input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: free QBoard 1.1 - 'history.php?qb_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: free QBoard 1.1 - 'history.php?qb_path' Remote File Inclusion. Author: CrAsh_oVeR_rIdE |
Analyze the security implications of: free QBoard 1.1 - 'history.php?qb_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Forum Template 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Forum Template 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Forum Template 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Complaint Management System 1.0 - 'username' SQL Injection | This is a webapps exploit for php platform. Description: Complaint Management System 1.0 - 'username' SQL Injection. Author: Daniel Ortiz |
Analyze the security implications of: Complaint Management System 1.0 - 'username' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Currency Converter 1.0.0 - 'from' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component Currency Converter 1.0.0 - 'from' Cross-Site Scripting. Author: BHG Security Center |
Analyze the security implications of: Joomla! Component Currency Converter 1.0.0 - 'from' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Xerver HTTP Server 4.32 - Cross-Site Scripting / Directory Traversal | This is a remote exploit for multiple platform. Description: Xerver HTTP Server 4.32 - Cross-Site Scripting / Directory Traversal. Author: Stack |
Analyze the security implications of: Xerver HTTP Server 4.32 - Cross-Site Scripting / Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: pdfium - opj_j2k_read_mcc 'libopenjpeg' Heap Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: pdfium - opj_j2k_read_mcc 'libopenjpeg' Heap Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: pdfium - opj_j2k_read_mcc 'libopenjpeg' Heap Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ZSNES 1.51 - Local Buffer Overflow | This is a local exploit for linux platform. Description: ZSNES 1.51 - Local Buffer Overflow. Author: Juan Sacco |
Analyze the security implications of: ZSNES 1.51 - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux Kernel < 4.4.0-83 / < 4.8.0-58 (Ubuntu 14.04/16.04) - Local Privilege Escalation (KASLR / SMEP) | This is a local exploit for linux platform. Description: Linux Kernel < 4.4.0-83 / < 4.8.0-58 (Ubuntu 14.04/16.04) - Local Privilege Escalation (KASLR / SMEP). Author: Andrey Konovalov |
Analyze the security implications of: Linux Kernel < 4.4.0-83 / < 4.8.0-58 (Ubuntu 14.04/16.04) - Local Privilege Escalation (KASLR / SMEP) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: HiSilicon DVR/NVR hi3520d firmware - Remote Backdoor Account | This is a remote exploit for hardware platform. Description: HiSilicon DVR/NVR hi3520d firmware - Remote Backdoor Account. Author: Snawoot |
Analyze the security implications of: HiSilicon DVR/NVR hi3520d firmware - Remote Backdoor Account | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AV Arcade 3 - Cookie Authentication Bypass | This is a webapps exploit for php platform. Description: AV Arcade 3 - Cookie Authentication Bypass. Author: saudi0hacker |
Analyze the security implications of: AV Arcade 3 - Cookie Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component gigCalendar 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component gigCalendar 1.0 - SQL Injection. Author: boom3rang |
Analyze the security implications of: Joomla! Component gigCalendar 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MikroTik 6.40.5 ICMP - Denial of Service | This is a dos exploit for hardware platform. Description: MikroTik 6.40.5 ICMP - Denial of Service. Author: FarazPajohan |
Analyze the security implications of: MikroTik 6.40.5 ICMP - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Color Prediction Game v1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Color Prediction Game v1.0 - SQL Injection. Author: Ahmet Ümit BAYRAM |
Analyze the security implications of: Color Prediction Game v1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JE Auto - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component JE Auto - Local File Inclusion. Author: Sid3^effects |
Analyze the security implications of: Joomla! Component JE Auto - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AR-Blog 5.2 - 'print.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: AR-Blog 5.2 - 'print.php' Cross-Site Scripting. Author: ALMOKANN3 |
Analyze the security implications of: AR-Blog 5.2 - 'print.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FluxBB < 1.5.6 - SQL Injection | This is a webapps exploit for multiple platform. Description: FluxBB < 1.5.6 - SQL Injection. Author: secthrowaway |
Analyze the security implications of: FluxBB < 1.5.6 - SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: itMedia - Multiple SQL Injections | This is a webapps exploit for php platform. Description: itMedia - Multiple SQL Injections. Author: baltazar |
Analyze the security implications of: itMedia - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JExtensions Property Finder - 'sf_id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JExtensions Property Finder - 'sf_id' SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component JExtensions Property Finder - 'sf_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alfresco - '/cmisbrowser?url' Server-Side Request Forgery | This is a remote exploit for multiple platform. Description: Alfresco - '/cmisbrowser?url' Server-Side Request Forgery. Author: V. Paulikas |
Analyze the security implications of: Alfresco - '/cmisbrowser?url' Server-Side Request Forgery | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BBSXP 5.13 - 'error.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: BBSXP 5.13 - 'error.asp' Cross-Site Scripting. Author: arashps0 |
Analyze the security implications of: BBSXP 5.13 - 'error.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: T-Dreams Cars Ads Package 2.0 - SQL Injection | This is a webapps exploit for asp platform. Description: T-Dreams Cars Ads Package 2.0 - SQL Injection. Author: R4dc0re |
Analyze the security implications of: T-Dreams Cars Ads Package 2.0 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: magic-portal 2.1 - SQL Injection | This is a webapps exploit for php platform. Description: magic-portal 2.1 - SQL Injection. Author: alnjm33 |
Analyze the security implications of: magic-portal 2.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Chipmunk NewsLetter - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Chipmunk NewsLetter - Persistent Cross-Site Scripting. Author: mr_me |
Analyze the security implications of: Chipmunk NewsLetter - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Man-db 2.6.7.1 - Local Privilege Escalation | This is a local exploit for linux platform. Description: Man-db 2.6.7.1 - Local Privilege Escalation. Author: halfdog |
Analyze the security implications of: Man-db 2.6.7.1 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: TP-Link TL-MR3220 - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: TP-Link TL-MR3220 - Cross-Site Scripting. Author: Thiago Sena |
Analyze the security implications of: TP-Link TL-MR3220 - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Wyrestorm Apollo VX20 < 1.3.58 - Account Enumeration | This is a remote exploit for multiple platform. Description: Wyrestorm Apollo VX20 < 1.3.58 - Account Enumeration. Author: hyp3rlinx |
Analyze the security implications of: Wyrestorm Apollo VX20 < 1.3.58 - Account Enumeration | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux Kernel 2.4 - IPTables FTP Stateful Inspection Arbitrary Filter Rule Insertion | This is a remote exploit for linux platform. Description: Linux Kernel 2.4 - IPTables FTP Stateful Inspection Arbitrary Filter Rule Insertion. Author: Cristiano Lincoln Mattos |
Analyze the security implications of: Linux Kernel 2.4 - IPTables FTP Stateful Inspection Arbitrary Filter Rule Insertion | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BloofoxCMS 0.2.2 - 'Img_Popup.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: BloofoxCMS 0.2.2 - 'Img_Popup.php' Cross-Site Scripting. Author: the_Edit0r |
Analyze the security implications of: BloofoxCMS 0.2.2 - 'Img_Popup.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bank Locker Management System - SQL Injection | This is a webapps exploit for php platform. Description: Bank Locker Management System - SQL Injection. Author: SoSPiro |
Analyze the security implications of: Bank Locker Management System - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DB[CMS] - 'article.php' SQL Injection | This is a webapps exploit for php platform. Description: DB[CMS] - 'article.php' SQL Injection. Author: blackraptor |
Analyze the security implications of: DB[CMS] - 'article.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: QNX RTOS 4.25 - monitor Arbitrary File Modification | This is a local exploit for linux platform. Description: QNX RTOS 4.25 - monitor Arbitrary File Modification. Author: Simon Ouellette |
Analyze the security implications of: QNX RTOS 4.25 - monitor Arbitrary File Modification | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component Spider Catalog Lite 1.8.10 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Spider Catalog Lite 1.8.10 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Spider Catalog Lite 1.8.10 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Claroline E-Learning 1.75 - 'ldap.inc.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Claroline E-Learning 1.75 - 'ldap.inc.php' Remote File Inclusion. Author: beford |
Analyze the security implications of: Claroline E-Learning 1.75 - 'ldap.inc.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.