input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Chris LaPointe Download Center 1.2 - 'category' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Chris LaPointe Download Center 1.2 - 'category' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: Chris LaPointe Download Center 1.2 - 'category' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Magic Winmail Server 4.0 (Build 1112) - 'upload.php' Traversal Arbitrary File Upload | This is a webapps exploit for php platform. Description: Magic Winmail Server 4.0 (Build 1112) - 'upload.php' Traversal Arbitrary File Upload. Author: Tan Chew Keong |
Analyze the security implications of: Magic Winmail Server 4.0 (Build 1112) - 'upload.php' Traversal Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ecomat CMS - SQL Injection | This is a webapps exploit for multiple platform. Description: Ecomat CMS - SQL Injection. Author: High-Tech Bridge SA |
Analyze the security implications of: Ecomat CMS - SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AdaptCMS 2.0.4 - 'config.php?question' SQL Injection | This is a webapps exploit for php platform. Description: AdaptCMS 2.0.4 - 'config.php?question' SQL Injection. Author: kallimero |
Analyze the security implications of: AdaptCMS 2.0.4 - 'config.php?question' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CitrusDB 0.3.6 - Arbitrary Local PHP File Inclusion | This is a webapps exploit for php platform. Description: CitrusDB 0.3.6 - Arbitrary Local PHP File Inclusion. Author: RedTeam Pentesting |
Analyze the security implications of: CitrusDB 0.3.6 - Arbitrary Local PHP File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Falt4 CMS RC4 - 'FCKeditor' Arbitrary File Upload | This is a webapps exploit for php platform. Description: Falt4 CMS RC4 - 'FCKeditor' Arbitrary File Upload. Author: Sp3shial |
Analyze the security implications of: Falt4 CMS RC4 - 'FCKeditor' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Free Realty 3.1-0.6 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Free Realty 3.1-0.6 - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Free Realty 3.1-0.6 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AraDown - 'id' SQL Injection | This is a webapps exploit for php platform. Description: AraDown - 'id' SQL Injection. Author: G-B |
Analyze the security implications of: AraDown - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMSsite 1.0 - 'cat_id' SQL Injection | This is a webapps exploit for php platform. Description: CMSsite 1.0 - 'cat_id' SQL Injection. Author: Majid kalantari |
Analyze the security implications of: CMSsite 1.0 - 'cat_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eWebquiz 8 - 'eWebQuiz.asp' SQL Injection | This is a webapps exploit for asp platform. Description: eWebquiz 8 - 'eWebQuiz.asp' SQL Injection. Author: ajann |
Analyze the security implications of: eWebquiz 8 - 'eWebQuiz.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Magic Photo Storage Website - '/user/add_category.php?_config[site_path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/user/add_category.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina |
Analyze the security implications of: Magic Photo Storage Website - '/user/add_category.php?_config[site_path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Coppermine Photo Gallery 1.4.11 - SQL Injection | This is a webapps exploit for php platform. Description: Coppermine Photo Gallery 1.4.11 - SQL Injection. Author: DarkFig |
Analyze the security implications of: Coppermine Photo Gallery 1.4.11 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash - AVC Edge Processing Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: Adobe Flash - AVC Edge Processing Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - AVC Edge Processing Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Hastymail 2.1.1 RC1 - Command Injection (Metasploit) | This is a webapps exploit for php platform. Description: Hastymail 2.1.1 RC1 - Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Hastymail 2.1.1 RC1 - Command Injection (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ecartis 1.0.0/0.129 a Listar - Multiple Local Buffer Overflow Vulnerabilities (1) | This is a local exploit for linux platform. Description: Ecartis 1.0.0/0.129 a Listar - Multiple Local Buffer Overflow Vulnerabilities (1). Author: the itch |
Analyze the security implications of: Ecartis 1.0.0/0.129 a Listar - Multiple Local Buffer Overflow Vulnerabilities (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Jamit Job Board 3.x - Blind SQL Injection | This is a webapps exploit for php platform. Description: Jamit Job Board 3.x - Blind SQL Injection. Author: XaDoS |
Analyze the security implications of: Jamit Job Board 3.x - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DUclassified 4.x - 'adDetail.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: DUclassified 4.x - 'adDetail.asp' Multiple SQL Injections. Author: Soroosh Dalili |
Analyze the security implications of: DUclassified 4.x - 'adDetail.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ideacart 0.02 - Local File Inclusion / SQL Injection | This is a webapps exploit for php platform. Description: ideacart 0.02 - Local File Inclusion / SQL Injection. Author: nuclear |
Analyze the security implications of: ideacart 0.02 - Local File Inclusion / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Company's Recruitment Management System 1.0 - 'Add New user' Cross-Site Request Forgery (CSRF) | This is a webapps exploit for php platform. Description: Company's Recruitment Management System 1.0 - 'Add New user' Cross-Site Request Forgery (CSRF). Author: Aniket Deshmane |
Analyze the security implications of: Company's Recruitment Management System 1.0 - 'Add New user' Cross-Site Request Forgery (CSRF) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ilient SysAid 8.5.5 - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities | This is a webapps exploit for jsp platform. Description: Ilient SysAid 8.5.5 - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities. Author: Julien Ahrens |
Analyze the security implications of: Ilient SysAid 8.5.5 - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Elxis CMS 2009 - 'index.php?task' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Elxis CMS 2009 - 'index.php?task' Cross-Site Scripting. Author: Ewerson Guimaraes |
Analyze the security implications of: Elxis CMS 2009 - 'index.php?task' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Component MiniBB 1.5a - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Component MiniBB 1.5a - Remote File Inclusion. Author: Matdhule |
Analyze the security implications of: Mambo Component MiniBB 1.5a - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Multiple Browsers - 'window.print()' Denial of Service | This is a dos exploit for osx platform. Description: Multiple Browsers - 'window.print()' Denial of Service. Author: Dr_IDE |
Analyze the security implications of: Multiple Browsers - 'window.print()' Denial of Service | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: OpenWrt 10.03 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cgi platform. Description: OpenWrt 10.03 - Multiple Cross-Site Scripting Vulnerabilities. Author: dave b |
Analyze the security implications of: OpenWrt 10.03 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: MySQL / MariaDB / PerconaDB 5.5.x/5.6.x/5.7.x - 'mysql' System User Privilege Escalation / Race Condition | This is a local exploit for linux platform. Description: MySQL / MariaDB / PerconaDB 5.5.x/5.6.x/5.7.x - 'mysql' System User Privilege Escalation / Race Condition. Author: Dawid Golunski |
Analyze the security implications of: MySQL / MariaDB / PerconaDB 5.5.x/5.6.x/5.7.x - 'mysql' System User Privilege Escalation / Race Condition | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AddressSanitizer (ASan) - SUID Executable Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: AddressSanitizer (ASan) - SUID Executable Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: AddressSanitizer (ASan) - SUID Executable Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Galore Simple Shop 3.1 - 'section' SQL Injection | This is a webapps exploit for php platform. Description: Galore Simple Shop 3.1 - 'section' SQL Injection. Author: S@BUN |
Analyze the security implications of: Galore Simple Shop 3.1 - 'section' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ABB Cylon Aspect 3.08.02 (escDevicesUpdate.php) - Denial of Service (DOS) | This is a hardware exploit for php platform. Description: ABB Cylon Aspect 3.08.02 (escDevicesUpdate.php) - Denial of Service (DOS). Author: LiquidWorm |
Analyze the security implications of: ABB Cylon Aspect 3.08.02 (escDevicesUpdate.php) - Denial of Service (DOS) | This exploit targets php systems. Type: hardware. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ISC BIND 9 - TKEY (PoC) | This is a dos exploit for multiple platform. Description: ISC BIND 9 - TKEY (PoC). Author: Errata Security |
Analyze the security implications of: ISC BIND 9 - TKEY (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Openfire 3.6.2 - 'group-summary.jsp' Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Openfire 3.6.2 - 'group-summary.jsp' Cross-Site Scripting. Author: Federico Muttis |
Analyze the security implications of: Openfire 3.6.2 - 'group-summary.jsp' Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Campsite CMS - Remote Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Campsite CMS - Remote Persistent Cross-Site Scripting. Author: D4rk357 |
Analyze the security implications of: Campsite CMS - Remote Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ESMI PayPal StoreFront 1.7 - 'pages.php?idpages' SQL Injection | This is a webapps exploit for php platform. Description: ESMI PayPal StoreFront 1.7 - 'pages.php?idpages' SQL Injection. Author: Dcrab |
Analyze the security implications of: ESMI PayPal StoreFront 1.7 - 'pages.php?idpages' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GnuPG 1.4/1.9 - Parse_Comment Remote Buffer Overflow | This is a dos exploit for linux platform. Description: GnuPG 1.4/1.9 - Parse_Comment Remote Buffer Overflow. Author: Evgeny Legerov |
Analyze the security implications of: GnuPG 1.4/1.9 - Parse_Comment Remote Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.