input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: aBitWhizzy - 'whizzylink.php?d' Traversal Arbitrary Directory Listing | This is a webapps exploit for php platform. Description: aBitWhizzy - 'whizzylink.php?d' Traversal Arbitrary Directory Listing. Author: Lostmon |
Analyze the security implications of: aBitWhizzy - 'whizzylink.php?d' Traversal Arbitrary Directory Listing | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AWCM - Database Disclosure | This is a webapps exploit for php platform. Description: AWCM - Database Disclosure. Author: alnjm33 |
Analyze the security implications of: AWCM - Database Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP mSQL (msql_connect) - Local Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: PHP mSQL (msql_connect) - Local Buffer Overflow (PoC). Author: NetJackal |
Analyze the security implications of: PHP mSQL (msql_connect) - Local Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_tickets 2.1 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_tickets 2.1 - 'id' SQL Injection. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component com_tickets 2.1 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Concrete5 CMS 8.1.0 - 'Host' Header Injection | This is a webapps exploit for php platform. Description: Concrete5 CMS 8.1.0 - 'Host' Header Injection. Author: hyp3rlinx |
Analyze the security implications of: Concrete5 CMS 8.1.0 - 'Host' Header Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cars & Vehicle - 'page.php' SQL Injection | This is a webapps exploit for php platform. Description: Cars & Vehicle - 'page.php' SQL Injection. Author: Hussin X |
Analyze the security implications of: Cars & Vehicle - 'page.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Centreon 1.4.2.3 - 'get_image.php' Remote File Disclosure | This is a webapps exploit for php platform. Description: Centreon 1.4.2.3 - 'get_image.php' Remote File Disclosure. Author: Julien CAYSSOL |
Analyze the security implications of: Centreon 1.4.2.3 - 'get_image.php' Remote File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MySQLDriverCS 4.0.1 - SQL Injection | This is a remote exploit for multiple platform. Description: MySQLDriverCS 4.0.1 - SQL Injection. Author: Qihan Luo |
Analyze the security implications of: MySQLDriverCS 4.0.1 - SQL Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Net Clubs Pro 4.0 - 'login.cgi?Password' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Net Clubs Pro 4.0 - 'login.cgi?Password' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: Net Clubs Pro 4.0 - 'login.cgi?Password' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Automated Job Portal Script - SQL Injection | This is a webapps exploit for php platform. Description: Automated Job Portal Script - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Automated Job Portal Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Enterprise Edition Payment Processor Script 3.7 - SQL Injection | This is a webapps exploit for php platform. Description: Enterprise Edition Payment Processor Script 3.7 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Enterprise Edition Payment Processor Script 3.7 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_enmasse 1.2.0.4 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_enmasse 1.2.0.4 - SQL Injection. Author: D4NB4R |
Analyze the security implications of: Joomla! Component com_enmasse 1.2.0.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Restaurant Guide 1.0.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component Restaurant Guide 1.0.0 - Multiple Vulnerabilities. Author: Valentin |
Analyze the security implications of: Joomla! Component Restaurant Guide 1.0.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: symantec mail-gear 1.0 - Directory Traversal | This is a remote exploit for multiple platform. Description: symantec mail-gear 1.0 - Directory Traversal. Author: Ussr Labs |
Analyze the security implications of: symantec mail-gear 1.0 - Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component AllVideos Reloaded 1.2.x - 'divid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component AllVideos Reloaded 1.2.x - 'divid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component AllVideos Reloaded 1.2.x - 'divid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NetBSD - 'FTPd / Tnftpd' Remote Stack Overflow (PoC) | This is a dos exploit for bsd platform. Description: NetBSD - 'FTPd / Tnftpd' Remote Stack Overflow (PoC). Author: kingcope |
Analyze the security implications of: NetBSD - 'FTPd / Tnftpd' Remote Stack Overflow (PoC) | This exploit targets bsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Grafik CMS - '/admin.php' SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Grafik CMS - '/admin.php' SQL Injection / Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: Grafik CMS - '/admin.php' SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Boonex 2.0 Dolphin - 'index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Boonex 2.0 Dolphin - 'index.php' Remote File Inclusion. Author: S.W.A.T. |
Analyze the security implications of: Boonex 2.0 Dolphin - 'index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_itarmory - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_itarmory - SQL Injection. Author: Craw |
Analyze the security implications of: Joomla! Component com_itarmory - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CedStat 1.31 - 'index.php?hier' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CedStat 1.31 - 'index.php?hier' Cross-Site Scripting. Author: sn0oPy |
Analyze the security implications of: CedStat 1.31 - 'index.php?hier' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Component multibanners 1.0.1 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Component multibanners 1.0.1 - Remote File Inclusion. Author: Blue|Spy |
Analyze the security implications of: Mambo Component multibanners 1.0.1 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel < 3.8.x - open-time Capability 'file_ns_capable()' Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel < 3.8.x - open-time Capability 'file_ns_capable()' Local Privilege Escalation. Author: Andrew Lutomirski |
Analyze the security implications of: Linux Kernel < 3.8.x - open-time Capability 'file_ns_capable()' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FUDforum 3.0.6 - Local File Inclusion | This is a webapps exploit for php platform. Description: FUDforum 3.0.6 - Local File Inclusion. Author: Curesec Research Team |
Analyze the security implications of: FUDforum 3.0.6 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco UCS-IMC Supervisor 2.2.0.0 - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Cisco UCS-IMC Supervisor 2.2.0.0 - Authentication Bypass. Author: Fatih Sencer |
Analyze the security implications of: Cisco UCS-IMC Supervisor 2.2.0.0 - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Electrolink FM/DAB/TV Transmitter - Pre-Auth MPFS Image Remote Code Execution | This is a webapps exploit for hardware platform. Description: Electrolink FM/DAB/TV Transmitter - Pre-Auth MPFS Image Remote Code Execution. Author: LiquidWorm |
Analyze the security implications of: Electrolink FM/DAB/TV Transmitter - Pre-Auth MPFS Image Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Kusaba X 0.9 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Kusaba X 0.9 - Multiple Cross-Site Scripting Vulnerabilities. Author: Emilio Pinna |
Analyze the security implications of: Kusaba X 0.9 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eDNews 2.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: eDNews 2.0 - Local File Inclusion. Author: GoLd_M |
Analyze the security implications of: eDNews 2.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Aero CMS v0.0.1 - PHP Code Injection (auth) | This is a webapps exploit for php platform. Description: Aero CMS v0.0.1 - PHP Code Injection (auth). Author: Hubert Wojciechowski |
Analyze the security implications of: Aero CMS v0.0.1 - PHP Code Injection (auth) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Escort Marketplace 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Escort Marketplace 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Escort Marketplace 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Navigate CMS - (Unauthenticated) Remote Code Execution (Metasploit) | This is a remote exploit for php platform. Description: Navigate CMS - (Unauthenticated) Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Navigate CMS - (Unauthenticated) Remote Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: No-IP Dynamic Update Client (DUC) 2.1.9 - Local IP Address Stack Overflow | This is a local exploit for linux platform. Description: No-IP Dynamic Update Client (DUC) 2.1.9 - Local IP Address Stack Overflow. Author: Alberto Ortega |
Analyze the security implications of: No-IP Dynamic Update Client (DUC) 2.1.9 - Local IP Address Stack Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Firebird SQL Fbserver 2.0 - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Firebird SQL Fbserver 2.0 - Remote Buffer Overflow. Author: Cody Pierce |
Analyze the security implications of: Firebird SQL Fbserver 2.0 - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Postfix SMTP 4.2.x < 4.2.48 - 'Shellshock' Remote Command Injection | This is a remote exploit for linux platform. Description: Postfix SMTP 4.2.x < 4.2.48 - 'Shellshock' Remote Command Injection. Author: Phil Blank |
Analyze the security implications of: Postfix SMTP 4.2.x < 4.2.48 - 'Shellshock' Remote Command Injection | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.