input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: jQuery-File-Upload 9.22.0 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: jQuery-File-Upload 9.22.0 - Arbitrary File Upload. Author: Larry W. Cashdollar |
Analyze the security implications of: jQuery-File-Upload 9.22.0 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LiveCMS 3.4 - 'categoria.php?cid' SQL Injection | This is a webapps exploit for php platform. Description: LiveCMS 3.4 - 'categoria.php?cid' SQL Injection. Author: g00ns |
Analyze the security implications of: LiveCMS 3.4 - 'categoria.php?cid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: good/bad vote - Cross-Site Scripting / Local File Inclusion | This is a webapps exploit for php platform. Description: good/bad vote - Cross-Site Scripting / Local File Inclusion. Author: Moudi |
Analyze the security implications of: good/bad vote - Cross-Site Scripting / Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ServersCheck Monitoring Software 9.0.12/9.0.14 - Persistent Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: ServersCheck Monitoring Software 9.0.12/9.0.14 - Persistent Cross-Site Scripting. Author: loneferret |
Analyze the security implications of: ServersCheck Monitoring Software 9.0.12/9.0.14 - Persistent Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SHOUTcast DNAS/Linux 1.9.4 - Format String Remote Overflow | This is a remote exploit for linux platform. Description: SHOUTcast DNAS/Linux 1.9.4 - Format String Remote Overflow. Author: pucik |
Analyze the security implications of: SHOUTcast DNAS/Linux 1.9.4 - Format String Remote Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CyberPanel 1.8.4 - Cross-Site Request Forgery | This is a webapps exploit for multiple platform. Description: CyberPanel 1.8.4 - Cross-Site Request Forgery. Author: Bilgi Birikim Sistemleri |
Analyze the security implications of: CyberPanel 1.8.4 - Cross-Site Request Forgery | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Microsoft Internet Explorer 6.0 / Mozilla 0.9.6 / Opera 5.1 - Image Count Denial of Service | This is a dos exploit for multiple platform. Description: Microsoft Internet Explorer 6.0 / Mozilla 0.9.6 / Opera 5.1 - Image Count Denial of Service. Author: Pavel Titov |
Analyze the security implications of: Microsoft Internet Explorer 6.0 / Mozilla 0.9.6 / Opera 5.1 - Image Count Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Integramod Nederland 1.4.2 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Integramod Nederland 1.4.2 - Remote File Inclusion. Author: Mehmet Ince |
Analyze the security implications of: Integramod Nederland 1.4.2 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sun ONE Unified Development Server 5.0 - Recursive Document Type Definition | This is a remote exploit for multiple platform. Description: Sun ONE Unified Development Server 5.0 - Recursive Document Type Definition. Author: Sun Microsystems |
Analyze the security implications of: Sun ONE Unified Development Server 5.0 - Recursive Document Type Definition | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: OneWorldStore - 'OWListProduct.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: OneWorldStore - 'OWListProduct.asp' Multiple SQL Injections. Author: Dcrab |
Analyze the security implications of: OneWorldStore - 'OWListProduct.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Web Wiz Forum - Injection | This is a webapps exploit for asp platform. Description: Web Wiz Forum - Injection. Author: eXeSoul |
Analyze the security implications of: Web Wiz Forum - Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Claroline 1.8.9 - 'document/document.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Claroline 1.8.9 - 'document/document.php' Cross-Site Scripting. Author: Digital Security Research Group |
Analyze the security implications of: Claroline 1.8.9 - 'document/document.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ZTE ZXDSL 831CII - Insecure Direct Object Reference | This is a webapps exploit for hardware platform. Description: ZTE ZXDSL 831CII - Insecure Direct Object Reference. Author: Paulos Yibelo |
Analyze the security implications of: ZTE ZXDSL 831CII - Insecure Direct Object Reference | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ABB Cylon Aspect 3.08.02 (bbmdUpdate.php) - Remote Code Execution | This is a hardware exploit for multiple platform. Description: ABB Cylon Aspect 3.08.02 (bbmdUpdate.php) - Remote Code Execution. Author: LiquidWorm |
Analyze the security implications of: ABB Cylon Aspect 3.08.02 (bbmdUpdate.php) - Remote Code Execution | This exploit targets multiple systems. Type: hardware. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mambo Component com_yanc 1.4 Beta - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component com_yanc 1.4 Beta - 'id' SQL Injection. Author: Mehmet Ince |
Analyze the security implications of: Mambo Component com_yanc 1.4 Beta - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Photo Video Album Transfer 1.0 iOS - Multiple Vulnerabilities | This is a webapps exploit for ios platform. Description: Photo Video Album Transfer 1.0 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Photo Video Album Transfer 1.0 iOS - Multiple Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Outlook for Android - Attachment Download Directory Traversal | This is a remote exploit for android platform. Description: Outlook for Android - Attachment Download Directory Traversal. Author: Google Security Research |
Analyze the security implications of: Outlook for Android - Attachment Download Directory Traversal | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Proticaret E-Commerce Script 3.0 - SQL Injection (1) | This is a webapps exploit for multiple platform. Description: Proticaret E-Commerce Script 3.0 - SQL Injection (1). Author: Onur Alanbel (BGA) |
Analyze the security implications of: Proticaret E-Commerce Script 3.0 - SQL Injection (1) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple macOS - Kernel Code Execution due to Lack of Bounds Checking in AppleIntelCapriController::GetLinkConfig | This is a dos exploit for macos platform. Description: Apple macOS - Kernel Code Execution due to Lack of Bounds Checking in AppleIntelCapriController::GetLinkConfig. Author: Google Security Research |
Analyze the security implications of: Apple macOS - Kernel Code Execution due to Lack of Bounds Checking in AppleIntelCapriController::GetLinkConfig | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: ScreenStream 3.0.15 - Denial of Service | This is a dos exploit for android platform. Description: ScreenStream 3.0.15 - Denial of Service. Author: s4vitar |
Analyze the security implications of: ScreenStream 3.0.15 - Denial of Service | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Dovecot 1.1.x - Invalid Message Address Parsing Denial of Service | This is a dos exploit for linux platform. Description: Dovecot 1.1.x - Invalid Message Address Parsing Denial of Service. Author: anonymous |
Analyze the security implications of: Dovecot 1.1.x - Invalid Message Address Parsing Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Family CMS 2.7.2 - Multiple Persistent Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Family CMS 2.7.2 - Multiple Persistent Cross-Site Scripting Vulnerabilities. Author: Ahmed Elhady Mohamed |
Analyze the security implications of: Family CMS 2.7.2 - Multiple Persistent Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HMS HICP Protocol + Intellicom - 'NetBiterConfig.exe' Remote Buffer Overflow | This is a remote exploit for hardware platform. Description: HMS HICP Protocol + Intellicom - 'NetBiterConfig.exe' Remote Buffer Overflow. Author: Ruben Santamarta |
Analyze the security implications of: HMS HICP Protocol + Intellicom - 'NetBiterConfig.exe' Remote Buffer Overflow | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Jinais IRC Server 0.1.8 - Null Pointer (PoC) | This is a dos exploit for multiple platform. Description: Jinais IRC Server 0.1.8 - Null Pointer (PoC). Author: Salvatore Fresta |
Analyze the security implications of: Jinais IRC Server 0.1.8 - Null Pointer (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple WebKit - 'JSC::SymbolTableEntry::isWatchable' Heap Buffer Overflow | This is a dos exploit for multiple platform. Description: Apple WebKit - 'JSC::SymbolTableEntry::isWatchable' Heap Buffer Overflow. Author: Google Security Research |
Analyze the security implications of: Apple WebKit - 'JSC::SymbolTableEntry::isWatchable' Heap Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Explorer 7.20 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Explorer 7.20 - Cross-Site Scripting. Author: Metropolis |
Analyze the security implications of: Explorer 7.20 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Android - 'ih264d_process_intra_mb' Memory Corruption | This is a dos exploit for android platform. Description: Google Android - 'ih264d_process_intra_mb' Memory Corruption. Author: Google Security Research |
Analyze the security implications of: Google Android - 'ih264d_process_intra_mb' Memory Corruption | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: iBill Management Script - Weak Hard-Coded Password | This is a remote exploit for cgi platform. Description: iBill Management Script - Weak Hard-Coded Password. Author: MK Ultra |
Analyze the security implications of: iBill Management Script - Weak Hard-Coded Password | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Grawlix 1.0.3 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Grawlix 1.0.3 - Cross-Site Request Forgery. Author: Curesec Research Team |
Analyze the security implications of: Grawlix 1.0.3 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Acpid 1:2.0.10-1ubuntu2 (Ubuntu 11.04/11.10) - Boundary Crossing Privilege Escalation | This is a local exploit for linux platform. Description: Acpid 1:2.0.10-1ubuntu2 (Ubuntu 11.04/11.10) - Boundary Crossing Privilege Escalation. Author: otr |
Analyze the security implications of: Acpid 1:2.0.10-1ubuntu2 (Ubuntu 11.04/11.10) - Boundary Crossing Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GS Real Estate Portal - Multiple SQL Injections | This is a webapps exploit for php platform. Description: GS Real Estate Portal - Multiple SQL Injections. Author: InjEctOr5 |
Analyze the security implications of: GS Real Estate Portal - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: dotWidget for articles 2.0 - '/admin/categories.php' Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: dotWidget for articles 2.0 - '/admin/categories.php' Multiple Remote File Inclusions. Author: SwEET-DeViL |
Analyze the security implications of: dotWidget for articles 2.0 - '/admin/categories.php' Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Daily Expense Manager 1.0 - 'term' SQLi | This is a webapps exploit for php platform. Description: Daily Expense Manager 1.0 - 'term' SQLi. Author: Stefan Hesselman |
Analyze the security implications of: Daily Expense Manager 1.0 - 'term' SQLi | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Collabtive 3.1 - 'address' Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Collabtive 3.1 - 'address' Persistent Cross-Site Scripting. Author: Deha Berkin Bir |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.