input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component JEXTN Video Gallery 3.0.5 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JEXTN Video Gallery 3.0.5 - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JEXTN Video Gallery 3.0.5 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sielco Analog FM Transmitter 2.12 - 'id' Cookie Brute Force Session Hijacking | This is a webapps exploit for hardware platform. Description: Sielco Analog FM Transmitter 2.12 - 'id' Cookie Brute Force Session Hijacking. Author: LiquidWorm |
Analyze the security implications of: Sielco Analog FM Transmitter 2.12 - 'id' Cookie Brute Force Session Hijacking | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Netscape 4.77 - Composer Font Face Field Buffer Overflow | This is a dos exploit for multiple platform. Description: Netscape 4.77 - Composer Font Face Field Buffer Overflow. Author: S[h]iff |
Analyze the security implications of: Netscape 4.77 - Composer Font Face Field Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Hanbanggaoke IP Camera - Arbitrary Password Change | This is a webapps exploit for hardware platform. Description: Hanbanggaoke IP Camera - Arbitrary Password Change. Author: SecuriTeam |
Analyze the security implications of: Hanbanggaoke IP Camera - Arbitrary Password Change | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Fiomental & Coolsis Backoffice - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Fiomental & Coolsis Backoffice - Multiple Vulnerabilities. Author: MasterGipy |
Analyze the security implications of: Fiomental & Coolsis Backoffice - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DMXReady Members Area Manager - Persistent Cross-Site Scripting | This is a webapps exploit for asp platform. Description: DMXReady Members Area Manager - Persistent Cross-Site Scripting. Author: L0rd CrusAd3r |
Analyze the security implications of: DMXReady Members Area Manager - Persistent Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: WebMaster ConferenceRoom 1.8 Developer Edition - Denial of Service | This is a dos exploit for multiple platform. Description: WebMaster ConferenceRoom 1.8 Developer Edition - Denial of Service. Author: Murat - 2 |
Analyze the security implications of: WebMaster ConferenceRoom 1.8 Developer Edition - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: iPlanet Web Server 4.1 - Search Component File Disclosure | This is a remote exploit for multiple platform. Description: iPlanet Web Server 4.1 - Search Component File Disclosure. Author: Qualys Corporation |
Analyze the security implications of: iPlanet Web Server 4.1 - Search Component File Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FreeBSD 9 - Address Space Manipulation Privilege Escalation (Metasploit) | This is a local exploit for freebsd platform. Description: FreeBSD 9 - Address Space Manipulation Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: FreeBSD 9 - Address Space Manipulation Privilege Escalation (Metasploit) | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: GDidees CMS 3.9.1 - Local File Disclosure | This is a webapps exploit for php platform. Description: GDidees CMS 3.9.1 - Local File Disclosure. Author: Hadi Mene |
Analyze the security implications of: GDidees CMS 3.9.1 - Local File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_business - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_business - SQL Injection. Author: DevilZ TM |
Analyze the security implications of: Joomla! Component com_business - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Batchelor Media BM Classifieds - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Batchelor Media BM Classifieds - Multiple SQL Injections. Author: xcorpitx |
Analyze the security implications of: Batchelor Media BM Classifieds - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SGI IRIX 6.5.x - FAM Arbitrary Root Owned Directory File Listing | This is a local exploit for irix platform. Description: SGI IRIX 6.5.x - FAM Arbitrary Root Owned Directory File Listing. Author: Michael Wardle |
Analyze the security implications of: SGI IRIX 6.5.x - FAM Arbitrary Root Owned Directory File Listing | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: DBGuestbook 1.1 - 'dbs_base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: DBGuestbook 1.1 - 'dbs_base_path' Remote File Inclusion. Author: Denven |
Analyze the security implications of: DBGuestbook 1.1 - 'dbs_base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DigiLIBE - Execution-After-Redirect Information Disclosure | This is a webapps exploit for php platform. Description: DigiLIBE - Execution-After-Redirect Information Disclosure. Author: Robert Gilbert |
Analyze the security implications of: DigiLIBE - Execution-After-Redirect Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gattaca Server 2003 - 'web.tmpl?Language' CPU Consumption (Denial of Service) | This is a dos exploit for multiple platform. Description: Gattaca Server 2003 - 'web.tmpl?Language' CPU Consumption (Denial of Service). Author: dr_insane |
Analyze the security implications of: Gattaca Server 2003 - 'web.tmpl?Language' CPU Consumption (Denial of Service) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: WebKit - 'detachWrapper' Use-After-Free | This is a dos exploit for multiple platform. Description: WebKit - 'detachWrapper' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: WebKit - 'detachWrapper' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Sony CH / DH Series IP Cameras - Multiple Cross-Site Request Forgery Vulnerabilities | This is a remote exploit for hardware platform. Description: Sony CH / DH Series IP Cameras - Multiple Cross-Site Request Forgery Vulnerabilities. Author: Castillo |
Analyze the security implications of: Sony CH / DH Series IP Cameras - Multiple Cross-Site Request Forgery Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: iOS Checkview 1.1 - Directory Traversal | This is a remote exploit for ios platform. Description: iOS Checkview 1.1 - Directory Traversal. Author: kim@story |
Analyze the security implications of: iOS Checkview 1.1 - Directory Traversal | This exploit targets ios systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Absolute News Manager .NET 5.1 - 'xlaabsolutenm.aspx?rmore' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Absolute News Manager .NET 5.1 - 'xlaabsolutenm.aspx?rmore' Cross-Site Scripting. Author: Adrian Pastor |
Analyze the security implications of: Absolute News Manager .NET 5.1 - 'xlaabsolutenm.aspx?rmore' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Mandrake 6.x / RedHat 6.x / Turbolinux 3.5 b2/4.x/6.0.2 userhelper/PAM - Path (2) | This is a local exploit for linux platform. Description: Mandrake 6.x / RedHat 6.x / Turbolinux 3.5 b2/4.x/6.0.2 userhelper/PAM - Path (2). Author: Elias Levy |
Analyze the security implications of: Mandrake 6.x / RedHat 6.x / Turbolinux 3.5 b2/4.x/6.0.2 userhelper/PAM - Path (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Complete PHP Counter - SQL Injection | This is a webapps exploit for php platform. Description: Complete PHP Counter - SQL Injection. Author: BiPi_HaCk |
Analyze the security implications of: Complete PHP Counter - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: kic 2.4a - Denial of Service | This is a dos exploit for linux platform. Description: kic 2.4a - Denial of Service. Author: JosueEncinar |
Analyze the security implications of: kic 2.4a - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: HomePH Design 2.10 RC2 - Local File Inclusion / Remote File Inclusion / Cross-Site Scripting | This is a webapps exploit for php platform. Description: HomePH Design 2.10 RC2 - Local File Inclusion / Remote File Inclusion / Cross-Site Scripting. Author: CraCkEr |
Analyze the security implications of: HomePH Design 2.10 RC2 - Local File Inclusion / Remote File Inclusion / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JobSitePro 1.0 - 'search.php' SQL Injection | This is a webapps exploit for php platform. Description: JobSitePro 1.0 - 'search.php' SQL Injection. Author: ajann |
Analyze the security implications of: JobSitePro 1.0 - 'search.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Webkit Normalize Bug - Android 2.2 | This is a remote exploit for android platform. Description: Webkit Normalize Bug - Android 2.2. Author: MJ Keith |
Analyze the security implications of: Webkit Normalize Bug - Android 2.2 | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Hashicorp Consul - Remote Command Execution via Services API (Metasploit) | This is a remote exploit for linux platform. Description: Hashicorp Consul - Remote Command Execution via Services API (Metasploit). Author: Metasploit |
Analyze the security implications of: Hashicorp Consul - Remote Command Execution via Services API (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Yachtcontrol Webapplication 1.0 - Unauthenticated Remote Code Execution | This is a webapps exploit for hardware platform. Description: Yachtcontrol Webapplication 1.0 - Unauthenticated Remote Code Execution. Author: Hodorsec |
Analyze the security implications of: Yachtcontrol Webapplication 1.0 - Unauthenticated Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: F5 BIG-IP 16.0.x - Remote Code Execution (RCE) | This is a remote exploit for multiple platform. Description: F5 BIG-IP 16.0.x - Remote Code Execution (RCE). Author: Yesith Alvarez |
Analyze the security implications of: F5 BIG-IP 16.0.x - Remote Code Execution (RCE) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Consona - 'n6plugindestructor.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Consona - 'n6plugindestructor.asp' Cross-Site Scripting. Author: Ruben Santamarta |
Analyze the security implications of: Consona - 'n6plugindestructor.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FirePass SSL VPN - Local File Inclusion | This is a webapps exploit for multiple platform. Description: FirePass SSL VPN - Local File Inclusion. Author: SEC Consult |
Analyze the security implications of: FirePass SSL VPN - Local File Inclusion | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Allomani Movies & Clips 2.7.0 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Allomani Movies & Clips 2.7.0 - Blind SQL Injection. Author: Qabandi |
Analyze the security implications of: Allomani Movies & Clips 2.7.0 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ac4p.com Gallery 1.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Ac4p.com Gallery 1.0 - Multiple Vulnerabilities. Author: indoushka |
Analyze the security implications of: Ac4p.com Gallery 1.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.