input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Apache Tomcat Connector mod_jk - 'exec-shield' Remote Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Jobberbase 2.0 CMS - 'jobs-in' SQL Injection | This is a webapps exploit for php platform. Description: Jobberbase 2.0 CMS - 'jobs-in' SQL Injection. Author: Suvadip Kar |
Analyze the security implications of: Jobberbase 2.0 CMS - 'jobs-in' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Scriptegrator 1.5 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Scriptegrator 1.5 - Local File Inclusion. Author: jdc |
Analyze the security implications of: Joomla! Component Scriptegrator 1.5 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jetty 6.1.x - JSP Snoop Page Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for jsp platform. Description: Jetty 6.1.x - JSP Snoop Page Multiple Cross-Site Scripting Vulnerabilities. Author: aScii |
Analyze the security implications of: Jetty 6.1.x - JSP Snoop Page Multiple Cross-Site Scripting Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Apple WebKit 10.0.2 (12602.3.12.0.1_ r210800) - 'constructJSReadableStreamDefaultReader' Type Confusion | This is a webapps exploit for multiple platform. Description: Apple WebKit 10.0.2 (12602.3.12.0.1_ r210800) - 'constructJSReadableStreamDefaultReader' Type Confusion. Author: Google Security Research |
Analyze the security implications of: Apple WebKit 10.0.2 (12602.3.12.0.1_ r210800) - 'constructJSReadableStreamDefaultReader' Type Confusion | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: NeoSys Neon Webmail for Java 5.06/5.07 - 'maillist' Servlet Multiple SQL Injections | This is a webapps exploit for jsp platform. Description: NeoSys Neon Webmail for Java 5.06/5.07 - 'maillist' Servlet Multiple SQL Injections. Author: Tan Chew Keong |
Analyze the security implications of: NeoSys Neon Webmail for Java 5.06/5.07 - 'maillist' Servlet Multiple SQL Injections | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Composr-CMS Version <=10.0.39 - Authenticated Remote Code Execution | This is a webapps exploit for php platform. Description: Composr-CMS Version <=10.0.39 - Authenticated Remote Code Execution. Author: Sarang Tumne |
Analyze the security implications of: Composr-CMS Version <=10.0.39 - Authenticated Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AGTC MyShop 3.2 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: AGTC MyShop 3.2 - Insecure Cookie Handling. Author: Mr.tro0oqy |
Analyze the security implications of: AGTC MyShop 3.2 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Advanced Management For Services Sites - Remote Add Admin | This is a webapps exploit for php platform. Description: Advanced Management For Services Sites - Remote Add Admin. Author: alnjm33 |
Analyze the security implications of: Advanced Management For Services Sites - Remote Add Admin | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASUSWRT RT-AC53 (3.0.0.4.380.6038) - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: ASUSWRT RT-AC53 (3.0.0.4.380.6038) - Cross-Site Scripting. Author: Bruno Bierbaumer |
Analyze the security implications of: ASUSWRT RT-AC53 (3.0.0.4.380.6038) - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Binary File Descriptor Library (libbfd) - Out-of-Bounds Crash | This is a dos exploit for linux platform. Description: Binary File Descriptor Library (libbfd) - Out-of-Bounds Crash. Author: Michal Zalewski |
Analyze the security implications of: Binary File Descriptor Library (libbfd) - Out-of-Bounds Crash | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: MuOnline Loopholes Web Server - 'pkok.asp' SQL Injection | This is a webapps exploit for asp platform. Description: MuOnline Loopholes Web Server - 'pkok.asp' SQL Injection. Author: nukedx |
Analyze the security implications of: MuOnline Loopholes Web Server - 'pkok.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Google Android max86902 Driver - 'sysfs' Interfaces Race Condition | This is a dos exploit for android platform. Description: Google Android max86902 Driver - 'sysfs' Interfaces Race Condition. Author: Google Security Research |
Analyze the security implications of: Google Android max86902 Driver - 'sysfs' Interfaces Race Condition | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Teradek VidiU Pro 3.0.3 - Server-Side Request Forgery | This is a webapps exploit for hardware platform. Description: Teradek VidiU Pro 3.0.3 - Server-Side Request Forgery. Author: LiquidWorm |
Analyze the security implications of: Teradek VidiU Pro 3.0.3 - Server-Side Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Binary Board System 0.2.5 - 'reply.pl' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cgi platform. Description: Binary Board System 0.2.5 - 'reply.pl' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t3d3Vil |
Analyze the security implications of: Binary Board System 0.2.5 - 'reply.pl' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: ZTE ZXDSL 831IIV7.5.0a_Z29_OV - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: ZTE ZXDSL 831IIV7.5.0a_Z29_OV - Multiple Vulnerabilities. Author: mehdi boukazoula |
Analyze the security implications of: ZTE ZXDSL 831IIV7.5.0a_Z29_OV - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Flowplayer 3.2.7 - 'linkUrl' Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Flowplayer 3.2.7 - 'linkUrl' Cross-Site Scripting. Author: Szymon Gruszecki |
Analyze the security implications of: Flowplayer 3.2.7 - 'linkUrl' Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Docebo CMS 3.0.x - 'index.php?searchkey' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Docebo CMS 3.0.x - 'index.php?searchkey' Cross-Site Scripting. Author: r00t |
Analyze the security implications of: Docebo CMS 3.0.x - 'index.php?searchkey' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Blog:CMS 4.2.1e - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Blog:CMS 4.2.1e - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: Blog:CMS 4.2.1e - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WeChat - Memory Corruption in CAudioJBM::InputAudioFrameToJBM | This is a dos exploit for android platform. Description: WeChat - Memory Corruption in CAudioJBM::InputAudioFrameToJBM. Author: Google Security Research |
Analyze the security implications of: WeChat - Memory Corruption in CAudioJBM::InputAudioFrameToJBM | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Alex Guestbook - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Alex Guestbook - Multiple Vulnerabilities. Author: LionTurk |
Analyze the security implications of: Alex Guestbook - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle JDeveloper 11.1.x/12.x - Directory Traversal | This is a webapps exploit for java platform. Description: Oracle JDeveloper 11.1.x/12.x - Directory Traversal. Author: hyp3rlinx |
Analyze the security implications of: Oracle JDeveloper 11.1.x/12.x - Directory Traversal | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Seowon 130-SLC router - 'queriesCnt' Remote Code Execution (Unauthenticated) | This is a webapps exploit for hardware platform. Description: Seowon 130-SLC router - 'queriesCnt' Remote Code Execution (Unauthenticated). Author: Aryan Chehreghani |
Analyze the security implications of: Seowon 130-SLC router - 'queriesCnt' Remote Code Execution (Unauthenticated) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AmbiCom Blue Neighbors 2.50 build 2500 - BlueTooth Stack Object Push Buffer Overflow | This is a dos exploit for multiple platform. Description: AmbiCom Blue Neighbors 2.50 build 2500 - BlueTooth Stack Object Push Buffer Overflow. Author: Kevin Finisterre |
Analyze the security implications of: AmbiCom Blue Neighbors 2.50 build 2500 - BlueTooth Stack Object Push Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: MoinMoin 1.x - 'PageEditor.py' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: MoinMoin 1.x - 'PageEditor.py' Cross-Site Scripting. Author: anonymous |
Analyze the security implications of: MoinMoin 1.x - 'PageEditor.py' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Belkin Wireless Router - Default WPS PIN Security | This is a remote exploit for hardware platform. Description: Belkin Wireless Router - Default WPS PIN Security. Author: ZhaoChunsheng |
Analyze the security implications of: Belkin Wireless Router - Default WPS PIN Security | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Hak5 WiFi Pineapple 2.4 - Preconfiguration Command Injection (Metasploit) | This is a remote exploit for linux platform. Description: Hak5 WiFi Pineapple 2.4 - Preconfiguration Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Hak5 WiFi Pineapple 2.4 - Preconfiguration Command Injection (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: KAPhotoservice - 'search.asp?Filename' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: KAPhotoservice - 'search.asp?Filename' Cross-Site Scripting. Author: by_casper41 |
Analyze the security implications of: KAPhotoservice - 'search.asp?Filename' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Most Wanted Real Estate 1.1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Most Wanted Real Estate 1.1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Most Wanted Real Estate 1.1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Exam Hall Management System 1.0 - Unrestricted File Upload + RCE (Unauthenticated) | This is a webapps exploit for php platform. Description: Exam Hall Management System 1.0 - Unrestricted File Upload + RCE (Unauthenticated). Author: Davide \'yth1n\' Bianchin |
Analyze the security implications of: Exam Hall Management System 1.0 - Unrestricted File Upload + RCE (Unauthenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Campus Bulletin Board 3.4 - '/post3/book.asp?review' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Campus Bulletin Board 3.4 - '/post3/book.asp?review' Cross-Site Scripting. Author: Unohope |
Analyze the security implications of: Campus Bulletin Board 3.4 - '/post3/book.asp?review' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Oracle E-Business Suite 11i - Multiple Remote Vulnerabilities | This is a remote exploit for multiple platform. Description: Oracle E-Business Suite 11i - Multiple Remote Vulnerabilities. Author: Hacktics |
Analyze the security implications of: Oracle E-Business Suite 11i - Multiple Remote Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Chipmunk Blog - 'members.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Chipmunk Blog - 'members.php' Cross-Site Scripting. Author: sl4xUz |
Analyze the security implications of: Chipmunk Blog - 'members.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeWPS 2.11 - 'upload.php' Remote Command Execution | This is a webapps exploit for php platform. Description: FreeWPS 2.11 - 'upload.php' Remote Command Execution. Author: HACKERS PAL |
Analyze the security implications of: FreeWPS 2.11 - 'upload.php' Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.