input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MagpieRSS 0.72 - CDATA HTML Injection | This is a remote exploit for multiple platform. Description: MagpieRSS 0.72 - CDATA HTML Injection. Author: system_meltdown |
Analyze the security implications of: MagpieRSS 0.72 - CDATA HTML Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component EShop 2.5.1 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component EShop 2.5.1 - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component EShop 2.5.1 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Patient folder (THEME ASP) - SQL Injection | This is a webapps exploit for asp platform. Description: Patient folder (THEME ASP) - SQL Injection. Author: SA H4x0r |
Analyze the security implications of: Patient folder (THEME ASP) - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: SpinetiX Fusion Digital Signage 3.4.8 - Database Backup Disclosure | This is a webapps exploit for hardware platform. Description: SpinetiX Fusion Digital Signage 3.4.8 - Database Backup Disclosure. Author: LiquidWorm |
Analyze the security implications of: SpinetiX Fusion Digital Signage 3.4.8 - Database Backup Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DansGuardian Webmin Module 0.x - 'edit.cgi' Directory Traversal | This is a webapps exploit for cgi platform. Description: DansGuardian Webmin Module 0.x - 'edit.cgi' Directory Traversal. Author: FIST |
Analyze the security implications of: DansGuardian Webmin Module 0.x - 'edit.cgi' Directory Traversal | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: BigACE 1.8.2 - 'upload_form.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: BigACE 1.8.2 - 'upload_form.php' Remote File Inclusion. Author: Vampire |
Analyze the security implications of: BigACE 1.8.2 - 'upload_form.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Digitalus 1.10.0 Alpha2 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Digitalus 1.10.0 Alpha2 - Arbitrary File Upload. Author: eidelweiss |
Analyze the security implications of: Digitalus 1.10.0 Alpha2 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM Net.Commerce 2.0/3.x/4.x - orderdspc.d2w order_rn Option SQL Injection | This is a remote exploit for multiple platform. Description: IBM Net.Commerce 2.0/3.x/4.x - orderdspc.d2w order_rn Option SQL Injection. Author: Rudi Carell |
Analyze the security implications of: IBM Net.Commerce 2.0/3.x/4.x - orderdspc.d2w order_rn Option SQL Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Netwin SurgeFTP 1.0b - Denial of Service | This is a dos exploit for multiple platform. Description: Netwin SurgeFTP 1.0b - Denial of Service. Author: the Strumpf Noir Society |
Analyze the security implications of: Netwin SurgeFTP 1.0b - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple Mac OSX 10.4.8 - SLP Daemon Service Registration Buffer Overflow (PoC) | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.4.8 - SLP Daemon Service Registration Buffer Overflow (PoC). Author: MoAB |
Analyze the security implications of: Apple Mac OSX 10.4.8 - SLP Daemon Service Registration Buffer Overflow (PoC) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: InfraPower PPS-02-S Q213V1 - Remote Command Execution | This is a webapps exploit for hardware platform. Description: InfraPower PPS-02-S Q213V1 - Remote Command Execution. Author: LiquidWorm |
Analyze the security implications of: InfraPower PPS-02-S Q213V1 - Remote Command Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CITSmart ITSM 9.1.2.22 - LDAP Injection | This is a webapps exploit for java platform. Description: CITSmart ITSM 9.1.2.22 - LDAP Injection. Author: skysbsb |
Analyze the security implications of: CITSmart ITSM 9.1.2.22 - LDAP Injection | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Crux Gallery 1.32 - 'theme' Local File Inclusion | This is a webapps exploit for php platform. Description: Crux Gallery 1.32 - 'theme' Local File Inclusion. Author: StAkeR |
Analyze the security implications of: Crux Gallery 1.32 - 'theme' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Socat 1.7.3.4 - Heap-Based Overflow (PoC) | This is a local exploit for linux platform. Description: Socat 1.7.3.4 - Heap-Based Overflow (PoC). Author: hieubl |
Analyze the security implications of: Socat 1.7.3.4 - Heap-Based Overflow (PoC) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Max Web Portal < 1.30 - Multiple Vulnerabilities | This is a webapps exploit for multiple platform. Description: Max Web Portal < 1.30 - Multiple Vulnerabilities. Author: GulfTech Security |
Analyze the security implications of: Max Web Portal < 1.30 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CarLine Forum Russian Board 4.2 - 'edit_msg.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: CarLine Forum Russian Board 4.2 - 'edit_msg.php' Multiple Cross-Site Scripting Vulnerabilities. Author: 1dt.w0lf |
Analyze the security implications of: CarLine Forum Russian Board 4.2 - 'edit_msg.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP JetDirect PJL - Query Execution (Metasploit) | This is a remote exploit for hardware platform. Description: HP JetDirect PJL - Query Execution (Metasploit). Author: Myo Soe |
Analyze the security implications of: HP JetDirect PJL - Query Execution (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GlassFish Enterprise Server 2.1 - Admin Console /webService/webServicesGeneral.jsf URI Cross-Site Scripting | This is a remote exploit for multiple platform. Description: GlassFish Enterprise Server 2.1 - Admin Console /webService/webServicesGeneral.jsf URI Cross-Site Scripting. Author: DSecRG |
Analyze the security implications of: GlassFish Enterprise Server 2.1 - Admin Console /webService/webServicesGeneral.jsf URI Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Blender 2.34/2.35a/2.4/2.49b - '.blend' Command Injection | This is a remote exploit for multiple platform. Description: Blender 2.34/2.35a/2.4/2.49b - '.blend' Command Injection. Author: Core Security |
Analyze the security implications of: Blender 2.34/2.35a/2.4/2.49b - '.blend' Command Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Anserv Auction XL - 'cat' SQL Injection | This is a webapps exploit for php platform. Description: Anserv Auction XL - 'cat' SQL Injection. Author: K-159 |
Analyze the security implications of: Anserv Auction XL - 'cat' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Behold! Software Web Page Counter 2.7 - Denial of Service | This is a dos exploit for multiple platform. Description: Behold! Software Web Page Counter 2.7 - Denial of Service. Author: David Litchfield |
Analyze the security implications of: Behold! Software Web Page Counter 2.7 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Aladdin Knowledge Systems eSafe Gateway 3.0 - Unicode Script-filtering Bypass | This is a remote exploit for multiple platform. Description: Aladdin Knowledge Systems eSafe Gateway 3.0 - Unicode Script-filtering Bypass. Author: eDvice Security Services |
Analyze the security implications of: Aladdin Knowledge Systems eSafe Gateway 3.0 - Unicode Script-filtering Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Blog Manager - 'categoryId' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Blog Manager - 'categoryId' Cross-Site Scripting. Author: Pouya_Server |
Analyze the security implications of: Blog Manager - 'categoryId' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Sielco PolyEco Digital FM Transmitter 2.0.6 - Radio Data System POST Manipulation | This is a webapps exploit for hardware platform. Description: Sielco PolyEco Digital FM Transmitter 2.0.6 - Radio Data System POST Manipulation. Author: LiquidWorm |
Analyze the security implications of: Sielco PolyEco Digital FM Transmitter 2.0.6 - Radio Data System POST Manipulation | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ES File Explorer 4.1.9.7.4 - Arbitrary File Read | This is a remote exploit for android platform. Description: ES File Explorer 4.1.9.7.4 - Arbitrary File Read. Author: Nehal Zaman |
Analyze the security implications of: ES File Explorer 4.1.9.7.4 - Arbitrary File Read | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: ChillyCMS 2.3.4.3 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: ChillyCMS 2.3.4.3 - Arbitrary File Upload. Author: John Leitch |
Analyze the security implications of: ChillyCMS 2.3.4.3 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FusionForge 5.0 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: FusionForge 5.0 - Multiple Remote File Inclusions. Author: cr4wl3r |
Analyze the security implications of: FusionForge 5.0 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WikiReader 1.12 - URL Field Local Buffer Overflow | This is a dos exploit for multiple platform. Description: WikiReader 1.12 - URL Field Local Buffer Overflow. Author: Umesh Wanve |
Analyze the security implications of: WikiReader 1.12 - URL Field Local Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Dropbear SSH 0.34 - Remote Code Execution | This is a remote exploit for linux platform. Description: Dropbear SSH 0.34 - Remote Code Execution. Author: livenn |
Analyze the security implications of: Dropbear SSH 0.34 - Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mozilla Camino Web Browser 0.7/0.8 - Infinite Array Sort Denial of Service | This is a dos exploit for multiple platform. Description: Mozilla Camino Web Browser 0.7/0.8 - Infinite Array Sort Denial of Service. Author: Berend-Jan Wever |
Analyze the security implications of: Mozilla Camino Web Browser 0.7/0.8 - Infinite Array Sort Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_bidding - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_bidding - SQL Injection. Author: N2n-Hacker |
Analyze the security implications of: Joomla! Component com_bidding - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Connectix Boards 0.8.2 - 'template_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Connectix Boards 0.8.2 - 'template_path' Remote File Inclusion. Author: Houssamix |
Analyze the security implications of: Connectix Boards 0.8.2 - 'template_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: jbFileManager - Directory Traversal | This is a webapps exploit for php platform. Description: jbFileManager - Directory Traversal. Author: HaHwul |
Analyze the security implications of: jbFileManager - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.