input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Grayscale Blog 0.8.0 - Security Bypass / SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Grayscale Blog 0.8.0 - Security Bypass / SQL Injection / Cross-Site Scripting. Author: Omni |
Analyze the security implications of: Grayscale Blog 0.8.0 - Security Bypass / SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP imap_open - Remote Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: PHP imap_open - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: PHP imap_open - Remote Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Friends in War Make or Break 1.7 - 'imgid' SQL Injection | This is a webapps exploit for php platform. Description: Friends in War Make or Break 1.7 - 'imgid' SQL Injection. Author: v3n0m |
Analyze the security implications of: Friends in War Make or Break 1.7 - 'imgid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GuestBookPro Script - Remote Database Disclosure | This is a webapps exploit for asp platform. Description: GuestBookPro Script - Remote Database Disclosure. Author: ViRuSMaN |
Analyze the security implications of: GuestBookPro Script - Remote Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FaceSentry Access Control System 6.4.8 - Remote SSH Root | This is a remote exploit for hardware platform. Description: FaceSentry Access Control System 6.4.8 - Remote SSH Root. Author: LiquidWorm |
Analyze the security implications of: FaceSentry Access Control System 6.4.8 - Remote SSH Root | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component Regional Booking - 'id' Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Regional Booking - 'id' Blind SQL Injection. Author: Hussin X |
Analyze the security implications of: Joomla! Component Regional Booking - 'id' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TerraMaster TOS 4.2.06 - Unauthenticated Remote Code Execution (Metasploit) | This is a webapps exploit for linux platform. Description: TerraMaster TOS 4.2.06 - Unauthenticated Remote Code Execution (Metasploit). Author: AkkuS |
Analyze the security implications of: TerraMaster TOS 4.2.06 - Unauthenticated Remote Code Execution (Metasploit) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ASPired2Protect Login Page - SQL Injection | This is a webapps exploit for asp platform. Description: ASPired2Protect Login Page - SQL Injection. Author: T_L_O_T_D |
Analyze the security implications of: ASPired2Protect Login Page - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Nginx 1.4.0 (Generic Linux x64) - Remote Overflow | This is a remote exploit for linux_x86-64 platform. Description: Nginx 1.4.0 (Generic Linux x64) - Remote Overflow. Author: sorbo |
Analyze the security implications of: Nginx 1.4.0 (Generic Linux x64) - Remote Overflow | This exploit targets linux_x86-64 systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux_x86-64 platform |
What is this exploit about: Pega Platform 8.1.0 - Remote Code Execution (RCE) | This is a webapps exploit for multiple platform. Description: Pega Platform 8.1.0 - Remote Code Execution (RCE). Author: Marcin Wolak |
Analyze the security implications of: Pega Platform 8.1.0 - Remote Code Execution (RCE) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_start - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_start - SQL Injection. Author: DevilZ TM |
Analyze the security implications of: Joomla! Component com_start - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bit 5 Blog 8.1 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: Bit 5 Blog 8.1 - 'index.php' SQL Injection. Author: Aliaksandr Hartsuyeu |
Analyze the security implications of: Bit 5 Blog 8.1 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bosdates 3.x/4.0 - 'Payment.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Bosdates 3.x/4.0 - 'Payment.php' Remote File Inclusion. Author: admin@jaascois.com |
Analyze the security implications of: Bosdates 3.x/4.0 - 'Payment.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FIBARO System Home Center 5.021 - Remote File Include | This is a webapps exploit for multiple platform. Description: FIBARO System Home Center 5.021 - Remote File Include. Author: LiquidWorm |
Analyze the security implications of: FIBARO System Home Center 5.021 - Remote File Include | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: IFSC Code Finder Project 1.0 - SQL injection (Unauthenticated) | This is a webapps exploit for php platform. Description: IFSC Code Finder Project 1.0 - SQL injection (Unauthenticated). Author: Yash Mahajan |
Analyze the security implications of: IFSC Code Finder Project 1.0 - SQL injection (Unauthenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Magic Photo Storage Website - '/user/login.php?_config[site_path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/user/login.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina |
Analyze the security implications of: Magic Photo Storage Website - '/user/login.php?_config[site_path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LAME 3.99.5 - 'III_dequantize_sample' Stack Buffer Overflow | This is a dos exploit for linux platform. Description: LAME 3.99.5 - 'III_dequantize_sample' Stack Buffer Overflow. Author: Agostino Sarubbo |
Analyze the security implications of: LAME 3.99.5 - 'III_dequantize_sample' Stack Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: HTGET 0.9.x - Local Privilege Escalation | This is a local exploit for linux platform. Description: HTGET 0.9.x - Local Privilege Escalation. Author: nekd0 |
Analyze the security implications of: HTGET 0.9.x - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Alex Heiphetz Group eZshopper - 'loadpage.cgi' Directory Traversal | This is a webapps exploit for cgi platform. Description: Alex Heiphetz Group eZshopper - 'loadpage.cgi' Directory Traversal. Author: Zero X |
Analyze the security implications of: Alex Heiphetz Group eZshopper - 'loadpage.cgi' Directory Traversal | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: iTech Business Networking Script 8.26 - SQL Injection | This is a webapps exploit for php platform. Description: iTech Business Networking Script 8.26 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: iTech Business Networking Script 8.26 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM (Multiple Products) - Login Page Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: IBM (Multiple Products) - Login Page Cross-Site Scripting. Author: Oren Hafif |
Analyze the security implications of: IBM (Multiple Products) - Login Page Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Oracle 10g - KUPW$WORKER.MAIN Grant/Revoke dba Permission | This is a remote exploit for multiple platform. Description: Oracle 10g - KUPW$WORKER.MAIN Grant/Revoke dba Permission. Author: bunker |
Analyze the security implications of: Oracle 10g - KUPW$WORKER.MAIN Grant/Revoke dba Permission | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: LibSPF2 < 1.2.8 - DNS TXT Record Parsing Bug Heap Overflow (PoC) | This is a dos exploit for multiple platform. Description: LibSPF2 < 1.2.8 - DNS TXT Record Parsing Bug Heap Overflow (PoC). Author: Dan Kaminsky |
Analyze the security implications of: LibSPF2 < 1.2.8 - DNS TXT Record Parsing Bug Heap Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Konqueror 4.1 - Cross-Site Scripting / Remote Crash | This is a dos exploit for multiple platform. Description: Konqueror 4.1 - Cross-Site Scripting / Remote Crash. Author: StAkeR |
Analyze the security implications of: Konqueror 4.1 - Cross-Site Scripting / Remote Crash | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Notilus Travel Solution Software 2012 R3 - SQL Injection | This is a webapps exploit for asp platform. Description: Notilus Travel Solution Software 2012 R3 - SQL Injection. Author: Alex Haynes |
Analyze the security implications of: Notilus Travel Solution Software 2012 R3 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: EBBISLAND EBBSHAVE 6100-09-04-1441 - Remote Buffer Overflow | This is a remote exploit for hardware platform. Description: EBBISLAND EBBSHAVE 6100-09-04-1441 - Remote Buffer Overflow. Author: hantwister |
Analyze the security implications of: EBBISLAND EBBSHAVE 6100-09-04-1441 - Remote Buffer Overflow | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC) | This is a dos exploit for linux platform. Description: NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC). Author: Magnus Klaaborg Stubman |
Analyze the security implications of: NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: VP-ASP Shopping Cart - 'Shopadmin.asp' HTML Injection | This is a webapps exploit for asp platform. Description: VP-ASP Shopping Cart - 'Shopadmin.asp' HTML Injection. Author: ConcorDHacK |
Analyze the security implications of: VP-ASP Shopping Cart - 'Shopadmin.asp' HTML Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Podman & Varlink 1.5.1 - Remote Code Execution | This is a remote exploit for linux platform. Description: Podman & Varlink 1.5.1 - Remote Code Execution. Author: Jeremy Brown |
Analyze the security implications of: Podman & Varlink 1.5.1 - Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PhotoWebsite 3.1 iOS - Local File Inclusion | This is a webapps exploit for ios platform. Description: PhotoWebsite 3.1 iOS - Local File Inclusion. Author: Vulnerability-Lab |
Analyze the security implications of: PhotoWebsite 3.1 iOS - Local File Inclusion | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Jax PHP Scripts 1.0/1.34/2.14/3.31 - suggestions.csv User IP Disclosure | This is a webapps exploit for php platform. Description: Jax PHP Scripts 1.0/1.34/2.14/3.31 - suggestions.csv User IP Disclosure. Author: Lostmon |
Analyze the security implications of: Jax PHP Scripts 1.0/1.34/2.14/3.31 - suggestions.csv User IP Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component mygallery - 'cid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component mygallery - 'cid' SQL Injection. Author: Houssamix |
Analyze the security implications of: Joomla! Component mygallery - 'cid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Map Locator - 'cid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Map Locator - 'cid' SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component Map Locator - 'cid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.