input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: censura 1.16.04 - Blind SQL Injection / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: censura 1.16.04 - Blind SQL Injection / Cross-Site Scripting. Author: Vrs-hCk
|
Analyze the security implications of: censura 1.16.04 - Blind SQL Injection / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: gokhun asp stok 1.0 - Multiple Vulnerabilities
|
This is a webapps exploit for asp platform. Description: gokhun asp stok 1.0 - Multiple Vulnerabilities. Author: KnocKout
|
Analyze the security implications of: gokhun asp stok 1.0 - Multiple Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Hyvikk Fleet Manager - Shell Upload
|
This is a webapps exploit for php platform. Description: Hyvikk Fleet Manager - Shell Upload. Author: saxgy1331
|
Analyze the security implications of: Hyvikk Fleet Manager - Shell Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Endian Firewall < 3.0.0 - OS Command Injection (Metasploit)
|
This is a remote exploit for cgi platform. Description: Endian Firewall < 3.0.0 - OS Command Injection (Metasploit). Author: Ben Lincoln
|
Analyze the security implications of: Endian Firewall < 3.0.0 - OS Command Injection (Metasploit)
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Claroline 1.8.9 - 'phpBB/viewtopic.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Claroline 1.8.9 - 'phpBB/viewtopic.php' Cross-Site Scripting. Author: Digital Security Research Group
|
Analyze the security implications of: Claroline 1.8.9 - 'phpBB/viewtopic.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: elFinder PHP Connector < 2.1.48 - 'exiftran' Command Injection (Metasploit)
|
This is a remote exploit for php platform. Description: elFinder PHP Connector < 2.1.48 - 'exiftran' Command Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: elFinder PHP Connector < 2.1.48 - 'exiftran' Command Injection (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Article Script 1.6.3 - 'rss.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Article Script 1.6.3 - 'rss.php' SQL Injection. Author: Liz0ziM
|
Analyze the security implications of: Article Script 1.6.3 - 'rss.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Audio Article Directory - 'file' Remote File Disclosure
|
This is a webapps exploit for php platform. Description: Audio Article Directory - 'file' Remote File Disclosure. Author: ThE g0bL!N
|
Analyze the security implications of: Audio Article Directory - 'file' Remote File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Heatmiser Wifi Thermostat 1.7 - Cross-Site Request Forgery (Update Admin)
|
This is a webapps exploit for hardware platform. Description: Heatmiser Wifi Thermostat 1.7 - Cross-Site Request Forgery (Update Admin). Author: SajjadBnd
|
Analyze the security implications of: Heatmiser Wifi Thermostat 1.7 - Cross-Site Request Forgery (Update Admin)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Domain Group Network GooCMS 1.02 - 'index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Domain Group Network GooCMS 1.02 - 'index.php' Cross-Site Scripting. Author: ahmadbaby
|
Analyze the security implications of: Domain Group Network GooCMS 1.02 - 'index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: XFree86 4.x - CopyISOLatin1Lowered Font_Name Buffer Overflow
|
This is a dos exploit for linux platform. Description: XFree86 4.x - CopyISOLatin1Lowered Font_Name Buffer Overflow. Author: Greg MacManus
|
Analyze the security implications of: XFree86 4.x - CopyISOLatin1Lowered Font_Name Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: KosmosBlog 0.9.3 - SQL Injection / Cross-Site Scripting / Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: KosmosBlog 0.9.3 - SQL Injection / Cross-Site Scripting / Cross-Site Request Forgery. Author: Milos Zivanovic
|
Analyze the security implications of: KosmosBlog 0.9.3 - SQL Injection / Cross-Site Scripting / Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Card sharj 1.0 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Card sharj 1.0 - Multiple SQL Injections. Author: Net.Edit0r
|
Analyze the security implications of: Card sharj 1.0 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Digirez 3.4 - Cross-Site Request Forgery (Update Admin)
|
This is a webapps exploit for asp platform. Description: Digirez 3.4 - Cross-Site Request Forgery (Update Admin). Author: Ihsan Sencan
|
Analyze the security implications of: Digirez 3.4 - Cross-Site Request Forgery (Update Admin)
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Chipmunk Pwngame - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Chipmunk Pwngame - Multiple SQL Injections. Author: KnocKout
|
Analyze the security implications of: Chipmunk Pwngame - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adobe Flash - Type Confusion in IExternalizable.readExternal When Performing Local Serialization
|
This is a dos exploit for multiple platform. Description: Adobe Flash - Type Confusion in IExternalizable.readExternal When Performing Local Serialization. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - Type Confusion in IExternalizable.readExternal When Performing Local Serialization
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Andy's PHP Projects Man Page Lookup Script - Information Disclosure
|
This is a webapps exploit for php platform. Description: Andy's PHP Projects Man Page Lookup Script - Information Disclosure. Author: Cabezon Aurelien
|
Analyze the security implications of: Andy's PHP Projects Man Page Lookup Script - Information Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ZPanel zsudo - Local Privilege Escalation (Metasploit)
|
This is a local exploit for linux platform. Description: ZPanel zsudo - Local Privilege Escalation (Metasploit). Author: Metasploit
|
Analyze the security implications of: ZPanel zsudo - Local Privilege Escalation (Metasploit)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: DblTek - Multiple Vulnerabilities
|
This is a webapps exploit for linux platform. Description: DblTek - Multiple Vulnerabilities. Author: SecuriTeam
|
Analyze the security implications of: DblTek - Multiple Vulnerabilities
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Activity MOD Plus 1.1.0 - 'phpBB Mod' File Inclusion
|
This is a webapps exploit for php platform. Description: Activity MOD Plus 1.1.0 - 'phpBB Mod' File Inclusion. Author: nukedx
|
Analyze the security implications of: Activity MOD Plus 1.1.0 - 'phpBB Mod' File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component aWiki - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component aWiki - Local File Inclusion. Author: Angela Zhang
|
Analyze the security implications of: Joomla! Component aWiki - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Mac OSX 10.4.5 Mail.app - Real Name Buffer Overflow
|
This is a remote exploit for osx platform. Description: Apple Mac OSX 10.4.5 Mail.app - Real Name Buffer Overflow. Author: Kevin Finisterre
|
Analyze the security implications of: Apple Mac OSX 10.4.5 Mail.app - Real Name Buffer Overflow
|
This exploit targets osx systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Jorani Leave Management 0.6.5 - (Authenticated) 'startdate' SQL Injection
|
This is a webapps exploit for php platform. Description: Jorani Leave Management 0.6.5 - (Authenticated) 'startdate' SQL Injection. Author: Javier Olmedo
|
Analyze the security implications of: Jorani Leave Management 0.6.5 - (Authenticated) 'startdate' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Borland/Inprise Interbase 4.0/5.0/6.0 - Backdoor Password
|
This is a remote exploit for multiple platform. Description: Borland/Inprise Interbase 4.0/5.0/6.0 - Backdoor Password. Author: Frank Schlottmann-Goedde
|
Analyze the security implications of: Borland/Inprise Interbase 4.0/5.0/6.0 - Backdoor Password
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Libmodplug 0.8.8.2 - '.abc' Stack Buffer Overflow (PoC)
|
This is a dos exploit for linux platform. Description: Libmodplug 0.8.8.2 - '.abc' Stack Buffer Overflow (PoC). Author: epiphant
|
Analyze the security implications of: Libmodplug 0.8.8.2 - '.abc' Stack Buffer Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: WordPress Plugin Work The Flow - Arbitrary File Upload (Metasploit)
|
This is a remote exploit for php platform. Description: WordPress Plugin Work The Flow - Arbitrary File Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: WordPress Plugin Work The Flow - Arbitrary File Upload (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Barcodes generator 1.0 - 'name' Stored Cross Site Scripting
|
This is a webapps exploit for php platform. Description: Barcodes generator 1.0 - 'name' Stored Cross Site Scripting. Author: Nikhil Kumar
|
Analyze the security implications of: Barcodes generator 1.0 - 'name' Stored Cross Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BloofoxCMS 0.5.0 - 'fileurl' Local File Inclusion
|
This is a webapps exploit for php platform. Description: BloofoxCMS 0.5.0 - 'fileurl' Local File Inclusion. Author: AtT4CKxT3rR0r1ST
|
Analyze the security implications of: BloofoxCMS 0.5.0 - 'fileurl' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 3proxy 0.5.3g (Linux) - 'proxy.c logurl()' Remote Buffer Overflow
|
This is a remote exploit for linux platform. Description: 3proxy 0.5.3g (Linux) - 'proxy.c logurl()' Remote Buffer Overflow. Author: vade79
|
Analyze the security implications of: 3proxy 0.5.3g (Linux) - 'proxy.c logurl()' Remote Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: NTP 4.2.8p8 - Denial of Service
|
This is a dos exploit for linux platform. Description: NTP 4.2.8p8 - Denial of Service. Author: Magnus Klaaborg Stubman
|
Analyze the security implications of: NTP 4.2.8p8 - Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: STARFACE 7.3.0.10 - Authentication with Password Hash Possible
|
This is a webapps exploit for jsp platform. Description: STARFACE 7.3.0.10 - Authentication with Password Hash Possible. Author: RedTeam Pentesting GmbH
|
Analyze the security implications of: STARFACE 7.3.0.10 - Authentication with Password Hash Possible
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: ChatSecure IM 2.2.4 iOS - Persistent Cross-Site Scripting
|
This is a webapps exploit for ios platform. Description: ChatSecure IM 2.2.4 iOS - Persistent Cross-Site Scripting. Author: Vulnerability-Lab
|
Analyze the security implications of: ChatSecure IM 2.2.4 iOS - Persistent Cross-Site Scripting
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: DL PayCart 1.34 - Admin Password Changing
|
This is a webapps exploit for php platform. Description: DL PayCart 1.34 - Admin Password Changing. Author: G4N0K
|
Analyze the security implications of: DL PayCart 1.34 - Admin Password Changing
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.