input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Add An Ad Script - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Add An Ad Script - Arbitrary File Upload. Author: MR.Z |
Analyze the security implications of: Add An Ad Script - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Moodle 3.6.3 - 'Install Plugin' Remote Command Execution (Metasploit) | This is a remote exploit for php platform. Description: Moodle 3.6.3 - 'Install Plugin' Remote Command Execution (Metasploit). Author: AkkuS |
Analyze the security implications of: Moodle 3.6.3 - 'Install Plugin' Remote Command Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Joaktree 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Joaktree 1.0 - SQL Injection. Author: Don Tukulesto |
Analyze the security implications of: Joomla! Component Joaktree 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SnipSnap 0.5.2 - HTTP Response Splitting | This is a remote exploit for multiple platform. Description: SnipSnap 0.5.2 - HTTP Response Splitting. Author: Maestro De-Seguridad |
Analyze the security implications of: SnipSnap 0.5.2 - HTTP Response Splitting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ac4p Mobile - 'up.php?Taaa' Cross-Site Scripting | This is a webapps exploit for php platform. Description: ac4p Mobile - 'up.php?Taaa' Cross-Site Scripting. Author: SwEET-DeViL |
Analyze the security implications of: ac4p Mobile - 'up.php?Taaa' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Goople 1.8.2 - 'FrontPage.php' Blind SQL Injection | This is a webapps exploit for php platform. Description: Goople 1.8.2 - 'FrontPage.php' Blind SQL Injection. Author: darkjoker |
Analyze the security implications of: Goople 1.8.2 - 'FrontPage.php' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ben Chivers Easy Homepage Creator 1.0 - File Modification | This is a webapps exploit for cgi platform. Description: Ben Chivers Easy Homepage Creator 1.0 - File Modification. Author: Arek Suroboyo |
Analyze the security implications of: Ben Chivers Easy Homepage Creator 1.0 - File Modification | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Perl 5.x - 'lc()' / 'uc()' TAINT Mode Protection Security Bypass | This is a remote exploit for linux platform. Description: Perl 5.x - 'lc()' / 'uc()' TAINT Mode Protection Security Bypass. Author: mmartinec |
Analyze the security implications of: Perl 5.x - 'lc()' / 'uc()' TAINT Mode Protection Security Bypass | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mapscrn 2.03 - Local Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: Mapscrn 2.03 - Local Buffer Overflow (PoC). Author: Juan Sacco |
Analyze the security implications of: Mapscrn 2.03 - Local Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! / Mambo Component com_utchat 0.2 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_utchat 0.2 - Multiple Remote File Inclusions. Author: by_casper41 |
Analyze the security implications of: Joomla! / Mambo Component com_utchat 0.2 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ircd-hybrid 8.0.5 - Denial of Service | This is a dos exploit for linux platform. Description: ircd-hybrid 8.0.5 - Denial of Service. Author: kingcope |
Analyze the security implications of: ircd-hybrid 8.0.5 - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Jaws 0.2/0.3/0.4 - 'ControlPanel.php' SQL Injection | This is a webapps exploit for php platform. Description: Jaws 0.2/0.3/0.4 - 'ControlPanel.php' SQL Injection. Author: Fernando Quintero |
Analyze the security implications of: Jaws 0.2/0.3/0.4 - 'ControlPanel.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP Insight Diagnostics 9.4.0.4710 - Local File Inclusion | This is a webapps exploit for php platform. Description: HP Insight Diagnostics 9.4.0.4710 - Local File Inclusion. Author: Markus Wulftange |
Analyze the security implications of: HP Insight Diagnostics 9.4.0.4710 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CakePHP Framework 3.2.4 - IP Spoofing | This is a webapps exploit for php platform. Description: CakePHP Framework 3.2.4 - IP Spoofing. Author: Dawid Golunski |
Analyze the security implications of: CakePHP Framework 3.2.4 - IP Spoofing | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CubeCart 3.0.4/4.3.6 - 'ProductID' SQL Injection | This is a webapps exploit for php platform. Description: CubeCart 3.0.4/4.3.6 - 'ProductID' SQL Injection. Author: Sangte Amtham |
Analyze the security implications of: CubeCart 3.0.4/4.3.6 - 'ProductID' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CF Image Host 1.65 - PHP Command Injection | This is a webapps exploit for php platform. Description: CF Image Host 1.65 - PHP Command Injection. Author: hyp3rlinx |
Analyze the security implications of: CF Image Host 1.65 - PHP Command Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dogfood CRM - 'spell.php' Remote Command Execution (Metasploit) | This is a webapps exploit for php platform. Description: Dogfood CRM - 'spell.php' Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Dogfood CRM - 'spell.php' Remote Command Execution (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS NetCat 3.0/3.12 - Blind SQL Injection | This is a webapps exploit for php platform. Description: CMS NetCat 3.0/3.12 - Blind SQL Injection. Author: s4avrd0w |
Analyze the security implications of: CMS NetCat 3.0/3.12 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Elber ESE DVB-S/S2 Satellite Receiver 1.5.x - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Elber ESE DVB-S/S2 Satellite Receiver 1.5.x - Authentication Bypass. Author: LiquidWorm |
Analyze the security implications of: Elber ESE DVB-S/S2 Satellite Receiver 1.5.x - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Buddy Zone 1.5 - 'view_sub_cat.php?cat_id' SQL Injection | This is a webapps exploit for php platform. Description: Buddy Zone 1.5 - 'view_sub_cat.php?cat_id' SQL Injection. Author: t0pP8uZz |
Analyze the security implications of: Buddy Zone 1.5 - 'view_sub_cat.php?cat_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ad Manager Pro 4 - Local File Inclusion | This is a webapps exploit for php platform. Description: Ad Manager Pro 4 - Local File Inclusion. Author: CorryL |
Analyze the security implications of: Ad Manager Pro 4 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WordPress Plugin Asset-Manager - Arbitrary '.PHP' File Upload (Metasploit) | This is a remote exploit for php platform. Description: WordPress Plugin Asset-Manager - Arbitrary '.PHP' File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: WordPress Plugin Asset-Manager - Arbitrary '.PHP' File Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bux.to Clone Script - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Bux.to Clone Script - Insecure Cookie Handling. Author: SirGod |
Analyze the security implications of: Bux.to Clone Script - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Microsoft IIS 4.0 / Microsoft JET 3.5/3.5.1 Database Engine - VBA | This is a dos exploit for multiple platform. Description: Microsoft IIS 4.0 / Microsoft JET 3.5/3.5.1 Database Engine - VBA. Author: J. Abreu Junior |
Analyze the security implications of: Microsoft IIS 4.0 / Microsoft JET 3.5/3.5.1 Database Engine - VBA | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ASPBB 0.5.2 - 'Perform_search.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: ASPBB 0.5.2 - 'Perform_search.asp' Cross-Site Scripting. Author: Mustafa Can Bjorn |
Analyze the security implications of: ASPBB 0.5.2 - 'Perform_search.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: AShop Deluxe 4.5 - 'basket.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: AShop Deluxe 4.5 - 'basket.php' Cross-Site Scripting. Author: Hackers Center Security |
Analyze the security implications of: AShop Deluxe 4.5 - 'basket.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linksys Web Camera Software 2.10 - 'Next_file' File Disclosure | This is a webapps exploit for cgi platform. Description: Linksys Web Camera Software 2.10 - 'Next_file' File Disclosure. Author: John Doe |
Analyze the security implications of: Linksys Web Camera Software 2.10 - 'Next_file' File Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Blank'N'Berg 0.2 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Blank'N'Berg 0.2 - Cross-Site Scripting. Author: Amine ABOUD |
Analyze the security implications of: Blank'N'Berg 0.2 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Horde 1.2.x/2.1.3 and Imp 2.2.x/3.1.2 - File Disclosure | This is a remote exploit for linux platform. Description: Horde 1.2.x/2.1.3 and Imp 2.2.x/3.1.2 - File Disclosure. Author: Caldera Open Linux |
Analyze the security implications of: Horde 1.2.x/2.1.3 and Imp 2.2.x/3.1.2 - File Disclosure | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GuppY 4.5 - 'editorTypetool.php?meskin' Traversal Arbitrary File Access | This is a webapps exploit for php platform. Description: GuppY 4.5 - 'editorTypetool.php?meskin' Traversal Arbitrary File Access. Author: retrogod@aliceposta.it |
Analyze the security implications of: GuppY 4.5 - 'editorTypetool.php?meskin' Traversal Arbitrary File Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_colorlab 1.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_colorlab 1.0 - Remote File Inclusion. Author: Mehmet Ince |
Analyze the security implications of: Joomla! Component com_colorlab 1.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IWebNegar - Multiple SQL Injections | This is a webapps exploit for php platform. Description: IWebNegar - Multiple SQL Injections. Author: Shervin Khaleghjou |
Analyze the security implications of: IWebNegar - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IPConfigure Orchid VMS 2.0.5 - Directory Traversal / Information Disclosure (Metasploit) | This is a webapps exploit for multiple platform. Description: IPConfigure Orchid VMS 2.0.5 - Directory Traversal / Information Disclosure (Metasploit). Author: Nettitude |
Analyze the security implications of: IPConfigure Orchid VMS 2.0.5 - Directory Traversal / Information Disclosure (Metasploit) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.