input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle Java Runtime Environment - Heap Out-of-Bounds Read During TTF Font Rendering in OpenTypeLayoutEngine::adjustGlyphPositions | This is a dos exploit for java platform. Description: Oracle Java Runtime Environment - Heap Out-of-Bounds Read During TTF Font Rendering in OpenTypeLayoutEngine::adjustGlyphPositions. Author: Google Security Research |
Analyze the security implications of: Oracle Java Runtime Environment - Heap Out-of-Bounds Read During TTF Font Rendering in OpenTypeLayoutEngine::adjustGlyphPositions | This exploit targets java systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Symantec Web Gateway 5.0.3.18 - Arbitrary Password Change (Metasploit) | This is a webapps exploit for linux platform. Description: Symantec Web Gateway 5.0.3.18 - Arbitrary Password Change (Metasploit). Author: Kc57 |
Analyze the security implications of: Symantec Web Gateway 5.0.3.18 - Arbitrary Password Change (Metasploit) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Shopstorenow E-Commerce Shopping Cart - 'Orange.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Shopstorenow E-Commerce Shopping Cart - 'Orange.asp' SQL Injection. Author: IbnuSina |
Analyze the security implications of: Shopstorenow E-Commerce Shopping Cart - 'Orange.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ClipShare 4.1.1 - 'gid' Blind SQL Injection | This is a webapps exploit for php platform. Description: ClipShare 4.1.1 - 'gid' Blind SQL Injection. Author: Esac |
Analyze the security implications of: ClipShare 4.1.1 - 'gid' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Webmin < 1.920 - 'rpc.cgi' Remote Code Execution (Metasploit) | This is a webapps exploit for linux platform. Description: Webmin < 1.920 - 'rpc.cgi' Remote Code Execution (Metasploit). Author: James Bercegay |
Analyze the security implications of: Webmin < 1.920 - 'rpc.cgi' Remote Code Execution (Metasploit) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component JE Awd Song - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component JE Awd Song - Persistent Cross-Site Scripting. Author: Sid3^effects |
Analyze the security implications of: Joomla! Component JE Awd Song - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Android - WifiNative::setHotlist Stack Overflow | This is a dos exploit for android platform. Description: Google Android - WifiNative::setHotlist Stack Overflow. Author: Google Security Research |
Analyze the security implications of: Google Android - WifiNative::setHotlist Stack Overflow | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Customer Support System 1.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Customer Support System 1.0 - 'id' SQL Injection. Author: Saeed Bala Ahmed |
Analyze the security implications of: Customer Support System 1.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX Kernel - IOAccelMemoryInfoUserClient Use-After-Free | This is a dos exploit for osx platform. Description: Apple Mac OSX Kernel - IOAccelMemoryInfoUserClient Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX Kernel - IOAccelMemoryInfoUserClient Use-After-Free | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: FortiOS_ FortiProxy_ FortiSwitchManager v7.2.1 - Authentication Bypass | This is a webapps exploit for multiple platform. Description: FortiOS_ FortiProxy_ FortiSwitchManager v7.2.1 - Authentication Bypass. Author: Felipe Alcantara |
Analyze the security implications of: FortiOS_ FortiProxy_ FortiSwitchManager v7.2.1 - Authentication Bypass | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: E-ShopSystem - Authentication Bypass / SQL Injection | This is a webapps exploit for asp platform. Description: E-ShopSystem - Authentication Bypass / SQL Injection. Author: InjEctOr5 |
Analyze the security implications of: E-ShopSystem - Authentication Bypass / SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Pydio Cells 4.1.2 - Unauthorised Role Assignments | This is a webapps exploit for go platform. Description: Pydio Cells 4.1.2 - Unauthorised Role Assignments. Author: RedTeam Pentesting GmbH |
Analyze the security implications of: Pydio Cells 4.1.2 - Unauthorised Role Assignments | This exploit targets go systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets go platform |
What is this exploit about: Tektronix Phaser Network Printer 740/750/750DP/840/930 PhaserLink WebServer - Retrieve Administrator Password | This is a remote exploit for hardware platform. Description: Tektronix Phaser Network Printer 740/750/750DP/840/930 PhaserLink WebServer - Retrieve Administrator Password. Author: Dennis W. Mattison |
Analyze the security implications of: Tektronix Phaser Network Printer 740/750/750DP/840/930 PhaserLink WebServer - Retrieve Administrator Password | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Kostenloses Linkmanagementscript - SQL Injection | This is a webapps exploit for php platform. Description: Kostenloses Linkmanagementscript - SQL Injection. Author: Virangar Security |
Analyze the security implications of: Kostenloses Linkmanagementscript - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: QEMU 0.9 / KVM 36/79 - VNC Server Remote Denial of Service | This is a dos exploit for linux platform. Description: QEMU 0.9 / KVM 36/79 - VNC Server Remote Denial of Service. Author: Alfredo Ortega |
Analyze the security implications of: QEMU 0.9 / KVM 36/79 - VNC Server Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: 68 Classifieds 4.1 - 'toplistings.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: 68 Classifieds 4.1 - 'toplistings.php' Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: 68 Classifieds 4.1 - 'toplistings.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple WebKit 10.0.2 - HTMLInputElement Use-After-Free | This is a dos exploit for multiple platform. Description: Apple WebKit 10.0.2 - HTMLInputElement Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Apple WebKit 10.0.2 - HTMLInputElement Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DataLife Engine 4.1 - SQL Injection | This is a webapps exploit for php platform. Description: DataLife Engine 4.1 - SQL Injection. Author: RusH |
Analyze the security implications of: DataLife Engine 4.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Tunnelblick - Local Privilege Escalation (1) | This is a local exploit for osx platform. Description: Tunnelblick - Local Privilege Escalation (1). Author: zx2c4 |
Analyze the security implications of: Tunnelblick - Local Privilege Escalation (1) | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: EsContacts 1.0 - 'add_groupe.php?msg' Cross-Site Scripting | This is a webapps exploit for php platform. Description: EsContacts 1.0 - 'add_groupe.php?msg' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: EsContacts 1.0 - 'add_groupe.php?msg' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JBlog 1.0 - 'index.php?id' SQL Injection | This is a webapps exploit for php platform. Description: JBlog 1.0 - 'index.php?id' SQL Injection. Author: s4mi |
Analyze the security implications of: JBlog 1.0 - 'index.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Autolinks 2.1 Pro - 'Al_initialize.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Autolinks 2.1 Pro - 'Al_initialize.php' Remote File Inclusion. Author: 4Degrees |
Analyze the security implications of: Autolinks 2.1 Pro - 'Al_initialize.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Explay CMS 2.1 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Explay CMS 2.1 - Insecure Cookie Handling. Author: Stack |
Analyze the security implications of: Explay CMS 2.1 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LinkBase 2.0 - Remote Cookie Grabber | This is a webapps exploit for php platform. Description: LinkBase 2.0 - Remote Cookie Grabber. Author: SirGod |
Analyze the security implications of: LinkBase 2.0 - Remote Cookie Grabber | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 2Moons 1.4 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: 2Moons 1.4 - Multiple Remote File Inclusions. Author: indoushka |
Analyze the security implications of: 2Moons 1.4 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Netgear DGN2200 / DGND3700 - Admin Password Disclosure | This is a webapps exploit for hardware platform. Description: Netgear DGN2200 / DGND3700 - Admin Password Disclosure. Author: Social Engineering Neo |
Analyze the security implications of: Netgear DGN2200 / DGND3700 - Admin Password Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Agora-Project 2.12.11 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Agora-Project 2.12.11 - Arbitrary File Upload. Author: Misa3l |
Analyze the security implications of: Agora-Project 2.12.11 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_blog - Directory Traversal | This is a webapps exploit for php platform. Description: Joomla! Component com_blog - Directory Traversal. Author: DevilZ TM |
Analyze the security implications of: Joomla! Component com_blog - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebRTC - VP8 Block Decoding Use-After-Free | This is a dos exploit for multiple platform. Description: WebRTC - VP8 Block Decoding Use-After-Free. Author: Google Security Research |
Analyze the security implications of: WebRTC - VP8 Block Decoding Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: KDE FTP - KIOSlave URI Arbitrary FTP Server Command Execution | This is a remote exploit for linux platform. Description: KDE FTP - KIOSlave URI Arbitrary FTP Server Command Execution. Author: Albert Puigsech Galicia |
Analyze the security implications of: KDE FTP - KIOSlave URI Arbitrary FTP Server Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FuseTalk Forums 3.2 - 'windowed' Cross-Site Scripting | This is a webapps exploit for php platform. Description: FuseTalk Forums 3.2 - 'windowed' Cross-Site Scripting. Author: sonyy |
Analyze the security implications of: FuseTalk Forums 3.2 - 'windowed' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OliveOffice Mobile Suite 2.0.3 iOS - Local File Inclusion | This is a webapps exploit for ios platform. Description: OliveOffice Mobile Suite 2.0.3 iOS - Local File Inclusion. Author: Vulnerability-Lab |
Analyze the security implications of: OliveOffice Mobile Suite 2.0.3 iOS - Local File Inclusion | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Diferior 8.03 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Diferior 8.03 - Multiple Cross-Site Scripting Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: Diferior 8.03 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.