input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: KDE Konqueror 3.x - Embedded Image URI Obfuscation
|
This is a remote exploit for linux platform. Description: KDE Konqueror 3.x - Embedded Image URI Obfuscation. Author: Drew Copley
|
Analyze the security implications of: KDE Konqueror 3.x - Embedded Image URI Obfuscation
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: wolfSSL 3.10.2 - x509 Certificate Text Parsing Off-by-One
|
This is a dos exploit for multiple platform. Description: wolfSSL 3.10.2 - x509 Certificate Text Parsing Off-by-One. Author: Talos
|
Analyze the security implications of: wolfSSL 3.10.2 - x509 Certificate Text Parsing Off-by-One
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CubeCart 3.0.6 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for php platform. Description: CubeCart 3.0.6 - Cross-Site Request Forgery (Add Admin). Author: P0C T34M
|
Analyze the security implications of: CubeCart 3.0.6 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sun Java System Identity Manager 6.0/7.0/7.1 - '/idm/login.jsp' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: Sun Java System Identity Manager 6.0/7.0/7.1 - '/idm/login.jsp' Multiple Cross-Site Scripting Vulnerabilities. Author: Jan Fry & Adrian Pastor
|
Analyze the security implications of: Sun Java System Identity Manager 6.0/7.0/7.1 - '/idm/login.jsp' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Apple iOS Safari - 'decodeURIComponent' Remote Crash
|
This is a dos exploit for hardware platform. Description: Apple iOS Safari - 'decodeURIComponent' Remote Crash. Author: Yakir Wizman
|
Analyze the security implications of: Apple iOS Safari - 'decodeURIComponent' Remote Crash
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Divine Content Server 5.0 - Error Page Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: Divine Content Server 5.0 - Error Page Cross-Site Scripting. Author: valgasu
|
Analyze the security implications of: Divine Content Server 5.0 - Error Page Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Kados R10 GreenBee - 'release_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Kados R10 GreenBee - 'release_id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Kados R10 GreenBee - 'release_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Expinion.net Member Management System 2.1 - 'resend.asp?ID' SQL Injection
|
This is a webapps exploit for asp platform. Description: Expinion.net Member Management System 2.1 - 'resend.asp?ID' SQL Injection. Author: Manuel Lopez
|
Analyze the security implications of: Expinion.net Member Management System 2.1 - 'resend.asp?ID' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: People Can Fly Painkiller Gamespy 1.3 - CD-Key Hash Remote Buffer Overflow
|
This is a remote exploit for multiple platform. Description: People Can Fly Painkiller Gamespy 1.3 - CD-Key Hash Remote Buffer Overflow. Author: Luigi Auriemma
|
Analyze the security implications of: People Can Fly Painkiller Gamespy 1.3 - CD-Key Hash Remote Buffer Overflow
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Symantec RAR Decomposer Engine (Multiple Products) - Out-of-Bounds Read / Out-of-Bounds Write
|
This is a dos exploit for multiple platform. Description: Symantec RAR Decomposer Engine (Multiple Products) - Out-of-Bounds Read / Out-of-Bounds Write. Author: Google Security Research
|
Analyze the security implications of: Symantec RAR Decomposer Engine (Multiple Products) - Out-of-Bounds Read / Out-of-Bounds Write
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Boom CMS v8.0.7 - Cross Site Scripting
|
This is a webapps exploit for php platform. Description: Boom CMS v8.0.7 - Cross Site Scripting. Author: Vulnerability-Lab
|
Analyze the security implications of: Boom CMS v8.0.7 - Cross Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WIMAX LX350P(WIXFMR-108) - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: WIMAX LX350P(WIXFMR-108) - Multiple Vulnerabilities. Author: alimp5
|
Analyze the security implications of: WIMAX LX350P(WIXFMR-108) - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Car Rental Management System 1.0 - Remote Code Execution (Authenticated)
|
This is a webapps exploit for php platform. Description: Car Rental Management System 1.0 - Remote Code Execution (Authenticated). Author: Mehmet Kelepçe
|
Analyze the security implications of: Car Rental Management System 1.0 - Remote Code Execution (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 11in1 CMS 1.0.1 - 'do.php' CRLF Injection
|
This is a webapps exploit for php platform. Description: 11in1 CMS 1.0.1 - 'do.php' CRLF Injection. Author: LiquidWorm
|
Analyze the security implications of: 11in1 CMS 1.0.1 - 'do.php' CRLF Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Miyabi CGI Tools 1.02 - 'index.pl' Remote Command Execution
|
This is a webapps exploit for cgi platform. Description: Miyabi CGI Tools 1.02 - 'index.pl' Remote Command Execution. Author: Marshall Whittaker
|
Analyze the security implications of: Miyabi CGI Tools 1.02 - 'index.pl' Remote Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Coship RT3052 Wireless Router - Persistent Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: Coship RT3052 Wireless Router - Persistent Cross-Site Scripting. Author: Sayan Chatterjee
|
Analyze the security implications of: Coship RT3052 Wireless Router - Persistent Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: AJ Auction - Authentication Bypass
|
This is a webapps exploit for php platform. Description: AJ Auction - Authentication Bypass. Author: G4N0K
|
Analyze the security implications of: AJ Auction - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Claroline 1.8.0 rc1 - 'import.lib.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Claroline 1.8.0 rc1 - 'import.lib.php' Remote File Inclusion. Author: k1tk4t
|
Analyze the security implications of: Claroline 1.8.0 rc1 - 'import.lib.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Drumbeat CMS 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Drumbeat CMS 1.0 - SQL Injection. Author: Sora
|
Analyze the security implications of: Drumbeat CMS 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alkacon OpenCMS 7.0.3 - 'users_list.jsp' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: Alkacon OpenCMS 7.0.3 - 'users_list.jsp' Multiple Cross-Site Scripting Vulnerabilities. Author: nnposter
|
Analyze the security implications of: Alkacon OpenCMS 7.0.3 - 'users_list.jsp' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Itech Video Sharing Script 4.94 - 'v' SQL Injection
|
This is a webapps exploit for php platform. Description: Itech Video Sharing Script 4.94 - 'v' SQL Injection. Author: Kaan KAMIS
|
Analyze the security implications of: Itech Video Sharing Script 4.94 - 'v' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Annuaire - 'index.php?id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Annuaire - 'index.php?id' SQL Injection. Author: Ashiyane Digital Security Team
|
Analyze the security implications of: Joomla! Component Annuaire - 'index.php?id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: KORA 2.7.0 - 'cid' SQL Injection
|
This is a webapps exploit for php platform. Description: KORA 2.7.0 - 'cid' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: KORA 2.7.0 - 'cid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: aptdaemon < 1.1.1 - File Existence Disclosure
|
This is a local exploit for linux platform. Description: aptdaemon < 1.1.1 - File Existence Disclosure. Author: Vaisha Bernard
|
Analyze the security implications of: aptdaemon < 1.1.1 - File Existence Disclosure
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ZTE - Change Admin Password
|
This is a webapps exploit for cgi platform. Description: ZTE - Change Admin Password. Author: Nuevo Asesino
|
Analyze the security implications of: ZTE - Change Admin Password
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: RSVG 2.40.13 / 2.42.2 - '.svg' Buffer Overflow
|
This is a dos exploit for multiple platform. Description: RSVG 2.40.13 / 2.42.2 - '.svg' Buffer Overflow. Author: Hamm3r.py
|
Analyze the security implications of: RSVG 2.40.13 / 2.42.2 - '.svg' Buffer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Kayako Fusion - 'download.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Kayako Fusion - 'download.php' Cross-Site Scripting. Author: High-Tech Bridge
|
Analyze the security implications of: Kayako Fusion - 'download.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: F5 BIG-IP Application Security Manager 9.4.3 - 'report_type' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: F5 BIG-IP Application Security Manager 9.4.3 - 'report_type' Cross-Site Scripting. Author: nnposter
|
Analyze the security implications of: F5 BIG-IP Application Security Manager 9.4.3 - 'report_type' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ownCloud 4.0.x/4.5.x - 'upload.php?Filename' Remote Code Execution
|
This is a webapps exploit for multiple platform. Description: ownCloud 4.0.x/4.5.x - 'upload.php?Filename' Remote Code Execution. Author: Portcullis
|
Analyze the security implications of: ownCloud 4.0.x/4.5.x - 'upload.php?Filename' Remote Code Execution
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Mozilla Firefox < 39.03 - 'pdf.js' Same Origin Policy
|
This is a local exploit for multiple platform. Description: Mozilla Firefox < 39.03 - 'pdf.js' Same Origin Policy. Author: Tantaryu MING
|
Analyze the security implications of: Mozilla Firefox < 39.03 - 'pdf.js' Same Origin Policy
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: iFunBox Free 1.1 iOS - Local File Inclusion
|
This is a webapps exploit for ios platform. Description: iFunBox Free 1.1 iOS - Local File Inclusion. Author: Vulnerability-Lab
|
Analyze the security implications of: iFunBox Free 1.1 iOS - Local File Inclusion
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: SGI IRIX 6.5.28 - 'runpriv' Design Error
|
This is a local exploit for irix platform. Description: SGI IRIX 6.5.28 - 'runpriv' Design Error. Author: anonymous
|
Analyze the security implications of: SGI IRIX 6.5.28 - 'runpriv' Design Error
|
This exploit targets irix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets irix platform
|
What is this exploit about: Built2Go PHP Movie Review 2B - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Built2Go PHP Movie Review 2B - Remote File Inclusion. Author: Camille Myers
|
Analyze the security implications of: Built2Go PHP Movie Review 2B - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.