input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Battle Blog 1.25 - 'comment.asp' SQL Injection | This is a webapps exploit for php platform. Description: Battle Blog 1.25 - 'comment.asp' SQL Injection. Author: Bl@ckbe@rD |
Analyze the security implications of: Battle Blog 1.25 - 'comment.asp' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Article Publisher PRO - 'userid' SQL Injection | This is a webapps exploit for php platform. Description: Article Publisher PRO - 'userid' SQL Injection. Author: Stack |
Analyze the security implications of: Article Publisher PRO - 'userid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Component Sitemap 2.0.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Component Sitemap 2.0.0 - Remote File Inclusion. Author: Matdhule |
Analyze the security implications of: Mambo Component Sitemap 2.0.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Coppermine Photo Gallery 1.4.12 - 'referer' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Coppermine Photo Gallery 1.4.12 - 'referer' Cross-Site Scripting. Author: L4teral |
Analyze the security implications of: Coppermine Photo Gallery 1.4.12 - 'referer' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nethack 3 - Local Buffer Overflow (1) | This is a local exploit for linux platform. Description: Nethack 3 - Local Buffer Overflow (1). Author: tsao@efnet |
Analyze the security implications of: Nethack 3 - Local Buffer Overflow (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Hastymail 1.x - IMAP SMTP Command Injection | This is a webapps exploit for php platform. Description: Hastymail 1.x - IMAP SMTP Command Injection. Author: Vicente Aguilera Diaz |
Analyze the security implications of: Hastymail 1.x - IMAP SMTP Command Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CF Image Hosting Script 1.3.82 - File Disclosure | This is a webapps exploit for php platform. Description: CF Image Hosting Script 1.3.82 - File Disclosure. Author: bd0rk |
Analyze the security implications of: CF Image Hosting Script 1.3.82 - File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Feng Office 3.7.0.5 - Remote Command Execution (Metasploit) | This is a webapps exploit for php platform. Description: Feng Office 3.7.0.5 - Remote Command Execution (Metasploit). Author: AkkuS |
Analyze the security implications of: Feng Office 3.7.0.5 - Remote Command Execution (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LiquidVPN 1.36 / 1.37 - Privilege Escalation | This is a local exploit for macos platform. Description: LiquidVPN 1.36 / 1.37 - Privilege Escalation. Author: Bernd Leitner |
Analyze the security implications of: LiquidVPN 1.36 / 1.37 - Privilege Escalation | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Joomla! Component jVideoDirect - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component jVideoDirect - Blind SQL Injection. Author: B-HUNT3|2 |
Analyze the security implications of: Joomla! Component jVideoDirect - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: philboard 1.14 - 'philboard_admin.asp' Authentication Bypass | This is a webapps exploit for asp platform. Description: philboard 1.14 - 'philboard_admin.asp' Authentication Bypass. Author: aresu@bosen.net |
Analyze the security implications of: philboard 1.14 - 'philboard_admin.asp' Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: fusermount - user_allow_other Restriction Bypass and SELinux Label Control | This is a dos exploit for linux platform. Description: fusermount - user_allow_other Restriction Bypass and SELinux Label Control. Author: Google Security Research |
Analyze the security implications of: fusermount - user_allow_other Restriction Bypass and SELinux Label Control | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Oracle Netbeans IDE 8.1 - Directory Traversal | This is a local exploit for multiple platform. Description: Oracle Netbeans IDE 8.1 - Directory Traversal. Author: hyp3rlinx |
Analyze the security implications of: Oracle Netbeans IDE 8.1 - Directory Traversal | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BRU 15.1/16.0 - BRUEXECLOG Environment Variable | This is a local exploit for multiple platform. Description: BRU 15.1/16.0 - BRUEXECLOG Environment Variable. Author: Riley Hassell |
Analyze the security implications of: BRU 15.1/16.0 - BRUEXECLOG Environment Variable | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Flatnux CMS 2013-01.17 - 'index.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Flatnux CMS 2013-01.17 - 'index.php' Local File Inclusion. Author: DaOne |
Analyze the security implications of: Flatnux CMS 2013-01.17 - 'index.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Big Forum 5.2 - Arbitrary File Upload / Local File Inclusion | This is a webapps exploit for php platform. Description: Big Forum 5.2 - Arbitrary File Upload / Local File Inclusion. Author: Zer0 Thunder |
Analyze the security implications of: Big Forum 5.2 - Arbitrary File Upload / Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: shadowsocks-libev 3.1.0 - Command Execution | This is a local exploit for linux platform. Description: shadowsocks-libev 3.1.0 - Command Execution. Author: X41 D-Sec GmbH |
Analyze the security implications of: shadowsocks-libev 3.1.0 - Command Execution | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Magnolia Search Module 2.1 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Magnolia Search Module 2.1 - Cross-Site Scripting. Author: r0t3d3Vil |
Analyze the security implications of: Magnolia Search Module 2.1 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Afroditi - 'id' SQL Injection | This is a webapps exploit for asp platform. Description: CMS Afroditi - 'id' SQL Injection. Author: projectzero labs |
Analyze the security implications of: CMS Afroditi - 'id' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: PaKnPost Pro 1.14 - Multiple Vulnerabilities | This is a webapps exploit for cgi platform. Description: PaKnPost Pro 1.14 - Multiple Vulnerabilities. Author: Edvin Rustemagic_ Grega Preseren |
Analyze the security implications of: PaKnPost Pro 1.14 - Multiple Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: ntop/nbox 2.3 < 2.5 - Multiple Vulnerabilities | This is a remote exploit for linux platform. Description: ntop/nbox 2.3 < 2.5 - Multiple Vulnerabilities. Author: Javier Marcos |
Analyze the security implications of: ntop/nbox 2.3 < 2.5 - Multiple Vulnerabilities | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CityWriter 0.9.7 - 'head.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: CityWriter 0.9.7 - 'head.php' Remote File Inclusion. Author: RoMaNcYxHaCkEr |
Analyze the security implications of: CityWriter 0.9.7 - 'head.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: F5 Big-IP - rsync Access | This is a remote exploit for hardware platform. Description: F5 Big-IP - rsync Access. Author: Security-Assessment.com |
Analyze the security implications of: F5 Big-IP - rsync Access | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PoPToP PPTP 1.1.4-b3 - Remote Command Execution | This is a remote exploit for linux platform. Description: PoPToP PPTP 1.1.4-b3 - Remote Command Execution. Author: einstein |
Analyze the security implications of: PoPToP PPTP 1.1.4-b3 - Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FS Trademe Clone 1.0 - 'search' / 'id' SQL Injection | This is a webapps exploit for php platform. Description: FS Trademe Clone 1.0 - 'search' / 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: FS Trademe Clone 1.0 - 'search' / 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Interact 2.4.1 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Interact 2.4.1 - Multiple Remote File Inclusions. Author: RoMaNcYxHaCkEr |
Analyze the security implications of: Interact 2.4.1 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CUPS Server 1.1 - GET Denial of Service | This is a dos exploit for linux platform. Description: CUPS Server 1.1 - GET Denial of Service. Author: tracewar |
Analyze the security implications of: CUPS Server 1.1 - GET Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Allaire ColdFusion Server 4.0/4.0.1 - 'CFCACHE' Information Disclosure | This is a remote exploit for multiple platform. Description: Allaire ColdFusion Server 4.0/4.0.1 - 'CFCACHE' Information Disclosure. Author: anonymous |
Analyze the security implications of: Allaire ColdFusion Server 4.0/4.0.1 - 'CFCACHE' Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Gazelle CMS - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Gazelle CMS - Cross-Site Request Forgery. Author: pratul agrawal |
Analyze the security implications of: Gazelle CMS - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASPired2Quote - Remote Database Disclosure | This is a webapps exploit for asp platform. Description: ASPired2Quote - Remote Database Disclosure. Author: Pouya_Server |
Analyze the security implications of: ASPired2Quote - Remote Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Blog System 1.5 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Blog System 1.5 - Multiple Vulnerabilities. Author: cp77fk4r |
Analyze the security implications of: Blog System 1.5 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Centreon 2.3.1 - 'command_name' Remote Command Execution | This is a webapps exploit for php platform. Description: Centreon 2.3.1 - 'command_name' Remote Command Execution. Author: Christophe de la Fuente |
Analyze the security implications of: Centreon 2.3.1 - 'command_name' Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: UApplication Ublog Reload 1.0.5 - 'Trackback.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: UApplication Ublog Reload 1.0.5 - 'Trackback.asp' Cross-Site Scripting. Author: Dedi Dwianto |
Analyze the security implications of: UApplication Ublog Reload 1.0.5 - 'Trackback.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.