input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ownCloud 10.3.0 stable - Cross-Site Request Forgery | This is a webapps exploit for linux platform. Description: ownCloud 10.3.0 stable - Cross-Site Request Forgery. Author: Ozer Goker |
Analyze the security implications of: ownCloud 10.3.0 stable - Cross-Site Request Forgery | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Horde IMP Webmail 4.3.7 - 'fetchmailprefs.php' HTML Injection | This is a webapps exploit for php platform. Description: Horde IMP Webmail 4.3.7 - 'fetchmailprefs.php' HTML Injection. Author: Moritz Naumann |
Analyze the security implications of: Horde IMP Webmail 4.3.7 - 'fetchmailprefs.php' HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Petrol Pump Management Software v1.0 - Remote Code Execution via File Upload | This is a remote exploit for php platform. Description: Petrol Pump Management Software v1.0 - Remote Code Execution via File Upload. Author: Shubham Pandey |
Analyze the security implications of: Petrol Pump Management Software v1.0 - Remote Code Execution via File Upload | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sepcity Shopping Mall - SQL Injection | This is a webapps exploit for asp platform. Description: Sepcity Shopping Mall - SQL Injection. Author: Osmanizim |
Analyze the security implications of: Sepcity Shopping Mall - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Oracle Database Server 8.1.7/9.0.x - ctxsys.driload Access Validation | This is a remote exploit for multiple platform. Description: Oracle Database Server 8.1.7/9.0.x - ctxsys.driload Access Validation. Author: Alexander Kornbrust |
Analyze the security implications of: Oracle Database Server 8.1.7/9.0.x - ctxsys.driload Access Validation | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GLPI 0.83.8 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: GLPI 0.83.8 - Multiple Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: GLPI 0.83.8 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Palo Alto Networks PanOS - appweb3 Stack Buffer Overflow | This is a dos exploit for linux platform. Description: Palo Alto Networks PanOS - appweb3 Stack Buffer Overflow. Author: Google Security Research |
Analyze the security implications of: Palo Alto Networks PanOS - appweb3 Stack Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Affiliate Market 0.1 Beta - Cross-Site Scripting / SQL Injection | This is a webapps exploit for php platform. Description: Affiliate Market 0.1 Beta - Cross-Site Scripting / SQL Injection. Author: Khashayar Fereidani |
Analyze the security implications of: Affiliate Market 0.1 Beta - Cross-Site Scripting / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Plugin JD-WordPress 2.0 RC2 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Plugin JD-WordPress 2.0 RC2 - Remote File Inclusion. Author: Don Tukulesto |
Analyze the security implications of: Joomla! Plugin JD-WordPress 2.0 RC2 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BaconMap 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: BaconMap 1.0 - SQL Injection. Author: John Leitch |
Analyze the security implications of: BaconMap 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNU/Linux mbse-bbs 0.70.0 - Local Buffer Overflow | This is a local exploit for linux platform. Description: GNU/Linux mbse-bbs 0.70.0 - Local Buffer Overflow. Author: prdelka |
Analyze the security implications of: GNU/Linux mbse-bbs 0.70.0 - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: INDEXU 5.0.1 - 'base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: INDEXU 5.0.1 - 'base_path' Remote File Inclusion. Author: K-159 |
Analyze the security implications of: INDEXU 5.0.1 - 'base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Axent Raptor 6.0 - Denial of Service | This is a dos exploit for bsd platform. Description: Axent Raptor 6.0 - Denial of Service. Author: MSG.Net |
Analyze the security implications of: Axent Raptor 6.0 - Denial of Service | This exploit targets bsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Interscan Web Security Virtual Appliance 5.0 - Arbitrary File Download | This is a webapps exploit for multiple platform. Description: Interscan Web Security Virtual Appliance 5.0 - Arbitrary File Download. Author: Ivan Huertas |
Analyze the security implications of: Interscan Web Security Virtual Appliance 5.0 - Arbitrary File Download | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Security IP Camera Star Vision DVR - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Security IP Camera Star Vision DVR - Authentication Bypass. Author: Meisam Monsef |
Analyze the security implications of: Security IP Camera Star Vision DVR - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apple Safari 4 - 'feeds:' URI Null Pointer Dereference Remote Denial of Service | This is a dos exploit for osx platform. Description: Apple Safari 4 - 'feeds:' URI Null Pointer Dereference Remote Denial of Service. Author: Trancer |
Analyze the security implications of: Apple Safari 4 - 'feeds:' URI Null Pointer Dereference Remote Denial of Service | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: InfraPower PPS-02-S Q213V1 - Authentication Bypass | This is a webapps exploit for php platform. Description: InfraPower PPS-02-S Q213V1 - Authentication Bypass. Author: LiquidWorm |
Analyze the security implications of: InfraPower PPS-02-S Q213V1 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jon Howell Faq-O-Matic 2.7 - Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Jon Howell Faq-O-Matic 2.7 - Cross-Site Scripting. Author: BrainRawt |
Analyze the security implications of: Jon Howell Faq-O-Matic 2.7 - Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Lycos HTMLGear - guestGear CSS HTML Injection | This is a webapps exploit for cgi platform. Description: Lycos HTMLGear - guestGear CSS HTML Injection. Author: Matthew Murphy |
Analyze the security implications of: Lycos HTMLGear - guestGear CSS HTML Injection | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: CISCO Small Business 200 / 300 / 500 Switches - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: CISCO Small Business 200 / 300 / 500 Switches - Multiple Vulnerabilities. Author: Ramikan |
Analyze the security implications of: CISCO Small Business 200 / 300 / 500 Switches - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: XMail 1.21 - '-t' Command Line Option Local Buffer Overflow / Local Privilege Escalation | This is a local exploit for linux platform. Description: XMail 1.21 - '-t' Command Line Option Local Buffer Overflow / Local Privilege Escalation. Author: qaaz |
Analyze the security implications of: XMail 1.21 - '-t' Command Line Option Local Buffer Overflow / Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Thomson SpeedTouch 500 Series - LocalNetwork Page 'name' Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Thomson SpeedTouch 500 Series - LocalNetwork Page 'name' Cross-Site Scripting. Author: Preben Nylokken |
Analyze the security implications of: Thomson SpeedTouch 500 Series - LocalNetwork Page 'name' Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: H-Sphere 2.5.1 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for java platform. Description: H-Sphere 2.5.1 - Multiple Cross-Site Scripting Vulnerabilities. Author: r0t |
Analyze the security implications of: H-Sphere 2.5.1 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Content-Builder (CMS) 0.7.2 - Multiple Include Vulnerabilities | This is a webapps exploit for php platform. Description: Content-Builder (CMS) 0.7.2 - Multiple Include Vulnerabilities. Author: Kacper |
Analyze the security implications of: Content-Builder (CMS) 0.7.2 - Multiple Include Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Viola DVR VIO-4/1000 - Multiple Directory Traversal Vulnerabilities | This is a remote exploit for linux platform. Description: Viola DVR VIO-4/1000 - Multiple Directory Traversal Vulnerabilities. Author: QSecure |
Analyze the security implications of: Viola DVR VIO-4/1000 - Multiple Directory Traversal Vulnerabilities | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Easy Message Board - Remote Command Execution | This is a webapps exploit for cgi platform. Description: Easy Message Board - Remote Command Execution. Author: SoulBlack Group |
Analyze the security implications of: Easy Message Board - Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! Component com_gallery_wd - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_gallery_wd - SQL Injection. Author: CrashBandicot |
Analyze the security implications of: Joomla! Component com_gallery_wd - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FdWeB Espace Membre 2.01 - 'path' Remote File Inclusion | This is a webapps exploit for php platform. Description: FdWeB Espace Membre 2.01 - 'path' Remote File Inclusion. Author: ajann |
Analyze the security implications of: FdWeB Espace Membre 2.01 - 'path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_jomestate - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_jomestate - Remote File Inclusion. Author: Sid3^effects |
Analyze the security implications of: Joomla! Component com_jomestate - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM Directory Server 4.1 - Web Administration Interface Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: IBM Directory Server 4.1 - Web Administration Interface Cross-Site Scripting. Author: Oliver Karow |
Analyze the security implications of: IBM Directory Server 4.1 - Web Administration Interface Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: PLD Software Ebola 0.1.4 - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: PLD Software Ebola 0.1.4 - Remote Buffer Overflow. Author: c0wboy |
Analyze the security implications of: PLD Software Ebola 0.1.4 - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Belden Garrettcom 6K/10K Switches - Authentication Bypass / Memory Corruption | This is a webapps exploit for php platform. Description: Belden Garrettcom 6K/10K Switches - Authentication Bypass / Memory Corruption. Author: David Tomaschik |
Analyze the security implications of: Belden Garrettcom 6K/10K Switches - Authentication Bypass / Memory Corruption | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Module Weather - 'absolute_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Module Weather - 'absolute_path' Remote File Inclusion. Author: Cold Zero |
Analyze the security implications of: Mambo Module Weather - 'absolute_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.