input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: ac4p Mobile - 'up.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OSGi v3.8-3.18 Console - RCE | This is a webapps exploit for multiple platform. Description: OSGi v3.8-3.18 Console - RCE. Author: Andrzej Olchawa_ Milenko Starcik |
Analyze the security implications of: OSGi v3.8-3.18 Console - RCE | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ESMI PayPal StoreFront 1.7 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: ESMI PayPal StoreFront 1.7 - Cross-Site Scripting. Author: Dcrab |
Analyze the security implications of: ESMI PayPal StoreFront 1.7 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Steamcast 0.9.75b - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Steamcast 0.9.75b - Remote Denial of Service. Author: ksa04 |
Analyze the security implications of: Steamcast 0.9.75b - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SpamTitan 7.07 - Remote Code Execution (Authenticated) | This is a webapps exploit for multiple platform. Description: SpamTitan 7.07 - Remote Code Execution (Authenticated). Author: Felipe Molina |
Analyze the security implications of: SpamTitan 7.07 - Remote Code Execution (Authenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: iG Calendar 1.0 - 'user.php?id' SQL Injection | This is a webapps exploit for php platform. Description: iG Calendar 1.0 - 'user.php?id' SQL Injection. Author: Michael Brooks |
Analyze the security implications of: iG Calendar 1.0 - 'user.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CFAGCMS - SQL Injection | This is a webapps exploit for php platform. Description: CFAGCMS - SQL Injection. Author: cr4wl3r |
Analyze the security implications of: CFAGCMS - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eWebeditor - Directory Traversal | This is a webapps exploit for asp platform. Description: eWebeditor - Directory Traversal. Author: anonymous |
Analyze the security implications of: eWebeditor - Directory Traversal | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: AutoIndex PHP Script 2.2.2/2.2.3 - 'index.php' Denial of Service | This is a dos exploit for php platform. Description: AutoIndex PHP Script 2.2.2/2.2.3 - 'index.php' Denial of Service. Author: L4teral |
Analyze the security implications of: AutoIndex PHP Script 2.2.2/2.2.3 - 'index.php' Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WFTPD 3.3 - Remote REST Denial of Service | This is a dos exploit for linux platform. Description: WFTPD 3.3 - Remote REST Denial of Service. Author: dmnt |
Analyze the security implications of: WFTPD 3.3 - Remote REST Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: XSOK 1.02 - '-xsokdir' Local Buffer Overflow Game | This is a local exploit for linux platform. Description: XSOK 1.02 - '-xsokdir' Local Buffer Overflow Game. Author: c0wboy |
Analyze the security implications of: XSOK 1.02 - '-xsokdir' Local Buffer Overflow Game | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CustomCMS - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: CustomCMS - Persistent Cross-Site Scripting. Author: Sid3^effects |
Analyze the security implications of: CustomCMS - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gallery 2.3 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Gallery 2.3 - Remote File Inclusion. Author: indoushka |
Analyze the security implications of: Gallery 2.3 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mini-XML 3.2 - Heap Overflow | This is a local exploit for linux platform. Description: Mini-XML 3.2 - Heap Overflow. Author: LIWEI |
Analyze the security implications of: Mini-XML 3.2 - Heap Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: TOSHIBA IP-Camera IK-WP41A - Authentication Bypass / Configuration Download | This is a webapps exploit for cgi platform. Description: TOSHIBA IP-Camera IK-WP41A - Authentication Bypass / Configuration Download. Author: Todor Donev |
Analyze the security implications of: TOSHIBA IP-Camera IK-WP41A - Authentication Bypass / Configuration Download | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: IBM Operational Decision Manager 8.x - XML External Entity Injection | This is a webapps exploit for multiple platform. Description: IBM Operational Decision Manager 8.x - XML External Entity Injection. Author: Mohamed M.Fouad |
Analyze the security implications of: IBM Operational Decision Manager 8.x - XML External Entity Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GeoBlog 1.0 - 'viewcat.php' SQL Injection | This is a webapps exploit for php platform. Description: GeoBlog 1.0 - 'viewcat.php' SQL Injection. Author: Aliaksandr Hartsuyeu |
Analyze the security implications of: GeoBlog 1.0 - 'viewcat.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IkonBoard 2.17/3.0/3.1 - Image Tag Cross-Agent Scripting | This is a webapps exploit for php platform. Description: IkonBoard 2.17/3.0/3.1 - Image Tag Cross-Agent Scripting. Author: godminus |
Analyze the security implications of: IkonBoard 2.17/3.0/3.1 - Image Tag Cross-Agent Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebcamXP 3.72.440/4.05.280 Beta - '/pocketpc?camnum' Arbitrary Memory Disclosure | This is a webapps exploit for multiple platform. Description: WebcamXP 3.72.440/4.05.280 Beta - '/pocketpc?camnum' Arbitrary Memory Disclosure. Author: Luigi Auriemma |
Analyze the security implications of: WebcamXP 3.72.440/4.05.280 Beta - '/pocketpc?camnum' Arbitrary Memory Disclosure | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: IBM Tivoli Service Automation Manager 7.2.4 - Remote Code Execution | This is a webapps exploit for jsp platform. Description: IBM Tivoli Service Automation Manager 7.2.4 - Remote Code Execution. Author: Jakub Palaczynski |
Analyze the security implications of: IBM Tivoli Service Automation Manager 7.2.4 - Remote Code Execution | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: BrudaNews 1.1 - '/admin/index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: BrudaNews 1.1 - '/admin/index.php' Remote File Inclusion. Author: SHiKaA |
Analyze the security implications of: BrudaNews 1.1 - '/admin/index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: InstantASP 4.1 - 'Logon.aspx?sessionid' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: InstantASP 4.1 - 'Logon.aspx?sessionid' Cross-Site Scripting. Author: Doz |
Analyze the security implications of: InstantASP 4.1 - 'Logon.aspx?sessionid' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Htaccess Passwort Generator 1.1 - 'ht_pfad' Remote File Inclusion | This is a webapps exploit for php platform. Description: Htaccess Passwort Generator 1.1 - 'ht_pfad' Remote File Inclusion. Author: kezzap66345 |
Analyze the security implications of: Htaccess Passwort Generator 1.1 - 'ht_pfad' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TurboTrafficTrader C 1.0 - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities | This is a webapps exploit for cgi platform. Description: TurboTrafficTrader C 1.0 - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities. Author: Kaloyan Olegov Georgiev |
Analyze the security implications of: TurboTrafficTrader C 1.0 - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Novell eDirectory 8.8 SP5 - 'dconserv.dlm' Cross-Site Scripting | This is a webapps exploit for novell platform. Description: Novell eDirectory 8.8 SP5 - 'dconserv.dlm' Cross-Site Scripting. Author: Francis Provencher |
Analyze the security implications of: Novell eDirectory 8.8 SP5 - 'dconserv.dlm' Cross-Site Scripting | This exploit targets novell systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: Nexxt Router Firmware 42.103.1.5095 - Remote Code Execution (RCE) (Authenticated) | This is a remote exploit for hardware platform. Description: Nexxt Router Firmware 42.103.1.5095 - Remote Code Execution (RCE) (Authenticated). Author: Yerodin Richards |
Analyze the security implications of: Nexxt Router Firmware 42.103.1.5095 - Remote Code Execution (RCE) (Authenticated) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: VMware Fusion 11.5.2 - Privilege Escalation | This is a local exploit for macos platform. Description: VMware Fusion 11.5.2 - Privilege Escalation. Author: Rich Mirch |
Analyze the security implications of: VMware Fusion 11.5.2 - Privilege Escalation | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Quick Classifieds 1.0 - 'index.php3?DOCUMENT_ROOT' Remote File Inclusion | This is a remote exploit for php platform. Description: Quick Classifieds 1.0 - 'index.php3?DOCUMENT_ROOT' Remote File Inclusion. Author: ZoRLu |
Analyze the security implications of: Quick Classifieds 1.0 - 'index.php3?DOCUMENT_ROOT' Remote File Inclusion | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla Firefox 3.6 - 'gfxTextRun::SanitizeGlyphRuns()' Remote Memory Corruption | This is a dos exploit for multiple platform. Description: Mozilla Firefox 3.6 - 'gfxTextRun::SanitizeGlyphRuns()' Remote Memory Corruption. Author: Jesse Ruderman |
Analyze the security implications of: Mozilla Firefox 3.6 - 'gfxTextRun::SanitizeGlyphRuns()' Remote Memory Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Rae Media Real Estate Multi Agent - SQL Injection | This is a webapps exploit for asp platform. Description: Rae Media Real Estate Multi Agent - SQL Injection. Author: R4dc0re |
Analyze the security implications of: Rae Media Real Estate Multi Agent - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Customer Support System 1.0 - 'username' Authentication Bypass | This is a webapps exploit for php platform. Description: Customer Support System 1.0 - 'username' Authentication Bypass. Author: Ahmed Abbas |
Analyze the security implications of: Customer Support System 1.0 - 'username' Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BS Auction - SQL Injection | This is a webapps exploit for php platform. Description: BS Auction - SQL Injection. Author: Easy Laster |
Analyze the security implications of: BS Auction - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component equotes 0.9.4 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component equotes 0.9.4 - SQL Injection. Author: His0k4 |
Analyze the security implications of: Joomla! Component equotes 0.9.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Atomic Photo Album 1.1.0pre4 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Atomic Photo Album 1.1.0pre4 - Insecure Cookie Handling. Author: Stack |
Analyze the security implications of: Atomic Photo Album 1.1.0pre4 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.