input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: aWebNews 1.1 - 'listing.php?path_to_news' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: aWebNews 1.1 - 'listing.php?path_to_news' Remote File Inclusion. Author: mostafa_ragab
|
Analyze the security implications of: aWebNews 1.1 - 'listing.php?path_to_news' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Freeway 1.4.1.171 - '/english/account.php?language' Traversal Local File Inclusion
|
This is a webapps exploit for php platform. Description: Freeway 1.4.1.171 - '/english/account.php?language' Traversal Local File Inclusion. Author: Digital Security Research Group
|
Analyze the security implications of: Freeway 1.4.1.171 - '/english/account.php?language' Traversal Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CPCommerce 1.1.0 - 'id_category' SQL Injection
|
This is a webapps exploit for php platform. Description: CPCommerce 1.1.0 - 'id_category' SQL Injection. Author: Kacper
|
Analyze the security implications of: CPCommerce 1.1.0 - 'id_category' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: cPanel 11.21 - 'wwwact' Privilege Escalation
|
This is a webapps exploit for php platform. Description: cPanel 11.21 - 'wwwact' Privilege Escalation. Author: Ali Jasbi
|
Analyze the security implications of: cPanel 11.21 - 'wwwact' Privilege Escalation
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: KMSoft Guestbook 1.0 - Database Disclosure
|
This is a webapps exploit for asp platform. Description: KMSoft Guestbook 1.0 - Database Disclosure. Author: LionTurk
|
Analyze the security implications of: KMSoft Guestbook 1.0 - Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Tiandy IP Cameras 5.56.17.120 - Sensitive Information Disclosure
|
This is a webapps exploit for hardware platform. Description: Tiandy IP Cameras 5.56.17.120 - Sensitive Information Disclosure. Author: SecuriTeam
|
Analyze the security implications of: Tiandy IP Cameras 5.56.17.120 - Sensitive Information Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: SkyPortal Picture Manager 0.11 - Contents Change
|
This is a webapps exploit for asp platform. Description: SkyPortal Picture Manager 0.11 - Contents Change. Author: ByALBAYX
|
Analyze the security implications of: SkyPortal Picture Manager 0.11 - Contents Change
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Snitz Forums 2000 3.x - 'members.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: Snitz Forums 2000 3.x - 'members.asp' SQL Injection. Author: acemi
|
Analyze the security implications of: Snitz Forums 2000 3.x - 'members.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: EziScript Google Page Rank 1.1 - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: EziScript Google Page Rank 1.1 - Cross-Site Scripting. Author: sarabande
|
Analyze the security implications of: EziScript Google Page Rank 1.1 - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_spsnewsletter - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_spsnewsletter - Local File Inclusion. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component com_spsnewsletter - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Butterfly ORGanizer 2.0.0 - SQL Injection / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Butterfly ORGanizer 2.0.0 - SQL Injection / Cross-Site Scripting. Author: CWH Underground
|
Analyze the security implications of: Butterfly ORGanizer 2.0.0 - SQL Injection / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Seagate Central 2014.0410.0026-F - Remote Command Execution
|
This is a remote exploit for hardware platform. Description: Seagate Central 2014.0410.0026-F - Remote Command Execution. Author: Jeremy Brown
|
Analyze the security implications of: Seagate Central 2014.0410.0026-F - Remote Command Execution
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component Directorix Directory Manager 1.1.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Directorix Directory Manager 1.1.1 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Directorix Directory Manager 1.1.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: nipper-ng 0.11.10 - Remote Buffer Overflow (PoC)
|
This is a remote exploit for linux platform. Description: nipper-ng 0.11.10 - Remote Buffer Overflow (PoC). Author: Guy Levin
|
Analyze the security implications of: nipper-ng 0.11.10 - Remote Buffer Overflow (PoC)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: python jsonpickle 2.0.0 - Remote Code Execution
|
This is a remote exploit for multiple platform. Description: python jsonpickle 2.0.0 - Remote Code Execution. Author: Adi Malyanker
|
Analyze the security implications of: python jsonpickle 2.0.0 - Remote Code Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Axioscloud Sissiweb Registro Elettronico 7.0.0 - 'Error_desc' Cross-Site Scripting
|
This is a webapps exploit for aspx platform. Description: Axioscloud Sissiweb Registro Elettronico 7.0.0 - 'Error_desc' Cross-Site Scripting. Author: Dino Barlattani
|
Analyze the security implications of: Axioscloud Sissiweb Registro Elettronico 7.0.0 - 'Error_desc' Cross-Site Scripting
|
This exploit targets aspx systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aspx platform
|
What is this exploit about: Joomla! Component com_xmovie 1.0 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_xmovie 1.0 - Local File Inclusion. Author: KelvinX
|
Analyze the security implications of: Joomla! Component com_xmovie 1.0 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: KLiK Social Media Website 1.0 - 'Multiple' SQLi
|
This is a webapps exploit for php platform. Description: KLiK Social Media Website 1.0 - 'Multiple' SQLi. Author: corpse
|
Analyze the security implications of: KLiK Social Media Website 1.0 - 'Multiple' SQLi
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Node.JS - 'node-serialize' Remote Code Execution
|
This is a remote exploit for linux platform. Description: Node.JS - 'node-serialize' Remote Code Execution. Author: OpSecX
|
Analyze the security implications of: Node.JS - 'node-serialize' Remote Code Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apple Mac OSX 10.4.9 - VPND Local Format String
|
This is a local exploit for osx platform. Description: Apple Mac OSX 10.4.9 - VPND Local Format String. Author: Chris Anley
|
Analyze the security implications of: Apple Mac OSX 10.4.9 - VPND Local Format String
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: eWeather - 'chart' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: eWeather - 'chart' Cross-Site Scripting. Author: NetJackal
|
Analyze the security implications of: eWeather - 'chart' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Blue Utopia - 'index.php' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Blue Utopia - 'index.php' Local File Inclusion. Author: PLATEN
|
Analyze the security implications of: Blue Utopia - 'index.php' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ProFTPd 1.2.7 < 1.2.9rc2 - Remote Code Execution / Brute Force
|
This is a remote exploit for linux platform. Description: ProFTPd 1.2.7 < 1.2.9rc2 - Remote Code Execution / Brute Force. Author: Haggis
|
Analyze the security implications of: ProFTPd 1.2.7 < 1.2.9rc2 - Remote Code Execution / Brute Force
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: LittlePhpGallery 1.0.2 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: LittlePhpGallery 1.0.2 - Local File Inclusion. Author: kire bozorge khavarmian
|
Analyze the security implications of: LittlePhpGallery 1.0.2 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WebKit JSC - JSGlobalObject::haveABadTime Causes Type Confusions
|
This is a dos exploit for multiple platform. Description: WebKit JSC - JSGlobalObject::haveABadTime Causes Type Confusions. Author: Google Security Research
|
Analyze the security implications of: WebKit JSC - JSGlobalObject::haveABadTime Causes Type Confusions
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Ajax Short URL Script - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Ajax Short URL Script - Authentication Bypass. Author: Cicklow
|
Analyze the security implications of: Ajax Short URL Script - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: KnowGate hipergate 4.0.12 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: KnowGate hipergate 4.0.12 - Multiple Cross-Site Scripting Vulnerabilities. Author: Nahuel Grisolia
|
Analyze the security implications of: KnowGate hipergate 4.0.12 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Splunk Enterprise 6.4.3 - Server-Side Request Forgery
|
This is a webapps exploit for multiple platform. Description: Splunk Enterprise 6.4.3 - Server-Side Request Forgery. Author: Security-Assessment.com
|
Analyze the security implications of: Splunk Enterprise 6.4.3 - Server-Side Request Forgery
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: K7 Ultimate Security K7RKScan.sys 17.0.2019 - Denial Of Service (DoS)
|
This is a remote exploit for multiple platform. Description: K7 Ultimate Security K7RKScan.sys 17.0.2019 - Denial Of Service (DoS). Author: M. Akil Gündoğan
|
Analyze the security implications of: K7 Ultimate Security K7RKScan.sys 17.0.2019 - Denial Of Service (DoS)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Atlassian Confluence Widget Connector Macro - Velocity Template Injection (Metasploit)
|
This is a remote exploit for multiple platform. Description: Atlassian Confluence Widget Connector Macro - Velocity Template Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: Atlassian Confluence Widget Connector Macro - Velocity Template Injection (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Webkit JSC: JIT - Uninitialized Variable Access in ArgumentsEliminationPhase::transform
|
This is a dos exploit for multiple platform. Description: Webkit JSC: JIT - Uninitialized Variable Access in ArgumentsEliminationPhase::transform. Author: Google Security Research
|
Analyze the security implications of: Webkit JSC: JIT - Uninitialized Variable Access in ArgumentsEliminationPhase::transform
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: NG WifiTransfer Pro 1.1 - Local File Inclusion
|
This is a webapps exploit for ios platform. Description: NG WifiTransfer Pro 1.1 - Local File Inclusion. Author: Vulnerability-Lab
|
Analyze the security implications of: NG WifiTransfer Pro 1.1 - Local File Inclusion
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: OpenAM 13.0 - LDAP Injection
|
This is a webapps exploit for java platform. Description: OpenAM 13.0 - LDAP Injection. Author: Charlton Trezevant
|
Analyze the security implications of: OpenAM 13.0 - LDAP Injection
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.