input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Aigaion 1.3.3 - 'topic topic_id' SQL Injection | This is a webapps exploit for php platform. Description: Aigaion 1.3.3 - 'topic topic_id' SQL Injection. Author: CypherXero |
Analyze the security implications of: Aigaion 1.3.3 - 'topic topic_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Subversion 1.6.6/1.6.12 - Code Execution | This is a remote exploit for linux platform. Description: Subversion 1.6.6/1.6.12 - Code Execution. Author: GlacierZ0ne |
Analyze the security implications of: Subversion 1.6.6/1.6.12 - Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Album Streamer 2.0 iOS - Directory Traversal | This is a webapps exploit for ios platform. Description: Album Streamer 2.0 iOS - Directory Traversal. Author: Vulnerability-Lab |
Analyze the security implications of: Album Streamer 2.0 iOS - Directory Traversal | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Alibaba Clone B2B Script - Admin Authentication Bypass | This is a webapps exploit for php platform. Description: Alibaba Clone B2B Script - Admin Authentication Bypass. Author: Meisam Monsef |
Analyze the security implications of: Alibaba Clone B2B Script - Admin Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Karrigell 1.x/2.0/2.1 - '.KS' File Arbitrary Python Command Execution | This is a webapps exploit for cgi platform. Description: Karrigell 1.x/2.0/2.1 - '.KS' File Arbitrary Python Command Execution. Author: Radovan GarabÃk |
Analyze the security implications of: Karrigell 1.x/2.0/2.1 - '.KS' File Arbitrary Python Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Maian Gallery 2 - Local File Download | This is a webapps exploit for php platform. Description: Maian Gallery 2 - Local File Download. Author: mr_me |
Analyze the security implications of: Maian Gallery 2 - Local File Download | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Makale Scripti - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Makale Scripti - Cross-Site Scripting. Author: GeFORC3 |
Analyze the security implications of: Makale Scripti - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Maian Uploader 4.0 - 'user' SQL Injection | This is a webapps exploit for php platform. Description: Maian Uploader 4.0 - 'user' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Maian Uploader 4.0 - 'user' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Online Voting System Project in PHP - 'username' Persistent Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Online Voting System Project in PHP - 'username' Persistent Cross-Site Scripting. Author: Sagar Banwa |
Analyze the security implications of: Online Voting System Project in PHP - 'username' Persistent Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Joomlaequipment (com_juser) 2.0.4 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Joomlaequipment (com_juser) 2.0.4 - SQL Injection. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component Joomlaequipment (com_juser) 2.0.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DmxReady Catalog Manager 1.2 - SQL Injection | This is a webapps exploit for asp platform. Description: DmxReady Catalog Manager 1.2 - SQL Injection. Author: Bellatrix |
Analyze the security implications of: DmxReady Catalog Manager 1.2 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! / Mambo Component Referenzen - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component Referenzen - 'id' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! / Mambo Component Referenzen - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SpiderMonkey - IonMonkey Compiled Code Fails to Update Inferred Property Types (Type Confusion) | This is a dos exploit for multiple platform. Description: SpiderMonkey - IonMonkey Compiled Code Fails to Update Inferred Property Types (Type Confusion). Author: Google Security Research |
Analyze the security implications of: SpiderMonkey - IonMonkey Compiled Code Fails to Update Inferred Property Types (Type Confusion) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Machine - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Joomla! Component Machine - Multiple SQL Injections. Author: the_cyber_nuxbie |
Analyze the security implications of: Joomla! Component Machine - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BlueCMS 1.6 - 'x-forwarded-for' Header SQL Injection | This is a webapps exploit for php platform. Description: BlueCMS 1.6 - 'x-forwarded-for' Header SQL Injection. Author: cnryan |
Analyze the security implications of: BlueCMS 1.6 - 'x-forwarded-for' Header SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MacKeeper - URL Handler Remote Code Execution | This is a remote exploit for osx platform. Description: MacKeeper - URL Handler Remote Code Execution. Author: Braden Thomas |
Analyze the security implications of: MacKeeper - URL Handler Remote Code Execution | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Microsoft Lync Server 2010 - 'ReachJoin.aspx' Remote Command Injection | This is a webapps exploit for asp platform. Description: Microsoft Lync Server 2010 - 'ReachJoin.aspx' Remote Command Injection. Author: Mark Lachniet |
Analyze the security implications of: Microsoft Lync Server 2010 - 'ReachJoin.aspx' Remote Command Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: AMSS++ 4.7 - Backdoor Admin Account | This is a webapps exploit for php platform. Description: AMSS++ 4.7 - Backdoor Admin Account. Author: indoushka |
Analyze the security implications of: AMSS++ 4.7 - Backdoor Admin Account | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Motorola SB5101 - Hax0rware Event Reset Remote Overflow | This is a dos exploit for hardware platform. Description: Motorola SB5101 - Hax0rware Event Reset Remote Overflow. Author: Dillon Beresford |
Analyze the security implications of: Motorola SB5101 - Hax0rware Event Reset Remote Overflow | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ETicket 1.5.5 - 'Open.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: ETicket 1.5.5 - 'Open.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Jesper Jurcenoks |
Analyze the security implications of: ETicket 1.5.5 - 'Open.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Grandstream Multiple IP Cameras - Cross-Site Request Forgery | This is a remote exploit for hardware platform. Description: Grandstream Multiple IP Cameras - Cross-Site Request Forgery. Author: Castillo |
Analyze the security implications of: Grandstream Multiple IP Cameras - Cross-Site Request Forgery | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Franklin Fueling Systems TS-550 - Default Password | This is a remote exploit for hardware platform. Description: Franklin Fueling Systems TS-550 - Default Password. Author: Parsa Rezaie Khiabanloo |
Analyze the security implications of: Franklin Fueling Systems TS-550 - Default Password | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CleverDog Smart Camera DOG-2W / DOG-2W-V4 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: CleverDog Smart Camera DOG-2W / DOG-2W-V4 - Multiple Vulnerabilities. Author: Alex Akinbi |
Analyze the security implications of: CleverDog Smart Camera DOG-2W / DOG-2W-V4 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: 2DayBiz Video Community Portal - 'user-profile.php' SQL Injection | This is a webapps exploit for php platform. Description: 2DayBiz Video Community Portal - 'user-profile.php' SQL Injection. Author: Sangteamtham |
Analyze the security implications of: 2DayBiz Video Community Portal - 'user-profile.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Laundry Booking Management System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Laundry Booking Management System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS). Author: Azumah Foresight Xorlali |
Analyze the security implications of: Laundry Booking Management System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FusionPBX 4.4.3 - Remote Command Execution | This is a webapps exploit for php platform. Description: FusionPBX 4.4.3 - Remote Command Execution. Author: Dustin Cobb |
Analyze the security implications of: FusionPBX 4.4.3 - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eXtremail 2.1.1 - DNS Parsing Bugs Remote (PoC) | This is a dos exploit for linux platform. Description: eXtremail 2.1.1 - DNS Parsing Bugs Remote (PoC). Author: mu-b |
Analyze the security implications of: eXtremail 2.1.1 - DNS Parsing Bugs Remote (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Palo Alto Networks PanOS - 'root_trace' Local Privilege Escalation | This is a local exploit for linux platform. Description: Palo Alto Networks PanOS - 'root_trace' Local Privilege Escalation. Author: Google Security Research |
Analyze the security implications of: Palo Alto Networks PanOS - 'root_trace' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Easyndexer 1.0 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: Easyndexer 1.0 - Cross-Site Request Forgery (Add Admin). Author: Ihsan Sencan |
Analyze the security implications of: Easyndexer 1.0 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DELTAScripts PHP Classifieds 7.5 - SQL Injection | This is a webapps exploit for php platform. Description: DELTAScripts PHP Classifieds 7.5 - SQL Injection. Author: ZoRLu |
Analyze the security implications of: DELTAScripts PHP Classifieds 7.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ea-gBook 0.1 - Remote Command Execution / Remote File Inclusion | This is a webapps exploit for php platform. Description: ea-gBook 0.1 - Remote Command Execution / Remote File Inclusion. Author: bd0rk |
Analyze the security implications of: ea-gBook 0.1 - Remote Command Execution / Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Progress Database Server 8.3b - 'prodb' Local Privilege Escalation | This is a local exploit for multiple platform. Description: Progress Database Server 8.3b - 'prodb' Local Privilege Escalation. Author: the itch |
Analyze the security implications of: Progress Database Server 8.3b - 'prodb' Local Privilege Escalation | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_gcalendar Suite 2.1.5 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_gcalendar Suite 2.1.5 - Local File Inclusion. Author: jdc |
Analyze the security implications of: Joomla! Component com_gcalendar Suite 2.1.5 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.