input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Phone Drive Eightythree 4.1.1 iOS - Multiple Vulnerabilities
|
This is a webapps exploit for ios platform. Description: Phone Drive Eightythree 4.1.1 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: Phone Drive Eightythree 4.1.1 iOS - Multiple Vulnerabilities
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: JSBoard 2.0.x - Arbitrary Script Upload
|
This is a webapps exploit for php platform. Description: JSBoard 2.0.x - Arbitrary Script Upload. Author: Jeremy Bae
|
Analyze the security implications of: JSBoard 2.0.x - Arbitrary Script Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: File Upload Manager 1.0.6 - 'detail.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: File Upload Manager 1.0.6 - 'detail.asp' SQL Injection. Author: ajann
|
Analyze the security implications of: File Upload Manager 1.0.6 - 'detail.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Enorth Webpublisher CMS - 'thisday' SQL Injection
|
This is a webapps exploit for php platform. Description: Enorth Webpublisher CMS - 'thisday' SQL Injection. Author: xin.wang
|
Analyze the security implications of: Enorth Webpublisher CMS - 'thisday' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DynMedia Pro Web CMS 4.0 - Local File Disclosure
|
This is a webapps exploit for php platform. Description: DynMedia Pro Web CMS 4.0 - Local File Disclosure. Author: Mbah_Semar
|
Analyze the security implications of: DynMedia Pro Web CMS 4.0 - Local File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: K-Meleon 1.5.3 - Remote Array Overrun
|
This is a dos exploit for bsd platform. Description: K-Meleon 1.5.3 - Remote Array Overrun. Author: Maksymilian Arciemowicz & sp3x
|
Analyze the security implications of: K-Meleon 1.5.3 - Remote Array Overrun
|
This exploit targets bsd systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets bsd platform
|
What is this exploit about: Filmis 0.2 Beta - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Filmis 0.2 Beta - Multiple Vulnerabilities. Author: M.Jock3R
|
Analyze the security implications of: Filmis 0.2 Beta - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cilem Haber Free Edition - 'hata.asp?hata' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Cilem Haber Free Edition - 'hata.asp?hata' Cross-Site Scripting. Author: ShaFuck31
|
Analyze the security implications of: Cilem Haber Free Edition - 'hata.asp?hata' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: HP-UX 11 / Linux Kernel 2.4 / Windows 2000/NT 4.0 / IRIX 6.5 - Small TCP MSS Denial of Service
|
This is a dos exploit for multiple platform. Description: HP-UX 11 / Linux Kernel 2.4 / Windows 2000/NT 4.0 / IRIX 6.5 - Small TCP MSS Denial of Service. Author: Darren Reed
|
Analyze the security implications of: HP-UX 11 / Linux Kernel 2.4 / Windows 2000/NT 4.0 / IRIX 6.5 - Small TCP MSS Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Dayfox Blog 4 - Multiple Local File Inclusions
|
This is a webapps exploit for php platform. Description: Dayfox Blog 4 - Multiple Local File Inclusions. Author: Virangar Security
|
Analyze the security implications of: Dayfox Blog 4 - Multiple Local File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CodetoSell ViArt Shop Enterprise 2.1.6 - 'product_details.php?category_id' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: CodetoSell ViArt Shop Enterprise 2.1.6 - 'product_details.php?category_id' Cross-Site Scripting. Author: Lostmon
|
Analyze the security implications of: CodetoSell ViArt Shop Enterprise 2.1.6 - 'product_details.php?category_id' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PersianBlog - 'Userslist.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: PersianBlog - 'Userslist.asp' SQL Injection. Author: trueend5
|
Analyze the security implications of: PersianBlog - 'Userslist.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ntop - 'arbfile' Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: ntop - 'arbfile' Cross-Site Scripting. Author: Marcos Garcia
|
Analyze the security implications of: ntop - 'arbfile' Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: yTree 1.94-1.1 - Local Buffer Overflow (PoC)
|
This is a dos exploit for linux platform. Description: yTree 1.94-1.1 - Local Buffer Overflow (PoC). Author: Juan Sacco
|
Analyze the security implications of: yTree 1.94-1.1 - Local Buffer Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Killer Protection 1.0 - Information Disclosure
|
This is a webapps exploit for php platform. Description: Killer Protection 1.0 - Information Disclosure. Author: frog
|
Analyze the security implications of: Killer Protection 1.0 - Information Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ChurchCRM 4.2.0 - CSV/Formula Injection
|
This is a webapps exploit for multiple platform. Description: ChurchCRM 4.2.0 - CSV/Formula Injection. Author: Mufaddal Masalawala
|
Analyze the security implications of: ChurchCRM 4.2.0 - CSV/Formula Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ASPilot Pilot Cart 7.3 - 'newsroom.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: ASPilot Pilot Cart 7.3 - 'newsroom.asp' SQL Injection. Author: Daikin
|
Analyze the security implications of: ASPilot Pilot Cart 7.3 - 'newsroom.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Cybershade CMS 0.2b - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Cybershade CMS 0.2b - Remote File Inclusion. Author: w0cker
|
Analyze the security implications of: Cybershade CMS 0.2b - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Pidgin 2.4.2 - 'msn_slplink_process_msg()' Denial of Service
|
This is a dos exploit for linux platform. Description: Pidgin 2.4.2 - 'msn_slplink_process_msg()' Denial of Service. Author: Juan Pablo Lopez Yacubian
|
Analyze the security implications of: Pidgin 2.4.2 - 'msn_slplink_process_msg()' Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Claroline 1.5/1.6 - 'myagenda.php?coursePath' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Claroline 1.5/1.6 - 'myagenda.php?coursePath' Cross-Site Scripting. Author: Sieg Fried
|
Analyze the security implications of: Claroline 1.5/1.6 - 'myagenda.php?coursePath' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Caucho Resin Professional 3.1.5 - '/resin-admin/digest.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Caucho Resin Professional 3.1.5 - '/resin-admin/digest.php' Multiple Cross-Site Scripting Vulnerabilities. Author: xuanmumu
|
Analyze the security implications of: Caucho Resin Professional 3.1.5 - '/resin-admin/digest.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Techfolio 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Techfolio 1.0 - SQL Injection. Author: Chris Russell
|
Analyze the security implications of: Joomla! Component Techfolio 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bs Scripts_Directory - SQL Injection / Authentication Bypass
|
This is a webapps exploit for php platform. Description: Bs Scripts_Directory - SQL Injection / Authentication Bypass. Author: Sid3^effects
|
Analyze the security implications of: Bs Scripts_Directory - SQL Injection / Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Job2C 4.2 - 'adtype' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Job2C 4.2 - 'adtype' Local File Inclusion. Author: ZoRLu
|
Analyze the security implications of: Job2C 4.2 - 'adtype' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Safari 1.x/2.0.1 - Data URI Memory Corruption
|
This is a dos exploit for osx platform. Description: Apple Safari 1.x/2.0.1 - Data URI Memory Corruption. Author: Jonathan Rockway
|
Analyze the security implications of: Apple Safari 1.x/2.0.1 - Data URI Memory Corruption
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Cisco Data Center Network Manager - Unauthenticated Remote Code Execution (Metasploit)
|
This is a remote exploit for java platform. Description: Cisco Data Center Network Manager - Unauthenticated Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Cisco Data Center Network Manager - Unauthenticated Remote Code Execution (Metasploit)
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Joomla! Component & Plugin JE Tooltip 1.0 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component & Plugin JE Tooltip 1.0 - Local File Inclusion. Author: Chip d3 bi0s
|
Analyze the security implications of: Joomla! Component & Plugin JE Tooltip 1.0 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DV Cart Shopping Cart software - SQL Injection
|
This is a webapps exploit for php platform. Description: DV Cart Shopping Cart software - SQL Injection. Author: Eyup CELIK
|
Analyze the security implications of: DV Cart Shopping Cart software - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Netware - SMB Remote Stack Overflow (PoC)
|
This is a dos exploit for novell platform. Description: Netware - SMB Remote Stack Overflow (PoC). Author: laurent gaffie
|
Analyze the security implications of: Netware - SMB Remote Stack Overflow (PoC)
|
This exploit targets novell systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets novell platform
|
What is this exploit about: D-Link DNS-320 ShareCenter < 1.06 - Backdoor Access
|
This is a remote exploit for hardware platform. Description: D-Link DNS-320 ShareCenter < 1.06 - Backdoor Access. Author: GulfTech Security
|
Analyze the security implications of: D-Link DNS-320 ShareCenter < 1.06 - Backdoor Access
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Longjing Technology BEMS API 1.21 - Remote Arbitrary File Download
|
This is a webapps exploit for hardware platform. Description: Longjing Technology BEMS API 1.21 - Remote Arbitrary File Download. Author: LiquidWorm
|
Analyze the security implications of: Longjing Technology BEMS API 1.21 - Remote Arbitrary File Download
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Gaim 1.2.1 - URL Handling Remote Stack Overflow
|
This is a dos exploit for linux platform. Description: Gaim 1.2.1 - URL Handling Remote Stack Overflow. Author: Ron
|
Analyze the security implications of: Gaim 1.2.1 - URL Handling Remote Stack Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Architectural 1.0 - 'email' SQL Injection
|
This is a webapps exploit for php platform. Description: Architectural 1.0 - 'email' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Architectural 1.0 - 'email' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mambo Open Source 4.6.2 - '/administrator/popups/index3pop.php?mosConfig_sitename' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Mambo Open Source 4.6.2 - '/administrator/popups/index3pop.php?mosConfig_sitename' Cross-Site Scripting. Author: Khashayar Fereidani
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.