input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Artmedic Event - 'index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Artmedic Event - 'index.php' Remote File Inclusion. Author: botan |
Analyze the security implications of: Artmedic Event - 'index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Veritas NetBackup 6.0 (Linux) - 'bpjava-msvc' Remote Command Execution | This is a remote exploit for multiple platform. Description: Veritas NetBackup 6.0 (Linux) - 'bpjava-msvc' Remote Command Execution. Author: Kevin Finisterre |
Analyze the security implications of: Veritas NetBackup 6.0 (Linux) - 'bpjava-msvc' Remote Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: InterTech WCMS - 'etemplate.php' SQL Injection | This is a webapps exploit for php platform. Description: InterTech WCMS - 'etemplate.php' SQL Injection. Author: GeNiUs IrAQI |
Analyze the security implications of: InterTech WCMS - 'etemplate.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BlogPHP 1.2 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: BlogPHP 1.2 - Multiple SQL Injections. Author: imei |
Analyze the security implications of: BlogPHP 1.2 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP Stock Management System 1.02 - Multiple Vulnerabilities | This is a dos exploit for aix platform. Description: PHP Stock Management System 1.02 - Multiple Vulnerabilities. Author: jsass |
Analyze the security implications of: PHP Stock Management System 1.02 - Multiple Vulnerabilities | This exploit targets aix systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: CorePlayer - 'callback' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CorePlayer - 'callback' Cross-Site Scripting. Author: MustLive |
Analyze the security implications of: CorePlayer - 'callback' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DZCP (deV!L_z Clanportal) 1.3.6 - 'Show' SQL Injection | This is a webapps exploit for php platform. Description: DZCP (deV!L_z Clanportal) 1.3.6 - 'Show' SQL Injection. Author: Tim Weber |
Analyze the security implications of: DZCP (deV!L_z Clanportal) 1.3.6 - 'Show' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OutStart Participate Enterprise 3 - Multiple Access Validation Vulnerabilities | This is a webapps exploit for jsp platform. Description: OutStart Participate Enterprise 3 - Multiple Access Validation Vulnerabilities. Author: Altrus |
Analyze the security implications of: OutStart Participate Enterprise 3 - Multiple Access Validation Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: CodoForum 3.2.1 - SQL Injection | This is a webapps exploit for php platform. Description: CodoForum 3.2.1 - SQL Injection. Author: Yakir Wizman |
Analyze the security implications of: CodoForum 3.2.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DreamPics Builder - 'exhibition_id' SQL Injection | This is a webapps exploit for php platform. Description: DreamPics Builder - 'exhibition_id' SQL Injection. Author: Mr.SQL |
Analyze the security implications of: DreamPics Builder - 'exhibition_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Half-Life CSTRIKE Server 1.6 - 'no-steam' Denial of Service | This is a dos exploit for multiple platform. Description: Half-Life CSTRIKE Server 1.6 - 'no-steam' Denial of Service. Author: Eugene Minaev |
Analyze the security implications of: Half-Life CSTRIKE Server 1.6 - 'no-steam' Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: klinza Professional CMS 5.0.1 - 'menulast.php' Local File Inclusion | This is a webapps exploit for php platform. Description: klinza Professional CMS 5.0.1 - 'menulast.php' Local File Inclusion. Author: klinza |
Analyze the security implications of: klinza Professional CMS 5.0.1 - 'menulast.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AIOCP 1.3.x - 'cp_codice_fiscale.php' SQL Injection | This is a webapps exploit for php platform. Description: AIOCP 1.3.x - 'cp_codice_fiscale.php' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: AIOCP 1.3.x - 'cp_codice_fiscale.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Thunderbird ESR < 60.7.XXX - 'icalrecur_add_bydayrules' Stack-Based Buffer Overflow | This is a dos exploit for multiple platform. Description: Thunderbird ESR < 60.7.XXX - 'icalrecur_add_bydayrules' Stack-Based Buffer Overflow. Author: X41 D-Sec GmbH |
Analyze the security implications of: Thunderbird ESR < 60.7.XXX - 'icalrecur_add_bydayrules' Stack-Based Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: KISGB (tmp_theme) 5.1.1 - Local File Inclusion | This is a webapps exploit for php platform. Description: KISGB (tmp_theme) 5.1.1 - Local File Inclusion. Author: Cr@zy_King |
Analyze the security implications of: KISGB (tmp_theme) 5.1.1 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HooToo Tripmate HT-TM01 2.000.022 - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: HooToo Tripmate HT-TM01 2.000.022 - Cross-Site Request Forgery. Author: Ken Smith |
Analyze the security implications of: HooToo Tripmate HT-TM01 2.000.022 - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Dvbbs 7.1/8.2 - 'dispuser.asp?name' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Dvbbs 7.1/8.2 - 'dispuser.asp?name' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: Dvbbs 7.1/8.2 - 'dispuser.asp?name' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: JSBoard 2.0.10 - 'login.php?table' Local File Inclusion | This is a webapps exploit for php platform. Description: JSBoard 2.0.10 - 'login.php?table' Local File Inclusion. Author: GoLd_M |
Analyze the security implications of: JSBoard 2.0.10 - 'login.php?table' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache Struts 2.3 < 2.3.34 / 2.5 < 2.5.16 - Remote Code Execution (1) | This is a remote exploit for linux platform. Description: Apache Struts 2.3 < 2.3.34 / 2.5 < 2.5.16 - Remote Code Execution (1). Author: Mazin Ahmed |
Analyze the security implications of: Apache Struts 2.3 < 2.3.34 / 2.5 < 2.5.16 - Remote Code Execution (1) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Chemtool 1.6.14 - Memory Corruption | This is a dos exploit for linux platform. Description: Chemtool 1.6.14 - Memory Corruption. Author: Pablo González |
Analyze the security implications of: Chemtool 1.6.14 - Memory Corruption | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AUO SunVeillance Monitoring System 1.1.9e - 'MailAdd' SQL Injection | This is a webapps exploit for hardware platform. Description: AUO SunVeillance Monitoring System 1.1.9e - 'MailAdd' SQL Injection. Author: Luca.Chiou |
Analyze the security implications of: AUO SunVeillance Monitoring System 1.1.9e - 'MailAdd' SQL Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: SonicWALL - Content Filtering Blocked Site Error Page Cross-Site Scripting | This is a remote exploit for hardware platform. Description: SonicWALL - Content Filtering Blocked Site Error Page Cross-Site Scripting. Author: pagvac |
Analyze the security implications of: SonicWALL - Content Filtering Blocked Site Error Page Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Lynx 2.8 - '.mailcap'/'.mime.type' Local Code Execution | This is a remote exploit for linux platform. Description: Lynx 2.8 - '.mailcap'/'.mime.type' Local Code Execution. Author: Piotr Engelking |
Analyze the security implications of: Lynx 2.8 - '.mailcap'/'.mime.type' Local Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: MySQL / MariaDB / PerconaDB 5.5.x/5.6.x/5.7.x - 'root' System User Privilege Escalation | This is a local exploit for linux platform. Description: MySQL / MariaDB / PerconaDB 5.5.x/5.6.x/5.7.x - 'root' System User Privilege Escalation. Author: Dawid Golunski |
Analyze the security implications of: MySQL / MariaDB / PerconaDB 5.5.x/5.6.x/5.7.x - 'root' System User Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Comodo Dome Firewall 2.7.0 - Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Comodo Dome Firewall 2.7.0 - Cross-Site Scripting. Author: Ozer Goker |
Analyze the security implications of: Comodo Dome Firewall 2.7.0 - Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: e107 website system 0.7.5 - 'fpw.php?Query String (PATH_INFO)' Cross-Site Scripting | This is a webapps exploit for php platform. Description: e107 website system 0.7.5 - 'fpw.php?Query String (PATH_INFO)' Cross-Site Scripting. Author: zark0vac |
Analyze the security implications of: e107 website system 0.7.5 - 'fpw.php?Query String (PATH_INFO)' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dolibarr ERP-CRM 14.0.2 - Stored Cross-Site Scripting (XSS) / Privilege Escalation | This is a webapps exploit for php platform. Description: Dolibarr ERP-CRM 14.0.2 - Stored Cross-Site Scripting (XSS) / Privilege Escalation. Author: Oscar Gil Gutierrez |
Analyze the security implications of: Dolibarr ERP-CRM 14.0.2 - Stored Cross-Site Scripting (XSS) / Privilege Escalation | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Xerox Phaser 8400 - Remote Reboot (Denial of Service) | This is a dos exploit for hardware platform. Description: Xerox Phaser 8400 - Remote Reboot (Denial of Service). Author: crit3rion |
Analyze the security implications of: Xerox Phaser 8400 - Remote Reboot (Denial of Service) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Build Smart ERP 21.0817 - 'eidValue' SQL Injection (Unauthenticated) | This is a webapps exploit for asp platform. Description: Build Smart ERP 21.0817 - 'eidValue' SQL Injection (Unauthenticated). Author: Nehru Sethuraman |
Analyze the security implications of: Build Smart ERP 21.0817 - 'eidValue' SQL Injection (Unauthenticated) | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Ericsson HM220dp DSL Modem - World Accessible Web Administration Interface | This is a remote exploit for hardware platform. Description: Ericsson HM220dp DSL Modem - World Accessible Web Administration Interface. Author: Davide Del Vecchio |
Analyze the security implications of: Ericsson HM220dp DSL Modem - World Accessible Web Administration Interface | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Phpscript-sgh 0.1.0 - Time Based Blind SQL Injection | This is a webapps exploit for multiple platform. Description: Phpscript-sgh 0.1.0 - Time Based Blind SQL Injection. Author: KeopssGroup0day_Inc |
Analyze the security implications of: Phpscript-sgh 0.1.0 - Time Based Blind SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Tcpdump - bgp_update_print Remote Denial of Service | This is a dos exploit for multiple platform. Description: Tcpdump - bgp_update_print Remote Denial of Service. Author: simon |
Analyze the security implications of: Tcpdump - bgp_update_print Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Message Board / Threaded Discussion Forum - 'Sign_In.aspx' SQL Injection | This is a webapps exploit for asp platform. Description: Message Board / Threaded Discussion Forum - 'Sign_In.aspx' SQL Injection. Author: Aria-Security Team |
Analyze the security implications of: Message Board / Threaded Discussion Forum - 'Sign_In.aspx' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.