input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Tenda FH303/A300 Firmware v5.07.68_EN - Remote DNS Change | This is a webapps exploit for asp platform. Description: Tenda FH303/A300 Firmware v5.07.68_EN - Remote DNS Change. Author: Todor Donev |
Analyze the security implications of: Tenda FH303/A300 Firmware v5.07.68_EN - Remote DNS Change | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: aaPanel 6.8.21 - Directory Traversal (Authenticated) | This is a webapps exploit for linux platform. Description: aaPanel 6.8.21 - Directory Traversal (Authenticated). Author: Ghuliev |
Analyze the security implications of: aaPanel 6.8.21 - Directory Traversal (Authenticated) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AllMyGuests 0.4.1 - 'cfg_serverpath' Remote File Inclusion | This is a webapps exploit for php platform. Description: AllMyGuests 0.4.1 - 'cfg_serverpath' Remote File Inclusion. Author: Br@Him |
Analyze the security implications of: AllMyGuests 0.4.1 - 'cfg_serverpath' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.5.33 - Invalid Memory Write | This is a dos exploit for php platform. Description: PHP 5.5.33 - Invalid Memory Write. Author: vah_13 |
Analyze the security implications of: PHP 5.5.33 - Invalid Memory Write | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Elite Bulletin Board - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Elite Bulletin Board - Multiple SQL Injections. Author: ToXiC |
Analyze the security implications of: Elite Bulletin Board - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MeshCMS 3.5 - Remote Code Execution | This is a webapps exploit for jsp platform. Description: MeshCMS 3.5 - Remote Code Execution. Author: mr_me |
Analyze the security implications of: MeshCMS 3.5 - Remote Code Execution | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Sun Java System Access Manager 7.1 - 'Username' Enumeration | This is a remote exploit for multiple platform. Description: Sun Java System Access Manager 7.1 - 'Username' Enumeration. Author: Marco Mella |
Analyze the security implications of: Sun Java System Access Manager 7.1 - 'Username' Enumeration | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: WhatsApp - RTP Processing Heap Corruption | This is a dos exploit for android platform. Description: WhatsApp - RTP Processing Heap Corruption. Author: Google Security Research |
Analyze the security implications of: WhatsApp - RTP Processing Heap Corruption | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Joomla! Component Letterman Subscriber Module 1.2.4 - 'Mod_Lettermansubscribe.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component Letterman Subscriber Module 1.2.4 - 'Mod_Lettermansubscribe.php' Cross-Site Scripting. Author: Edi Strosar |
Analyze the security implications of: Joomla! Component Letterman Subscriber Module 1.2.4 - 'Mod_Lettermansubscribe.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eboli - 'index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: eboli - 'index.php' Remote File Inclusion. Author: DarkFig |
Analyze the security implications of: eboli - 'index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Openfire Server 3.6.0a - Authentication Bypass / SQL Injection / Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Openfire Server 3.6.0a - Authentication Bypass / SQL Injection / Cross-Site Scripting. Author: Andreas Kurtz |
Analyze the security implications of: Openfire Server 3.6.0a - Authentication Bypass / SQL Injection / Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: PyBlosxom 1.6.3 Atom Flavor - Multiple XML Injection Vulnerabilities | This is a remote exploit for multiple platform. Description: PyBlosxom 1.6.3 Atom Flavor - Multiple XML Injection Vulnerabilities. Author: Nam Nguyen |
Analyze the security implications of: PyBlosxom 1.6.3 Atom Flavor - Multiple XML Injection Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: E-topbiz ViralDX 2.07 - 'bannerid' SQL Injection | This is a webapps exploit for php platform. Description: E-topbiz ViralDX 2.07 - 'bannerid' SQL Injection. Author: Hussin X |
Analyze the security implications of: E-topbiz ViralDX 2.07 - 'bannerid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flatnuke 2.5.8 - 'file()' Privilege Escalation / Code Execution | This is a webapps exploit for php platform. Description: Flatnuke 2.5.8 - 'file()' Privilege Escalation / Code Execution. Author: rgod |
Analyze the security implications of: Flatnuke 2.5.8 - 'file()' Privilege Escalation / Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DynPage 1.0 - 'ckfinder' Multiple Arbitrary File Upload Vulnerabilities | This is a webapps exploit for php platform. Description: DynPage 1.0 - 'ckfinder' Multiple Arbitrary File Upload Vulnerabilities. Author: KedAns-Dz |
Analyze the security implications of: DynPage 1.0 - 'ckfinder' Multiple Arbitrary File Upload Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Novell Groupwise 7.0 - HTML Injection / Denial of Service | This is a dos exploit for novell platform. Description: Novell Groupwise 7.0 - HTML Injection / Denial of Service. Author: Juan Pablo Lopez Yacubian |
Analyze the security implications of: Novell Groupwise 7.0 - HTML Injection / Denial of Service | This exploit targets novell systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: pfSense 2.4.4-p1 - Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: pfSense 2.4.4-p1 - Cross-Site Scripting. Author: Ozer Goker |
Analyze the security implications of: pfSense 2.4.4-p1 - Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: EZContents 2.0.3 - 'showguestbook.php?GLOBALS[admin_home]' Remote File Inclusion | This is a webapps exploit for php platform. Description: EZContents 2.0.3 - 'showguestbook.php?GLOBALS[admin_home]' Remote File Inclusion. Author: DarkFig |
Analyze the security implications of: EZContents 2.0.3 - 'showguestbook.php?GLOBALS[admin_home]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: UltraEdit 14.00b - FTP/SFTP 'LIST' Directory Traversal | This is a remote exploit for multiple platform. Description: UltraEdit 14.00b - FTP/SFTP 'LIST' Directory Traversal. Author: Tan Chew Keong |
Analyze the security implications of: UltraEdit 14.00b - FTP/SFTP 'LIST' Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: macOS/iOS - JavaScript Injection Bug in OfficeImporter | This is a dos exploit for multiple platform. Description: macOS/iOS - JavaScript Injection Bug in OfficeImporter. Author: Google Security Research |
Analyze the security implications of: macOS/iOS - JavaScript Injection Bug in OfficeImporter | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_ckforms - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component com_ckforms - Multiple Vulnerabilities. Author: ALTBTA |
Analyze the security implications of: Joomla! Component com_ckforms - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Perl - 'rmtree()' Function Local Insecure Permissions | This is a local exploit for linux platform. Description: Perl - 'rmtree()' Function Local Insecure Permissions. Author: Frans Pop |
Analyze the security implications of: Perl - 'rmtree()' Function Local Insecure Permissions | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: berliCRM 1.0.24 - 'src_record' SQL Injection | This is a webapps exploit for php platform. Description: berliCRM 1.0.24 - 'src_record' SQL Injection. Author: Ahmet Ümit BAYRAM |
Analyze the security implications of: berliCRM 1.0.24 - 'src_record' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GetWare Web Server Component - Content-Length Value Remote Denial of Service | This is a dos exploit for multiple platform. Description: GetWare Web Server Component - Content-Length Value Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: GetWare Web Server Component - Content-Length Value Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Flirt Matching Sms System - SQL Injection | This is a webapps exploit for php platform. Description: Flirt Matching Sms System - SQL Injection. Author: Easy Laster |
Analyze the security implications of: Flirt Matching Sms System - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple iOS 7.0.2 - Sim Lock Screen Display Bypass | This is a webapps exploit for ios platform. Description: Apple iOS 7.0.2 - Sim Lock Screen Display Bypass. Author: Vulnerability-Lab |
Analyze the security implications of: Apple iOS 7.0.2 - Sim Lock Screen Display Bypass | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Claroline 1.x - '/admin/campusProblem.php?view' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Claroline 1.x - '/admin/campusProblem.php?view' Cross-Site Scripting. Author: Fernando Munoz |
Analyze the security implications of: Claroline 1.x - '/admin/campusProblem.php?view' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cag CMS 0.2 - Cross-Site Scripting / Blind SQL Injection | This is a webapps exploit for php platform. Description: Cag CMS 0.2 - Cross-Site Scripting / Blind SQL Injection. Author: Shamus |
Analyze the security implications of: Cag CMS 0.2 - Cross-Site Scripting / Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ArcSight Logger - Arbitrary File Upload / Code Execution | This is a remote exploit for linux platform. Description: ArcSight Logger - Arbitrary File Upload / Code Execution. Author: Horoszkiewicz Julian ISP_ |
Analyze the security implications of: ArcSight Logger - Arbitrary File Upload / Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CompuCMS - Multiple SQL Injections / Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: CompuCMS - Multiple SQL Injections / Cross-Site Scripting Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: CompuCMS - Multiple SQL Injections / Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TP-Link WR842ND - Remote Multiple SSID Directory Traversals | This is a webapps exploit for hardware platform. Description: TP-Link WR842ND - Remote Multiple SSID Directory Traversals. Author: Adam Simuntis |
Analyze the security implications of: TP-Link WR842ND - Remote Multiple SSID Directory Traversals | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Technicolor TC7300.B0 - 'hostname' Persistent Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Technicolor TC7300.B0 - 'hostname' Persistent Cross-Site Scripting. Author: Luis Santana |
Analyze the security implications of: Technicolor TC7300.B0 - 'hostname' Persistent Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Accton-based switches (3com / Dell / SMC / Foundry / EdgeCore) - Backdoor Password | This is a remote exploit for multiple platform. Description: Accton-based switches (3com / Dell / SMC / Foundry / EdgeCore) - Backdoor Password. Author: Edwin Eefting |
Analyze the security implications of: Accton-based switches (3com / Dell / SMC / Foundry / EdgeCore) - Backdoor Password | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.