input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Phone Drive Eightythree 4.1.1 iOS - Multiple Vulnerabilities | This is a webapps exploit for ios platform. Description: Phone Drive Eightythree 4.1.1 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Phone Drive Eightythree 4.1.1 iOS - Multiple Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: JSBoard 2.0.x - Arbitrary Script Upload | This is a webapps exploit for php platform. Description: JSBoard 2.0.x - Arbitrary Script Upload. Author: Jeremy Bae |
Analyze the security implications of: JSBoard 2.0.x - Arbitrary Script Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: File Upload Manager 1.0.6 - 'detail.asp' SQL Injection | This is a webapps exploit for asp platform. Description: File Upload Manager 1.0.6 - 'detail.asp' SQL Injection. Author: ajann |
Analyze the security implications of: File Upload Manager 1.0.6 - 'detail.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Enorth Webpublisher CMS - 'thisday' SQL Injection | This is a webapps exploit for php platform. Description: Enorth Webpublisher CMS - 'thisday' SQL Injection. Author: xin.wang |
Analyze the security implications of: Enorth Webpublisher CMS - 'thisday' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DynMedia Pro Web CMS 4.0 - Local File Disclosure | This is a webapps exploit for php platform. Description: DynMedia Pro Web CMS 4.0 - Local File Disclosure. Author: Mbah_Semar |
Analyze the security implications of: DynMedia Pro Web CMS 4.0 - Local File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: K-Meleon 1.5.3 - Remote Array Overrun | This is a dos exploit for bsd platform. Description: K-Meleon 1.5.3 - Remote Array Overrun. Author: Maksymilian Arciemowicz & sp3x |
Analyze the security implications of: K-Meleon 1.5.3 - Remote Array Overrun | This exploit targets bsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Filmis 0.2 Beta - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Filmis 0.2 Beta - Multiple Vulnerabilities. Author: M.Jock3R |
Analyze the security implications of: Filmis 0.2 Beta - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cilem Haber Free Edition - 'hata.asp?hata' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Cilem Haber Free Edition - 'hata.asp?hata' Cross-Site Scripting. Author: ShaFuck31 |
Analyze the security implications of: Cilem Haber Free Edition - 'hata.asp?hata' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: HP-UX 11 / Linux Kernel 2.4 / Windows 2000/NT 4.0 / IRIX 6.5 - Small TCP MSS Denial of Service | This is a dos exploit for multiple platform. Description: HP-UX 11 / Linux Kernel 2.4 / Windows 2000/NT 4.0 / IRIX 6.5 - Small TCP MSS Denial of Service. Author: Darren Reed |
Analyze the security implications of: HP-UX 11 / Linux Kernel 2.4 / Windows 2000/NT 4.0 / IRIX 6.5 - Small TCP MSS Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Dayfox Blog 4 - Multiple Local File Inclusions | This is a webapps exploit for php platform. Description: Dayfox Blog 4 - Multiple Local File Inclusions. Author: Virangar Security |
Analyze the security implications of: Dayfox Blog 4 - Multiple Local File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CodetoSell ViArt Shop Enterprise 2.1.6 - 'product_details.php?category_id' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CodetoSell ViArt Shop Enterprise 2.1.6 - 'product_details.php?category_id' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: CodetoSell ViArt Shop Enterprise 2.1.6 - 'product_details.php?category_id' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PersianBlog - 'Userslist.asp' SQL Injection | This is a webapps exploit for asp platform. Description: PersianBlog - 'Userslist.asp' SQL Injection. Author: trueend5 |
Analyze the security implications of: PersianBlog - 'Userslist.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ntop - 'arbfile' Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: ntop - 'arbfile' Cross-Site Scripting. Author: Marcos Garcia |
Analyze the security implications of: ntop - 'arbfile' Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: yTree 1.94-1.1 - Local Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: yTree 1.94-1.1 - Local Buffer Overflow (PoC). Author: Juan Sacco |
Analyze the security implications of: yTree 1.94-1.1 - Local Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Killer Protection 1.0 - Information Disclosure | This is a webapps exploit for php platform. Description: Killer Protection 1.0 - Information Disclosure. Author: frog |
Analyze the security implications of: Killer Protection 1.0 - Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ChurchCRM 4.2.0 - CSV/Formula Injection | This is a webapps exploit for multiple platform. Description: ChurchCRM 4.2.0 - CSV/Formula Injection. Author: Mufaddal Masalawala |
Analyze the security implications of: ChurchCRM 4.2.0 - CSV/Formula Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ASPilot Pilot Cart 7.3 - 'newsroom.asp' SQL Injection | This is a webapps exploit for asp platform. Description: ASPilot Pilot Cart 7.3 - 'newsroom.asp' SQL Injection. Author: Daikin |
Analyze the security implications of: ASPilot Pilot Cart 7.3 - 'newsroom.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Cybershade CMS 0.2b - Remote File Inclusion | This is a webapps exploit for php platform. Description: Cybershade CMS 0.2b - Remote File Inclusion. Author: w0cker |
Analyze the security implications of: Cybershade CMS 0.2b - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pidgin 2.4.2 - 'msn_slplink_process_msg()' Denial of Service | This is a dos exploit for linux platform. Description: Pidgin 2.4.2 - 'msn_slplink_process_msg()' Denial of Service. Author: Juan Pablo Lopez Yacubian |
Analyze the security implications of: Pidgin 2.4.2 - 'msn_slplink_process_msg()' Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Claroline 1.5/1.6 - 'myagenda.php?coursePath' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Claroline 1.5/1.6 - 'myagenda.php?coursePath' Cross-Site Scripting. Author: Sieg Fried |
Analyze the security implications of: Claroline 1.5/1.6 - 'myagenda.php?coursePath' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Caucho Resin Professional 3.1.5 - '/resin-admin/digest.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Caucho Resin Professional 3.1.5 - '/resin-admin/digest.php' Multiple Cross-Site Scripting Vulnerabilities. Author: xuanmumu |
Analyze the security implications of: Caucho Resin Professional 3.1.5 - '/resin-admin/digest.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Techfolio 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Techfolio 1.0 - SQL Injection. Author: Chris Russell |
Analyze the security implications of: Joomla! Component Techfolio 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bs Scripts_Directory - SQL Injection / Authentication Bypass | This is a webapps exploit for php platform. Description: Bs Scripts_Directory - SQL Injection / Authentication Bypass. Author: Sid3^effects |
Analyze the security implications of: Bs Scripts_Directory - SQL Injection / Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Job2C 4.2 - 'adtype' Local File Inclusion | This is a webapps exploit for php platform. Description: Job2C 4.2 - 'adtype' Local File Inclusion. Author: ZoRLu |
Analyze the security implications of: Job2C 4.2 - 'adtype' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Safari 1.x/2.0.1 - Data URI Memory Corruption | This is a dos exploit for osx platform. Description: Apple Safari 1.x/2.0.1 - Data URI Memory Corruption. Author: Jonathan Rockway |
Analyze the security implications of: Apple Safari 1.x/2.0.1 - Data URI Memory Corruption | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Cisco Data Center Network Manager - Unauthenticated Remote Code Execution (Metasploit) | This is a remote exploit for java platform. Description: Cisco Data Center Network Manager - Unauthenticated Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Cisco Data Center Network Manager - Unauthenticated Remote Code Execution (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Joomla! Component & Plugin JE Tooltip 1.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component & Plugin JE Tooltip 1.0 - Local File Inclusion. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component & Plugin JE Tooltip 1.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DV Cart Shopping Cart software - SQL Injection | This is a webapps exploit for php platform. Description: DV Cart Shopping Cart software - SQL Injection. Author: Eyup CELIK |
Analyze the security implications of: DV Cart Shopping Cart software - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Netware - SMB Remote Stack Overflow (PoC) | This is a dos exploit for novell platform. Description: Netware - SMB Remote Stack Overflow (PoC). Author: laurent gaffie |
Analyze the security implications of: Netware - SMB Remote Stack Overflow (PoC) | This exploit targets novell systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: D-Link DNS-320 ShareCenter < 1.06 - Backdoor Access | This is a remote exploit for hardware platform. Description: D-Link DNS-320 ShareCenter < 1.06 - Backdoor Access. Author: GulfTech Security |
Analyze the security implications of: D-Link DNS-320 ShareCenter < 1.06 - Backdoor Access | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Longjing Technology BEMS API 1.21 - Remote Arbitrary File Download | This is a webapps exploit for hardware platform. Description: Longjing Technology BEMS API 1.21 - Remote Arbitrary File Download. Author: LiquidWorm |
Analyze the security implications of: Longjing Technology BEMS API 1.21 - Remote Arbitrary File Download | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Gaim 1.2.1 - URL Handling Remote Stack Overflow | This is a dos exploit for linux platform. Description: Gaim 1.2.1 - URL Handling Remote Stack Overflow. Author: Ron |
Analyze the security implications of: Gaim 1.2.1 - URL Handling Remote Stack Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Architectural 1.0 - 'email' SQL Injection | This is a webapps exploit for php platform. Description: Architectural 1.0 - 'email' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Architectural 1.0 - 'email' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Open Source 4.6.2 - '/administrator/popups/index3pop.php?mosConfig_sitename' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Mambo Open Source 4.6.2 - '/administrator/popups/index3pop.php?mosConfig_sitename' Cross-Site Scripting. Author: Khashayar Fereidani |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.