input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Oracle E-Business Suite 12.1.3/12.2.x - Open Redirect | This is a webapps exploit for jsp platform. Description: Oracle E-Business Suite 12.1.3/12.2.x - Open Redirect. Author: Andrew Gill |
Analyze the security implications of: Oracle E-Business Suite 12.1.3/12.2.x - Open Redirect | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Linux Kernel 2.6.13 < 2.6.17.4 - 'sys_prctl()' Local Privilege Escalation (2) | This is a local exploit for linux platform. Description: Linux Kernel 2.6.13 < 2.6.17.4 - 'sys_prctl()' Local Privilege Escalation (2). Author: Julien Tinnes |
Analyze the security implications of: Linux Kernel 2.6.13 < 2.6.17.4 - 'sys_prctl()' Local Privilege Escalation (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: IDevSpot BizDirectory 2.04 - 'page' Cross-Site Scripting | This is a webapps exploit for php platform. Description: IDevSpot BizDirectory 2.04 - 'page' Cross-Site Scripting. Author: Am!r |
Analyze the security implications of: IDevSpot BizDirectory 2.04 - 'page' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ManageEngine DeviceExpert 5.9 - User Credential Disclosure | This is a webapps exploit for multiple platform. Description: ManageEngine DeviceExpert 5.9 - User Credential Disclosure. Author: Pedro Ribeiro |
Analyze the security implications of: ManageEngine DeviceExpert 5.9 - User Credential Disclosure | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Album Lock 4.0 iOS - Directory Traversal | This is a webapps exploit for ios platform. Description: Album Lock 4.0 iOS - Directory Traversal. Author: Vulnerability-Lab |
Analyze the security implications of: Album Lock 4.0 iOS - Directory Traversal | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Check Point VPN-1 SecureClient - IP Address Local Memory Access | This is a dos exploit for hardware platform. Description: Check Point VPN-1 SecureClient - IP Address Local Memory Access. Author: Wang Ning |
Analyze the security implications of: Check Point VPN-1 SecureClient - IP Address Local Memory Access | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Hospital-Management 1.26 - 'fname' SQL Injection | This is a webapps exploit for php platform. Description: Hospital-Management 1.26 - 'fname' SQL Injection. Author: cakes |
Analyze the security implications of: Hospital-Management 1.26 - 'fname' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SDFingerD 1.1 - Failure To Drop Privileges Privilege Escalation | This is a local exploit for linux platform. Description: SDFingerD 1.1 - Failure To Drop Privileges Privilege Escalation. Author: V9 |
Analyze the security implications of: SDFingerD 1.1 - Failure To Drop Privileges Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CSZ CMS 1.3.0 - Stored Cross-Site Scripting ('Photo URL' and 'YouTube URL' ) | This is a webapps exploit for php platform. Description: CSZ CMS 1.3.0 - Stored Cross-Site Scripting ('Photo URL' and 'YouTube URL' ). Author: Daniel González |
Analyze the security implications of: CSZ CMS 1.3.0 - Stored Cross-Site Scripting ('Photo URL' and 'YouTube URL' ) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EgavilanMedia PHPCRUD 1.0 - 'First Name' SQL Injection | This is a webapps exploit for php platform. Description: EgavilanMedia PHPCRUD 1.0 - 'First Name' SQL Injection. Author: Dimitrios Mitakos |
Analyze the security implications of: EgavilanMedia PHPCRUD 1.0 - 'First Name' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TP-Link TL-WA701N / TL-WA701ND - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: TP-Link TL-WA701N / TL-WA701ND - Multiple Vulnerabilities. Author: m-1-k-3 |
Analyze the security implications of: TP-Link TL-WA701N / TL-WA701ND - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Novell Groupwise Internet Agent - Stack Overflow | This is a dos exploit for multiple platform. Description: Novell Groupwise Internet Agent - Stack Overflow. Author: Francis Provencher |
Analyze the security implications of: Novell Groupwise Internet Agent - Stack Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Accellion File Transfer - 'Appliance web_client_user_guide.html?lang' Traversal Arbitrary File Access | This is a remote exploit for linux platform. Description: Accellion File Transfer - 'Appliance web_client_user_guide.html?lang' Traversal Arbitrary File Access. Author: Tim Brown |
Analyze the security implications of: Accellion File Transfer - 'Appliance web_client_user_guide.html?lang' Traversal Arbitrary File Access | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Klonet E-Commerce - 'products.php' SQL Injection | This is a webapps exploit for php platform. Description: Klonet E-Commerce - 'products.php' SQL Injection. Author: S3T4N |
Analyze the security implications of: Klonet E-Commerce - 'products.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Skyworth GPON HomeGateways and Optical Network Terminals - Stack Overflow | This is a dos exploit for asp platform. Description: Skyworth GPON HomeGateways and Optical Network Terminals - Stack Overflow. Author: Kaustubh G. Padwad |
Analyze the security implications of: Skyworth GPON HomeGateways and Optical Network Terminals - Stack Overflow | This exploit targets asp systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: E-book Store - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: E-book Store - Multiple Vulnerabilities. Author: indoushka |
Analyze the security implications of: E-book Store - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: YaBB 1.x/9.1.2000 - 'YaBB.pl IMSend' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: YaBB 1.x/9.1.2000 - 'YaBB.pl IMSend' Cross-Site Scripting. Author: GulfTech Security |
Analyze the security implications of: YaBB 1.x/9.1.2000 - 'YaBB.pl IMSend' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Linux Kernel 2.6.37 - 'setup_arg_pages()' Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.37 - 'setup_arg_pages()' Denial of Service. Author: Roland McGrath |
Analyze the security implications of: Linux Kernel 2.6.37 - 'setup_arg_pages()' Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Wireshark 2.0.0 < 2.0.4 - MMSE / WAP / WBXML / WSP Dissectors Denial of Service | This is a dos exploit for multiple platform. Description: Wireshark 2.0.0 < 2.0.4 - MMSE / WAP / WBXML / WSP Dissectors Denial of Service. Author: Antti Levomäki |
Analyze the security implications of: Wireshark 2.0.0 < 2.0.4 - MMSE / WAP / WBXML / WSP Dissectors Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ASUSWRT RT-AC53 (3.0.0.4.380.6038) - Remote Code Execution | This is a webapps exploit for hardware platform. Description: ASUSWRT RT-AC53 (3.0.0.4.380.6038) - Remote Code Execution. Author: Bruno Bierbaumer |
Analyze the security implications of: ASUSWRT RT-AC53 (3.0.0.4.380.6038) - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BoltWire 3.4.16 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: BoltWire 3.4.16 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Stefan Schurtz |
Analyze the security implications of: BoltWire 3.4.16 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Selea Targa 512 IP OCR-ANPR Camera - Stream Disclosure (Unauthenticated) | This is a webapps exploit for hardware platform. Description: Selea Targa 512 IP OCR-ANPR Camera - Stream Disclosure (Unauthenticated). Author: LiquidWorm |
Analyze the security implications of: Selea Targa 512 IP OCR-ANPR Camera - Stream Disclosure (Unauthenticated) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DirectAdmin 1.33.3 - '/CMD_DB' Backup Action Insecure Temporary File Creation | This is a local exploit for linux platform. Description: DirectAdmin 1.33.3 - '/CMD_DB' Backup Action Insecure Temporary File Creation. Author: anonymous |
Analyze the security implications of: DirectAdmin 1.33.3 - '/CMD_DB' Backup Action Insecure Temporary File Creation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: @lexPHPTeam @lex Guestbook 3.12 - PHP Remote File Inclusion | This is a webapps exploit for php platform. Description: @lexPHPTeam @lex Guestbook 3.12 - PHP Remote File Inclusion. Author: Himeur Nourredine |
Analyze the security implications of: @lexPHPTeam @lex Guestbook 3.12 - PHP Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Power Board 2.1.7 - 'Debug' Remote Password Change | This is a webapps exploit for php platform. Description: Invision Power Board 2.1.7 - 'Debug' Remote Password Change. Author: Rapigator |
Analyze the security implications of: Invision Power Board 2.1.7 - 'Debug' Remote Password Change | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Church Management System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Church Management System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS). Author: Murat DEMİRCİ |
Analyze the security implications of: Church Management System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Symantec AntiVirus - Unpacking RAR Multiple Remote Memory Corruptions | This is a dos exploit for multiple platform. Description: Symantec AntiVirus - Unpacking RAR Multiple Remote Memory Corruptions. Author: Google Security Research |
Analyze the security implications of: Symantec AntiVirus - Unpacking RAR Multiple Remote Memory Corruptions | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Responsive Portfolio 1.6.1 - 'filter_order_Dir' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Responsive Portfolio 1.6.1 - 'filter_order_Dir' SQL Injection. Author: AkkuS |
Analyze the security implications of: Joomla! Component Responsive Portfolio 1.6.1 - 'filter_order_Dir' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DynPG 4.9.1 - Persistent Cross-Site Scripting (Authenticated) | This is a webapps exploit for php platform. Description: DynPG 4.9.1 - Persistent Cross-Site Scripting (Authenticated). Author: Enes Özeser |
Analyze the security implications of: DynPG 4.9.1 - Persistent Cross-Site Scripting (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNU Bash - 'Shellshock' Environment Variable Command Injection | This is a remote exploit for linux platform. Description: GNU Bash - 'Shellshock' Environment Variable Command Injection. Author: Stephane Chazelas |
Analyze the security implications of: GNU Bash - 'Shellshock' Environment Variable Command Injection | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FreePBX 13.0.35 - SQL Injection | This is a webapps exploit for php platform. Description: FreePBX 13.0.35 - SQL Injection. Author: i-Hmx |
Analyze the security implications of: FreePBX 13.0.35 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Citrix Nitro SDK - Command Injection | This is a webapps exploit for linux platform. Description: Citrix Nitro SDK - Command Injection. Author: Han Sahin |
Analyze the security implications of: Citrix Nitro SDK - Command Injection | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Snmppd - SNMP Proxy Daemon Remote Format String | This is a remote exploit for linux platform. Description: Snmppd - SNMP Proxy Daemon Remote Format String. Author: cybertronic |
Analyze the security implications of: Snmppd - SNMP Proxy Daemon Remote Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.