input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Google Chrome for Android - Local Application Handling Cookie Theft
|
This is a remote exploit for android platform. Description: Google Chrome for Android - Local Application Handling Cookie Theft. Author: Artem Chaykin
|
Analyze the security implications of: Google Chrome for Android - Local Application Handling Cookie Theft
|
This exploit targets android systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: UNICOS 9/MAX 1.3/mk 1.5 / AIX 4.2 / libc 5.2.18 / RedHat 4 / IRIX 6 / Slackware 3 - NLS (2)
|
This is a local exploit for multiple platform. Description: UNICOS 9/MAX 1.3/mk 1.5 / AIX 4.2 / libc 5.2.18 / RedHat 4 / IRIX 6 / Slackware 3 - NLS (2). Author: Solar Designer
|
Analyze the security implications of: UNICOS 9/MAX 1.3/mk 1.5 / AIX 4.2 / libc 5.2.18 / RedHat 4 / IRIX 6 / Slackware 3 - NLS (2)
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Ajenti 2.1.31 - Remote Code Exection (Metasploit)
|
This is a webapps exploit for json platform. Description: Ajenti 2.1.31 - Remote Code Exection (Metasploit). Author: Onur ER
|
Analyze the security implications of: Ajenti 2.1.31 - Remote Code Exection (Metasploit)
|
This exploit targets json systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets json platform
|
What is this exploit about: Joomla! Component com_jcommunity - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_jcommunity - SQL Injection. Author: Sid3^effects
|
Analyze the security implications of: Joomla! Component com_jcommunity - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GNU/Gallery 1.1.1.0 - 'admin.php' Local File Inclusion
|
This is a webapps exploit for php platform. Description: GNU/Gallery 1.1.1.0 - 'admin.php' Local File Inclusion. Author: t0pP8uZz
|
Analyze the security implications of: GNU/Gallery 1.1.1.0 - 'admin.php' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Escapade 0.2.1 Beta Scripting Engine - 'PAGE' Full Path Disclosure
|
This is a webapps exploit for cgi platform. Description: Escapade 0.2.1 Beta Scripting Engine - 'PAGE' Full Path Disclosure. Author: Bahaa Naamneh
|
Analyze the security implications of: Escapade 0.2.1 Beta Scripting Engine - 'PAGE' Full Path Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Bluecoat ASG 6.6/CAS 1.3 - OS Command Injection (Metasploit)
|
This is a remote exploit for linux platform. Description: Bluecoat ASG 6.6/CAS 1.3 - OS Command Injection (Metasploit). Author: Chris Hebert
|
Analyze the security implications of: Bluecoat ASG 6.6/CAS 1.3 - OS Command Injection (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ActiveWeb Contentserver 5.6.2929 - 'Picture_Real_Edit.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: ActiveWeb Contentserver 5.6.2929 - 'Picture_Real_Edit.asp' SQL Injection. Author: RedTeam Pentesting
|
Analyze the security implications of: ActiveWeb Contentserver 5.6.2929 - 'Picture_Real_Edit.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component com_ops - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_ops - SQL Injection. Author: DevilZ TM
|
Analyze the security implications of: Joomla! Component com_ops - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component jCart for OpenCart 2.3.0.2 - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: Joomla! Component jCart for OpenCart 2.3.0.2 - Cross-Site Request Forgery. Author: L0RD
|
Analyze the security implications of: Joomla! Component jCart for OpenCart 2.3.0.2 - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: netis RealTek Wireless Router / ADSL Modem - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: netis RealTek Wireless Router / ADSL Modem - Multiple Vulnerabilities. Author: Karn Ganeshen
|
Analyze the security implications of: netis RealTek Wireless Router / ADSL Modem - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Web Wiz Forum 6.34 - Information Disclosure
|
This is a webapps exploit for asp platform. Description: Web Wiz Forum 6.34 - Information Disclosure. Author: Uziel aka nuJIurpuM
|
Analyze the security implications of: Web Wiz Forum 6.34 - Information Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: FreeHost 1.00 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: FreeHost 1.00 - Arbitrary File Upload. Author: indoushka
|
Analyze the security implications of: FreeHost 1.00 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ASPNuke 0.80 - 'detail.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: ASPNuke 0.80 - 'detail.asp' SQL Injection. Author: Dcrab
|
Analyze the security implications of: ASPNuke 0.80 - 'detail.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component Job - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Job - SQL Injection. Author: B-HUNT3|2
|
Analyze the security implications of: Joomla! Component Job - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BBMedia Design's - 'news_more.php' SQL Injection
|
This is a webapps exploit for php platform. Description: BBMedia Design's - 'news_more.php' SQL Injection. Author: gendenk
|
Analyze the security implications of: BBMedia Design's - 'news_more.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Router ZTE-H108NS - Stack Buffer Overflow (DoS)
|
This is a dos exploit for hardware platform. Description: Router ZTE-H108NS - Stack Buffer Overflow (DoS). Author: George Tsimpidas
|
Analyze the security implications of: Router ZTE-H108NS - Stack Buffer Overflow (DoS)
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: gnome-terminal (vte) VteTerminal - Escape Sequence Parsing Remote Denial of Service
|
This is a dos exploit for linux platform. Description: gnome-terminal (vte) VteTerminal - Escape Sequence Parsing Remote Denial of Service. Author: Kevin Fenzi
|
Analyze the security implications of: gnome-terminal (vte) VteTerminal - Escape Sequence Parsing Remote Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_rsgallery2 1.14.x/2.x - Remote Backdoor Access
|
This is a webapps exploit for php platform. Description: Joomla! Component com_rsgallery2 1.14.x/2.x - Remote Backdoor Access. Author: Jan Van Niekerk
|
Analyze the security implications of: Joomla! Component com_rsgallery2 1.14.x/2.x - Remote Backdoor Access
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_items - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_items - SQL Injection. Author: DevilZ TM
|
Analyze the security implications of: Joomla! Component com_items - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dew-NewPHPLinks 2.1b - 'index.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Dew-NewPHPLinks 2.1b - 'index.php' SQL Injection. Author: AtT4CKxT3rR0r1ST
|
Analyze the security implications of: Dew-NewPHPLinks 2.1b - 'index.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iFoto 0.20 - 'index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: iFoto 0.20 - 'index.php' Cross-Site Scripting. Author: Luny
|
Analyze the security implications of: iFoto 0.20 - 'index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple WebKit - Negative-Size memmove in HTMLFormElement
|
This is a dos exploit for multiple platform. Description: Apple WebKit - Negative-Size memmove in HTMLFormElement. Author: Google Security Research
|
Analyze the security implications of: Apple WebKit - Negative-Size memmove in HTMLFormElement
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: BSCW 3.4/4.0 - Insecure Default Installation
|
This is a remote exploit for multiple platform. Description: BSCW 3.4/4.0 - Insecure Default Installation. Author: Thomas Seliger
|
Analyze the security implications of: BSCW 3.4/4.0 - Insecure Default Installation
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: DBImageGallery 1.2.2 - 'donsimg_base_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: DBImageGallery 1.2.2 - 'donsimg_base_path' Remote File Inclusion. Author: Denven
|
Analyze the security implications of: DBImageGallery 1.2.2 - 'donsimg_base_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM Lotus Domino 6.x/7.0 - iNotes JavaScript: Filter Bypass
|
This is a remote exploit for multiple platform. Description: IBM Lotus Domino 6.x/7.0 - iNotes JavaScript: Filter Bypass. Author: Jakob Balle
|
Analyze the security implications of: IBM Lotus Domino 6.x/7.0 - iNotes JavaScript: Filter Bypass
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: AuroraGPT 4.0 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: AuroraGPT 4.0 - Remote Code Execution. Author: Amoo Arash
|
Analyze the security implications of: AuroraGPT 4.0 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CLScript.com Classifieds Software - SQL Injection
|
This is a webapps exploit for php platform. Description: CLScript.com Classifieds Software - SQL Injection. Author: 41.w4r10
|
Analyze the security implications of: CLScript.com Classifieds Software - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sun Java System Identity Manager 6.0/7.0/7.1 - '/idm/user/main.jsp?activeControl' Cross-Site Scripting
|
This is a webapps exploit for jsp platform. Description: Sun Java System Identity Manager 6.0/7.0/7.1 - '/idm/user/main.jsp?activeControl' Cross-Site Scripting. Author: Jan Fry & Adrian Pastor
|
Analyze the security implications of: Sun Java System Identity Manager 6.0/7.0/7.1 - '/idm/user/main.jsp?activeControl' Cross-Site Scripting
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: EvoTopsite 2.0 - 'index.php' Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: EvoTopsite 2.0 - 'index.php' Multiple SQL Injections. Author: Hamid Ebadi
|
Analyze the security implications of: EvoTopsite 2.0 - 'index.php' Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Macallan Mail Solution Macallan Mail Solution 2.8.4.6 (Build 260) - Web Interface Authentication Bypass
|
This is a webapps exploit for php platform. Description: Macallan Mail Solution Macallan Mail Solution 2.8.4.6 (Build 260) - Web Interface Authentication Bypass. Author: Ziv Kamir
|
Analyze the security implications of: Macallan Mail Solution Macallan Mail Solution 2.8.4.6 (Build 260) - Web Interface Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Nokia Symbian OS 3rd Edition - Multiple Web Browser Vulnerabilities
|
This is a dos exploit for hardware platform. Description: Nokia Symbian OS 3rd Edition - Multiple Web Browser Vulnerabilities. Author: Nishant Das Patnaik
|
Analyze the security implications of: Nokia Symbian OS 3rd Edition - Multiple Web Browser Vulnerabilities
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Opera Web Browser 8.0/8.5 - HTML Form Status Bar Misrepresentation
|
This is a remote exploit for multiple platform. Description: Opera Web Browser 8.0/8.5 - HTML Form Status Bar Misrepresentation. Author: Sverx
|
Analyze the security implications of: Opera Web Browser 8.0/8.5 - HTML Form Status Bar Misrepresentation
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: SAP Business Objects InfoView System - '/webi/webi_modify.aspx?id' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: SAP Business Objects InfoView System - '/webi/webi_modify.aspx?id' Cross-Site Scripting. Author: vulns@dionach.com
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.