input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Gallo 0.1.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Gallo 0.1.0 - Remote File Inclusion. Author: cr4wl3r |
Analyze the security implications of: Gallo 0.1.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GTX CMS 2013 Optima - SQL Injection | This is a webapps exploit for php platform. Description: GTX CMS 2013 Optima - SQL Injection. Author: Vulnerability-Lab |
Analyze the security implications of: GTX CMS 2013 Optima - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! / Mambo Component gigCalendar 1.0 - 'banddetails.php' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component gigCalendar 1.0 - 'banddetails.php' SQL Injection. Author: Salvatore Fresta |
Analyze the security implications of: Joomla! / Mambo Component gigCalendar 1.0 - 'banddetails.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TEMENOS T24 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for jsp platform. Description: TEMENOS T24 - Multiple Cross-Site Scripting Vulnerabilities. Author: Rehan Ahmed |
Analyze the security implications of: TEMENOS T24 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: jCart 1.1 - Multiple Cross-Site Scripting / Cross-Site Request Forgery/Open Redirect Vulnerabilities | This is a webapps exploit for php platform. Description: jCart 1.1 - Multiple Cross-Site Scripting / Cross-Site Request Forgery/Open Redirect Vulnerabilities. Author: p0deje |
Analyze the security implications of: jCart 1.1 - Multiple Cross-Site Scripting / Cross-Site Request Forgery/Open Redirect Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pirelli DRG A115 v3 ADSL Router - DNS Change | This is a webapps exploit for hardware platform. Description: Pirelli DRG A115 v3 ADSL Router - DNS Change. Author: Todor Donev |
Analyze the security implications of: Pirelli DRG A115 v3 ADSL Router - DNS Change | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GaziYapBoz Game Portal - 'kategori.asp' SQL Injection | This is a webapps exploit for asp platform. Description: GaziYapBoz Game Portal - 'kategori.asp' SQL Injection. Author: CyberGhost |
Analyze the security implications of: GaziYapBoz Game Portal - 'kategori.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Kayako eSupport 2.3.1 - 'subd' Remote File Inclusion | This is a webapps exploit for php platform. Description: Kayako eSupport 2.3.1 - 'subd' Remote File Inclusion. Author: beford |
Analyze the security implications of: Kayako eSupport 2.3.1 - 'subd' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.x - 'fput()' Null Pointer Dereference Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - 'fput()' Null Pointer Dereference Local Denial of Service. Author: David Howells |
Analyze the security implications of: Linux Kernel 2.6.x - 'fput()' Null Pointer Dereference Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: EditMe CMS - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: EditMe CMS - Cross-Site Request Forgery (Add Admin). Author: Vulnerability-Lab |
Analyze the security implications of: EditMe CMS - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Belchior Foundry VCard 2.8 - Authentication Bypass | This is a webapps exploit for php platform. Description: Belchior Foundry VCard 2.8 - Authentication Bypass. Author: saudi linux |
Analyze the security implications of: Belchior Foundry VCard 2.8 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash - Processing AVC Causes Stack Corruption | This is a dos exploit for multiple platform. Description: Adobe Flash - Processing AVC Causes Stack Corruption. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Processing AVC Causes Stack Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: MPlayer 1.0 rc2 - 'sdpplin_parse()' Array Indexing Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: MPlayer 1.0 rc2 - 'sdpplin_parse()' Array Indexing Buffer Overflow (PoC). Author: Guido Landi |
Analyze the security implications of: MPlayer 1.0 rc2 - 'sdpplin_parse()' Array Indexing Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: VACRON VIG-US731VE 1.0.18-09-B727 IP Camera - Authentication Bypass | This is a webapps exploit for hardware platform. Description: VACRON VIG-US731VE 1.0.18-09-B727 IP Camera - Authentication Bypass. Author: Viktoras |
Analyze the security implications of: VACRON VIG-US731VE 1.0.18-09-B727 IP Camera - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Chipmunk Forums - SQL Injection | This is a webapps exploit for php platform. Description: Chipmunk Forums - SQL Injection. Author: GHC |
Analyze the security implications of: Chipmunk Forums - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wireshark - add_ff_vht_compressed_beamforming_report Static Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: Wireshark - add_ff_vht_compressed_beamforming_report Static Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: Wireshark - add_ff_vht_compressed_beamforming_report Static Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: All Club CMS 0.0.2 - Remote Database Configuration Retrieve | This is a webapps exploit for php platform. Description: All Club CMS 0.0.2 - Remote Database Configuration Retrieve. Author: StAkeR |
Analyze the security implications of: All Club CMS 0.0.2 - Remote Database Configuration Retrieve | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GetSimple CMS My SMTP Contact Plugin 1.1.1 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: GetSimple CMS My SMTP Contact Plugin 1.1.1 - Cross-Site Request Forgery. Author: boku |
Analyze the security implications of: GetSimple CMS My SMTP Contact Plugin 1.1.1 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Innovaphone PBX Admin-GUI - Cross-Site Request Forgery | This is a webapps exploit for multiple platform. Description: Innovaphone PBX Admin-GUI - Cross-Site Request Forgery. Author: Rainer Giedat |
Analyze the security implications of: Innovaphone PBX Admin-GUI - Cross-Site Request Forgery | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Denver Smart Wifi Camera SHC-150 - 'Telnet' Remote Code Execution (RCE) | This is a remote exploit for hardware platform. Description: Denver Smart Wifi Camera SHC-150 - 'Telnet' Remote Code Execution (RCE). Author: Ivan Nikolsky |
Analyze the security implications of: Denver Smart Wifi Camera SHC-150 - 'Telnet' Remote Code Execution (RCE) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CMS little 0.0.1 - 'template' Local File Inclusion | This is a webapps exploit for php platform. Description: CMS little 0.0.1 - 'template' Local File Inclusion. Author: CWH Underground |
Analyze the security implications of: CMS little 0.0.1 - 'template' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Maxwebportal 1.3 - 'dl_popular.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Maxwebportal 1.3 - 'dl_popular.asp' SQL Injection. Author: s-dalili |
Analyze the security implications of: Maxwebportal 1.3 - 'dl_popular.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: DUportal Pro 3.4 - 'result.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: DUportal Pro 3.4 - 'result.asp' Multiple SQL Injections. Author: Dcrab |
Analyze the security implications of: DUportal Pro 3.4 - 'result.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Gram Post 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Gram Post 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Gram Post 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CUPS 1.1.x - UDP Packet Remote Denial of Service | This is a dos exploit for linux platform. Description: CUPS 1.1.x - UDP Packet Remote Denial of Service. Author: Alvaro Martinez Echevarria |
Analyze the security implications of: CUPS 1.1.x - UDP Packet Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Asterisk chan_pjsip 15.2.0 - 'INVITE' Denial of Service | This is a dos exploit for linux platform. Description: Asterisk chan_pjsip 15.2.0 - 'INVITE' Denial of Service. Author: EnableSecurity |
Analyze the security implications of: Asterisk chan_pjsip 15.2.0 - 'INVITE' Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Dokeos 1.6.5 - 'courseLog.php?scormcontopen' SQL Injection | This is a webapps exploit for php platform. Description: Dokeos 1.6.5 - 'courseLog.php?scormcontopen' SQL Injection. Author: Silentz |
Analyze the security implications of: Dokeos 1.6.5 - 'courseLog.php?scormcontopen' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Xerox WorkCentre - PJL Daemon Buffer Overflow (PoC) | This is a dos exploit for hardware platform. Description: Xerox WorkCentre - PJL Daemon Buffer Overflow (PoC). Author: Francis Provencher |
Analyze the security implications of: Xerox WorkCentre - PJL Daemon Buffer Overflow (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Todd Woolums ASP News Management 2.2 - SQL Injection | This is a webapps exploit for asp platform. Description: Todd Woolums ASP News Management 2.2 - SQL Injection. Author: Bl@ckbe@rD |
Analyze the security implications of: Todd Woolums ASP News Management 2.2 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linksys WRT54GL Wireless Router - Cross-Site Request Forgery | This is a remote exploit for hardware platform. Description: Linksys WRT54GL Wireless Router - Cross-Site Request Forgery. Author: Kalashinkov3 |
Analyze the security implications of: Linksys WRT54GL Wireless Router - Cross-Site Request Forgery | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: blueman - set_dhcp_handler D-Bus Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: blueman - set_dhcp_handler D-Bus Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: blueman - set_dhcp_handler D-Bus Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: EZ-Blog Beta2 - 'category' SQL Injection | This is a webapps exploit for php platform. Description: EZ-Blog Beta2 - 'category' SQL Injection. Author: YEnH4ckEr |
Analyze the security implications of: EZ-Blog Beta2 - 'category' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JasperReports - (Authenticated) File Read | This is a webapps exploit for multiple platform. Description: JasperReports - (Authenticated) File Read. Author: Hector Monsegur |
Analyze the security implications of: JasperReports - (Authenticated) File Read | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.