input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Claroline 1.10 - Multiple HTML Injection Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Google Chrome - 'HTMLKeygenElement::shadowSelect()' Type Confusion
|
This is a dos exploit for multiple platform. Description: Google Chrome - 'HTMLKeygenElement::shadowSelect()' Type Confusion. Author: Google Security Research
|
Analyze the security implications of: Google Chrome - 'HTMLKeygenElement::shadowSelect()' Type Confusion
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: HIOX Random Ad 1.3 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: HIOX Random Ad 1.3 - Remote File Inclusion. Author: Ghost Hacker
|
Analyze the security implications of: HIOX Random Ad 1.3 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CyberBrau 0.9.4 - '/forum/track.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: CyberBrau 0.9.4 - '/forum/track.php' Remote File Inclusion. Author: Kw3[R]Ln
|
Analyze the security implications of: CyberBrau 0.9.4 - '/forum/track.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GSC Client 1.00 2067 - Privilege Escalation
|
This is a remote exploit for multiple platform. Description: GSC Client 1.00 2067 - Privilege Escalation. Author: Michael Gray
|
Analyze the security implications of: GSC Client 1.00 2067 - Privilege Escalation
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CyberStrong EShop 4.2 - '10browse.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: CyberStrong EShop 4.2 - '10browse.asp' SQL Injection. Author: aresu@bosen.net
|
Analyze the security implications of: CyberStrong EShop 4.2 - '10browse.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: NOKIA Siemens FlexiISN 3.1 - Multiple Authentication Bypass Vulnerabilities
|
This is a remote exploit for hardware platform. Description: NOKIA Siemens FlexiISN 3.1 - Multiple Authentication Bypass Vulnerabilities. Author: TaMBaRuS
|
Analyze the security implications of: NOKIA Siemens FlexiISN 3.1 - Multiple Authentication Bypass Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: PHP 4.x - DLOpen Memory Disclosure (1)
|
This is a local exploit for php platform. Description: PHP 4.x - DLOpen Memory Disclosure (1). Author: Andrew Griffiths
|
Analyze the security implications of: PHP 4.x - DLOpen Memory Disclosure (1)
|
This exploit targets php systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Helpdezk 1.1.1 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Helpdezk 1.1.1 - Arbitrary File Upload. Author: Ihsan Sencan
|
Analyze the security implications of: Helpdezk 1.1.1 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Memory Book 1.2 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Memory Book 1.2 - Local File Inclusion. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component Memory Book 1.2 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: glFusion 1.2.2 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: glFusion 1.2.2 - Multiple Cross-Site Scripting Vulnerabilities. Author: High-Tech Bridge SA
|
Analyze the security implications of: glFusion 1.2.2 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WebKit - WebAssembly Parsing Does not Correctly Check Section Order
|
This is a dos exploit for multiple platform. Description: WebKit - WebAssembly Parsing Does not Correctly Check Section Order. Author: Google Security Research
|
Analyze the security implications of: WebKit - WebAssembly Parsing Does not Correctly Check Section Order
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Garennes 0.6.1 - 'repertoire_config' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Garennes 0.6.1 - 'repertoire_config' Remote File Inclusion. Author: GoLd_M
|
Analyze the security implications of: Garennes 0.6.1 - 'repertoire_config' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ZTE ZXDSL 831 II Modem - Arbitrary Add Admin
|
This is a remote exploit for hardware platform. Description: ZTE ZXDSL 831 II Modem - Arbitrary Add Admin. Author: SuNHouSe2
|
Analyze the security implications of: ZTE ZXDSL 831 II Modem - Arbitrary Add Admin
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Burden 1.8 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Burden 1.8 - Authentication Bypass. Author: High-Tech Bridge SA
|
Analyze the security implications of: Burden 1.8 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Fire Soft Board 2.0.1 - Persistent Cross-Site Scripting (Admin Panel)
|
This is a webapps exploit for php platform. Description: Fire Soft Board 2.0.1 - Persistent Cross-Site Scripting (Admin Panel). Author: _jill for A-S
|
Analyze the security implications of: Fire Soft Board 2.0.1 - Persistent Cross-Site Scripting (Admin Panel)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cacti 1.2.8 - Unauthenticated Remote Code Execution
|
This is a webapps exploit for multiple platform. Description: Cacti 1.2.8 - Unauthenticated Remote Code Execution. Author: Askar
|
Analyze the security implications of: Cacti 1.2.8 - Unauthenticated Remote Code Execution
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Bs Home_Classifieds Script - SQL Injection
|
This is a webapps exploit for php platform. Description: Bs Home_Classifieds Script - SQL Injection. Author: Sid3^effects
|
Analyze the security implications of: Bs Home_Classifieds Script - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Peplink Balance Routers 7.0.0-build1904 - SQL Injection / Cross-Site Scripting / Information Disclosure
|
This is a webapps exploit for cgi platform. Description: Peplink Balance Routers 7.0.0-build1904 - SQL Injection / Cross-Site Scripting / Information Disclosure. Author: X41 D-Sec GmbH
|
Analyze the security implications of: Peplink Balance Routers 7.0.0-build1904 - SQL Injection / Cross-Site Scripting / Information Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Accellion Secure File Transfer Appliance - Multiple Command Restriction / Privilege Escalations
|
This is a local exploit for linux platform. Description: Accellion Secure File Transfer Appliance - Multiple Command Restriction / Privilege Escalations. Author: Tim Brown
|
Analyze the security implications of: Accellion Secure File Transfer Appliance - Multiple Command Restriction / Privilege Escalations
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Edimax BR6228nS/BR6228nC - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Edimax BR6228nS/BR6228nC - Multiple Vulnerabilities. Author: smash
|
Analyze the security implications of: Edimax BR6228nS/BR6228nC - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: GNU MyProxy 20030629 - Cross-Site Scripting
|
This is a remote exploit for linux platform. Description: GNU MyProxy 20030629 - Cross-Site Scripting. Author: Donato Ferrante
|
Analyze the security implications of: GNU MyProxy 20030629 - Cross-Site Scripting
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: F3Site 2.1 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: F3Site 2.1 - Remote Code Execution. Author: Kacper
|
Analyze the security implications of: F3Site 2.1 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 4.4 (Ubuntu 16.04) - 'snd_timer_user_ccallback()' Kernel Pointer Leak
|
This is a dos exploit for linux platform. Description: Linux Kernel 4.4 (Ubuntu 16.04) - 'snd_timer_user_ccallback()' Kernel Pointer Leak. Author: wally0813
|
Analyze the security implications of: Linux Kernel 4.4 (Ubuntu 16.04) - 'snd_timer_user_ccallback()' Kernel Pointer Leak
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Broadlight Residential Gateway DI3124 - Remote DNS Change
|
This is a webapps exploit for hardware platform. Description: Broadlight Residential Gateway DI3124 - Remote DNS Change. Author: Todor Donev
|
Analyze the security implications of: Broadlight Residential Gateway DI3124 - Remote DNS Change
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Fool's Workshop Owl's Workshop 1.0 - 'newmultiplechoice.php' Arbitrary File Access
|
This is a webapps exploit for php platform. Description: Fool's Workshop Owl's Workshop 1.0 - 'newmultiplechoice.php' Arbitrary File Access. Author: G00db0y
|
Analyze the security implications of: Fool's Workshop Owl's Workshop 1.0 - 'newmultiplechoice.php' Arbitrary File Access
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mafia Moblog 6 - 'Big.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Mafia Moblog 6 - 'Big.php' Remote File Inclusion. Author: sh3ll
|
Analyze the security implications of: Mafia Moblog 6 - 'Big.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Microstrategy Web 7 - Cross-Site Scripting / Directory Traversal
|
This is a webapps exploit for jsp platform. Description: Microstrategy Web 7 - Cross-Site Scripting / Directory Traversal. Author: Rafael Pedrero
|
Analyze the security implications of: Microstrategy Web 7 - Cross-Site Scripting / Directory Traversal
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Linksys WRT54 Access Point - 'apply.cgi' Remote Buffer Overflow (Metasploit)
|
This is a remote exploit for hardware platform. Description: Linksys WRT54 Access Point - 'apply.cgi' Remote Buffer Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: Linksys WRT54 Access Point - 'apply.cgi' Remote Buffer Overflow (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ProjectSend - Arbitrary File Upload (Metasploit)
|
This is a remote exploit for php platform. Description: ProjectSend - Arbitrary File Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: ProjectSend - Arbitrary File Upload (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Fullaspsite ASP Hosting Site - 'listmain.asp?cat' SQL Injection
|
This is a webapps exploit for asp platform. Description: Fullaspsite ASP Hosting Site - 'listmain.asp?cat' SQL Injection. Author: ShaFuck31
|
Analyze the security implications of: Fullaspsite ASP Hosting Site - 'listmain.asp?cat' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Car Portal CMS 3.0 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Car Portal CMS 3.0 - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: Car Portal CMS 3.0 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ASPapp Knowledge Base - 'CatId' SQL Injection (2)
|
This is a webapps exploit for php platform. Description: ASPapp Knowledge Base - 'CatId' SQL Injection (2). Author: Crackers_Child
|
Analyze the security implications of: ASPapp Knowledge Base - 'CatId' SQL Injection (2)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Forum Rank System 6 - 'settings['locale']' Multiple Local File Inclusions
|
This is a webapps exploit for php platform. Description: Forum Rank System 6 - 'settings['locale']' Multiple Local File Inclusions. Author: Matrix86
|
Analyze the security implications of: Forum Rank System 6 - 'settings['locale']' Multiple Local File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.