input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: LabStoRe 1.5.4 - SQL Injection
|
This is a webapps exploit for php platform. Description: LabStoRe 1.5.4 - SQL Injection. Author: muuratsalo
|
Analyze the security implications of: LabStoRe 1.5.4 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Openfire 4.6.0 - 'path' Stored XSS
|
This is a webapps exploit for jsp platform. Description: Openfire 4.6.0 - 'path' Stored XSS. Author: j5s
|
Analyze the security implications of: Openfire 4.6.0 - 'path' Stored XSS
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: ContentNow 1.30 - Arbitrary File Upload / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: ContentNow 1.30 - Arbitrary File Upload / Cross-Site Scripting. Author: Timq
|
Analyze the security implications of: ContentNow 1.30 - Arbitrary File Upload / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Zoho ManageEngine ServiceDesk Plus 9.3 - 'SiteLookup.do' Cross-Site Scripting
|
This is a webapps exploit for java platform. Description: Zoho ManageEngine ServiceDesk Plus 9.3 - 'SiteLookup.do' Cross-Site Scripting. Author: Vingroup
|
Analyze the security implications of: Zoho ManageEngine ServiceDesk Plus 9.3 - 'SiteLookup.do' Cross-Site Scripting
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Lazybone Studios WiFi Music 1.0 iOS - Multiple Vulnerabilities
|
This is a webapps exploit for ios platform. Description: Lazybone Studios WiFi Music 1.0 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: Lazybone Studios WiFi Music 1.0 iOS - Multiple Vulnerabilities
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Pidgin MSN 2.6.4 - File Download
|
This is a remote exploit for multiple platform. Description: Pidgin MSN 2.6.4 - File Download. Author: Mathieu GASPARD
|
Analyze the security implications of: Pidgin MSN 2.6.4 - File Download
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Frog CMS 0.9.5 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Frog CMS 0.9.5 - Arbitrary File Upload. Author: Javid Hussain
|
Analyze the security implications of: Frog CMS 0.9.5 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DIGISOL DG-HR1400 Wireless Router - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: DIGISOL DG-HR1400 Wireless Router - Cross-Site Request Forgery. Author: Indrajith.A.N
|
Analyze the security implications of: DIGISOL DG-HR1400 Wireless Router - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Google Chrome 2.0.172 - 'chrome://history/' URI Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: Google Chrome 2.0.172 - 'chrome://history/' URI Cross-Site Scripting. Author: Karn Ganeshen
|
Analyze the security implications of: Google Chrome 2.0.172 - 'chrome://history/' URI Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Juniper Networks JUNOS 7.1.1 - Malformed TCP Packet Denial of Service / Multiple Vulnerabilities
|
This is a dos exploit for hardware platform. Description: Juniper Networks JUNOS 7.1.1 - Malformed TCP Packet Denial of Service / Multiple Vulnerabilities. Author: anonymous
|
Analyze the security implications of: Juniper Networks JUNOS 7.1.1 - Malformed TCP Packet Denial of Service / Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Mambo Component 'com_acnews' - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Mambo Component 'com_acnews' - 'id' SQL Injection. Author: Zero Bits & Xzit3
|
Analyze the security implications of: Mambo Component 'com_acnews' - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WebKit - 'WebCore::Node::nextSibling' Use-After-Free
|
This is a dos exploit for multiple platform. Description: WebKit - 'WebCore::Node::nextSibling' Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: WebKit - 'WebCore::Node::nextSibling' Use-After-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Croogo 2.0.0 - Arbitrary PHP Code Execution
|
This is a webapps exploit for php platform. Description: Croogo 2.0.0 - Arbitrary PHP Code Execution. Author: LiquidWorm
|
Analyze the security implications of: Croogo 2.0.0 - Arbitrary PHP Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle HTML DB 1.5/1.6 - 'f?p=' Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: Oracle HTML DB 1.5/1.6 - 'f?p=' Cross-Site Scripting. Author: Red-Database-Security
|
Analyze the security implications of: Oracle HTML DB 1.5/1.6 - 'f?p=' Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Classified Ads Scrip - 'store_info.php?id' SQL Injection
|
This is a webapps exploit for php platform. Description: Classified Ads Scrip - 'store_info.php?id' SQL Injection. Author: Hussin X
|
Analyze the security implications of: Classified Ads Scrip - 'store_info.php?id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! / Mambo Component Comprofiler 1.0 - 'class.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! / Mambo Component Comprofiler 1.0 - 'class.php' Remote File Inclusion. Author: Matdhule
|
Analyze the security implications of: Joomla! / Mambo Component Comprofiler 1.0 - 'class.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ManageEngine AssetExplorer 6.2.0 - Cross-Site Scripting
|
This is a webapps exploit for java platform. Description: ManageEngine AssetExplorer 6.2.0 - Cross-Site Scripting. Author: Ismail Tasdelen
|
Analyze the security implications of: ManageEngine AssetExplorer 6.2.0 - Cross-Site Scripting
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Sudo 1.8.14 (RHEL 5/6/7 / Ubuntu) - 'Sudoedit' Unauthorized Privilege Escalation
|
This is a local exploit for linux platform. Description: Sudo 1.8.14 (RHEL 5/6/7 / Ubuntu) - 'Sudoedit' Unauthorized Privilege Escalation. Author: daniel svartman
|
Analyze the security implications of: Sudo 1.8.14 (RHEL 5/6/7 / Ubuntu) - 'Sudoedit' Unauthorized Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AssoCIateD CMS 1.1.3 - 'ROOT_PATH' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: AssoCIateD CMS 1.1.3 - 'ROOT_PATH' Remote File Inclusion. Author: Kacper
|
Analyze the security implications of: AssoCIateD CMS 1.1.3 - 'ROOT_PATH' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Medal of Honor Spearhead (Linux) - Server Remote Buffer Overflow
|
This is a remote exploit for linux platform. Description: Medal of Honor Spearhead (Linux) - Server Remote Buffer Overflow. Author: millhouse
|
Analyze the security implications of: Medal of Honor Spearhead (Linux) - Server Remote Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Pegasi Web Server 0.2.2 - Arbitrary File Access
|
This is a remote exploit for linux platform. Description: Pegasi Web Server 0.2.2 - Arbitrary File Access. Author: Donato Ferrante
|
Analyze the security implications of: Pegasi Web Server 0.2.2 - Arbitrary File Access
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Microsoft Internet Explorer 4/5/5.5/5.0.1 - external.NavigateAndFind() Cross-Frame
|
This is a remote exploit for multiple platform. Description: Microsoft Internet Explorer 4/5/5.5/5.0.1 - external.NavigateAndFind() Cross-Frame. Author: Georgi Guninski
|
Analyze the security implications of: Microsoft Internet Explorer 4/5/5.5/5.0.1 - external.NavigateAndFind() Cross-Frame
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Webfroot Shoutbox < 2.32 (Apache) - Local File Inclusion / Remote Code Execution
|
This is a remote exploit for linux platform. Description: Webfroot Shoutbox < 2.32 (Apache) - Local File Inclusion / Remote Code Execution. Author: anonymous
|
Analyze the security implications of: Webfroot Shoutbox < 2.32 (Apache) - Local File Inclusion / Remote Code Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ZYXEL 3 Prestige Router - HTTP Remote Administration Configuration Reset
|
This is a remote exploit for hardware platform. Description: ZYXEL 3 Prestige Router - HTTP Remote Administration Configuration Reset. Author: Francisco Canela
|
Analyze the security implications of: ZYXEL 3 Prestige Router - HTTP Remote Administration Configuration Reset
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Belkin G Wireless Router Firmware 5.00.12 - Remote Code Execution
|
This is a remote exploit for hardware platform. Description: Belkin G Wireless Router Firmware 5.00.12 - Remote Code Execution. Author: Aodrulez
|
Analyze the security implications of: Belkin G Wireless Router Firmware 5.00.12 - Remote Code Execution
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ManageEngine Netflow Analyzer / IT360 - Arbitrary File Download
|
This is a webapps exploit for multiple platform. Description: ManageEngine Netflow Analyzer / IT360 - Arbitrary File Download. Author: Pedro Ribeiro
|
Analyze the security implications of: ManageEngine Netflow Analyzer / IT360 - Arbitrary File Download
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Applicure dotDefender 4.01-3 - Persistent Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: Applicure dotDefender 4.01-3 - Persistent Cross-Site Scripting. Author: EnableSecurity
|
Analyze the security implications of: Applicure dotDefender 4.01-3 - Persistent Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: FortiOS SSL-VPN 7.4.4 - Insufficient Session Expiration & Cookie Reuse
|
This is a remote exploit for multiple platform. Description: FortiOS SSL-VPN 7.4.4 - Insufficient Session Expiration & Cookie Reuse. Author: Shahid Hakim
|
Analyze the security implications of: FortiOS SSL-VPN 7.4.4 - Insufficient Session Expiration & Cookie Reuse
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: HP HP-UX 10.20 / IBM AIX 4.1.5 - 'connect()' Denial of Service
|
This is a dos exploit for hp-ux platform. Description: HP HP-UX 10.20 / IBM AIX 4.1.5 - 'connect()' Denial of Service. Author: Cahya Wirawan
|
Analyze the security implications of: HP HP-UX 10.20 / IBM AIX 4.1.5 - 'connect()' Denial of Service
|
This exploit targets hp-ux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hp-ux platform
|
What is this exploit about: ccTiddly 1.7.4 - 'cct_base' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: ccTiddly 1.7.4 - 'cct_base' Remote File Inclusion. Author: cOndemned
|
Analyze the security implications of: ccTiddly 1.7.4 - 'cct_base' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP < 4.4.5/5.2.1 - PHP_binary Session Deserialization Information Leak
|
This is a local exploit for multiple platform. Description: PHP < 4.4.5/5.2.1 - PHP_binary Session Deserialization Information Leak. Author: Stefan Esser
|
Analyze the security implications of: PHP < 4.4.5/5.2.1 - PHP_binary Session Deserialization Information Leak
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CoolForum 0.x - 'editpost.php' SQL Injection
|
This is a webapps exploit for php platform. Description: CoolForum 0.x - 'editpost.php' SQL Injection. Author: DarkFig
|
Analyze the security implications of: CoolForum 0.x - 'editpost.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Optergy 2.3.0a - Username Disclosure
|
This is a webapps exploit for hardware platform. Description: Optergy 2.3.0a - Username Disclosure. Author: LiquidWorm
|
Analyze the security implications of: Optergy 2.3.0a - Username Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.