input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RemotelyAnywhere - Default.HTML Logout Message Injection | This is a webapps exploit for cgi platform. Description: RemotelyAnywhere - Default.HTML Logout Message Injection. Author: Oliver Karow |
Analyze the security implications of: RemotelyAnywhere - Default.HTML Logout Message Injection | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Rockwell Automation Allen-Bradley PowerMonitor 1000 - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Rockwell Automation Allen-Bradley PowerMonitor 1000 - Cross-Site Scripting. Author: Luca.Chiou |
Analyze the security implications of: Rockwell Automation Allen-Bradley PowerMonitor 1000 - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: An image Gallery 1.0 - 'navigation.php' Local Directory Traversal | This is a webapps exploit for php platform. Description: An image Gallery 1.0 - 'navigation.php' Local Directory Traversal. Author: ThE g0bL!N |
Analyze the security implications of: An image Gallery 1.0 - 'navigation.php' Local Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PostgreSQL 9.6.1 - Remote Code Execution (RCE) (Authenticated) | This is a remote exploit for multiple platform. Description: PostgreSQL 9.6.1 - Remote Code Execution (RCE) (Authenticated). Author: Paulo Trindade |
Analyze the security implications of: PostgreSQL 9.6.1 - Remote Code Execution (RCE) (Authenticated) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: OpenSSH 1.2 - '.scp' File Create/Overwrite | This is a remote exploit for linux platform. Description: OpenSSH 1.2 - '.scp' File Create/Overwrite. Author: Michal Zalewski |
Analyze the security implications of: OpenSSH 1.2 - '.scp' File Create/Overwrite | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Adobe Flash - Transform.colorTranform Getter Infomation Leak | This is a dos exploit for multiple platform. Description: Adobe Flash - Transform.colorTranform Getter Infomation Leak. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Transform.colorTranform Getter Infomation Leak | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Optoma 1080PSTX Firmware C02 - Authentication Bypass | This is a remote exploit for hardware platform. Description: Optoma 1080PSTX Firmware C02 - Authentication Bypass. Author: Anthony Cole |
Analyze the security implications of: Optoma 1080PSTX Firmware C02 - Authentication Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Seagate Central 2014.0410.0026-F - Remote Facebook Access Token | This is a webapps exploit for hardware platform. Description: Seagate Central 2014.0410.0026-F - Remote Facebook Access Token. Author: Jeremy Brown |
Analyze the security implications of: Seagate Central 2014.0410.0026-F - Remote Facebook Access Token | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Inout RealEstate - 'city' SQL Injection | This is a webapps exploit for php platform. Description: Inout RealEstate - 'city' SQL Injection. Author: Ahmet Ümit BAYRAM |
Analyze the security implications of: Inout RealEstate - 'city' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Touch - 'pages.php?Page_ID' SQL Injection | This is a webapps exploit for php platform. Description: CMS Touch - 'pages.php?Page_ID' SQL Injection. Author: indoushka |
Analyze the security implications of: CMS Touch - 'pages.php?Page_ID' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pdfium - Pattern Shading Integer Overflows | This is a dos exploit for multiple platform. Description: Pdfium - Pattern Shading Integer Overflows. Author: Google Security Research |
Analyze the security implications of: Pdfium - Pattern Shading Integer Overflows | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Fortigate Firewall 2.x - dlg Admin Interface Cross-Site Scripting | This is a remote exploit for hardware platform. Description: Fortigate Firewall 2.x - dlg Admin Interface Cross-Site Scripting. Author: Maarten Hartsuijker |
Analyze the security implications of: Fortigate Firewall 2.x - dlg Admin Interface Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: SGI IRIX 6.4 - 'ioconfig' Local Privilege Escalation | This is a local exploit for irix platform. Description: SGI IRIX 6.4 - 'ioconfig' Local Privilege Escalation. Author: Loneguard |
Analyze the security implications of: SGI IRIX 6.4 - 'ioconfig' Local Privilege Escalation | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: Dev Web Management System 1.5 - 'cat' SQL Injection | This is a webapps exploit for php platform. Description: Dev Web Management System 1.5 - 'cat' SQL Injection. Author: rgod |
Analyze the security implications of: Dev Web Management System 1.5 - 'cat' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: E-topbiz Link ADS 1 PHP script - 'linkid' Blind SQL Injection | This is a webapps exploit for php platform. Description: E-topbiz Link ADS 1 PHP script - 'linkid' Blind SQL Injection. Author: JosS |
Analyze the security implications of: E-topbiz Link ADS 1 PHP script - 'linkid' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Strapi CMS 3.0.0-beta.17.4 - Set Password (Unauthenticated) (Metasploit) | This is a webapps exploit for nodejs platform. Description: Strapi CMS 3.0.0-beta.17.4 - Set Password (Unauthenticated) (Metasploit). Author: WackyH4cker |
Analyze the security implications of: Strapi CMS 3.0.0-beta.17.4 - Set Password (Unauthenticated) (Metasploit) | This exploit targets nodejs systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets nodejs platform |
What is this exploit about: Hanterm 3.3 - Local Buffer Overflow (1) | This is a local exploit for linux platform. Description: Hanterm 3.3 - Local Buffer Overflow (1). Author: Xpl017Elz |
Analyze the security implications of: Hanterm 3.3 - Local Buffer Overflow (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: E-Learning System 1.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: E-Learning System 1.0 - Authentication Bypass. Author: Himanshu Shukla |
Analyze the security implications of: E-Learning System 1.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ruby on Rails - Dynamic Render File Upload / Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Ruby on Rails - Dynamic Render File Upload / Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Ruby on Rails - Dynamic Render File Upload / Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mozilla Bonsai - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cgi platform. Description: Mozilla Bonsai - Multiple Cross-Site Scripting Vulnerabilities. Author: Stan Bubrouski |
Analyze the security implications of: Mozilla Bonsai - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: GoToMeeting for Android - Multiple Local Information Disclosure Vulnerabilities | This is a local exploit for android platform. Description: GoToMeeting for Android - Multiple Local Information Disclosure Vulnerabilities. Author: Claudio J. Lacayo |
Analyze the security implications of: GoToMeeting for Android - Multiple Local Information Disclosure Vulnerabilities | This exploit targets android systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Magento Server MAGMI Plugin - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Magento Server MAGMI Plugin - Multiple Vulnerabilities. Author: SECUPENT |
Analyze the security implications of: Magento Server MAGMI Plugin - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 4/5 - Input/Output Wrapper Remote File Inclusion Function Command Execution | This is a remote exploit for php platform. Description: PHP 4/5 - Input/Output Wrapper Remote File Inclusion Function Command Execution. Author: Slythers |
Analyze the security implications of: PHP 4/5 - Input/Output Wrapper Remote File Inclusion Function Command Execution | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeForum 1.7 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: FreeForum 1.7 - Cross-Site Scripting. Author: indoushka |
Analyze the security implications of: FreeForum 1.7 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PAN-OS 10.0 - Remote Code Execution (RCE) (Authenticated) | This is a remote exploit for multiple platform. Description: PAN-OS 10.0 - Remote Code Execution (RCE) (Authenticated). Author: UnD3sc0n0c1d0 |
Analyze the security implications of: PAN-OS 10.0 - Remote Code Execution (RCE) (Authenticated) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GOautodial 4.0 - Persistent Cross-Site Scripting (Authenticated) | This is a webapps exploit for php platform. Description: GOautodial 4.0 - Persistent Cross-Site Scripting (Authenticated). Author: Balzabu |
Analyze the security implications of: GOautodial 4.0 - Persistent Cross-Site Scripting (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dell EMC iDRAC7/iDRAC8 2.52.52.52 - Remote Code Execution (RCE) | This is a remote exploit for hardware platform. Description: Dell EMC iDRAC7/iDRAC8 2.52.52.52 - Remote Code Execution (RCE). Author: Photubias |
Analyze the security implications of: Dell EMC iDRAC7/iDRAC8 2.52.52.52 - Remote Code Execution (RCE) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: eUploader PRO 3.1.1 - Cross-Site Request Forgery / Cross-Site Scripting | This is a webapps exploit for php platform. Description: eUploader PRO 3.1.1 - Cross-Site Request Forgery / Cross-Site Scripting. Author: Milos Zivanovic |
Analyze the security implications of: eUploader PRO 3.1.1 - Cross-Site Request Forgery / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bitweaver R2 CMS - Arbitrary File Upload / Disclosure | This is a webapps exploit for php platform. Description: Bitweaver R2 CMS - Arbitrary File Upload / Disclosure. Author: BugReport.IR |
Analyze the security implications of: Bitweaver R2 CMS - Arbitrary File Upload / Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: i-doit CMDB 1.12 - Arbitrary File Download | This is a webapps exploit for php platform. Description: i-doit CMDB 1.12 - Arbitrary File Download. Author: Ihsan Sencan |
Analyze the security implications of: i-doit CMDB 1.12 - Arbitrary File Download | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BigTree CMS 4.2.11 - SQL Injection | This is a webapps exploit for php platform. Description: BigTree CMS 4.2.11 - SQL Injection. Author: Mehmet Ince |
Analyze the security implications of: BigTree CMS 4.2.11 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Candle 1.0 - 'cid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Candle 1.0 - 'cid' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! Component Candle 1.0 - 'cid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Find a Place CMS Directory 1.5 - 'assets/external/data_2.php cate' SQL Injection | This is a webapps exploit for php platform. Description: Find a Place CMS Directory 1.5 - 'assets/external/data_2.php cate' SQL Injection. Author: Deyaa Muhammad |
Analyze the security implications of: Find a Place CMS Directory 1.5 - 'assets/external/data_2.php cate' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.