input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Progress Database 9.1 - sqlcpp Local Buffer Overflow | This is a local exploit for multiple platform. Description: Progress Database 9.1 - sqlcpp Local Buffer Overflow. Author: kf |
Analyze the security implications of: Progress Database 9.1 - sqlcpp Local Buffer Overflow | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: JSPWiki 2.5.139 - 'Diff.jsp' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for jsp platform. Description: JSPWiki 2.5.139 - 'Diff.jsp' Multiple Cross-Site Scripting Vulnerabilities. Author: Jason Kratzer |
Analyze the security implications of: JSPWiki 2.5.139 - 'Diff.jsp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Jax Guestbook 3.50 - 'Page' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Jax Guestbook 3.50 - 'Page' Cross-Site Scripting. Author: ALMOKANN3 |
Analyze the security implications of: Jax Guestbook 3.50 - 'Page' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Trend Micro Interscan Messaging Security Suite - Persistent Cross-Site Scripting / Cross-Site Request Forgery | This is a webapps exploit for aix platform. Description: Trend Micro Interscan Messaging Security Suite - Persistent Cross-Site Scripting / Cross-Site Request Forgery. Author: modpr0be |
Analyze the security implications of: Trend Micro Interscan Messaging Security Suite - Persistent Cross-Site Scripting / Cross-Site Request Forgery | This exploit targets aix systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Vim 5.x - Swap File Race Condition | This is a local exploit for linux platform. Description: Vim 5.x - Swap File Race Condition. Author: zen-parse |
Analyze the security implications of: Vim 5.x - Swap File Race Condition | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Kirby CMS 3.5.3.1 - 'file' Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Kirby CMS 3.5.3.1 - 'file' Cross-Site Scripting (XSS). Author: Sreenath Raghunathan |
Analyze the security implications of: Kirby CMS 3.5.3.1 - 'file' Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BPDirectory Business Directory - Authentication Bypass | This is a webapps exploit for asp platform. Description: BPDirectory Business Directory - Authentication Bypass. Author: v3n0m |
Analyze the security implications of: BPDirectory Business Directory - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: CKEditor 5 35.4.0 - Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: CKEditor 5 35.4.0 - Cross-Site Scripting (XSS). Author: Manish Pathak |
Analyze the security implications of: CKEditor 5 35.4.0 - Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NullLogic Null HTTPd 0.5.1 - Error Page Long HTTP Request Cross-Site Scripting | This is a remote exploit for multiple platform. Description: NullLogic Null HTTPd 0.5.1 - Error Page Long HTTP Request Cross-Site Scripting. Author: Luigi Auriemma |
Analyze the security implications of: NullLogic Null HTTPd 0.5.1 - Error Page Long HTTP Request Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CubeCart 3.0.x - '/admin/print_order.php?order_id' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CubeCart 3.0.x - '/admin/print_order.php?order_id' Cross-Site Scripting. Author: HACKERS PAL |
Analyze the security implications of: CubeCart 3.0.x - '/admin/print_order.php?order_id' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component TimeTrack 1.2.4 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Joomla! Component TimeTrack 1.2.4 - Multiple SQL Injections. Author: Salvatore Fresta |
Analyze the security implications of: Joomla! Component TimeTrack 1.2.4 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Camera Life 2.6.2 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Camera Life 2.6.2 - 'id' SQL Injection. Author: nuclear |
Analyze the security implications of: Camera Life 2.6.2 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BIND 9.x - Remote DNS Cache Poisoning | This is a remote exploit for multiple platform. Description: BIND 9.x - Remote DNS Cache Poisoning. Author: Marc Bevand |
Analyze the security implications of: BIND 9.x - Remote DNS Cache Poisoning | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Man Command - -H Flag Local Buffer Overflow | This is a local exploit for linux platform. Description: Man Command - -H Flag Local Buffer Overflow. Author: Daniel Roethlisberger |
Analyze the security implications of: Man Command - -H Flag Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: QNAP - Admin Shell via Bash Environment Variable Code Injection (Metasploit) | This is a remote exploit for hardware platform. Description: QNAP - Admin Shell via Bash Environment Variable Code Injection (Metasploit). Author: Patrick Pellegrino |
Analyze the security implications of: QNAP - Admin Shell via Bash Environment Variable Code Injection (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Coppermine Photo Gallery - 'index.php' Script SQL Injection | This is a webapps exploit for php platform. Description: Coppermine Photo Gallery - 'index.php' Script SQL Injection. Author: Taurus Omar |
Analyze the security implications of: Coppermine Photo Gallery - 'index.php' Script SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: lxml - 'clean_html' Security Bypass | This is a remote exploit for linux platform. Description: lxml - 'clean_html' Security Bypass. Author: Maksim Kochkin |
Analyze the security implications of: lxml - 'clean_html' Security Bypass | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ManageEngine EventLog Analyzer < 10.6 build 10060 - SQL Execution | This is a webapps exploit for multiple platform. Description: ManageEngine EventLog Analyzer < 10.6 build 10060 - SQL Execution. Author: xistence |
Analyze the security implications of: ManageEngine EventLog Analyzer < 10.6 build 10060 - SQL Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ZPanel 10.0.0.2 htpasswd Module - 'Username' Command Execution (Metasploit) | This is a remote exploit for linux platform. Description: ZPanel 10.0.0.2 htpasswd Module - 'Username' Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: ZPanel 10.0.0.2 htpasswd Module - 'Username' Command Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Dell SonicWALL Secure Mobile Access SMA 8.1 - Cross-Site Scripting / Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Dell SonicWALL Secure Mobile Access SMA 8.1 - Cross-Site Scripting / Cross-Site Request Forgery. Author: LiquidWorm |
Analyze the security implications of: Dell SonicWALL Secure Mobile Access SMA 8.1 - Cross-Site Scripting / Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: e-ticketing - SQL Injection | This is a webapps exploit for php platform. Description: e-ticketing - SQL Injection. Author: Mark Stanislav |
Analyze the security implications of: e-ticketing - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mailist 3.0 - Insecure Backup / Local File Inclusion | This is a webapps exploit for php platform. Description: Mailist 3.0 - Insecure Backup / Local File Inclusion. Author: SirGod |
Analyze the security implications of: Mailist 3.0 - Insecure Backup / Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mantis Bug Tracker 0.15.x/0.16/0.17.x - JPGraph Remote File Inclusion Command Execution | This is a webapps exploit for php platform. Description: Mantis Bug Tracker 0.15.x/0.16/0.17.x - JPGraph Remote File Inclusion Command Execution. Author: Joao Gouveia |
Analyze the security implications of: Mantis Bug Tracker 0.15.x/0.16/0.17.x - JPGraph Remote File Inclusion Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Automatic-Systems SOC FL9600 FastLine - The device contains hardcoded login and password for super admin | This is a webapps exploit for php platform. Description: Automatic-Systems SOC FL9600 FastLine - The device contains hardcoded login and password for super admin. Author: Marcin Kozlowski |
Analyze the security implications of: Automatic-Systems SOC FL9600 FastLine - The device contains hardcoded login and password for super admin | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FaScript FaPersian Petition - SQL Injection | This is a webapps exploit for php platform. Description: FaScript FaPersian Petition - SQL Injection. Author: Khashayar Fereidani |
Analyze the security implications of: FaScript FaPersian Petition - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Spider Calendar 3.2.6 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Spider Calendar 3.2.6 - SQL Injection. Author: Claudio Viviani |
Analyze the security implications of: Joomla! Component Spider Calendar 3.2.6 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TwonkyMedia Server 7.0.11-8.5 - Persistent Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: TwonkyMedia Server 7.0.11-8.5 - Persistent Cross-Site Scripting. Author: Sven Fassbender |
Analyze the security implications of: TwonkyMedia Server 7.0.11-8.5 - Persistent Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Deonixscripts Templates Management 1.3 - SQL Injection | This is a webapps exploit for php platform. Description: Deonixscripts Templates Management 1.3 - SQL Injection. Author: d3b4g |
Analyze the security implications of: Deonixscripts Templates Management 1.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! 1.6 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Joomla! 1.6 - Multiple SQL Injections. Author: Aung Khant |
Analyze the security implications of: Joomla! 1.6 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: E-Xoopport 3.1 - 'display.php?katid' SQL Injection | This is a webapps exploit for php platform. Description: E-Xoopport 3.1 - 'display.php?katid' SQL Injection. Author: Vis Intelligendi |
Analyze the security implications of: E-Xoopport 3.1 - 'display.php?katid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JFFNms 0.8.3 - 'admin/adm/test.php' PHP Information Disclosure | This is a webapps exploit for php platform. Description: JFFNms 0.8.3 - 'admin/adm/test.php' PHP Information Disclosure. Author: Tim Brown |
Analyze the security implications of: JFFNms 0.8.3 - 'admin/adm/test.php' PHP Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LemonLDAP:NG 0.9.3.1 - User Enumeration / Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: LemonLDAP:NG 0.9.3.1 - User Enumeration / Cross-Site Scripting. Author: clément Oudot |
Analyze the security implications of: LemonLDAP:NG 0.9.3.1 - User Enumeration / Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Belkin N150 Wireless Router F9K1009 v1 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Belkin N150 Wireless Router F9K1009 v1 - Multiple Vulnerabilities. Author: Rahul Pratap Singh |
Analyze the security implications of: Belkin N150 Wireless Router F9K1009 v1 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.