input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Limbo CMS 1.0.4.2 - 'option' Traversal Arbitrary File Access | This is a webapps exploit for php platform. Description: Limbo CMS 1.0.4.2 - 'option' Traversal Arbitrary File Access. Author: rgod |
Analyze the security implications of: Limbo CMS 1.0.4.2 - 'option' Traversal Arbitrary File Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TP-Link TL-WA855RE V5_200415 - Device Reset Auth Bypass | This is a webapps exploit for hardware platform. Description: TP-Link TL-WA855RE V5_200415 - Device Reset Auth Bypass. Author: malwrforensics |
Analyze the security implications of: TP-Link TL-WA855RE V5_200415 - Device Reset Auth Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Canon PRINT 2.5.5 - Information Disclosure | This is a local exploit for android platform. Description: Canon PRINT 2.5.5 - Information Disclosure. Author: 0x48piraj |
Analyze the security implications of: Canon PRINT 2.5.5 - Information Disclosure | This exploit targets android systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Dream CMS 2.3.0 - Cross-Site Request Forgery (Add Extension) / Arbitrary File Upload / PHP Code Execution | This is a webapps exploit for php platform. Description: Dream CMS 2.3.0 - Cross-Site Request Forgery (Add Extension) / Arbitrary File Upload / PHP Code Execution. Author: LiquidWorm |
Analyze the security implications of: Dream CMS 2.3.0 - Cross-Site Request Forgery (Add Extension) / Arbitrary File Upload / PHP Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cPanel 10.8.1/10.8.2 - OnMouseover Cross-Site Scripting | This is a webapps exploit for php platform. Description: cPanel 10.8.1/10.8.2 - OnMouseover Cross-Site Scripting. Author: MexHackTeam.org |
Analyze the security implications of: cPanel 10.8.1/10.8.2 - OnMouseover Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Love Factory 1.3.4 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Love Factory 1.3.4 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Love Factory 1.3.4 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple WebKit 10.0.2(12602.3.12.0.1) - 'Frame::setDocument (1)' Universal Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Apple WebKit 10.0.2(12602.3.12.0.1) - 'Frame::setDocument (1)' Universal Cross-Site Scripting. Author: Google Security Research |
Analyze the security implications of: Apple WebKit 10.0.2(12602.3.12.0.1) - 'Frame::setDocument (1)' Universal Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Google Android 2.0/2.1/2.1.1 - WebKit Use-After-Free | This is a remote exploit for android platform. Description: Google Android 2.0/2.1/2.1.1 - WebKit Use-After-Free. Author: MJ Keith |
Analyze the security implications of: Google Android 2.0/2.1/2.1.1 - WebKit Use-After-Free | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Extensis Portfolio Netpublish Server 7.0 - Server.NP Directory Traversal | This is a webapps exploit for cgi platform. Description: Extensis Portfolio Netpublish Server 7.0 - Server.NP Directory Traversal. Author: Andy Davis |
Analyze the security implications of: Extensis Portfolio Netpublish Server 7.0 - Server.NP Directory Traversal | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Seyeon FlexWATCH Network Video Server 2.2 - Unauthorized Administrative Access | This is a remote exploit for hardware platform. Description: Seyeon FlexWATCH Network Video Server 2.2 - Unauthorized Administrative Access. Author: slaizer |
Analyze the security implications of: Seyeon FlexWATCH Network Video Server 2.2 - Unauthorized Administrative Access | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Laundry Booking Management System 1.0 - 'Multiple' SQL Injection | This is a webapps exploit for php platform. Description: Laundry Booking Management System 1.0 - 'Multiple' SQL Injection. Author: Azumah Foresight Xorlali |
Analyze the security implications of: Laundry Booking Management System 1.0 - 'Multiple' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DZCP (deV!L_z Clanportal) 1.5.4 - Local File Inclusion | This is a webapps exploit for php platform. Description: DZCP (deV!L_z Clanportal) 1.5.4 - Local File Inclusion. Author: High-Tech Bridge SA |
Analyze the security implications of: DZCP (deV!L_z Clanportal) 1.5.4 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SGI IRIX 5.3 - 'Cadmin' Local Privilege Escalation | This is a local exploit for irix platform. Description: SGI IRIX 5.3 - 'Cadmin' Local Privilege Escalation. Author: Grant Kaufmann |
Analyze the security implications of: SGI IRIX 5.3 - 'Cadmin' Local Privilege Escalation | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: Google Android - 'IOMXNodeInstance::enableNativeBuffers' Unchecked Index | This is a dos exploit for android platform. Description: Google Android - 'IOMXNodeInstance::enableNativeBuffers' Unchecked Index. Author: Google Security Research |
Analyze the security implications of: Google Android - 'IOMXNodeInstance::enableNativeBuffers' Unchecked Index | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Joomla! Component com_fss 1.9.1.1447 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_fss 1.9.1.1447 - SQL Injection. Author: D4NB4R |
Analyze the security implications of: Joomla! Component com_fss 1.9.1.1447 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iBoutique.MALL 1.2 - 'cat' Blind SQL Injection | This is a webapps exploit for php platform. Description: iBoutique.MALL 1.2 - 'cat' Blind SQL Injection. Author: InjEctOr5 |
Analyze the security implications of: iBoutique.MALL 1.2 - 'cat' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution | This is a remote exploit for linux platform. Description: ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution. Author: R-73eN |
Analyze the security implications of: ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ghttpd 1.4 - Daemon Buffer Overflow | This is a remote exploit for linux platform. Description: ghttpd 1.4 - Daemon Buffer Overflow. Author: qitest1 |
Analyze the security implications of: ghttpd 1.4 - Daemon Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Factux - Local File Inclusion | This is a webapps exploit for php platform. Description: Factux - Local File Inclusion. Author: ALTBTA |
Analyze the security implications of: Factux - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Firefox / Evince / EoG / GIMP - '.SVG' File Processing Denial of Service | This is a dos exploit for linux platform. Description: Firefox / Evince / EoG / GIMP - '.SVG' File Processing Denial of Service. Author: Kristian Hermansen |
Analyze the security implications of: Firefox / Evince / EoG / GIMP - '.SVG' File Processing Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PHP 5.3.5 - 'grapheme_extract()' Null Pointer Dereference Denial of Service | This is a dos exploit for php platform. Description: PHP 5.3.5 - 'grapheme_extract()' Null Pointer Dereference Denial of Service. Author: Maksymilian Arciemowicz |
Analyze the security implications of: PHP 5.3.5 - 'grapheme_extract()' Null Pointer Dereference Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10.x - Applescript ARDAgent Shell Privilege Escalation | This is a local exploit for osx platform. Description: Apple Mac OSX 10.x - Applescript ARDAgent Shell Privilege Escalation. Author: anonymous |
Analyze the security implications of: Apple Mac OSX 10.x - Applescript ARDAgent Shell Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: FreeBSD - 'setrlimit' Stack Clash (PoC) | This is a dos exploit for freebsd_x86 platform. Description: FreeBSD - 'setrlimit' Stack Clash (PoC). Author: Qualys Corporation |
Analyze the security implications of: FreeBSD - 'setrlimit' Stack Clash (PoC) | This exploit targets freebsd_x86 systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd_x86 platform |
What is this exploit about: OpenWFE 1.4.x - Cross-Site Scripting / Connection Proxy | This is a remote exploit for multiple platform. Description: OpenWFE 1.4.x - Cross-Site Scripting / Connection Proxy. Author: Joxean Koret |
Analyze the security implications of: OpenWFE 1.4.x - Cross-Site Scripting / Connection Proxy | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GeoVision GV-ASManager 6.1.0.0 - Information Disclosure | This is a webapps exploit for multiple platform. Description: GeoVision GV-ASManager 6.1.0.0 - Information Disclosure. Author: Giorgi Dograshvili |
Analyze the security implications of: GeoVision GV-ASManager 6.1.0.0 - Information Disclosure | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: eGroupWare 1.8.1 - 'test.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: eGroupWare 1.8.1 - 'test.php' Cross-Site Scripting. Author: AutoSec Tools |
Analyze the security implications of: eGroupWare 1.8.1 - 'test.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gemtek WVRTM-127ACN 01.01.02.141 - Authenticated Arbitrary Command Injection | This is a webapps exploit for cgi platform. Description: Gemtek WVRTM-127ACN 01.01.02.141 - Authenticated Arbitrary Command Injection. Author: Gabriele Zuddas |
Analyze the security implications of: Gemtek WVRTM-127ACN 01.01.02.141 - Authenticated Arbitrary Command Injection | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: GLPI 0.71.3 - Multiple SQL Injections Vulnerabilities | This is a webapps exploit for php platform. Description: GLPI 0.71.3 - Multiple SQL Injections Vulnerabilities. Author: Zigma |
Analyze the security implications of: GLPI 0.71.3 - Multiple SQL Injections Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle GlassFish Server 2.1.1/3.0.1 - Multiple Subcomponent Resource Identifier Traversal Arbitrary File Access | This is a remote exploit for multiple platform. Description: Oracle GlassFish Server 2.1.1/3.0.1 - Multiple Subcomponent Resource Identifier Traversal Arbitrary File Access. Author: Alex Kouzemtchenko |
Analyze the security implications of: Oracle GlassFish Server 2.1.1/3.0.1 - Multiple Subcomponent Resource Identifier Traversal Arbitrary File Access | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: libvorbis 1.3.5 - Multiple Vulnerabilities | This is a dos exploit for linux platform. Description: libvorbis 1.3.5 - Multiple Vulnerabilities. Author: qflb.wu |
Analyze the security implications of: libvorbis 1.3.5 - Multiple Vulnerabilities | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Telegram 3.2 - Input Length Handling Crash (PoC) | This is a dos exploit for ios platform. Description: Telegram 3.2 - Input Length Handling Crash (PoC). Author: Mohammad Reza Espargham |
Analyze the security implications of: Telegram 3.2 - Input Length Handling Crash (PoC) | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: BLUEPAGE CMS 2.5 - 'PHPSESSID' Session Fixation | This is a webapps exploit for php platform. Description: BLUEPAGE CMS 2.5 - 'PHPSESSID' Session Fixation. Author: David Vieira-Kurz |
Analyze the security implications of: BLUEPAGE CMS 2.5 - 'PHPSESSID' Session Fixation | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Exponent CMS 0.96.3 - 'articlemodule' SQL Injection | This is a webapps exploit for php platform. Description: Exponent CMS 0.96.3 - 'articlemodule' SQL Injection. Author: T u R c O |
Analyze the security implications of: Exponent CMS 0.96.3 - 'articlemodule' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Xen - Broken Check in 'memory_exchange()' Permits PV Guest Breakout | This is a local exploit for multiple platform. Description: Xen - Broken Check in 'memory_exchange()' Permits PV Guest Breakout. Author: Google Security Research |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.