input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Multiple Browsers - Address bar Characters | This is a dos exploit for multiple platform. Description: Multiple Browsers - Address bar Characters. Author: Pouya Daneshmand |
Analyze the security implications of: Multiple Browsers - Address bar Characters | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: D-Link DCS-936L Network Camera - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: D-Link DCS-936L Network Camera - Cross-Site Request Forgery. Author: SlidingWindow |
Analyze the security implications of: D-Link DCS-936L Network Camera - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CubeCart 2.0.x - 'view_product.php?product' Full Path Disclosure | This is a webapps exploit for php platform. Description: CubeCart 2.0.x - 'view_product.php?product' Full Path Disclosure. Author: John Cobb |
Analyze the security implications of: CubeCart 2.0.x - 'view_product.php?product' Full Path Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CuteSITE CMS 1.x - '/manage/add_user.php?user_id' SQL Injection | This is a webapps exploit for php platform. Description: CuteSITE CMS 1.x - '/manage/add_user.php?user_id' SQL Injection. Author: High-Tech Bridge SA |
Analyze the security implications of: CuteSITE CMS 1.x - '/manage/add_user.php?user_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AR Memberscript - 'usercp_menu.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: AR Memberscript - 'usercp_menu.php' Remote File Inclusion. Author: ex0 |
Analyze the security implications of: AR Memberscript - 'usercp_menu.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LANSA aXes Web Terminal TN5250 - 'axes_default.css' Cross-Site Scripting | This is a webapps exploit for java platform. Description: LANSA aXes Web Terminal TN5250 - 'axes_default.css' Cross-Site Scripting. Author: Patrick Webster |
Analyze the security implications of: LANSA aXes Web Terminal TN5250 - 'axes_default.css' Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Adobe Flash - Pointer Crash in Drawing and Bitmap Handling | This is a dos exploit for linux platform. Description: Adobe Flash - Pointer Crash in Drawing and Bitmap Handling. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Pointer Crash in Drawing and Bitmap Handling | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Sun Java Applet 1.x - Invocation Version Specification | This is a dos exploit for multiple platform. Description: Sun Java Applet 1.x - Invocation Version Specification. Author: Peter Greenwood |
Analyze the security implications of: Sun Java Applet 1.x - Invocation Version Specification | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: TestLink 1.9.3 - Arbitrary File Upload (Metasploit) | This is a remote exploit for php platform. Description: TestLink 1.9.3 - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: TestLink 1.9.3 - Arbitrary File Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: De-Journal 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: De-Journal 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: De-Journal 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_acprojects - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_acprojects - SQL Injection. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Joomla! Component com_acprojects - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ICProductConfigurator 1.1 - 'key' SQL Injection | This is a webapps exploit for php platform. Description: ICProductConfigurator 1.1 - 'key' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: ICProductConfigurator 1.1 - 'key' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ipswitch WhatsUp Professional 2006 - '/NmConsole/ToolResults.asp?sHostname' Cross-Site Scripting | This is a remote exploit for asp platform. Description: Ipswitch WhatsUp Professional 2006 - '/NmConsole/ToolResults.asp?sHostname' Cross-Site Scripting. Author: David Maciejak |
Analyze the security implications of: Ipswitch WhatsUp Professional 2006 - '/NmConsole/ToolResults.asp?sHostname' Cross-Site Scripting | This exploit targets asp systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: bharat Mediratta Gallery 1.1/1.2 - Directory Traversal | This is a webapps exploit for php platform. Description: bharat Mediratta Gallery 1.1/1.2 - Directory Traversal. Author: Cabezon Aurelien |
Analyze the security implications of: bharat Mediratta Gallery 1.1/1.2 - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Grandora Rialto 1.6 - 'forminfo.asp?refno' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Grandora Rialto 1.6 - 'forminfo.asp?refno' Cross-Site Scripting. Author: laurent gaffie |
Analyze the security implications of: Grandora Rialto 1.6 - 'forminfo.asp?refno' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Polycom RealPresence Resource Manager < 8.4 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Polycom RealPresence Resource Manager < 8.4 - Multiple Vulnerabilities. Author: SEC Consult |
Analyze the security implications of: Polycom RealPresence Resource Manager < 8.4 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FreeBSD - Multiple Vulnerabilities | This is a dos exploit for freebsd platform. Description: FreeBSD - Multiple Vulnerabilities. Author: Core Security |
Analyze the security implications of: FreeBSD - Multiple Vulnerabilities | This exploit targets freebsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Device42 WAN Emulator 2.3 - Ping Command Injection (Metasploit) | This is a webapps exploit for cgi platform. Description: Device42 WAN Emulator 2.3 - Ping Command Injection (Metasploit). Author: Brandon Perry |
Analyze the security implications of: Device42 WAN Emulator 2.3 - Ping Command Injection (Metasploit) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Cisco Unity Express - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: Cisco Unity Express - Multiple Vulnerabilities. Author: Jacob Holcomb |
Analyze the security implications of: Cisco Unity Express - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Ganeti - Multiple Vulnerabilities | This is a dos exploit for multiple platform. Description: Ganeti - Multiple Vulnerabilities. Author: Pierre Kim |
Analyze the security implications of: Ganeti - Multiple Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: KPhone 2.x/3.x/4.0.1 - Malformed STUN Packet Denial of Service | This is a dos exploit for multiple platform. Description: KPhone 2.x/3.x/4.0.1 - Malformed STUN Packet Denial of Service. Author: storm |
Analyze the security implications of: KPhone 2.x/3.x/4.0.1 - Malformed STUN Packet Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AIX 4.2/4.3 - '/usr/lib/lpd/pio/etc/piomkapqd' Local Buffer Overflow | This is a local exploit for aix platform. Description: AIX 4.2/4.3 - '/usr/lib/lpd/pio/etc/piomkapqd' Local Buffer Overflow. Author: Last Stage of Delirium |
Analyze the security implications of: AIX 4.2/4.3 - '/usr/lib/lpd/pio/etc/piomkapqd' Local Buffer Overflow | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Adobe Flash (Linux x64) - Bad Dereference at 0x23c | This is a dos exploit for linux_x86-64 platform. Description: Adobe Flash (Linux x64) - Bad Dereference at 0x23c. Author: Google Security Research |
Analyze the security implications of: Adobe Flash (Linux x64) - Bad Dereference at 0x23c | This exploit targets linux_x86-64 systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux_x86-64 platform |
What is this exploit about: Airmail 3.0.2 - Cross-Site Scripting | This is a webapps exploit for osx platform. Description: Airmail 3.0.2 - Cross-Site Scripting. Author: redrain |
Analyze the security implications of: Airmail 3.0.2 - Cross-Site Scripting | This exploit targets osx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Joomla! Component Picture Calendar for Joomla! 3.1.4 - Directory Traversal | This is a webapps exploit for php platform. Description: Joomla! Component Picture Calendar for Joomla! 3.1.4 - Directory Traversal. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Picture Calendar for Joomla! 3.1.4 - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flexphpsite 0.0.1 - Authentication Bypass | This is a webapps exploit for php platform. Description: Flexphpsite 0.0.1 - Authentication Bypass. Author: x0r |
Analyze the security implications of: Flexphpsite 0.0.1 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel - UDP Fragmentation Offset 'UFO' Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: Linux Kernel - UDP Fragmentation Offset 'UFO' Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Linux Kernel - UDP Fragmentation Offset 'UFO' Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Claroline 1.8 - '/tracking/toolaccess_details.php?toolId' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Claroline 1.8 - '/tracking/toolaccess_details.php?toolId' Cross-Site Scripting. Author: DSecRG |
Analyze the security implications of: Claroline 1.8 - '/tracking/toolaccess_details.php?toolId' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Atlassian JIRA 3.7.3 - BrowseProject.JSPA Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Atlassian JIRA 3.7.3 - BrowseProject.JSPA Cross-Site Scripting. Author: BL4CK |
Analyze the security implications of: Atlassian JIRA 3.7.3 - BrowseProject.JSPA Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: lighttpd 1.4/1.5 - Slow Request Handling Remote Denial of Service | This is a dos exploit for linux platform. Description: lighttpd 1.4/1.5 - Slow Request Handling Remote Denial of Service. Author: Li Ming |
Analyze the security implications of: lighttpd 1.4/1.5 - Slow Request Handling Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Blog PixelMotion - 'categorie' SQL Injection | This is a webapps exploit for php platform. Description: Blog PixelMotion - 'categorie' SQL Injection. Author: parad0x |
Analyze the security implications of: Blog PixelMotion - 'categorie' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FlatNuke 2.5.6 - 'ID' Directory Traversal | This is a webapps exploit for php platform. Description: FlatNuke 2.5.6 - 'ID' Directory Traversal. Author: rgod |
Analyze the security implications of: FlatNuke 2.5.6 - 'ID' Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BMForum 5.6 - 'tagname' SQL Injection | This is a webapps exploit for php platform. Description: BMForum 5.6 - 'tagname' SQL Injection. Author: ~!Dok_tOR!~ |
Analyze the security implications of: BMForum 5.6 - 'tagname' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.