input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: 'customhs_js_content' - 'customhs_js_content' Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: 'customhs_js_content' - 'customhs_js_content' Cross-Site Request Forgery. Author: Abhishek Joshi |
Analyze the security implications of: 'customhs_js_content' - 'customhs_js_content' Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HolaCMS 1.2.x - 'HTMLtags.php' Local File Inclusion | This is a webapps exploit for php platform. Description: HolaCMS 1.2.x - 'HTMLtags.php' Local File Inclusion. Author: Virginity Security |
Analyze the security implications of: HolaCMS 1.2.x - 'HTMLtags.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iBall ADSL2+ Home Router - Authentication Bypass | This is a webapps exploit for hardware platform. Description: iBall ADSL2+ Home Router - Authentication Bypass. Author: Gem George |
Analyze the security implications of: iBall ADSL2+ Home Router - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: EsContacts 1.0 - 'groupes.php?msg' Cross-Site Scripting | This is a webapps exploit for php platform. Description: EsContacts 1.0 - 'groupes.php?msg' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: EsContacts 1.0 - 'groupes.php?msg' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebRTC - VP9 Processing Use-After-Free | This is a dos exploit for multiple platform. Description: WebRTC - VP9 Processing Use-After-Free. Author: Google Security Research |
Analyze the security implications of: WebRTC - VP9 Processing Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: libpng 1.4.2 - Denial of Service | This is a dos exploit for multiple platform. Description: libpng 1.4.2 - Denial of Service. Author: kripthor |
Analyze the security implications of: libpng 1.4.2 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Jupiter 1.1.5ex - Privilege Escalation | This is a webapps exploit for php platform. Description: Jupiter 1.1.5ex - Privilege Escalation. Author: BugReport.IR |
Analyze the security implications of: Jupiter 1.1.5ex - Privilege Escalation | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Andy's PHP KnowledgeBase 0.95.4 - SQL Injection | This is a webapps exploit for php platform. Description: Andy's PHP KnowledgeBase 0.95.4 - SQL Injection. Author: AutoSec Tools |
Analyze the security implications of: Andy's PHP KnowledgeBase 0.95.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache mod_cgi - 'Shellshock' Remote Command Injection | This is a remote exploit for linux platform. Description: Apache mod_cgi - 'Shellshock' Remote Command Injection. Author: Federico Galatolo |
Analyze the security implications of: Apache mod_cgi - 'Shellshock' Remote Command Injection | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Kasseler CMS 1.3.4 Lite - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Kasseler CMS 1.3.4 Lite - Multiple Cross-Site Scripting Vulnerabilities. Author: Gamoscu |
Analyze the security implications of: Kasseler CMS 1.3.4 Lite - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebcamXP 3.72.440/4.05.280 Beta - '/show_gallery_pic?id' Arbitrary Memory Disclosure | This is a webapps exploit for multiple platform. Description: WebcamXP 3.72.440/4.05.280 Beta - '/show_gallery_pic?id' Arbitrary Memory Disclosure. Author: Luigi Auriemma |
Analyze the security implications of: WebcamXP 3.72.440/4.05.280 Beta - '/show_gallery_pic?id' Arbitrary Memory Disclosure | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: THOMSON TG585n 7.4.3.2 - 'user.ini' Arbitrary Disclosure | This is a remote exploit for hardware platform. Description: THOMSON TG585n 7.4.3.2 - 'user.ini' Arbitrary Disclosure. Author: AnTi SeCuRe |
Analyze the security implications of: THOMSON TG585n 7.4.3.2 - 'user.ini' Arbitrary Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: WebKit - 'enqueuePageshowEvent' / 'enqueuePopstateEvent' Universal Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: WebKit - 'enqueuePageshowEvent' / 'enqueuePopstateEvent' Universal Cross-Site Scripting. Author: Google Security Research |
Analyze the security implications of: WebKit - 'enqueuePageshowEvent' / 'enqueuePopstateEvent' Universal Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AIX 5.2 - 'ipl_varyon' Local Privilege Escalation | This is a local exploit for aix platform. Description: AIX 5.2 - 'ipl_varyon' Local Privilege Escalation. Author: intropy |
Analyze the security implications of: AIX 5.2 - 'ipl_varyon' Local Privilege Escalation | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: GlassFish Enterprise Server 2.1 - Admin Console /applications/applications.jsf URI Cross-Site Scripting | This is a remote exploit for multiple platform. Description: GlassFish Enterprise Server 2.1 - Admin Console /applications/applications.jsf URI Cross-Site Scripting. Author: DSecRG |
Analyze the security implications of: GlassFish Enterprise Server 2.1 - Admin Console /applications/applications.jsf URI Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SurgeLDAP 1.0 d - Full Path Disclosure | This is a remote exploit for multiple platform. Description: SurgeLDAP 1.0 d - Full Path Disclosure. Author: Ziv Kamir |
Analyze the security implications of: SurgeLDAP 1.0 d - Full Path Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BlueShoes Framework 4.6 - Remote File Inclusion | This is a webapps exploit for php platform. Description: BlueShoes Framework 4.6 - Remote File Inclusion. Author: Kacper |
Analyze the security implications of: BlueShoes Framework 4.6 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cFTP 0.1 - 'r80' Arbitrary File Upload | This is a webapps exploit for php platform. Description: cFTP 0.1 - 'r80' Arbitrary File Upload. Author: leviathan |
Analyze the security implications of: cFTP 0.1 - 'r80' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_packages - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_packages - SQL Injection. Author: Kernel Security Group |
Analyze the security implications of: Joomla! Component com_packages - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Clear Voyager Hotspot IMW-C910W - Arbitrary File Disclosure | This is a webapps exploit for cgi platform. Description: Clear Voyager Hotspot IMW-C910W - Arbitrary File Disclosure. Author: Damaster |
Analyze the security implications of: Clear Voyager Hotspot IMW-C910W - Arbitrary File Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Just William's Amazon Webstore - 'Closeup.php?Image' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Just William's Amazon Webstore - 'Closeup.php?Image' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: Just William's Amazon Webstore - 'Closeup.php?Image' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EPNadmin 0.7 - 'constantes.inc.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: EPNadmin 0.7 - 'constantes.inc.php' Remote File Inclusion. Author: Kw3[R]Ln |
Analyze the security implications of: EPNadmin 0.7 - 'constantes.inc.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FS Groupon Clone 1.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: FS Groupon Clone 1.0 - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: FS Groupon Clone 1.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe ColdFusion 8 - Remote Command Execution (RCE) | This is a webapps exploit for cfm platform. Description: Adobe ColdFusion 8 - Remote Command Execution (RCE). Author: Pergyz |
Analyze the security implications of: Adobe ColdFusion 8 - Remote Command Execution (RCE) | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: Chyrp 2.x - '/includes/JavaScript.php?action' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Chyrp 2.x - '/includes/JavaScript.php?action' Cross-Site Scripting. Author: Wireghoul |
Analyze the security implications of: Chyrp 2.x - '/includes/JavaScript.php?action' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DoceboLMS 1.2 - SQL Injection / Arbitrary File Upload | This is a webapps exploit for php platform. Description: DoceboLMS 1.2 - SQL Injection / Arbitrary File Upload. Author: Ihsan Sencan |
Analyze the security implications of: DoceboLMS 1.2 - SQL Injection / Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Liens_Dynamiques 2.1 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Liens_Dynamiques 2.1 - Multiple Cross-Site Scripting Vulnerabilities. Author: sn0oPy |
Analyze the security implications of: Liens_Dynamiques 2.1 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_media_library 1.5.3 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_media_library 1.5.3 - Remote File Inclusion. Author: Mehmet Ince |
Analyze the security implications of: Joomla! Component com_media_library 1.5.3 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BSI Hotel Booking System Admin 1.4/2.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: BSI Hotel Booking System Admin 1.4/2.0 - Authentication Bypass. Author: K-159 |
Analyze the security implications of: BSI Hotel Booking System Admin 1.4/2.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: chipmunk topsites - Authentication Bypass / Cross-Site Scripting | This is a webapps exploit for php platform. Description: chipmunk topsites - Authentication Bypass / Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: chipmunk topsites - Authentication Bypass / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ColoradoFTP 1.3 Prime Edition (Build 8) - Directory Traversal | This is a webapps exploit for java platform. Description: ColoradoFTP 1.3 Prime Edition (Build 8) - Directory Traversal. Author: Rv3Laboratory |
Analyze the security implications of: ColoradoFTP 1.3 Prime Edition (Build 8) - Directory Traversal | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: rsync 2.3/2.4/2.5 - Signed Array Index Remote Code Execution | This is a remote exploit for linux platform. Description: rsync 2.3/2.4/2.5 - Signed Array Index Remote Code Execution. Author: sorbo |
Analyze the security implications of: rsync 2.3/2.4/2.5 - Signed Array Index Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Broadcom BCM43xx Wi-Fi - 'BroadPWN' Denial of Service | This is a dos exploit for android platform. Description: Broadcom BCM43xx Wi-Fi - 'BroadPWN' Denial of Service. Author: 649 |
Analyze the security implications of: Broadcom BCM43xx Wi-Fi - 'BroadPWN' Denial of Service | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: RedHat Linux 6.1 i386 - Tmpwatch Recursive Write Denial of Service | This is a dos exploit for linux platform. Description: RedHat Linux 6.1 i386 - Tmpwatch Recursive Write Denial of Service. Author: zenith parsec |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.