input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: KDE Konqueror 3.x - Embedded Image URI Obfuscation | This is a remote exploit for linux platform. Description: KDE Konqueror 3.x - Embedded Image URI Obfuscation. Author: Drew Copley |
Analyze the security implications of: KDE Konqueror 3.x - Embedded Image URI Obfuscation | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: wolfSSL 3.10.2 - x509 Certificate Text Parsing Off-by-One | This is a dos exploit for multiple platform. Description: wolfSSL 3.10.2 - x509 Certificate Text Parsing Off-by-One. Author: Talos |
Analyze the security implications of: wolfSSL 3.10.2 - x509 Certificate Text Parsing Off-by-One | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CubeCart 3.0.6 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: CubeCart 3.0.6 - Cross-Site Request Forgery (Add Admin). Author: P0C T34M |
Analyze the security implications of: CubeCart 3.0.6 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sun Java System Identity Manager 6.0/7.0/7.1 - '/idm/login.jsp' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for jsp platform. Description: Sun Java System Identity Manager 6.0/7.0/7.1 - '/idm/login.jsp' Multiple Cross-Site Scripting Vulnerabilities. Author: Jan Fry & Adrian Pastor |
Analyze the security implications of: Sun Java System Identity Manager 6.0/7.0/7.1 - '/idm/login.jsp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Apple iOS Safari - 'decodeURIComponent' Remote Crash | This is a dos exploit for hardware platform. Description: Apple iOS Safari - 'decodeURIComponent' Remote Crash. Author: Yakir Wizman |
Analyze the security implications of: Apple iOS Safari - 'decodeURIComponent' Remote Crash | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Divine Content Server 5.0 - Error Page Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Divine Content Server 5.0 - Error Page Cross-Site Scripting. Author: valgasu |
Analyze the security implications of: Divine Content Server 5.0 - Error Page Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Kados R10 GreenBee - 'release_id' SQL Injection | This is a webapps exploit for php platform. Description: Kados R10 GreenBee - 'release_id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Kados R10 GreenBee - 'release_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Expinion.net Member Management System 2.1 - 'resend.asp?ID' SQL Injection | This is a webapps exploit for asp platform. Description: Expinion.net Member Management System 2.1 - 'resend.asp?ID' SQL Injection. Author: Manuel Lopez |
Analyze the security implications of: Expinion.net Member Management System 2.1 - 'resend.asp?ID' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: People Can Fly Painkiller Gamespy 1.3 - CD-Key Hash Remote Buffer Overflow | This is a remote exploit for multiple platform. Description: People Can Fly Painkiller Gamespy 1.3 - CD-Key Hash Remote Buffer Overflow. Author: Luigi Auriemma |
Analyze the security implications of: People Can Fly Painkiller Gamespy 1.3 - CD-Key Hash Remote Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Symantec RAR Decomposer Engine (Multiple Products) - Out-of-Bounds Read / Out-of-Bounds Write | This is a dos exploit for multiple platform. Description: Symantec RAR Decomposer Engine (Multiple Products) - Out-of-Bounds Read / Out-of-Bounds Write. Author: Google Security Research |
Analyze the security implications of: Symantec RAR Decomposer Engine (Multiple Products) - Out-of-Bounds Read / Out-of-Bounds Write | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Boom CMS v8.0.7 - Cross Site Scripting | This is a webapps exploit for php platform. Description: Boom CMS v8.0.7 - Cross Site Scripting. Author: Vulnerability-Lab |
Analyze the security implications of: Boom CMS v8.0.7 - Cross Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WIMAX LX350P(WIXFMR-108) - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: WIMAX LX350P(WIXFMR-108) - Multiple Vulnerabilities. Author: alimp5 |
Analyze the security implications of: WIMAX LX350P(WIXFMR-108) - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Car Rental Management System 1.0 - Remote Code Execution (Authenticated) | This is a webapps exploit for php platform. Description: Car Rental Management System 1.0 - Remote Code Execution (Authenticated). Author: Mehmet Kelepçe |
Analyze the security implications of: Car Rental Management System 1.0 - Remote Code Execution (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 11in1 CMS 1.0.1 - 'do.php' CRLF Injection | This is a webapps exploit for php platform. Description: 11in1 CMS 1.0.1 - 'do.php' CRLF Injection. Author: LiquidWorm |
Analyze the security implications of: 11in1 CMS 1.0.1 - 'do.php' CRLF Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Miyabi CGI Tools 1.02 - 'index.pl' Remote Command Execution | This is a webapps exploit for cgi platform. Description: Miyabi CGI Tools 1.02 - 'index.pl' Remote Command Execution. Author: Marshall Whittaker |
Analyze the security implications of: Miyabi CGI Tools 1.02 - 'index.pl' Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Coship RT3052 Wireless Router - Persistent Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Coship RT3052 Wireless Router - Persistent Cross-Site Scripting. Author: Sayan Chatterjee |
Analyze the security implications of: Coship RT3052 Wireless Router - Persistent Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AJ Auction - Authentication Bypass | This is a webapps exploit for php platform. Description: AJ Auction - Authentication Bypass. Author: G4N0K |
Analyze the security implications of: AJ Auction - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Claroline 1.8.0 rc1 - 'import.lib.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Claroline 1.8.0 rc1 - 'import.lib.php' Remote File Inclusion. Author: k1tk4t |
Analyze the security implications of: Claroline 1.8.0 rc1 - 'import.lib.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Drumbeat CMS 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Drumbeat CMS 1.0 - SQL Injection. Author: Sora |
Analyze the security implications of: Drumbeat CMS 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alkacon OpenCMS 7.0.3 - 'users_list.jsp' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for jsp platform. Description: Alkacon OpenCMS 7.0.3 - 'users_list.jsp' Multiple Cross-Site Scripting Vulnerabilities. Author: nnposter |
Analyze the security implications of: Alkacon OpenCMS 7.0.3 - 'users_list.jsp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Itech Video Sharing Script 4.94 - 'v' SQL Injection | This is a webapps exploit for php platform. Description: Itech Video Sharing Script 4.94 - 'v' SQL Injection. Author: Kaan KAMIS |
Analyze the security implications of: Itech Video Sharing Script 4.94 - 'v' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Annuaire - 'index.php?id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Annuaire - 'index.php?id' SQL Injection. Author: Ashiyane Digital Security Team |
Analyze the security implications of: Joomla! Component Annuaire - 'index.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KORA 2.7.0 - 'cid' SQL Injection | This is a webapps exploit for php platform. Description: KORA 2.7.0 - 'cid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: KORA 2.7.0 - 'cid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: aptdaemon < 1.1.1 - File Existence Disclosure | This is a local exploit for linux platform. Description: aptdaemon < 1.1.1 - File Existence Disclosure. Author: Vaisha Bernard |
Analyze the security implications of: aptdaemon < 1.1.1 - File Existence Disclosure | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ZTE - Change Admin Password | This is a webapps exploit for cgi platform. Description: ZTE - Change Admin Password. Author: Nuevo Asesino |
Analyze the security implications of: ZTE - Change Admin Password | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: RSVG 2.40.13 / 2.42.2 - '.svg' Buffer Overflow | This is a dos exploit for multiple platform. Description: RSVG 2.40.13 / 2.42.2 - '.svg' Buffer Overflow. Author: Hamm3r.py |
Analyze the security implications of: RSVG 2.40.13 / 2.42.2 - '.svg' Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Kayako Fusion - 'download.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Kayako Fusion - 'download.php' Cross-Site Scripting. Author: High-Tech Bridge |
Analyze the security implications of: Kayako Fusion - 'download.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: F5 BIG-IP Application Security Manager 9.4.3 - 'report_type' Cross-Site Scripting | This is a webapps exploit for php platform. Description: F5 BIG-IP Application Security Manager 9.4.3 - 'report_type' Cross-Site Scripting. Author: nnposter |
Analyze the security implications of: F5 BIG-IP Application Security Manager 9.4.3 - 'report_type' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ownCloud 4.0.x/4.5.x - 'upload.php?Filename' Remote Code Execution | This is a webapps exploit for multiple platform. Description: ownCloud 4.0.x/4.5.x - 'upload.php?Filename' Remote Code Execution. Author: Portcullis |
Analyze the security implications of: ownCloud 4.0.x/4.5.x - 'upload.php?Filename' Remote Code Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mozilla Firefox < 39.03 - 'pdf.js' Same Origin Policy | This is a local exploit for multiple platform. Description: Mozilla Firefox < 39.03 - 'pdf.js' Same Origin Policy. Author: Tantaryu MING |
Analyze the security implications of: Mozilla Firefox < 39.03 - 'pdf.js' Same Origin Policy | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: iFunBox Free 1.1 iOS - Local File Inclusion | This is a webapps exploit for ios platform. Description: iFunBox Free 1.1 iOS - Local File Inclusion. Author: Vulnerability-Lab |
Analyze the security implications of: iFunBox Free 1.1 iOS - Local File Inclusion | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: SGI IRIX 6.5.28 - 'runpriv' Design Error | This is a local exploit for irix platform. Description: SGI IRIX 6.5.28 - 'runpriv' Design Error. Author: anonymous |
Analyze the security implications of: SGI IRIX 6.5.28 - 'runpriv' Design Error | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: Built2Go PHP Movie Review 2B - Remote File Inclusion | This is a webapps exploit for php platform. Description: Built2Go PHP Movie Review 2B - Remote File Inclusion. Author: Camille Myers |
Analyze the security implications of: Built2Go PHP Movie Review 2B - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.