input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Joomla! Component com_versioning - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_versioning - SQL Injection. Author: the_cyber_nuxbie
|
Analyze the security implications of: Joomla! Component com_versioning - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ZYXEL P-330W - Multiple Vulnerabilities
|
This is a remote exploit for hardware platform. Description: ZYXEL P-330W - Multiple Vulnerabilities. Author: santa_clause
|
Analyze the security implications of: ZYXEL P-330W - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: MiniNuke 1.8.2 - Multiple SQL Injections
|
This is a webapps exploit for asp platform. Description: MiniNuke 1.8.2 - Multiple SQL Injections. Author: nukedx
|
Analyze the security implications of: MiniNuke 1.8.2 - Multiple SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Endian Firewall 2.4 - 'dansguardian.cgi?addrule' Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: Endian Firewall 2.4 - 'dansguardian.cgi?addrule' Cross-Site Scripting. Author: Vulnerability Research Laboratory
|
Analyze the security implications of: Endian Firewall 2.4 - 'dansguardian.cgi?addrule' Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Camtron CMNC-200 IP Camera - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Camtron CMNC-200 IP Camera - Authentication Bypass. Author: Trustwave's SpiderLabs
|
Analyze the security implications of: Camtron CMNC-200 IP Camera - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: GNU Wget 1.x - Multiple Vulnerabilities
|
This is a remote exploit for linux platform. Description: GNU Wget 1.x - Multiple Vulnerabilities. Author: Jan Minar
|
Analyze the security implications of: GNU Wget 1.x - Multiple Vulnerabilities
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AmazCart CMS 3.4 - Cross-Site-Scripting (XSS)
|
This is a webapps exploit for php platform. Description: AmazCart CMS 3.4 - Cross-Site-Scripting (XSS). Author: Sajibe Kanti
|
Analyze the security implications of: AmazCart CMS 3.4 - Cross-Site-Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Employee Task Management System v1.0 - Broken Authentication
|
This is a webapps exploit for php platform. Description: Employee Task Management System v1.0 - Broken Authentication. Author: Muhammad Navaid Zafar Ansari
|
Analyze the security implications of: Employee Task Management System v1.0 - Broken Authentication
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: NoviFlow NoviWare < NW400.2.6 - Multiple Vulnerabilities
|
This is a dos exploit for hardware platform. Description: NoviFlow NoviWare < NW400.2.6 - Multiple Vulnerabilities. Author: François Goichon
|
Analyze the security implications of: NoviFlow NoviWare < NW400.2.6 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ClipShare 4.1.4 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: ClipShare 4.1.4 - Multiple Vulnerabilities. Author: AkaStep
|
Analyze the security implications of: ClipShare 4.1.4 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eWON Flexy - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: eWON Flexy - Authentication Bypass. Author: Photubias
|
Analyze the security implications of: eWON Flexy - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: DigiLeave 1.2 - 'book_id' Blind SQL Injection
|
This is a webapps exploit for asp platform. Description: DigiLeave 1.2 - 'book_id' Blind SQL Injection. Author: Mr.SQL
|
Analyze the security implications of: DigiLeave 1.2 - 'book_id' Blind SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: cyclades alterpath manager 1.1 - Multiple Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: cyclades alterpath manager 1.1 - Multiple Vulnerabilities. Author: sullo@cirt.net
|
Analyze the security implications of: cyclades alterpath manager 1.1 - Multiple Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: FuseTalk 4.0 - 'AuthError.cfm' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for cfm platform. Description: FuseTalk 4.0 - 'AuthError.cfm' Multiple Cross-Site Scripting Vulnerabilities. Author: Ivan Almuina
|
Analyze the security implications of: FuseTalk 4.0 - 'AuthError.cfm' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets cfm systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cfm platform
|
What is this exploit about: WebKit - 'WebCore::AXObjectCache::handleMenuItemSelected' Use-After-Free
|
This is a dos exploit for multiple platform. Description: WebKit - 'WebCore::AXObjectCache::handleMenuItemSelected' Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: WebKit - 'WebCore::AXObjectCache::handleMenuItemSelected' Use-After-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CreaDirectory 1.2 - 'search.asp?search' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: CreaDirectory 1.2 - 'search.asp?search' Cross-Site Scripting. Author: laurent gaffie
|
Analyze the security implications of: CreaDirectory 1.2 - 'search.asp?search' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Adobe Flash Player 8/9.0.x - '.SWF' File 'DeclareFunction2' ActionScript Tag Remote Code Execution
|
This is a remote exploit for linux platform. Description: Adobe Flash Player 8/9.0.x - '.SWF' File 'DeclareFunction2' ActionScript Tag Remote Code Execution. Author: Javier Vicente Vallejo
|
Analyze the security implications of: Adobe Flash Player 8/9.0.x - '.SWF' File 'DeclareFunction2' ActionScript Tag Remote Code Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: BatmanPorTaL - 'uyeadmin.asp?id' SQL Injection
|
This is a webapps exploit for php platform. Description: BatmanPorTaL - 'uyeadmin.asp?id' SQL Injection. Author: U238
|
Analyze the security implications of: BatmanPorTaL - 'uyeadmin.asp?id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FTPx FTP Explorer 1.0.00.10 - Weak Password Encryption
|
This is a local exploit for linux platform. Description: FTPx FTP Explorer 1.0.00.10 - Weak Password Encryption. Author: Nelson Brito
|
Analyze the security implications of: FTPx FTP Explorer 1.0.00.10 - Weak Password Encryption
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: BEdita 3.0.1.2550 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: BEdita 3.0.1.2550 - Multiple Vulnerabilities. Author: High-Tech Bridge SA
|
Analyze the security implications of: BEdita 3.0.1.2550 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Simple PHP Blog 0.4 - 'colors.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for cgi platform. Description: Simple PHP Blog 0.4 - 'colors.php' Multiple Cross-Site Scripting Vulnerabilities. Author: enji@infosys.tuwien.ac.at
|
Analyze the security implications of: Simple PHP Blog 0.4 - 'colors.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Fortigate Firewall 2.x - Policy Admin Interface Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: Fortigate Firewall 2.x - Policy Admin Interface Cross-Site Scripting. Author: Maarten Hartsuijker
|
Analyze the security implications of: Fortigate Firewall 2.x - Policy Admin Interface Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: NetNumber Titan ENUM/DNS/NP 7.9.1 - Path Traversal / Authorization Bypass
|
This is a webapps exploit for linux platform. Description: NetNumber Titan ENUM/DNS/NP 7.9.1 - Path Traversal / Authorization Bypass. Author: MobileNetworkSecurity
|
Analyze the security implications of: NetNumber Titan ENUM/DNS/NP 7.9.1 - Path Traversal / Authorization Bypass
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apple Mac OSX - IOSCSIPeripheralDeviceType00 Userclient Type 12 Kernel NULL Dereference
|
This is a dos exploit for osx platform. Description: Apple Mac OSX - IOSCSIPeripheralDeviceType00 Userclient Type 12 Kernel NULL Dereference. Author: Google Security Research
|
Analyze the security implications of: Apple Mac OSX - IOSCSIPeripheralDeviceType00 Userclient Type 12 Kernel NULL Dereference
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: VNC Keyboard - Remote Code Execution (Metasploit)
|
This is a remote exploit for multiple platform. Description: VNC Keyboard - Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: VNC Keyboard - Remote Code Execution (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: BookReview 1.0 - 'suggest_review.htm?node' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: BookReview 1.0 - 'suggest_review.htm?node' Cross-Site Scripting. Author: Lostmon
|
Analyze the security implications of: BookReview 1.0 - 'suggest_review.htm?node' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cipi Control Panel 3.1.15 - Stored Cross-Site Scripting (XSS) (Authenticated)
|
This is a webapps exploit for linux platform. Description: Cipi Control Panel 3.1.15 - Stored Cross-Site Scripting (XSS) (Authenticated). Author: Ghuliev
|
Analyze the security implications of: Cipi Control Panel 3.1.15 - Stored Cross-Site Scripting (XSS) (Authenticated)
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: EntertainmentScript 1.4.0 - 'play.php' SQL Injection
|
This is a webapps exploit for php platform. Description: EntertainmentScript 1.4.0 - 'play.php' SQL Injection. Author: Mr.SQL
|
Analyze the security implications of: EntertainmentScript 1.4.0 - 'play.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Asterisk 13.17.2 - 'chan_skinny' Remote Memory Corruption
|
This is a dos exploit for multiple platform. Description: Asterisk 13.17.2 - 'chan_skinny' Remote Memory Corruption. Author: Juan Sacco
|
Analyze the security implications of: Asterisk 13.17.2 - 'chan_skinny' Remote Memory Corruption
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: DPScms - 'q' SQL Injection / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DPScms - 'q' SQL Injection / Cross-Site Scripting. Author: Ariko-Security
|
Analyze the security implications of: DPScms - 'q' SQL Injection / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Huawei DG8045 Router 1.0 - Credential Disclosure
|
This is a webapps exploit for hardware platform. Description: Huawei DG8045 Router 1.0 - Credential Disclosure. Author: Abdalrahman Gamal
|
Analyze the security implications of: Huawei DG8045 Router 1.0 - Credential Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: LANChat Pro Revival 1.666c - UDP Processing Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: LANChat Pro Revival 1.666c - UDP Processing Remote Denial of Service. Author: Donato Ferrante
|
Analyze the security implications of: LANChat Pro Revival 1.666c - UDP Processing Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: WonderCMS 3.4.2 - Remote Code Execution (RCE)
|
This is a remote exploit for php platform. Description: WonderCMS 3.4.2 - Remote Code Execution (RCE). Author: Milad karimi
|
Analyze the security implications of: WonderCMS 3.4.2 - Remote Code Execution (RCE)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.