input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Allomani E-Store 1.0 - Cross-Site Request Forgery (Add Admin) (2) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Winds3D Viewer 3 - 'GetURL()' Arbitrary File Download | This is a remote exploit for multiple platform. Description: Winds3D Viewer 3 - 'GetURL()' Arbitrary File Download. Author: Diego Juarez |
Analyze the security implications of: Winds3D Viewer 3 - 'GetURL()' Arbitrary File Download | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: RRDBrowse 1.6 - Arbitrary File Disclosure | This is a webapps exploit for cgi platform. Description: RRDBrowse 1.6 - Arbitrary File Disclosure. Author: Sebastian Wolfgarten |
Analyze the security implications of: RRDBrowse 1.6 - Arbitrary File Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Adobe Flash - Pointer Crash in XML Handling | This is a dos exploit for linux platform. Description: Adobe Flash - Pointer Crash in XML Handling. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Pointer Crash in XML Handling | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Campsite 2.6.1 - 'DatabaseObject.php?g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'DatabaseObject.php?g_documentRoot' Remote File Inclusion. Author: anonymous |
Analyze the security implications of: Campsite 2.6.1 - 'DatabaseObject.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WideChapter 3.0 - HTTP Request Buffer Overflow | This is a dos exploit for multiple platform. Description: WideChapter 3.0 - HTTP Request Buffer Overflow. Author: Bahaa Naamneh |
Analyze the security implications of: WideChapter 3.0 - HTTP Request Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Magic Photo Storage Website - '/user/user_extend.php?_config[site_path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/user/user_extend.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina |
Analyze the security implications of: Magic Photo Storage Website - '/user/user_extend.php?_config[site_path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Safari Web Browser 2.0.4 - DHTML SetAttributeNode() Null Dereference Denial of Service | This is a dos exploit for osx platform. Description: Apple Safari Web Browser 2.0.4 - DHTML SetAttributeNode() Null Dereference Denial of Service. Author: Dennis Cox |
Analyze the security implications of: Apple Safari Web Browser 2.0.4 - DHTML SetAttributeNode() Null Dereference Denial of Service | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: FUDForum 3.1.0 - 'srch' Reflected XSS | This is a webapps exploit for php platform. Description: FUDForum 3.1.0 - 'srch' Reflected XSS. Author: Piyush Patil |
Analyze the security implications of: FUDForum 3.1.0 - 'srch' Reflected XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Monkey HTTP Daemon < 0.9.3 - Denial of Service | This is a dos exploit for linux platform. Description: Monkey HTTP Daemon < 0.9.3 - Denial of Service. Author: Patroklos Argyroudis |
Analyze the security implications of: Monkey HTTP Daemon < 0.9.3 - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Elemental Software CartWIZ 1.20 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Elemental Software CartWIZ 1.20 - Multiple SQL Injections. Author: Diabolic Crab |
Analyze the security implications of: Elemental Software CartWIZ 1.20 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CyberCMS - 'faq.php' SQL Injection | This is a webapps exploit for php platform. Description: CyberCMS - 'faq.php' SQL Injection. Author: hc0de |
Analyze the security implications of: CyberCMS - 'faq.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.4.x/2.5.x/2.6.x - 'Sockaddr_In.Sin_Zero' Kernel Memory Disclosure | This is a local exploit for linux platform. Description: Linux Kernel 2.4.x/2.5.x/2.6.x - 'Sockaddr_In.Sin_Zero' Kernel Memory Disclosure. Author: Pavel Kankovsky |
Analyze the security implications of: Linux Kernel 2.4.x/2.5.x/2.6.x - 'Sockaddr_In.Sin_Zero' Kernel Memory Disclosure | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DewNewPHPLinks 2.1.0.1 - Local File Inclusion | This is a webapps exploit for php platform. Description: DewNewPHPLinks 2.1.0.1 - Local File Inclusion. Author: ITSecTeam |
Analyze the security implications of: DewNewPHPLinks 2.1.0.1 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sony Playstation 4 (PS4) 3.50 < 4.07 - WebKit Code Execution (PoC) | This is a local exploit for hardware platform. Description: Sony Playstation 4 (PS4) 3.50 < 4.07 - WebKit Code Execution (PoC). Author: Specter |
Analyze the security implications of: Sony Playstation 4 (PS4) 3.50 < 4.07 - WebKit Code Execution (PoC) | This exploit targets hardware systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component com_wallpapers - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_wallpapers - SQL Injection. Author: DevilZ TM |
Analyze the security implications of: Joomla! Component com_wallpapers - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Archimede Net 2000 - 'E-Guest_show.php' SQL Injection | This is a webapps exploit for php platform. Description: Archimede Net 2000 - 'E-Guest_show.php' SQL Injection. Author: Sw33t h4cK3r |
Analyze the security implications of: Archimede Net 2000 - 'E-Guest_show.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BrightSuite Groupware - SQL Injection | This is a webapps exploit for asp platform. Description: BrightSuite Groupware - SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: BrightSuite Groupware - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: BlogWrite 0.91 - Remote File Disclosure / SQL Injection | This is a webapps exploit for php platform. Description: BlogWrite 0.91 - Remote File Disclosure / SQL Injection. Author: Osirys |
Analyze the security implications of: BlogWrite 0.91 - Remote File Disclosure / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebKit - 'ContainerNode::parserInsertBefore' Universal Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: WebKit - 'ContainerNode::parserInsertBefore' Universal Cross-Site Scripting. Author: Google Security Research |
Analyze the security implications of: WebKit - 'ContainerNode::parserInsertBefore' Universal Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Zavio IP Cameras Firmware 1.6.03 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Zavio IP Cameras Firmware 1.6.03 - Multiple Vulnerabilities. Author: Core Security |
Analyze the security implications of: Zavio IP Cameras Firmware 1.6.03 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: WordPress Plugin PHPMailer 4.6 - Host Header Command Injection (Metasploit) | This is a remote exploit for php platform. Description: WordPress Plugin PHPMailer 4.6 - Host Header Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: WordPress Plugin PHPMailer 4.6 - Host Header Command Injection (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OneWorldStore - 'OWListProduct.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: OneWorldStore - 'OWListProduct.asp' Cross-Site Scripting. Author: Dcrab |
Analyze the security implications of: OneWorldStore - 'OWListProduct.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Alex Heiphetz Group eZshopper 3.0 - Remote Command Execution | This is a remote exploit for multiple platform. Description: Alex Heiphetz Group eZshopper 3.0 - Remote Command Execution. Author: suid |
Analyze the security implications of: Alex Heiphetz Group eZshopper 3.0 - Remote Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Seagate BlackArmor NAS sg2000-2000.1331 - Remote Command Execution | This is a webapps exploit for hardware platform. Description: Seagate BlackArmor NAS sg2000-2000.1331 - Remote Command Execution. Author: Jeroen - IT Nerdbox |
Analyze the security implications of: Seagate BlackArmor NAS sg2000-2000.1331 - Remote Command Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Loaded Commerce 6.6 - Client-Side Template Injection(CSTI) | This is a webapps exploit for php platform. Description: Loaded Commerce 6.6 - Client-Side Template Injection(CSTI). Author: tmrswrr |
Analyze the security implications of: Loaded Commerce 6.6 - Client-Side Template Injection(CSTI) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IMAP4rev1 12.261/12.264/2000.284 - 'lsub' Remote Overflow | This is a remote exploit for linux platform. Description: IMAP4rev1 12.261/12.264/2000.284 - 'lsub' Remote Overflow. Author: SkyLaZarT |
Analyze the security implications of: IMAP4rev1 12.261/12.264/2000.284 - 'lsub' Remote Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Peplink Balance Routers 7.0.0-build1904 - SQL Injection / Cross-Site Scripting / Information Disclosure | This is a webapps exploit for cgi platform. Description: Peplink Balance Routers 7.0.0-build1904 - SQL Injection / Cross-Site Scripting / Information Disclosure. Author: X41 D-Sec GmbH |
Analyze the security implications of: Peplink Balance Routers 7.0.0-build1904 - SQL Injection / Cross-Site Scripting / Information Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Novell Client 3.0/3.0.1 - Denial of Service | This is a dos exploit for novell platform. Description: Novell Client 3.0/3.0.1 - Denial of Service. Author: Bruce Dennison |
Analyze the security implications of: Novell Client 3.0/3.0.1 - Denial of Service | This exploit targets novell systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: Eros Erotik Webkatalog - 'start.php?id' SQL Injection | This is a webapps exploit for php platform. Description: Eros Erotik Webkatalog - 'start.php?id' SQL Injection. Author: Easy Laster |
Analyze the security implications of: Eros Erotik Webkatalog - 'start.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fome SMS Portal 2.0 - SQL Injection | This is a webapps exploit for php platform. Description: Fome SMS Portal 2.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Fome SMS Portal 2.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Research In Motion BlackBerry Device Software 4.7.1 - Cross Domain Information Disclosure | This is a remote exploit for hardware platform. Description: Research In Motion BlackBerry Device Software 4.7.1 - Cross Domain Information Disclosure. Author: 599eme Man |
Analyze the security implications of: Research In Motion BlackBerry Device Software 4.7.1 - Cross Domain Information Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PHP League 0.82 - 'classement.php' SQL Injection | This is a webapps exploit for asp platform. Description: PHP League 0.82 - 'classement.php' SQL Injection. Author: ajann |
Analyze the security implications of: PHP League 0.82 - 'classement.php' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: MyGuestBK - 'Add.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: MyGuestBK - 'Add.asp' Cross-Site Scripting. Author: Over_G |
Analyze the security implications of: MyGuestBK - 'Add.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.