input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Barman 0.0.1r3 - 'Interface.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Barman 0.0.1r3 - 'Interface.php' Remote File Inclusion. Author: DeltahackingTEAM |
Analyze the security implications of: Barman 0.0.1r3 - 'Interface.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EZHomePagePro 1.5 - 'email.asp' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: EZHomePagePro 1.5 - 'email.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t |
Analyze the security implications of: EZHomePagePro 1.5 - 'email.asp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: TWiki 4.2.0 - 'configure' Remote File Disclosure | This is a webapps exploit for cgi platform. Description: TWiki 4.2.0 - 'configure' Remote File Disclosure. Author: Th1nk3r |
Analyze the security implications of: TWiki 4.2.0 - 'configure' Remote File Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: AJ Auction Pro Platinum - 'seller_id' SQL Injection | This is a webapps exploit for php platform. Description: AJ Auction Pro Platinum - 'seller_id' SQL Injection. Author: InjEctOr5 |
Analyze the security implications of: AJ Auction Pro Platinum - 'seller_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iCart Pro - 'section' SQL Injection | This is a webapps exploit for php platform. Description: iCart Pro - 'section' SQL Injection. Author: n3tw0rk |
Analyze the security implications of: iCart Pro - 'section' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gonafish LinksCaffePRO 4.5 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: Gonafish LinksCaffePRO 4.5 - 'index.php' SQL Injection. Author: sl4xUz |
Analyze the security implications of: Gonafish LinksCaffePRO 4.5 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 4.x - SafeMode Arbitrary File Execution | This is a local exploit for php platform. Description: PHP 4.x - SafeMode Arbitrary File Execution. Author: Wojciech Purczynski |
Analyze the security implications of: PHP 4.x - SafeMode Arbitrary File Execution | This exploit targets php systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sudo 1.6.x - Environment Variable Handling Security Bypass (2) | This is a local exploit for linux platform. Description: Sudo 1.6.x - Environment Variable Handling Security Bypass (2). Author: Breno Silva Pinto |
Analyze the security implications of: Sudo 1.6.x - Environment Variable Handling Security Bypass (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Adaptive Website Framework 1.11 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Adaptive Website Framework 1.11 - Remote File Inclusion. Author: Federico Fazzi |
Analyze the security implications of: Adaptive Website Framework 1.11 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Diamorphine Rootkit - Signal Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: Diamorphine Rootkit - Signal Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Diamorphine Rootkit - Signal Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: IBM DB2 < 9.5 pack 3a - Connect Denial of Service | This is a dos exploit for multiple platform. Description: IBM DB2 < 9.5 pack 3a - Connect Denial of Service. Author: Dennis Yurichev |
Analyze the security implications of: IBM DB2 < 9.5 pack 3a - Connect Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: LionWiki 3.x - 'index.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: LionWiki 3.x - 'index.php' Arbitrary File Upload. Author: ayastar |
Analyze the security implications of: LionWiki 3.x - 'index.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Inout Search Engine - Remote Code Execution | This is a webapps exploit for php platform. Description: Inout Search Engine - Remote Code Execution. Author: BlackHawk |
Analyze the security implications of: Inout Search Engine - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fortinet FortiGate 4.x < 5.0.7 - SSH Backdoor Access | This is a remote exploit for linux platform. Description: Fortinet FortiGate 4.x < 5.0.7 - SSH Backdoor Access. Author: operator8203 |
Analyze the security implications of: Fortinet FortiGate 4.x < 5.0.7 - SSH Backdoor Access | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SX Design sipd 0.1.2/0.1.4 - Remote Format String | This is a dos exploit for multiple platform. Description: SX Design sipd 0.1.2/0.1.4 - Remote Format String. Author: storm |
Analyze the security implications of: SX Design sipd 0.1.2/0.1.4 - Remote Format String | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GL-SH Deaf Forum 6.4.4 - Local File Inclusion | This is a webapps exploit for php platform. Description: GL-SH Deaf Forum 6.4.4 - Local File Inclusion. Author: Katatafish |
Analyze the security implications of: GL-SH Deaf Forum 6.4.4 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DIR-890L/R - Multiple Buffer Overflow Vulnerabilities | This is a remote exploit for hardware platform. Description: D-Link DIR-890L/R - Multiple Buffer Overflow Vulnerabilities. Author: Samuel Huntley |
Analyze the security implications of: D-Link DIR-890L/R - Multiple Buffer Overflow Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Ceica-GW - 'login.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Ceica-GW - 'login.php' Cross-Site Scripting. Author: indoushka |
Analyze the security implications of: Ceica-GW - 'login.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Academy LMS 6.1 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Academy LMS 6.1 - Arbitrary File Upload. Author: CraCkEr |
Analyze the security implications of: Academy LMS 6.1 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ActiveKB 1.5 - Insecure Cookie Handling/Arbitrary Admin Access | This is a webapps exploit for php platform. Description: ActiveKB 1.5 - Insecure Cookie Handling/Arbitrary Admin Access. Author: t0pP8uZz |
Analyze the security implications of: ActiveKB 1.5 - Insecure Cookie Handling/Arbitrary Admin Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Balitbang CMS 3.3 - 'index.php?hal' SQL Injection | This is a webapps exploit for php platform. Description: Balitbang CMS 3.3 - 'index.php?hal' SQL Injection. Author: X-Cisadane |
Analyze the security implications of: Balitbang CMS 3.3 - 'index.php?hal' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dolibarr ERP/CRM 3.2 Alpha - Multiple Directory Traversal Vulnerabilities | This is a webapps exploit for php platform. Description: Dolibarr ERP/CRM 3.2 Alpha - Multiple Directory Traversal Vulnerabilities. Author: Benjamin Kunz Mejri |
Analyze the security implications of: Dolibarr ERP/CRM 3.2 Alpha - Multiple Directory Traversal Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_doc - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_doc - SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! Component com_doc - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Juergen Weigert screen 3.9 - User Supplied Format String | This is a local exploit for bsd platform. Description: Juergen Weigert screen 3.9 - User Supplied Format String. Author: IhaQueR@IRCnet |
Analyze the security implications of: Juergen Weigert screen 3.9 - User Supplied Format String | This exploit targets bsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Joomla! Component KissGallery 1.0.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component KissGallery 1.0.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component KissGallery 1.0.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: amfPHP 1.2 - '/browser/code.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: amfPHP 1.2 - '/browser/code.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Alberto Cuesta Partida |
Analyze the security implications of: amfPHP 1.2 - '/browser/code.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash - H264 Parsing Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: Adobe Flash - H264 Parsing Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - H264 Parsing Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: TEM Opera Plus FM Family Transmitter 35.45 - XSRF | This is a remote exploit for hardware platform. Description: TEM Opera Plus FM Family Transmitter 35.45 - XSRF. Author: LiquidWorm |
Analyze the security implications of: TEM Opera Plus FM Family Transmitter 35.45 - XSRF | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: RWS WorldServer 11.7.3 - Session Token Enumeration | This is a webapps exploit for multiple platform. Description: RWS WorldServer 11.7.3 - Session Token Enumeration. Author: RedTeam Pentesting GmbH |
Analyze the security implications of: RWS WorldServer 11.7.3 - Session Token Enumeration | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_storedirectory - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_storedirectory - 'id' SQL Injection. Author: XroGuE |
Analyze the security implications of: Joomla! Component com_storedirectory - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Magic Photo Storage Website - '/user/user_membership_password.php?_config[site_path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/user/user_membership_password.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina |
Analyze the security implications of: Magic Photo Storage Website - '/user/user_membership_password.php?_config[site_path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WhatsApp 2.11.476 (Android) - Remote Reboot/Crash App (Denial of Service) | This is a dos exploit for android platform. Description: WhatsApp 2.11.476 (Android) - Remote Reboot/Crash App (Denial of Service). Author: Daniel Godoy |
Analyze the security implications of: WhatsApp 2.11.476 (Android) - Remote Reboot/Crash App (Denial of Service) | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Zoom Linux Client 2.0.106600.0904 - Command Injection | This is a dos exploit for linux platform. Description: Zoom Linux Client 2.0.106600.0904 - Command Injection. Author: Conviso |
Analyze the security implications of: Zoom Linux Client 2.0.106600.0904 - Command Injection | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.