exploit for cgi platform. Description: iSoft-Solutions QuikStore Shopping Cart 2.12 - 'store' Full Path Disclosure. Author: Dr Ponidi Haryanto |
Analyze the security implications of: iSoft-Solutions QuikStore Shopping Cart 2.12 - 'store' Full Path Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.