input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iBoutique eCommerce 4.0 - Multiple Web Vulnerabilities | This is a webapps exploit for php platform. Description: iBoutique eCommerce 4.0 - Multiple Web Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: iBoutique eCommerce 4.0 - Multiple Web Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Centova Cast 3.2.11 - Arbitrary File Download | This is a webapps exploit for hardware platform. Description: Centova Cast 3.2.11 - Arbitrary File Download. Author: DroidU |
Analyze the security implications of: Centova Cast 3.2.11 - Arbitrary File Download | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Answerdev 1.0.3 - Account Takeover | This is a webapps exploit for go platform. Description: Answerdev 1.0.3 - Account Takeover. Author: Eduardo Pérez-Malumbres Cervera |
Analyze the security implications of: Answerdev 1.0.3 - Account Takeover | This exploit targets go systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets go platform |
What is this exploit about: BT Voyager 2000 Wireless ADSL Router - SNMP Community String Information Disclosure | This is a remote exploit for hardware platform. Description: BT Voyager 2000 Wireless ADSL Router - SNMP Community String Information Disclosure. Author: Konstantin V. Gavrilenko |
Analyze the security implications of: BT Voyager 2000 Wireless ADSL Router - SNMP Community String Information Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CakePHP 2.x < 2.2.0-RC2 - XML External Entity Injection | This is a webapps exploit for php platform. Description: CakePHP 2.x < 2.2.0-RC2 - XML External Entity Injection. Author: Pawel Wylecial |
Analyze the security implications of: CakePHP 2.x < 2.2.0-RC2 - XML External Entity Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lexmark Multiple Laser printers - Remote Stack Overflow | This is a dos exploit for hardware platform. Description: Lexmark Multiple Laser printers - Remote Stack Overflow. Author: Francis Provencher |
Analyze the security implications of: Lexmark Multiple Laser printers - Remote Stack Overflow | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: SquirrelMail < 1.4.22 - Remote Code Execution | This is a remote exploit for linux platform. Description: SquirrelMail < 1.4.22 - Remote Code Execution. Author: Dawid Golunski |
Analyze the security implications of: SquirrelMail < 1.4.22 - Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Netgear SPH200D - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Netgear SPH200D - Multiple Vulnerabilities. Author: m-1-k-3 |
Analyze the security implications of: Netgear SPH200D - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Campsite 2.6.1 - 'topic.php?g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'topic.php?g_documentRoot' Remote File Inclusion. Author: anonymous |
Analyze the security implications of: Campsite 2.6.1 - 'topic.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Quick News - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Quick News - SQL Injection. Author: Don Tukulesto |
Analyze the security implications of: Joomla! Component Quick News - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BSD-Games 2.x - Monop Player Name Local Buffer Overrun (1) | This is a local exploit for bsd platform. Description: BSD-Games 2.x - Monop Player Name Local Buffer Overrun (1). Author: ^sq |
Analyze the security implications of: BSD-Games 2.x - Monop Player Name Local Buffer Overrun (1) | This exploit targets bsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: DUportal Pro 3.4 - 'detail.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: DUportal Pro 3.4 - 'detail.asp' Multiple SQL Injections. Author: Dcrab |
Analyze the security implications of: DUportal Pro 3.4 - 'detail.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Roger Wilco Server 1.4.1 - Unauthorized Audio Stream Denial of Service | This is a dos exploit for multiple platform. Description: Roger Wilco Server 1.4.1 - Unauthorized Audio Stream Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Roger Wilco Server 1.4.1 - Unauthorized Audio Stream Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: OpenText Documentum Content Server - dm_bp_transition.ebs docbase Method Arbitrary Code Execution | This is a webapps exploit for multiple platform. Description: OpenText Documentum Content Server - dm_bp_transition.ebs docbase Method Arbitrary Code Execution. Author: Andrey B. Panfilov |
Analyze the security implications of: OpenText Documentum Content Server - dm_bp_transition.ebs docbase Method Arbitrary Code Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Boat Classifieds - SQL Injection | This is a webapps exploit for asp platform. Description: Boat Classifieds - SQL Injection. Author: Sangteamtham |
Analyze the security implications of: Boat Classifieds - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Oracle Portal 10g - 'P_OldURL' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Oracle Portal 10g - 'P_OldURL' Cross-Site Scripting. Author: d3nx |
Analyze the security implications of: Oracle Portal 10g - 'P_OldURL' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Perl$hop E-Commerce Script - Trust Boundary Input Parameter Injection | This is a webapps exploit for cgi platform. Description: Perl$hop E-Commerce Script - Trust Boundary Input Parameter Injection. Author: Shadow |
Analyze the security implications of: Perl$hop E-Commerce Script - Trust Boundary Input Parameter Injection | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Chitor-CMS v1.1.2 - Pre-Auth SQL Injection | This is a webapps exploit for php platform. Description: Chitor-CMS v1.1.2 - Pre-Auth SQL Injection. Author: msd0pe |
Analyze the security implications of: Chitor-CMS v1.1.2 - Pre-Auth SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ispCP Omega 1.0.4 - Remote File Inclusion | This is a webapps exploit for php platform. Description: ispCP Omega 1.0.4 - Remote File Inclusion. Author: cr4wl3r |
Analyze the security implications of: ispCP Omega 1.0.4 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Veritas NetBackup 6.0 (OSX) - 'bpjava-msvc' Remote Command Execution | This is a remote exploit for osx platform. Description: Veritas NetBackup 6.0 (OSX) - 'bpjava-msvc' Remote Command Execution. Author: Kevin Finisterre |
Analyze the security implications of: Veritas NetBackup 6.0 (OSX) - 'bpjava-msvc' Remote Command Execution | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Article Directory - 'index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Article Directory - 'index.php' Remote File Inclusion. Author: mozi |
Analyze the security implications of: Article Directory - 'index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: extropia webstore 1.0/2.0 - Directory Traversal | This is a remote exploit for cgi platform. Description: extropia webstore 1.0/2.0 - Directory Traversal. Author: f0bic |
Analyze the security implications of: extropia webstore 1.0/2.0 - Directory Traversal | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Apache Tomcat 3.2 - 404 Error Page Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Apache Tomcat 3.2 - 404 Error Page Cross-Site Scripting. Author: MustLive |
Analyze the security implications of: Apache Tomcat 3.2 - 404 Error Page Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Adobe Flash - MovieClip Attach init Object Use-After-Free | This is a dos exploit for multiple platform. Description: Adobe Flash - MovieClip Attach init Object Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - MovieClip Attach init Object Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FireConfig 0.5 - 'dl.php' Remote File Disclosure | This is a webapps exploit for php platform. Description: FireConfig 0.5 - 'dl.php' Remote File Disclosure. Author: GoLd_M |
Analyze the security implications of: FireConfig 0.5 - 'dl.php' Remote File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AWCM CMS - Local File Inclusion | This is a webapps exploit for php platform. Description: AWCM CMS - Local File Inclusion. Author: SwEET-DeViL |
Analyze the security implications of: AWCM CMS - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Advertiz PHP Script 0.2 - Cross-Site Request Forgery (Update Admin) | This is a webapps exploit for php platform. Description: Advertiz PHP Script 0.2 - Cross-Site Request Forgery (Update Admin). Author: Ihsan Sencan |
Analyze the security implications of: Advertiz PHP Script 0.2 - Cross-Site Request Forgery (Update Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_bayesiannaivefilter 1.1 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_bayesiannaivefilter 1.1 - Remote File Inclusion. Author: Pablin77 |
Analyze the security implications of: Joomla! Component com_bayesiannaivefilter 1.1 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jax PHP Scripts 1.0/1.34/2.14/3.31 petitionbook Script - User IP Disclosure | This is a webapps exploit for php platform. Description: Jax PHP Scripts 1.0/1.34/2.14/3.31 petitionbook Script - User IP Disclosure. Author: Lostmon |
Analyze the security implications of: Jax PHP Scripts 1.0/1.34/2.14/3.31 petitionbook Script - User IP Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Fields - SQLi Remote Code Execution (Metasploit) | This is a webapps exploit for php platform. Description: Joomla! Component Fields - SQLi Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Joomla! Component Fields - SQLi Remote Code Execution (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JE Media Player - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component JE Media Player - Local File Inclusion. Author: Sid3^effects |
Analyze the security implications of: Joomla! Component JE Media Player - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.x - IPv6_SockGlue.c Null Pointer Dereference Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - IPv6_SockGlue.c Null Pointer Dereference Denial of Service. Author: Joey Mengele |
Analyze the security implications of: Linux Kernel 2.6.x - IPv6_SockGlue.c Null Pointer Dereference Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Atlassian JIRA 3.4.2 - IssueNavigator.JSPA Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Atlassian JIRA 3.4.2 - IssueNavigator.JSPA Cross-Site Scripting. Author: syniack |
Analyze the security implications of: Atlassian JIRA 3.4.2 - IssueNavigator.JSPA Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.