input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Grayscale Blog 0.8.0 - Security Bypass / SQL Injection / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Grayscale Blog 0.8.0 - Security Bypass / SQL Injection / Cross-Site Scripting. Author: Omni
|
Analyze the security implications of: Grayscale Blog 0.8.0 - Security Bypass / SQL Injection / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP imap_open - Remote Code Execution (Metasploit)
|
This is a remote exploit for linux platform. Description: PHP imap_open - Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: PHP imap_open - Remote Code Execution (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Friends in War Make or Break 1.7 - 'imgid' SQL Injection
|
This is a webapps exploit for php platform. Description: Friends in War Make or Break 1.7 - 'imgid' SQL Injection. Author: v3n0m
|
Analyze the security implications of: Friends in War Make or Break 1.7 - 'imgid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GuestBookPro Script - Remote Database Disclosure
|
This is a webapps exploit for asp platform. Description: GuestBookPro Script - Remote Database Disclosure. Author: ViRuSMaN
|
Analyze the security implications of: GuestBookPro Script - Remote Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: FaceSentry Access Control System 6.4.8 - Remote SSH Root
|
This is a remote exploit for hardware platform. Description: FaceSentry Access Control System 6.4.8 - Remote SSH Root. Author: LiquidWorm
|
Analyze the security implications of: FaceSentry Access Control System 6.4.8 - Remote SSH Root
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component Regional Booking - 'id' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Regional Booking - 'id' Blind SQL Injection. Author: Hussin X
|
Analyze the security implications of: Joomla! Component Regional Booking - 'id' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: TerraMaster TOS 4.2.06 - Unauthenticated Remote Code Execution (Metasploit)
|
This is a webapps exploit for linux platform. Description: TerraMaster TOS 4.2.06 - Unauthenticated Remote Code Execution (Metasploit). Author: AkkuS
|
Analyze the security implications of: TerraMaster TOS 4.2.06 - Unauthenticated Remote Code Execution (Metasploit)
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ASPired2Protect Login Page - SQL Injection
|
This is a webapps exploit for asp platform. Description: ASPired2Protect Login Page - SQL Injection. Author: T_L_O_T_D
|
Analyze the security implications of: ASPired2Protect Login Page - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Nginx 1.4.0 (Generic Linux x64) - Remote Overflow
|
This is a remote exploit for linux_x86-64 platform. Description: Nginx 1.4.0 (Generic Linux x64) - Remote Overflow. Author: sorbo
|
Analyze the security implications of: Nginx 1.4.0 (Generic Linux x64) - Remote Overflow
|
This exploit targets linux_x86-64 systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux_x86-64 platform
|
What is this exploit about: Pega Platform 8.1.0 - Remote Code Execution (RCE)
|
This is a webapps exploit for multiple platform. Description: Pega Platform 8.1.0 - Remote Code Execution (RCE). Author: Marcin Wolak
|
Analyze the security implications of: Pega Platform 8.1.0 - Remote Code Execution (RCE)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_start - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_start - SQL Injection. Author: DevilZ TM
|
Analyze the security implications of: Joomla! Component com_start - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bit 5 Blog 8.1 - 'index.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Bit 5 Blog 8.1 - 'index.php' SQL Injection. Author: Aliaksandr Hartsuyeu
|
Analyze the security implications of: Bit 5 Blog 8.1 - 'index.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bosdates 3.x/4.0 - 'Payment.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Bosdates 3.x/4.0 - 'Payment.php' Remote File Inclusion. Author: admin@jaascois.com
|
Analyze the security implications of: Bosdates 3.x/4.0 - 'Payment.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FIBARO System Home Center 5.021 - Remote File Include
|
This is a webapps exploit for multiple platform. Description: FIBARO System Home Center 5.021 - Remote File Include. Author: LiquidWorm
|
Analyze the security implications of: FIBARO System Home Center 5.021 - Remote File Include
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: IFSC Code Finder Project 1.0 - SQL injection (Unauthenticated)
|
This is a webapps exploit for php platform. Description: IFSC Code Finder Project 1.0 - SQL injection (Unauthenticated). Author: Yash Mahajan
|
Analyze the security implications of: IFSC Code Finder Project 1.0 - SQL injection (Unauthenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Magic Photo Storage Website - '/user/login.php?_config[site_path]' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/user/login.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina
|
Analyze the security implications of: Magic Photo Storage Website - '/user/login.php?_config[site_path]' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LAME 3.99.5 - 'III_dequantize_sample' Stack Buffer Overflow
|
This is a dos exploit for linux platform. Description: LAME 3.99.5 - 'III_dequantize_sample' Stack Buffer Overflow. Author: Agostino Sarubbo
|
Analyze the security implications of: LAME 3.99.5 - 'III_dequantize_sample' Stack Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: HTGET 0.9.x - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: HTGET 0.9.x - Local Privilege Escalation. Author: nekd0
|
Analyze the security implications of: HTGET 0.9.x - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Alex Heiphetz Group eZshopper - 'loadpage.cgi' Directory Traversal
|
This is a webapps exploit for cgi platform. Description: Alex Heiphetz Group eZshopper - 'loadpage.cgi' Directory Traversal. Author: Zero X
|
Analyze the security implications of: Alex Heiphetz Group eZshopper - 'loadpage.cgi' Directory Traversal
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: iTech Business Networking Script 8.26 - SQL Injection
|
This is a webapps exploit for php platform. Description: iTech Business Networking Script 8.26 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: iTech Business Networking Script 8.26 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM (Multiple Products) - Login Page Cross-Site Scripting
|
This is a webapps exploit for jsp platform. Description: IBM (Multiple Products) - Login Page Cross-Site Scripting. Author: Oren Hafif
|
Analyze the security implications of: IBM (Multiple Products) - Login Page Cross-Site Scripting
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Oracle 10g - KUPW$WORKER.MAIN Grant/Revoke dba Permission
|
This is a remote exploit for multiple platform. Description: Oracle 10g - KUPW$WORKER.MAIN Grant/Revoke dba Permission. Author: bunker
|
Analyze the security implications of: Oracle 10g - KUPW$WORKER.MAIN Grant/Revoke dba Permission
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: LibSPF2 < 1.2.8 - DNS TXT Record Parsing Bug Heap Overflow (PoC)
|
This is a dos exploit for multiple platform. Description: LibSPF2 < 1.2.8 - DNS TXT Record Parsing Bug Heap Overflow (PoC). Author: Dan Kaminsky
|
Analyze the security implications of: LibSPF2 < 1.2.8 - DNS TXT Record Parsing Bug Heap Overflow (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Konqueror 4.1 - Cross-Site Scripting / Remote Crash
|
This is a dos exploit for multiple platform. Description: Konqueror 4.1 - Cross-Site Scripting / Remote Crash. Author: StAkeR
|
Analyze the security implications of: Konqueror 4.1 - Cross-Site Scripting / Remote Crash
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Notilus Travel Solution Software 2012 R3 - SQL Injection
|
This is a webapps exploit for asp platform. Description: Notilus Travel Solution Software 2012 R3 - SQL Injection. Author: Alex Haynes
|
Analyze the security implications of: Notilus Travel Solution Software 2012 R3 - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: EBBISLAND EBBSHAVE 6100-09-04-1441 - Remote Buffer Overflow
|
This is a remote exploit for hardware platform. Description: EBBISLAND EBBSHAVE 6100-09-04-1441 - Remote Buffer Overflow. Author: hantwister
|
Analyze the security implications of: EBBISLAND EBBSHAVE 6100-09-04-1441 - Remote Buffer Overflow
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC)
|
This is a dos exploit for linux platform. Description: NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC). Author: Magnus Klaaborg Stubman
|
Analyze the security implications of: NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: VP-ASP Shopping Cart - 'Shopadmin.asp' HTML Injection
|
This is a webapps exploit for asp platform. Description: VP-ASP Shopping Cart - 'Shopadmin.asp' HTML Injection. Author: ConcorDHacK
|
Analyze the security implications of: VP-ASP Shopping Cart - 'Shopadmin.asp' HTML Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Podman & Varlink 1.5.1 - Remote Code Execution
|
This is a remote exploit for linux platform. Description: Podman & Varlink 1.5.1 - Remote Code Execution. Author: Jeremy Brown
|
Analyze the security implications of: Podman & Varlink 1.5.1 - Remote Code Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: PhotoWebsite 3.1 iOS - Local File Inclusion
|
This is a webapps exploit for ios platform. Description: PhotoWebsite 3.1 iOS - Local File Inclusion. Author: Vulnerability-Lab
|
Analyze the security implications of: PhotoWebsite 3.1 iOS - Local File Inclusion
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Jax PHP Scripts 1.0/1.34/2.14/3.31 - suggestions.csv User IP Disclosure
|
This is a webapps exploit for php platform. Description: Jax PHP Scripts 1.0/1.34/2.14/3.31 - suggestions.csv User IP Disclosure. Author: Lostmon
|
Analyze the security implications of: Jax PHP Scripts 1.0/1.34/2.14/3.31 - suggestions.csv User IP Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component mygallery - 'cid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component mygallery - 'cid' SQL Injection. Author: Houssamix
|
Analyze the security implications of: Joomla! Component mygallery - 'cid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Map Locator - 'cid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Map Locator - 'cid' SQL Injection. Author: FL0RiX
|
Analyze the security implications of: Joomla! Component Map Locator - 'cid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.