input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Graffiti Forums 1.0 - 'Topics.php' SQL Injection | This is a webapps exploit for php platform. Description: Graffiti Forums 1.0 - 'Topics.php' SQL Injection. Author: Paisterist |
Analyze the security implications of: Graffiti Forums 1.0 - 'Topics.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component IXXO Cart! Standalone and - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component IXXO Cart! Standalone and - SQL Injection. Author: sm0k3 |
Analyze the security implications of: Joomla! Component IXXO Cart! Standalone and - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FrontAccounting 1.12 build 31 - Remote File Inclusion | This is a webapps exploit for php platform. Description: FrontAccounting 1.12 build 31 - Remote File Inclusion. Author: kezzap66345 |
Analyze the security implications of: FrontAccounting 1.12 build 31 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sun Microsystems SunScreen Firewall - Privilege Escalation | This is a remote exploit for multiple platform. Description: Sun Microsystems SunScreen Firewall - Privilege Escalation. Author: kingcope |
Analyze the security implications of: Sun Microsystems SunScreen Firewall - Privilege Escalation | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Kimai 0.9.2.1306-3 - SQL Injection | This is a webapps exploit for php platform. Description: Kimai 0.9.2.1306-3 - SQL Injection. Author: drone |
Analyze the security implications of: Kimai 0.9.2.1306-3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component SVMap 1.1.1 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component SVMap 1.1.1 - Local File Inclusion. Author: Vrs-hCk |
Analyze the security implications of: Joomla! Component SVMap 1.1.1 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 3.3.5 - '/drivers/media/media-device.c' Local Information Disclosure | This is a local exploit for linux platform. Description: Linux Kernel 3.3.5 - '/drivers/media/media-device.c' Local Information Disclosure. Author: Salva Peiro |
Analyze the security implications of: Linux Kernel 3.3.5 - '/drivers/media/media-device.c' Local Information Disclosure | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_idoblog - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_idoblog - SQL Injection. Author: NOCKAR1111 |
Analyze the security implications of: Joomla! Component com_idoblog - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Infor CRM 8.2.0.1136 - Multiple HTML Script Injection Vulnerabilities | This is a webapps exploit for ashx platform. Description: Infor CRM 8.2.0.1136 - Multiple HTML Script Injection Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: Infor CRM 8.2.0.1136 - Multiple HTML Script Injection Vulnerabilities | This exploit targets ashx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ashx platform |
What is this exploit about: Enalean Tuleap 7.4.99.5 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Enalean Tuleap 7.4.99.5 - Blind SQL Injection. Author: Portcullis |
Analyze the security implications of: Enalean Tuleap 7.4.99.5 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DZcms 3.1 - SQL Injection | This is a webapps exploit for php platform. Description: DZcms 3.1 - SQL Injection. Author: Glafkos Charalambous |
Analyze the security implications of: DZcms 3.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Vitek - Remote Command Execution / Information Disclosure (PoC) | This is a remote exploit for multiple platform. Description: Vitek - Remote Command Execution / Information Disclosure (PoC). Author: bashis |
Analyze the security implications of: Vitek - Remote Command Execution / Information Disclosure (PoC) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AnyDesk 5.5.2 - Remote Code Execution | This is a remote exploit for linux platform. Description: AnyDesk 5.5.2 - Remote Code Execution. Author: scryh |
Analyze the security implications of: AnyDesk 5.5.2 - Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: In-link 2.3.4 - 'ADODB_DIR' Remote File Inclusion | This is a webapps exploit for php platform. Description: In-link 2.3.4 - 'ADODB_DIR' Remote File Inclusion. Author: Saudi Hackrz |
Analyze the security implications of: In-link 2.3.4 - 'ADODB_DIR' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Valentina Studio 9.0.5 Linux - 'Host' Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: Valentina Studio 9.0.5 Linux - 'Host' Buffer Overflow (PoC). Author: Alejandra Sánchez |
Analyze the security implications of: Valentina Studio 9.0.5 Linux - 'Host' Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SoftXMLCMS - Arbitrary File Upload | This is a webapps exploit for asp platform. Description: SoftXMLCMS - Arbitrary File Upload. Author: Alexander |
Analyze the security implications of: SoftXMLCMS - Arbitrary File Upload | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apple iOS Safari - 'JS .' Remote Crash | This is a dos exploit for hardware platform. Description: Apple iOS Safari - 'JS .' Remote Crash. Author: Yakir Wizman |
Analyze the security implications of: Apple iOS Safari - 'JS .' Remote Crash | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: NodeJS Debugger - Command Injection (Metasploit) | This is a remote exploit for multiple platform. Description: NodeJS Debugger - Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: NodeJS Debugger - Command Injection (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Satellian 1.12 - Remote Code Execution | This is a webapps exploit for hardware platform. Description: Satellian 1.12 - Remote Code Execution. Author: Xh4H |
Analyze the security implications of: Satellian 1.12 - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component com_realestatemanager 1.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_realestatemanager 1.0 - Remote File Inclusion. Author: Mehmet Ince |
Analyze the security implications of: Joomla! Component com_realestatemanager 1.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Teradek Slice 7.3.15 - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Teradek Slice 7.3.15 - Cross-Site Request Forgery. Author: LiquidWorm |
Analyze the security implications of: Teradek Slice 7.3.15 - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linux Kernel 2.6.10 - File Lock Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.10 - File Lock Local Denial of Service. Author: ChoiX |
Analyze the security implications of: Linux Kernel 2.6.10 - File Lock Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: e107 Plugin BLOG Engine 2.2 - 'uid' SQL Injection | This is a webapps exploit for php platform. Description: e107 Plugin BLOG Engine 2.2 - 'uid' SQL Injection. Author: Virangar Security |
Analyze the security implications of: e107 Plugin BLOG Engine 2.2 - 'uid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: rsync 2.5.1 - Remote (1) | This is a remote exploit for linux platform. Description: rsync 2.5.1 - Remote (1). Author: Teso |
Analyze the security implications of: rsync 2.5.1 - Remote (1) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Hospital Management System v1.0 - Stored Cross Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Hospital Management System v1.0 - Stored Cross Site Scripting (XSS). Author: Sandeep Vishwakarma |
Analyze the security implications of: Hospital Management System v1.0 - Stored Cross Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MDBms 0.96/0.99 - Query Display Buffer Overflow | This is a remote exploit for linux platform. Description: MDBms 0.96/0.99 - Query Display Buffer Overflow. Author: teleh0r |
Analyze the security implications of: MDBms 0.96/0.99 - Query Display Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mambo - Cache_Lite Class MosConfig_absolute_path Remote File Inclusion (Metasploit) | This is a webapps exploit for php platform. Description: Mambo - Cache_Lite Class MosConfig_absolute_path Remote File Inclusion (Metasploit). Author: Metasploit |
Analyze the security implications of: Mambo - Cache_Lite Class MosConfig_absolute_path Remote File Inclusion (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Packeteer PacketShaper 7.x - Web Interface Remote Denial of Service | This is a dos exploit for hardware platform. Description: Packeteer PacketShaper 7.x - Web Interface Remote Denial of Service. Author: nnposter |
Analyze the security implications of: Packeteer PacketShaper 7.x - Web Interface Remote Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Alqatari group 1.0 < 5.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Alqatari group 1.0 < 5.0 - 'id' SQL Injection. Author: Red-D3v1L |
Analyze the security implications of: Alqatari group 1.0 < 5.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Courier-IMAP 3.0.2-r1 - 'auth_debug()' Remote Format String | This is a remote exploit for bsd platform. Description: Courier-IMAP 3.0.2-r1 - 'auth_debug()' Remote Format String. Author: ktha |
Analyze the security implications of: Courier-IMAP 3.0.2-r1 - 'auth_debug()' Remote Format String | This exploit targets bsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Confluence Server 7.12.4 - 'OGNL injection' Remote Code Execution (RCE) (Unauthenticated) | This is a webapps exploit for java platform. Description: Confluence Server 7.12.4 - 'OGNL injection' Remote Code Execution (RCE) (Unauthenticated). Author: Fellipe Oliveira |
Analyze the security implications of: Confluence Server 7.12.4 - 'OGNL injection' Remote Code Execution (RCE) (Unauthenticated) | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Hippo CMS 10.1 - Multiple Vulnerabilities | This is a webapps exploit for java platform. Description: Hippo CMS 10.1 - Multiple Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: Hippo CMS 10.1 - Multiple Vulnerabilities | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: ProFTPd - 'mod_mysql' Authentication Bypass | This is a remote exploit for multiple platform. Description: ProFTPd - 'mod_mysql' Authentication Bypass. Author: gat3way |
Analyze the security implications of: ProFTPd - 'mod_mysql' Authentication Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.