input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: LabStoRe 1.5.4 - SQL Injection | This is a webapps exploit for php platform. Description: LabStoRe 1.5.4 - SQL Injection. Author: muuratsalo |
Analyze the security implications of: LabStoRe 1.5.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Openfire 4.6.0 - 'path' Stored XSS | This is a webapps exploit for jsp platform. Description: Openfire 4.6.0 - 'path' Stored XSS. Author: j5s |
Analyze the security implications of: Openfire 4.6.0 - 'path' Stored XSS | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: ContentNow 1.30 - Arbitrary File Upload / Cross-Site Scripting | This is a webapps exploit for php platform. Description: ContentNow 1.30 - Arbitrary File Upload / Cross-Site Scripting. Author: Timq |
Analyze the security implications of: ContentNow 1.30 - Arbitrary File Upload / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zoho ManageEngine ServiceDesk Plus 9.3 - 'SiteLookup.do' Cross-Site Scripting | This is a webapps exploit for java platform. Description: Zoho ManageEngine ServiceDesk Plus 9.3 - 'SiteLookup.do' Cross-Site Scripting. Author: Vingroup |
Analyze the security implications of: Zoho ManageEngine ServiceDesk Plus 9.3 - 'SiteLookup.do' Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Lazybone Studios WiFi Music 1.0 iOS - Multiple Vulnerabilities | This is a webapps exploit for ios platform. Description: Lazybone Studios WiFi Music 1.0 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Lazybone Studios WiFi Music 1.0 iOS - Multiple Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Pidgin MSN 2.6.4 - File Download | This is a remote exploit for multiple platform. Description: Pidgin MSN 2.6.4 - File Download. Author: Mathieu GASPARD |
Analyze the security implications of: Pidgin MSN 2.6.4 - File Download | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Frog CMS 0.9.5 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Frog CMS 0.9.5 - Arbitrary File Upload. Author: Javid Hussain |
Analyze the security implications of: Frog CMS 0.9.5 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DIGISOL DG-HR1400 Wireless Router - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: DIGISOL DG-HR1400 Wireless Router - Cross-Site Request Forgery. Author: Indrajith.A.N |
Analyze the security implications of: DIGISOL DG-HR1400 Wireless Router - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Google Chrome 2.0.172 - 'chrome://history/' URI Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Google Chrome 2.0.172 - 'chrome://history/' URI Cross-Site Scripting. Author: Karn Ganeshen |
Analyze the security implications of: Google Chrome 2.0.172 - 'chrome://history/' URI Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Juniper Networks JUNOS 7.1.1 - Malformed TCP Packet Denial of Service / Multiple Vulnerabilities | This is a dos exploit for hardware platform. Description: Juniper Networks JUNOS 7.1.1 - Malformed TCP Packet Denial of Service / Multiple Vulnerabilities. Author: anonymous |
Analyze the security implications of: Juniper Networks JUNOS 7.1.1 - Malformed TCP Packet Denial of Service / Multiple Vulnerabilities | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Mambo Component 'com_acnews' - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component 'com_acnews' - 'id' SQL Injection. Author: Zero Bits & Xzit3 |
Analyze the security implications of: Mambo Component 'com_acnews' - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebKit - 'WebCore::Node::nextSibling' Use-After-Free | This is a dos exploit for multiple platform. Description: WebKit - 'WebCore::Node::nextSibling' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: WebKit - 'WebCore::Node::nextSibling' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Croogo 2.0.0 - Arbitrary PHP Code Execution | This is a webapps exploit for php platform. Description: Croogo 2.0.0 - Arbitrary PHP Code Execution. Author: LiquidWorm |
Analyze the security implications of: Croogo 2.0.0 - Arbitrary PHP Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle HTML DB 1.5/1.6 - 'f?p=' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Oracle HTML DB 1.5/1.6 - 'f?p=' Cross-Site Scripting. Author: Red-Database-Security |
Analyze the security implications of: Oracle HTML DB 1.5/1.6 - 'f?p=' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Classified Ads Scrip - 'store_info.php?id' SQL Injection | This is a webapps exploit for php platform. Description: Classified Ads Scrip - 'store_info.php?id' SQL Injection. Author: Hussin X |
Analyze the security implications of: Classified Ads Scrip - 'store_info.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! / Mambo Component Comprofiler 1.0 - 'class.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component Comprofiler 1.0 - 'class.php' Remote File Inclusion. Author: Matdhule |
Analyze the security implications of: Joomla! / Mambo Component Comprofiler 1.0 - 'class.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ManageEngine AssetExplorer 6.2.0 - Cross-Site Scripting | This is a webapps exploit for java platform. Description: ManageEngine AssetExplorer 6.2.0 - Cross-Site Scripting. Author: Ismail Tasdelen |
Analyze the security implications of: ManageEngine AssetExplorer 6.2.0 - Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Sudo 1.8.14 (RHEL 5/6/7 / Ubuntu) - 'Sudoedit' Unauthorized Privilege Escalation | This is a local exploit for linux platform. Description: Sudo 1.8.14 (RHEL 5/6/7 / Ubuntu) - 'Sudoedit' Unauthorized Privilege Escalation. Author: daniel svartman |
Analyze the security implications of: Sudo 1.8.14 (RHEL 5/6/7 / Ubuntu) - 'Sudoedit' Unauthorized Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AssoCIateD CMS 1.1.3 - 'ROOT_PATH' Remote File Inclusion | This is a webapps exploit for php platform. Description: AssoCIateD CMS 1.1.3 - 'ROOT_PATH' Remote File Inclusion. Author: Kacper |
Analyze the security implications of: AssoCIateD CMS 1.1.3 - 'ROOT_PATH' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Medal of Honor Spearhead (Linux) - Server Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Medal of Honor Spearhead (Linux) - Server Remote Buffer Overflow. Author: millhouse |
Analyze the security implications of: Medal of Honor Spearhead (Linux) - Server Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Pegasi Web Server 0.2.2 - Arbitrary File Access | This is a remote exploit for linux platform. Description: Pegasi Web Server 0.2.2 - Arbitrary File Access. Author: Donato Ferrante |
Analyze the security implications of: Pegasi Web Server 0.2.2 - Arbitrary File Access | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Microsoft Internet Explorer 4/5/5.5/5.0.1 - external.NavigateAndFind() Cross-Frame | This is a remote exploit for multiple platform. Description: Microsoft Internet Explorer 4/5/5.5/5.0.1 - external.NavigateAndFind() Cross-Frame. Author: Georgi Guninski |
Analyze the security implications of: Microsoft Internet Explorer 4/5/5.5/5.0.1 - external.NavigateAndFind() Cross-Frame | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Webfroot Shoutbox < 2.32 (Apache) - Local File Inclusion / Remote Code Execution | This is a remote exploit for linux platform. Description: Webfroot Shoutbox < 2.32 (Apache) - Local File Inclusion / Remote Code Execution. Author: anonymous |
Analyze the security implications of: Webfroot Shoutbox < 2.32 (Apache) - Local File Inclusion / Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ZYXEL 3 Prestige Router - HTTP Remote Administration Configuration Reset | This is a remote exploit for hardware platform. Description: ZYXEL 3 Prestige Router - HTTP Remote Administration Configuration Reset. Author: Francisco Canela |
Analyze the security implications of: ZYXEL 3 Prestige Router - HTTP Remote Administration Configuration Reset | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Belkin G Wireless Router Firmware 5.00.12 - Remote Code Execution | This is a remote exploit for hardware platform. Description: Belkin G Wireless Router Firmware 5.00.12 - Remote Code Execution. Author: Aodrulez |
Analyze the security implications of: Belkin G Wireless Router Firmware 5.00.12 - Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ManageEngine Netflow Analyzer / IT360 - Arbitrary File Download | This is a webapps exploit for multiple platform. Description: ManageEngine Netflow Analyzer / IT360 - Arbitrary File Download. Author: Pedro Ribeiro |
Analyze the security implications of: ManageEngine Netflow Analyzer / IT360 - Arbitrary File Download | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Applicure dotDefender 4.01-3 - Persistent Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Applicure dotDefender 4.01-3 - Persistent Cross-Site Scripting. Author: EnableSecurity |
Analyze the security implications of: Applicure dotDefender 4.01-3 - Persistent Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FortiOS SSL-VPN 7.4.4 - Insufficient Session Expiration & Cookie Reuse | This is a remote exploit for multiple platform. Description: FortiOS SSL-VPN 7.4.4 - Insufficient Session Expiration & Cookie Reuse. Author: Shahid Hakim |
Analyze the security implications of: FortiOS SSL-VPN 7.4.4 - Insufficient Session Expiration & Cookie Reuse | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: HP HP-UX 10.20 / IBM AIX 4.1.5 - 'connect()' Denial of Service | This is a dos exploit for hp-ux platform. Description: HP HP-UX 10.20 / IBM AIX 4.1.5 - 'connect()' Denial of Service. Author: Cahya Wirawan |
Analyze the security implications of: HP HP-UX 10.20 / IBM AIX 4.1.5 - 'connect()' Denial of Service | This exploit targets hp-ux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: ccTiddly 1.7.4 - 'cct_base' Remote File Inclusion | This is a webapps exploit for php platform. Description: ccTiddly 1.7.4 - 'cct_base' Remote File Inclusion. Author: cOndemned |
Analyze the security implications of: ccTiddly 1.7.4 - 'cct_base' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP < 4.4.5/5.2.1 - PHP_binary Session Deserialization Information Leak | This is a local exploit for multiple platform. Description: PHP < 4.4.5/5.2.1 - PHP_binary Session Deserialization Information Leak. Author: Stefan Esser |
Analyze the security implications of: PHP < 4.4.5/5.2.1 - PHP_binary Session Deserialization Information Leak | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CoolForum 0.x - 'editpost.php' SQL Injection | This is a webapps exploit for php platform. Description: CoolForum 0.x - 'editpost.php' SQL Injection. Author: DarkFig |
Analyze the security implications of: CoolForum 0.x - 'editpost.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Optergy 2.3.0a - Username Disclosure | This is a webapps exploit for hardware platform. Description: Optergy 2.3.0a - Username Disclosure. Author: LiquidWorm |
Analyze the security implications of: Optergy 2.3.0a - Username Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.