input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Easy POS System - 'login.php' SQL Injection | This is a webapps exploit for php platform. Description: Easy POS System - 'login.php' SQL Injection. Author: vinicius777 |
Analyze the security implications of: Easy POS System - 'login.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GejoSoft Image Hosting Community - Cross-Site Scripting | This is a webapps exploit for php platform. Description: GejoSoft Image Hosting Community - Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: GejoSoft Image Hosting Community - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: enano CMS 1.1.7pl1 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: enano CMS 1.1.7pl1 - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: enano CMS 1.1.7pl1 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: J-OWAMP Web Interface 2.1b - 'link' Remote File Inclusion | This is a webapps exploit for php platform. Description: J-OWAMP Web Interface 2.1b - 'link' Remote File Inclusion. Author: 3l3ctric-Cracker |
Analyze the security implications of: J-OWAMP Web Interface 2.1b - 'link' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache 1.3.14 - Mac File Protection Bypass | This is a remote exploit for osx platform. Description: Apache 1.3.14 - Mac File Protection Bypass. Author: Stefan Arentz |
Analyze the security implications of: Apache 1.3.14 - Mac File Protection Bypass | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: CartWIZ 1.10 - 'searchresults.asp' PriceFrom Argument SQL Injection | This is a webapps exploit for asp platform. Description: CartWIZ 1.10 - 'searchresults.asp' PriceFrom Argument SQL Injection. Author: Dcrab |
Analyze the security implications of: CartWIZ 1.10 - 'searchresults.asp' PriceFrom Argument SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Lantern CMS - '11-login.asp' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Lantern CMS - '11-login.asp' Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: Lantern CMS - '11-login.asp' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: F5 BIG-IP 10.1.0 - Directory Traversal | This is a webapps exploit for jsp platform. Description: F5 BIG-IP 10.1.0 - Directory Traversal. Author: Anastasios Monachos |
Analyze the security implications of: F5 BIG-IP 10.1.0 - Directory Traversal | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Etano 1.20/1.22 - 'search.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Etano 1.20/1.22 - 'search.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Aung Khant |
Analyze the security implications of: Etano 1.20/1.22 - 'search.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Enthrallweb eHomes - 'result.asp' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: Enthrallweb eHomes - 'result.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: laurent gaffie |
Analyze the security implications of: Enthrallweb eHomes - 'result.asp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Almnzm 2.0 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Almnzm 2.0 - Blind SQL Injection. Author: Qabandi |
Analyze the security implications of: Almnzm 2.0 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ProductCart 1.5/1.6/2.0 - 'Custva.asp' SQL Injection | This is a webapps exploit for asp platform. Description: ProductCart 1.5/1.6/2.0 - 'Custva.asp' SQL Injection. Author: Bosen |
Analyze the security implications of: ProductCart 1.5/1.6/2.0 - 'Custva.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: GetSimpleCMS - Unauthenticated Remote Code Execution (Metasploit) | This is a remote exploit for php platform. Description: GetSimpleCMS - Unauthenticated Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: GetSimpleCMS - Unauthenticated Remote Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DSR Router Series - Remote Command Execution | This is a webapps exploit for hardware platform. Description: D-Link DSR Router Series - Remote Command Execution. Author: 0_o |
Analyze the security implications of: D-Link DSR Router Series - Remote Command Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: D-Link DIR-846 - Remote Command Execution (RCE) vulnerability | This is a remote exploit for hardware platform. Description: D-Link DIR-846 - Remote Command Execution (RCE) vulnerability. Author: Françoa Taffarel |
Analyze the security implications of: D-Link DIR-846 - Remote Command Execution (RCE) vulnerability | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Novell NCP - Remote Command Execution | This is a remote exploit for linux platform. Description: Novell NCP - Remote Command Execution. Author: Gary Nilson |
Analyze the security implications of: Novell NCP - Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: dynamic flash forum 1.0 Beta - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: dynamic flash forum 1.0 Beta - Multiple Vulnerabilities. Author: Salvatore Fresta |
Analyze the security implications of: dynamic flash forum 1.0 Beta - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KACE System Management Appliance (SMA) < 9.0.270 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: KACE System Management Appliance (SMA) < 9.0.270 - Multiple Vulnerabilities. Author: SlidingWindow |
Analyze the security implications of: KACE System Management Appliance (SMA) < 9.0.270 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Campsite 3.3.0 RC1 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Campsite 3.3.0 RC1 - Multiple Remote File Inclusions. Author: CraCkEr |
Analyze the security implications of: Campsite 3.3.0 RC1 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cacti v1.2.22 - Remote Command Execution (RCE) | This is a webapps exploit for php platform. Description: Cacti v1.2.22 - Remote Command Execution (RCE). Author: Riadh Bouchahoua |
Analyze the security implications of: Cacti v1.2.22 - Remote Command Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: libtiff 3.9.5 - Integer Overflow | This is a dos exploit for linux platform. Description: libtiff 3.9.5 - Integer Overflow. Author: x90c |
Analyze the security implications of: libtiff 3.9.5 - Integer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution | This is a webapps exploit for aspx platform. Description: Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution. Author: Gregory Draperi |
Analyze the security implications of: Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Clinic's Patient Management System 1.0 - Unauthenticated RCE | This is a webapps exploit for php platform. Description: Clinic's Patient Management System 1.0 - Unauthenticated RCE. Author: Oğulcan Hami Gül |
Analyze the security implications of: Clinic's Patient Management System 1.0 - Unauthenticated RCE | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HotelDruid 2.3.0 - 'id_utente_mod' SQL Injection | This is a webapps exploit for php platform. Description: HotelDruid 2.3.0 - 'id_utente_mod' SQL Injection. Author: Sainadh Jamalpur |
Analyze the security implications of: HotelDruid 2.3.0 - 'id_utente_mod' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco IOS - Remote Code Execution | This is a remote exploit for hardware platform. Description: Cisco IOS - Remote Code Execution. Author: Artem Kondratenko |
Analyze the security implications of: Cisco IOS - Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Mambo Component com_videodb 0.3en - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Component com_videodb 0.3en - Remote File Inclusion. Author: h4ntu |
Analyze the security implications of: Mambo Component com_videodb 0.3en - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DB[CMS] - 'section.php' SQL Injection | This is a webapps exploit for php platform. Description: DB[CMS] - 'section.php' SQL Injection. Author: CoBRa_21 |
Analyze the security implications of: DB[CMS] - 'section.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ALFTP FTP Client 4.1/5.0 - 'LIST' Directory Traversal | This is a remote exploit for linux platform. Description: ALFTP FTP Client 4.1/5.0 - 'LIST' Directory Traversal. Author: Tan Chew Keong |
Analyze the security implications of: ALFTP FTP Client 4.1/5.0 - 'LIST' Directory Traversal | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: eMerge E3 1.00-06 - Privilege Escalation | This is a webapps exploit for hardware platform. Description: eMerge E3 1.00-06 - Privilege Escalation. Author: LiquidWorm |
Analyze the security implications of: eMerge E3 1.00-06 - Privilege Escalation | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Wireshark - 'cdma2k_message_ACTIVE_SET_RECORD_FIELDS' Stack Corruption | This is a dos exploit for multiple platform. Description: Wireshark - 'cdma2k_message_ACTIVE_SET_RECORD_FIELDS' Stack Corruption. Author: Google Security Research |
Analyze the security implications of: Wireshark - 'cdma2k_message_ACTIVE_SET_RECORD_FIELDS' Stack Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: MySQL 6.0.9 - SELECT Statement WHERE Clause Sub-query Denial of Service | This is a dos exploit for linux platform. Description: MySQL 6.0.9 - SELECT Statement WHERE Clause Sub-query Denial of Service. Author: Shane Bester |
Analyze the security implications of: MySQL 6.0.9 - SELECT Statement WHERE Clause Sub-query Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: NASM 2.0 - 'ppscan()' Off-by-One Buffer Overflow | This is a remote exploit for linux platform. Description: NASM 2.0 - 'ppscan()' Off-by-One Buffer Overflow. Author: Philipp Thomas |
Analyze the security implications of: NASM 2.0 - 'ppscan()' Off-by-One Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cyphor 0.19 - 'lostpwd.php?nick' SQL Injection | This is a webapps exploit for php platform. Description: Cyphor 0.19 - 'lostpwd.php?nick' SQL Injection. Author: rgod |
Analyze the security implications of: Cyphor 0.19 - 'lostpwd.php?nick' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.