input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CubeCart 3.0.x - '/admin/header.inc.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: CubeCart 3.0.x - '/admin/header.inc.php' Multiple Cross-Site Scripting Vulnerabilities. Author: HACKERS PAL |
Analyze the security implications of: CubeCart 3.0.x - '/admin/header.inc.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AirTies-4450 - Unauthorized Remote Reboot (Denial of Service) | This is a dos exploit for hardware platform. Description: AirTies-4450 - Unauthorized Remote Reboot (Denial of Service). Author: rigan |
Analyze the security implications of: AirTies-4450 - Unauthorized Remote Reboot (Denial of Service) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: LibTIFF 3.8.2 - 'LZWDecodeCompat()' Remote Buffer Underflow | This is a dos exploit for linux platform. Description: LibTIFF 3.8.2 - 'LZWDecodeCompat()' Remote Buffer Underflow. Author: wololo |
Analyze the security implications of: LibTIFF 3.8.2 - 'LZWDecodeCompat()' Remote Buffer Underflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: High Performance Computers Solutions Shopping Cart - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: High Performance Computers Solutions Shopping Cart - Multiple SQL Injections. Author: laurent gaffie |
Analyze the security implications of: High Performance Computers Solutions Shopping Cart - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: CarLine Forum Russian Board 4.2 - 'menu_tema.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: CarLine Forum Russian Board 4.2 - 'menu_tema.php' Multiple Cross-Site Scripting Vulnerabilities. Author: 1dt.w0lf |
Analyze the security implications of: CarLine Forum Russian Board 4.2 - 'menu_tema.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Raisecom XPON ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 - Remote Code Execution | This is a webapps exploit for hardware platform. Description: Raisecom XPON ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 - Remote Code Execution. Author: JameelNabbo |
Analyze the security implications of: Raisecom XPON ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Friendly-Tech FriendlyTR69 CPE Remote Management 2.8.9 - SQL Injection | This is a webapps exploit for hardware platform. Description: Friendly-Tech FriendlyTR69 CPE Remote Management 2.8.9 - SQL Injection. Author: Yaniv Miron |
Analyze the security implications of: Friendly-Tech FriendlyTR69 CPE Remote Management 2.8.9 - SQL Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GFHost PHP GMail - Remote Command Execution | This is a webapps exploit for php platform. Description: GFHost PHP GMail - Remote Command Execution. Author: spabam |
Analyze the security implications of: GFHost PHP GMail - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Opera Web Browser 7.54 - 'KDE KFMCLIENT' Remote Command Execution | This is a dos exploit for linux platform. Description: Opera Web Browser 7.54 - 'KDE KFMCLIENT' Remote Command Execution. Author: Giovanni Delvecchio |
Analyze the security implications of: Opera Web Browser 7.54 - 'KDE KFMCLIENT' Remote Command Execution | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: NTPsec 1.1.2 - 'ctl_getitem' Out-of-Bounds Read (PoC) | This is a dos exploit for linux platform. Description: NTPsec 1.1.2 - 'ctl_getitem' Out-of-Bounds Read (PoC). Author: Magnus Klaaborg Stubman |
Analyze the security implications of: NTPsec 1.1.2 - 'ctl_getitem' Out-of-Bounds Read (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache Struts 2.0 - 'XSLTResult.java' Arbitrary File Upload | This is a webapps exploit for java platform. Description: Apache Struts 2.0 - 'XSLTResult.java' Arbitrary File Upload. Author: voidloafer |
Analyze the security implications of: Apache Struts 2.0 - 'XSLTResult.java' Arbitrary File Upload | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Ifenslave 0.0.7 - Argument Local Buffer Overflow (1) | This is a local exploit for linux platform. Description: Ifenslave 0.0.7 - Argument Local Buffer Overflow (1). Author: jlanthea |
Analyze the security implications of: Ifenslave 0.0.7 - Argument Local Buffer Overflow (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Ocean12 ASP Calendar Manager 1.0 - Authentication Bypass | This is a webapps exploit for asp platform. Description: Ocean12 ASP Calendar Manager 1.0 - Authentication Bypass. Author: syst3m_f4ult |
Analyze the security implications of: Ocean12 ASP Calendar Manager 1.0 - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Jumi - 'fileid' Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Jumi - 'fileid' Blind SQL Injection. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component Jumi - 'fileid' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gnome Evolution 2.x - GnuPG Arbitrary Content Injection | This is a remote exploit for linux platform. Description: Gnome Evolution 2.x - GnuPG Arbitrary Content Injection. Author: Gerardo Richarte |
Analyze the security implications of: Gnome Evolution 2.x - GnuPG Arbitrary Content Injection | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Transmission - Integer Overflows Parsing Torrent Files | This is a dos exploit for multiple platform. Description: Transmission - Integer Overflows Parsing Torrent Files. Author: Google Security Research |
Analyze the security implications of: Transmission - Integer Overflows Parsing Torrent Files | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GNU Mailman 2.0.x - Admin Login Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: GNU Mailman 2.0.x - Admin Login Cross-Site Scripting. Author: office |
Analyze the security implications of: GNU Mailman 2.0.x - Admin Login Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: BinGo News 3.01 - 'bnrep' Remote File Inclusion | This is a webapps exploit for php platform. Description: BinGo News 3.01 - 'bnrep' Remote File Inclusion. Author: SHiKaA |
Analyze the security implications of: BinGo News 3.01 - 'bnrep' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CartWIZ 1.10 - 'ProductCatalogSubCats.asp' SQL Injection | This is a webapps exploit for asp platform. Description: CartWIZ 1.10 - 'ProductCatalogSubCats.asp' SQL Injection. Author: Dcrab |
Analyze the security implications of: CartWIZ 1.10 - 'ProductCatalogSubCats.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Skia and Firefox - Integer Overflow in SkTDArray Leading to Out-of-Bounds Write | This is a dos exploit for multiple platform. Description: Skia and Firefox - Integer Overflow in SkTDArray Leading to Out-of-Bounds Write. Author: Google Security Research |
Analyze the security implications of: Skia and Firefox - Integer Overflow in SkTDArray Leading to Out-of-Bounds Write | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mahara 1.4.1 - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities | This is a webapps exploit for php platform. Description: Mahara 1.4.1 - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities. Author: anonymous |
Analyze the security implications of: Mahara 1.4.1 - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GWScripts News Publisher 1.0 - 'author.file' Write | This is a remote exploit for cgi platform. Description: GWScripts News Publisher 1.0 - 'author.file' Write. Author: n30 |
Analyze the security implications of: GWScripts News Publisher 1.0 - 'author.file' Write | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: OTRS 2.0 - Login Function 'User' SQL Injection | This is a webapps exploit for cgi platform. Description: OTRS 2.0 - Login Function 'User' SQL Injection. Author: Moritz Naumann |
Analyze the security implications of: OTRS 2.0 - Login Function 'User' SQL Injection | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: EasyVillaRentalSite - 'id' SQL Injection | This is a webapps exploit for php platform. Description: EasyVillaRentalSite - 'id' SQL Injection. Author: BazOka-HaCkEr |
Analyze the security implications of: EasyVillaRentalSite - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX / iOS - SUID Binary Logic Error Kernel Code Execution | This is a local exploit for multiple platform. Description: Apple Mac OSX / iOS - SUID Binary Logic Error Kernel Code Execution. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX / iOS - SUID Binary Logic Error Kernel Code Execution | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Jstore - 'Controller' Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Jstore - 'Controller' Local File Inclusion. Author: jos_ali_joe |
Analyze the security implications of: Joomla! Component Jstore - 'Controller' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bs Counter 2.5.3 - 'page' SQL Injection | This is a webapps exploit for php platform. Description: Bs Counter 2.5.3 - 'page' SQL Injection. Author: Bgh7 |
Analyze the security implications of: Bs Counter 2.5.3 - 'page' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Foing 0.7.0 - 'phpBB' Remote File Inclusion | This is a webapps exploit for php platform. Description: Foing 0.7.0 - 'phpBB' Remote File Inclusion. Author: Kurdish Security |
Analyze the security implications of: Foing 0.7.0 - 'phpBB' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RedDot CMS 7.5 - 'LngId' SQL Injection | This is a webapps exploit for asp platform. Description: RedDot CMS 7.5 - 'LngId' SQL Injection. Author: IRM Plc. |
Analyze the security implications of: RedDot CMS 7.5 - 'LngId' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: eNdonesia 8.2/8.3 - 'Mod' Cross-Site Scripting | This is a webapps exploit for php platform. Description: eNdonesia 8.2/8.3 - 'Mod' Cross-Site Scripting. Author: Bahaa Naamneh |
Analyze the security implications of: eNdonesia 8.2/8.3 - 'Mod' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 4 - Unserialize() ZVAL Reference Counter Overflow (Cookie) (Metasploit) | This is a remote exploit for multiple platform. Description: PHP 4 - Unserialize() ZVAL Reference Counter Overflow (Cookie) (Metasploit). Author: Metasploit |
Analyze the security implications of: PHP 4 - Unserialize() ZVAL Reference Counter Overflow (Cookie) (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Subex Fms 7.4 - SQL Injection | This is a webapps exploit for multiple platform. Description: Subex Fms 7.4 - SQL Injection. Author: Anastasios Monachos |
Analyze the security implications of: Subex Fms 7.4 - SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BLOG 1.55B - 'image_upload.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: BLOG 1.55B - 'image_upload.php' Arbitrary File Upload. Author: Piker |
Analyze the security implications of: BLOG 1.55B - 'image_upload.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.