input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: BetaParticle Blog 6.0 - 'fldGalleryID' SQL Injection | This is a webapps exploit for asp platform. Description: BetaParticle Blog 6.0 - 'fldGalleryID' SQL Injection. Author: nukedx |
Analyze the security implications of: BetaParticle Blog 6.0 - 'fldGalleryID' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Microsoft Windows NT 4.0/2000 - NTFS File Hiding | This is a local exploit for linux platform. Description: Microsoft Windows NT 4.0/2000 - NTFS File Hiding. Author: Hans Somers |
Analyze the security implications of: Microsoft Windows NT 4.0/2000 - NTFS File Hiding | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: NetFlow Analyzer 5 - '/jspui/selectDevice.jsp?rtype' Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: NetFlow Analyzer 5 - '/jspui/selectDevice.jsp?rtype' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: NetFlow Analyzer 5 - '/jspui/selectDevice.jsp?rtype' Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: ClassApps SelectSurvey.net - Multiple SQL Injections | This is a webapps exploit for php platform. Description: ClassApps SelectSurvey.net - Multiple SQL Injections. Author: BillV-Lists |
Analyze the security implications of: ClassApps SelectSurvey.net - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASUS HG100 - Denial of Service | This is a dos exploit for hardware platform. Description: ASUS HG100 - Denial of Service. Author: YinT Wang |
Analyze the security implications of: ASUS HG100 - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Accellion File Transfer - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Accellion File Transfer - Multiple Cross-Site Scripting Vulnerabilities. Author: Eric Beaulieu |
Analyze the security implications of: Accellion File Transfer - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DevelopItEasy News And Article System 1.4 - SQL Injection | This is a webapps exploit for php platform. Description: DevelopItEasy News And Article System 1.4 - SQL Injection. Author: InjEctOr5 |
Analyze the security implications of: DevelopItEasy News And Article System 1.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CGI Script Center Auction Weaver 1.0.2 - Remote Command Execution | This is a remote exploit for cgi platform. Description: CGI Script Center Auction Weaver 1.0.2 - Remote Command Execution. Author: teleh0r |
Analyze the security implications of: CGI Script Center Auction Weaver 1.0.2 - Remote Command Execution | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: D-Link DIR-615 Rev H - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: D-Link DIR-615 Rev H - Multiple Vulnerabilities. Author: m-1-k-3 |
Analyze the security implications of: D-Link DIR-615 Rev H - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joplin 1.2.6 - 'link' Cross Site Scripting | This is a webapps exploit for multiple platform. Description: Joplin 1.2.6 - 'link' Cross Site Scripting. Author: Philip Holbrook |
Analyze the security implications of: Joplin 1.2.6 - 'link' Cross Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple macOS Kernel - Use-After-Free Due to Lack of Locking in nvidia GeForce Driver | This is a dos exploit for macos platform. Description: Apple macOS Kernel - Use-After-Free Due to Lack of Locking in nvidia GeForce Driver. Author: Google Security Research |
Analyze the security implications of: Apple macOS Kernel - Use-After-Free Due to Lack of Locking in nvidia GeForce Driver | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Mozilla Spidermonkey - Unboxed Objects Uninitialized Memory Access | This is a dos exploit for multiple platform. Description: Mozilla Spidermonkey - Unboxed Objects Uninitialized Memory Access. Author: Google Security Research |
Analyze the security implications of: Mozilla Spidermonkey - Unboxed Objects Uninitialized Memory Access | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Airbnb Clone Script - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Airbnb Clone Script - Arbitrary File Upload. Author: Ihsan Sencan |
Analyze the security implications of: Airbnb Clone Script - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Just William's Amazon Webstore - 'CurrentNumber' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Just William's Amazon Webstore - 'CurrentNumber' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: Just William's Amazon Webstore - 'CurrentNumber' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Android - Hardware Service Manager Arbitrary Service Replacement due to getpidcon | This is a dos exploit for android platform. Description: Android - Hardware Service Manager Arbitrary Service Replacement due to getpidcon. Author: Google Security Research |
Analyze the security implications of: Android - Hardware Service Manager Arbitrary Service Replacement due to getpidcon | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: BSD/OS 2.1/3.0 / Larry Wall Perl 5.0 03 / RedHat 4.0/4.1 / SGI Freeware 1.0/2.0 SUIDPerl - Local Overflow (2) | This is a local exploit for multiple platform. Description: BSD/OS 2.1/3.0 / Larry Wall Perl 5.0 03 / RedHat 4.0/4.1 / SGI Freeware 1.0/2.0 SUIDPerl - Local Overflow (2). Author: Willy Tarreau |
Analyze the security implications of: BSD/OS 2.1/3.0 / Larry Wall Perl 5.0 03 / RedHat 4.0/4.1 / SGI Freeware 1.0/2.0 SUIDPerl - Local Overflow (2) | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_spielothek 1.6.9 - Multiple Blind SQL Injections | This is a webapps exploit for php platform. Description: Joomla! Component com_spielothek 1.6.9 - Multiple Blind SQL Injections. Author: Salvatore Fresta |
Analyze the security implications of: Joomla! Component com_spielothek 1.6.9 - Multiple Blind SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_qcontacts 1.0.6 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_qcontacts 1.0.6 - SQL Injection. Author: Don |
Analyze the security implications of: Joomla! Component com_qcontacts 1.0.6 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache JackRabbit 1.4/1.5 Content Repository (JCR) - 'swr.jsp?q' Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Apache JackRabbit 1.4/1.5 Content Repository (JCR) - 'swr.jsp?q' Cross-Site Scripting. Author: Red Hat |
Analyze the security implications of: Apache JackRabbit 1.4/1.5 Content Repository (JCR) - 'swr.jsp?q' Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Dell SonicWALL Scrutinizer 11.01 - methodDetail SQL Injection (Metasploit) | This is a remote exploit for multiple platform. Description: Dell SonicWALL Scrutinizer 11.01 - methodDetail SQL Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Dell SonicWALL Scrutinizer 11.01 - methodDetail SQL Injection (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: e107 0.7.21 full - Remote File Inclusion / Cross-Site Scripting | This is a webapps exploit for php platform. Description: e107 0.7.21 full - Remote File Inclusion / Cross-Site Scripting. Author: indoushka |
Analyze the security implications of: e107 0.7.21 full - Remote File Inclusion / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe ColdFusion APSB13-03 - Remote Multiple Vulnerabilities (Metasploit) | This is a remote exploit for multiple platform. Description: Adobe ColdFusion APSB13-03 - Remote Multiple Vulnerabilities (Metasploit). Author: Metasploit |
Analyze the security implications of: Adobe ColdFusion APSB13-03 - Remote Multiple Vulnerabilities (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: event Calendar - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: event Calendar - Multiple Vulnerabilities. Author: Janek Vind |
Analyze the security implications of: event Calendar - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Mosets Tree 1.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Mosets Tree 1.0 - Remote File Inclusion. Author: Crackers_Child |
Analyze the security implications of: Joomla! Component Mosets Tree 1.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MikroTik RouterOS < 6.38.4 (MIPSBE) - 'Chimay Red' Stack Clash Remote Code Execution | This is a remote exploit for hardware platform. Description: MikroTik RouterOS < 6.38.4 (MIPSBE) - 'Chimay Red' Stack Clash Remote Code Execution. Author: Lorenzo Santina |
Analyze the security implications of: MikroTik RouterOS < 6.38.4 (MIPSBE) - 'Chimay Red' Stack Clash Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DigiAffiliate 1.4 - Cross-Site Request Forgery (Update Admin) | This is a webapps exploit for asp platform. Description: DigiAffiliate 1.4 - Cross-Site Request Forgery (Update Admin). Author: Ihsan Sencan |
Analyze the security implications of: DigiAffiliate 1.4 - Cross-Site Request Forgery (Update Admin) | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Clix'N'Cash Clone 2010 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: Clix'N'Cash Clone 2010 - 'index.php' SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: Clix'N'Cash Clone 2010 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lotus CMS Fraise 3.0 - Local File Inclusion / Remote Code Execution | This is a webapps exploit for php platform. Description: Lotus CMS Fraise 3.0 - Local File Inclusion / Remote Code Execution. Author: mr_me |
Analyze the security implications of: Lotus CMS Fraise 3.0 - Local File Inclusion / Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Colloquy - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Colloquy - Remote Denial of Service. Author: Aph3x |
Analyze the security implications of: Colloquy - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ELinks Relative 0.10.6/011.1 - Path Arbitrary Code Execution | This is a local exploit for linux platform. Description: ELinks Relative 0.10.6/011.1 - Path Arbitrary Code Execution. Author: Arnaud Giersch |
Analyze the security implications of: ELinks Relative 0.10.6/011.1 - Path Arbitrary Code Execution | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AneCMS - '/registre/next' SQL Injection | This is a webapps exploit for php platform. Description: AneCMS - '/registre/next' SQL Injection. Author: Sweet |
Analyze the security implications of: AneCMS - '/registre/next' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pilot Cart 7.2 - 'Pilot.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Pilot Cart 7.2 - 'Pilot.asp' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: Pilot Cart 7.2 - 'Pilot.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Accela Civic Platform 21.1 - 'servProvCode' Cross-Site-Scripting (XSS) | This is a webapps exploit for multiple platform. Description: Accela Civic Platform 21.1 - 'servProvCode' Cross-Site-Scripting (XSS). Author: Abdulazeez Alaseeri |
Analyze the security implications of: Accela Civic Platform 21.1 - 'servProvCode' Cross-Site-Scripting (XSS) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Personal.Net Portal - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: Personal.Net Portal - Multiple Vulnerabilities. Author: Abysssec |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.