input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Claroline 1.10 - Multiple HTML Injection Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Chrome - 'HTMLKeygenElement::shadowSelect()' Type Confusion | This is a dos exploit for multiple platform. Description: Google Chrome - 'HTMLKeygenElement::shadowSelect()' Type Confusion. Author: Google Security Research |
Analyze the security implications of: Google Chrome - 'HTMLKeygenElement::shadowSelect()' Type Confusion | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: HIOX Random Ad 1.3 - Remote File Inclusion | This is a webapps exploit for php platform. Description: HIOX Random Ad 1.3 - Remote File Inclusion. Author: Ghost Hacker |
Analyze the security implications of: HIOX Random Ad 1.3 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CyberBrau 0.9.4 - '/forum/track.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: CyberBrau 0.9.4 - '/forum/track.php' Remote File Inclusion. Author: Kw3[R]Ln |
Analyze the security implications of: CyberBrau 0.9.4 - '/forum/track.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GSC Client 1.00 2067 - Privilege Escalation | This is a remote exploit for multiple platform. Description: GSC Client 1.00 2067 - Privilege Escalation. Author: Michael Gray |
Analyze the security implications of: GSC Client 1.00 2067 - Privilege Escalation | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CyberStrong EShop 4.2 - '10browse.asp' SQL Injection | This is a webapps exploit for asp platform. Description: CyberStrong EShop 4.2 - '10browse.asp' SQL Injection. Author: aresu@bosen.net |
Analyze the security implications of: CyberStrong EShop 4.2 - '10browse.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: NOKIA Siemens FlexiISN 3.1 - Multiple Authentication Bypass Vulnerabilities | This is a remote exploit for hardware platform. Description: NOKIA Siemens FlexiISN 3.1 - Multiple Authentication Bypass Vulnerabilities. Author: TaMBaRuS |
Analyze the security implications of: NOKIA Siemens FlexiISN 3.1 - Multiple Authentication Bypass Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PHP 4.x - DLOpen Memory Disclosure (1) | This is a local exploit for php platform. Description: PHP 4.x - DLOpen Memory Disclosure (1). Author: Andrew Griffiths |
Analyze the security implications of: PHP 4.x - DLOpen Memory Disclosure (1) | This exploit targets php systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Helpdezk 1.1.1 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Helpdezk 1.1.1 - Arbitrary File Upload. Author: Ihsan Sencan |
Analyze the security implications of: Helpdezk 1.1.1 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Memory Book 1.2 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Memory Book 1.2 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Memory Book 1.2 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: glFusion 1.2.2 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: glFusion 1.2.2 - Multiple Cross-Site Scripting Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: glFusion 1.2.2 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebKit - WebAssembly Parsing Does not Correctly Check Section Order | This is a dos exploit for multiple platform. Description: WebKit - WebAssembly Parsing Does not Correctly Check Section Order. Author: Google Security Research |
Analyze the security implications of: WebKit - WebAssembly Parsing Does not Correctly Check Section Order | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Garennes 0.6.1 - 'repertoire_config' Remote File Inclusion | This is a webapps exploit for php platform. Description: Garennes 0.6.1 - 'repertoire_config' Remote File Inclusion. Author: GoLd_M |
Analyze the security implications of: Garennes 0.6.1 - 'repertoire_config' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ZTE ZXDSL 831 II Modem - Arbitrary Add Admin | This is a remote exploit for hardware platform. Description: ZTE ZXDSL 831 II Modem - Arbitrary Add Admin. Author: SuNHouSe2 |
Analyze the security implications of: ZTE ZXDSL 831 II Modem - Arbitrary Add Admin | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Burden 1.8 - Authentication Bypass | This is a webapps exploit for php platform. Description: Burden 1.8 - Authentication Bypass. Author: High-Tech Bridge SA |
Analyze the security implications of: Burden 1.8 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fire Soft Board 2.0.1 - Persistent Cross-Site Scripting (Admin Panel) | This is a webapps exploit for php platform. Description: Fire Soft Board 2.0.1 - Persistent Cross-Site Scripting (Admin Panel). Author: _jill for A-S |
Analyze the security implications of: Fire Soft Board 2.0.1 - Persistent Cross-Site Scripting (Admin Panel) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cacti 1.2.8 - Unauthenticated Remote Code Execution | This is a webapps exploit for multiple platform. Description: Cacti 1.2.8 - Unauthenticated Remote Code Execution. Author: Askar |
Analyze the security implications of: Cacti 1.2.8 - Unauthenticated Remote Code Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Bs Home_Classifieds Script - SQL Injection | This is a webapps exploit for php platform. Description: Bs Home_Classifieds Script - SQL Injection. Author: Sid3^effects |
Analyze the security implications of: Bs Home_Classifieds Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Peplink Balance Routers 7.0.0-build1904 - SQL Injection / Cross-Site Scripting / Information Disclosure | This is a webapps exploit for cgi platform. Description: Peplink Balance Routers 7.0.0-build1904 - SQL Injection / Cross-Site Scripting / Information Disclosure. Author: X41 D-Sec GmbH |
Analyze the security implications of: Peplink Balance Routers 7.0.0-build1904 - SQL Injection / Cross-Site Scripting / Information Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Accellion Secure File Transfer Appliance - Multiple Command Restriction / Privilege Escalations | This is a local exploit for linux platform. Description: Accellion Secure File Transfer Appliance - Multiple Command Restriction / Privilege Escalations. Author: Tim Brown |
Analyze the security implications of: Accellion Secure File Transfer Appliance - Multiple Command Restriction / Privilege Escalations | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Edimax BR6228nS/BR6228nC - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Edimax BR6228nS/BR6228nC - Multiple Vulnerabilities. Author: smash |
Analyze the security implications of: Edimax BR6228nS/BR6228nC - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GNU MyProxy 20030629 - Cross-Site Scripting | This is a remote exploit for linux platform. Description: GNU MyProxy 20030629 - Cross-Site Scripting. Author: Donato Ferrante |
Analyze the security implications of: GNU MyProxy 20030629 - Cross-Site Scripting | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: F3Site 2.1 - Remote Code Execution | This is a webapps exploit for php platform. Description: F3Site 2.1 - Remote Code Execution. Author: Kacper |
Analyze the security implications of: F3Site 2.1 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 4.4 (Ubuntu 16.04) - 'snd_timer_user_ccallback()' Kernel Pointer Leak | This is a dos exploit for linux platform. Description: Linux Kernel 4.4 (Ubuntu 16.04) - 'snd_timer_user_ccallback()' Kernel Pointer Leak. Author: wally0813 |
Analyze the security implications of: Linux Kernel 4.4 (Ubuntu 16.04) - 'snd_timer_user_ccallback()' Kernel Pointer Leak | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Broadlight Residential Gateway DI3124 - Remote DNS Change | This is a webapps exploit for hardware platform. Description: Broadlight Residential Gateway DI3124 - Remote DNS Change. Author: Todor Donev |
Analyze the security implications of: Broadlight Residential Gateway DI3124 - Remote DNS Change | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Fool's Workshop Owl's Workshop 1.0 - 'newmultiplechoice.php' Arbitrary File Access | This is a webapps exploit for php platform. Description: Fool's Workshop Owl's Workshop 1.0 - 'newmultiplechoice.php' Arbitrary File Access. Author: G00db0y |
Analyze the security implications of: Fool's Workshop Owl's Workshop 1.0 - 'newmultiplechoice.php' Arbitrary File Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mafia Moblog 6 - 'Big.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Mafia Moblog 6 - 'Big.php' Remote File Inclusion. Author: sh3ll |
Analyze the security implications of: Mafia Moblog 6 - 'Big.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Microstrategy Web 7 - Cross-Site Scripting / Directory Traversal | This is a webapps exploit for jsp platform. Description: Microstrategy Web 7 - Cross-Site Scripting / Directory Traversal. Author: Rafael Pedrero |
Analyze the security implications of: Microstrategy Web 7 - Cross-Site Scripting / Directory Traversal | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Linksys WRT54 Access Point - 'apply.cgi' Remote Buffer Overflow (Metasploit) | This is a remote exploit for hardware platform. Description: Linksys WRT54 Access Point - 'apply.cgi' Remote Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Linksys WRT54 Access Point - 'apply.cgi' Remote Buffer Overflow (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ProjectSend - Arbitrary File Upload (Metasploit) | This is a remote exploit for php platform. Description: ProjectSend - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: ProjectSend - Arbitrary File Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fullaspsite ASP Hosting Site - 'listmain.asp?cat' SQL Injection | This is a webapps exploit for asp platform. Description: Fullaspsite ASP Hosting Site - 'listmain.asp?cat' SQL Injection. Author: ShaFuck31 |
Analyze the security implications of: Fullaspsite ASP Hosting Site - 'listmain.asp?cat' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Car Portal CMS 3.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Car Portal CMS 3.0 - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Car Portal CMS 3.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASPapp Knowledge Base - 'CatId' SQL Injection (2) | This is a webapps exploit for php platform. Description: ASPapp Knowledge Base - 'CatId' SQL Injection (2). Author: Crackers_Child |
Analyze the security implications of: ASPapp Knowledge Base - 'CatId' SQL Injection (2) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Forum Rank System 6 - 'settings['locale']' Multiple Local File Inclusions | This is a webapps exploit for php platform. Description: Forum Rank System 6 - 'settings['locale']' Multiple Local File Inclusions. Author: Matrix86 |
Analyze the security implications of: Forum Rank System 6 - 'settings['locale']' Multiple Local File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.