input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ownCloud 10.3.0 stable - Cross-Site Request Forgery
|
This is a webapps exploit for linux platform. Description: ownCloud 10.3.0 stable - Cross-Site Request Forgery. Author: Ozer Goker
|
Analyze the security implications of: ownCloud 10.3.0 stable - Cross-Site Request Forgery
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Horde IMP Webmail 4.3.7 - 'fetchmailprefs.php' HTML Injection
|
This is a webapps exploit for php platform. Description: Horde IMP Webmail 4.3.7 - 'fetchmailprefs.php' HTML Injection. Author: Moritz Naumann
|
Analyze the security implications of: Horde IMP Webmail 4.3.7 - 'fetchmailprefs.php' HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Petrol Pump Management Software v1.0 - Remote Code Execution via File Upload
|
This is a remote exploit for php platform. Description: Petrol Pump Management Software v1.0 - Remote Code Execution via File Upload. Author: Shubham Pandey
|
Analyze the security implications of: Petrol Pump Management Software v1.0 - Remote Code Execution via File Upload
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sepcity Shopping Mall - SQL Injection
|
This is a webapps exploit for asp platform. Description: Sepcity Shopping Mall - SQL Injection. Author: Osmanizim
|
Analyze the security implications of: Sepcity Shopping Mall - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Oracle Database Server 8.1.7/9.0.x - ctxsys.driload Access Validation
|
This is a remote exploit for multiple platform. Description: Oracle Database Server 8.1.7/9.0.x - ctxsys.driload Access Validation. Author: Alexander Kornbrust
|
Analyze the security implications of: Oracle Database Server 8.1.7/9.0.x - ctxsys.driload Access Validation
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: GLPI 0.83.8 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: GLPI 0.83.8 - Multiple Vulnerabilities. Author: LiquidWorm
|
Analyze the security implications of: GLPI 0.83.8 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Palo Alto Networks PanOS - appweb3 Stack Buffer Overflow
|
This is a dos exploit for linux platform. Description: Palo Alto Networks PanOS - appweb3 Stack Buffer Overflow. Author: Google Security Research
|
Analyze the security implications of: Palo Alto Networks PanOS - appweb3 Stack Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Affiliate Market 0.1 Beta - Cross-Site Scripting / SQL Injection
|
This is a webapps exploit for php platform. Description: Affiliate Market 0.1 Beta - Cross-Site Scripting / SQL Injection. Author: Khashayar Fereidani
|
Analyze the security implications of: Affiliate Market 0.1 Beta - Cross-Site Scripting / SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Plugin JD-WordPress 2.0 RC2 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Plugin JD-WordPress 2.0 RC2 - Remote File Inclusion. Author: Don Tukulesto
|
Analyze the security implications of: Joomla! Plugin JD-WordPress 2.0 RC2 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BaconMap 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: BaconMap 1.0 - SQL Injection. Author: John Leitch
|
Analyze the security implications of: BaconMap 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GNU/Linux mbse-bbs 0.70.0 - Local Buffer Overflow
|
This is a local exploit for linux platform. Description: GNU/Linux mbse-bbs 0.70.0 - Local Buffer Overflow. Author: prdelka
|
Analyze the security implications of: GNU/Linux mbse-bbs 0.70.0 - Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: INDEXU 5.0.1 - 'base_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: INDEXU 5.0.1 - 'base_path' Remote File Inclusion. Author: K-159
|
Analyze the security implications of: INDEXU 5.0.1 - 'base_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Axent Raptor 6.0 - Denial of Service
|
This is a dos exploit for bsd platform. Description: Axent Raptor 6.0 - Denial of Service. Author: MSG.Net
|
Analyze the security implications of: Axent Raptor 6.0 - Denial of Service
|
This exploit targets bsd systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets bsd platform
|
What is this exploit about: Interscan Web Security Virtual Appliance 5.0 - Arbitrary File Download
|
This is a webapps exploit for multiple platform. Description: Interscan Web Security Virtual Appliance 5.0 - Arbitrary File Download. Author: Ivan Huertas
|
Analyze the security implications of: Interscan Web Security Virtual Appliance 5.0 - Arbitrary File Download
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Security IP Camera Star Vision DVR - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Security IP Camera Star Vision DVR - Authentication Bypass. Author: Meisam Monsef
|
Analyze the security implications of: Security IP Camera Star Vision DVR - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Apple Safari 4 - 'feeds:' URI Null Pointer Dereference Remote Denial of Service
|
This is a dos exploit for osx platform. Description: Apple Safari 4 - 'feeds:' URI Null Pointer Dereference Remote Denial of Service. Author: Trancer
|
Analyze the security implications of: Apple Safari 4 - 'feeds:' URI Null Pointer Dereference Remote Denial of Service
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: InfraPower PPS-02-S Q213V1 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: InfraPower PPS-02-S Q213V1 - Authentication Bypass. Author: LiquidWorm
|
Analyze the security implications of: InfraPower PPS-02-S Q213V1 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jon Howell Faq-O-Matic 2.7 - Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: Jon Howell Faq-O-Matic 2.7 - Cross-Site Scripting. Author: BrainRawt
|
Analyze the security implications of: Jon Howell Faq-O-Matic 2.7 - Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Lycos HTMLGear - guestGear CSS HTML Injection
|
This is a webapps exploit for cgi platform. Description: Lycos HTMLGear - guestGear CSS HTML Injection. Author: Matthew Murphy
|
Analyze the security implications of: Lycos HTMLGear - guestGear CSS HTML Injection
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: CISCO Small Business 200 / 300 / 500 Switches - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: CISCO Small Business 200 / 300 / 500 Switches - Multiple Vulnerabilities. Author: Ramikan
|
Analyze the security implications of: CISCO Small Business 200 / 300 / 500 Switches - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: XMail 1.21 - '-t' Command Line Option Local Buffer Overflow / Local Privilege Escalation
|
This is a local exploit for linux platform. Description: XMail 1.21 - '-t' Command Line Option Local Buffer Overflow / Local Privilege Escalation. Author: qaaz
|
Analyze the security implications of: XMail 1.21 - '-t' Command Line Option Local Buffer Overflow / Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Thomson SpeedTouch 500 Series - LocalNetwork Page 'name' Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: Thomson SpeedTouch 500 Series - LocalNetwork Page 'name' Cross-Site Scripting. Author: Preben Nylokken
|
Analyze the security implications of: Thomson SpeedTouch 500 Series - LocalNetwork Page 'name' Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: H-Sphere 2.5.1 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for java platform. Description: H-Sphere 2.5.1 - Multiple Cross-Site Scripting Vulnerabilities. Author: r0t
|
Analyze the security implications of: H-Sphere 2.5.1 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Content-Builder (CMS) 0.7.2 - Multiple Include Vulnerabilities
|
This is a webapps exploit for php platform. Description: Content-Builder (CMS) 0.7.2 - Multiple Include Vulnerabilities. Author: Kacper
|
Analyze the security implications of: Content-Builder (CMS) 0.7.2 - Multiple Include Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Viola DVR VIO-4/1000 - Multiple Directory Traversal Vulnerabilities
|
This is a remote exploit for linux platform. Description: Viola DVR VIO-4/1000 - Multiple Directory Traversal Vulnerabilities. Author: QSecure
|
Analyze the security implications of: Viola DVR VIO-4/1000 - Multiple Directory Traversal Vulnerabilities
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Easy Message Board - Remote Command Execution
|
This is a webapps exploit for cgi platform. Description: Easy Message Board - Remote Command Execution. Author: SoulBlack Group
|
Analyze the security implications of: Easy Message Board - Remote Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Joomla! Component com_gallery_wd - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_gallery_wd - SQL Injection. Author: CrashBandicot
|
Analyze the security implications of: Joomla! Component com_gallery_wd - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FdWeB Espace Membre 2.01 - 'path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: FdWeB Espace Membre 2.01 - 'path' Remote File Inclusion. Author: ajann
|
Analyze the security implications of: FdWeB Espace Membre 2.01 - 'path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_jomestate - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_jomestate - Remote File Inclusion. Author: Sid3^effects
|
Analyze the security implications of: Joomla! Component com_jomestate - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM Directory Server 4.1 - Web Administration Interface Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: IBM Directory Server 4.1 - Web Administration Interface Cross-Site Scripting. Author: Oliver Karow
|
Analyze the security implications of: IBM Directory Server 4.1 - Web Administration Interface Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: PLD Software Ebola 0.1.4 - Remote Buffer Overflow
|
This is a remote exploit for linux platform. Description: PLD Software Ebola 0.1.4 - Remote Buffer Overflow. Author: c0wboy
|
Analyze the security implications of: PLD Software Ebola 0.1.4 - Remote Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Belden Garrettcom 6K/10K Switches - Authentication Bypass / Memory Corruption
|
This is a webapps exploit for php platform. Description: Belden Garrettcom 6K/10K Switches - Authentication Bypass / Memory Corruption. Author: David Tomaschik
|
Analyze the security implications of: Belden Garrettcom 6K/10K Switches - Authentication Bypass / Memory Corruption
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mambo Module Weather - 'absolute_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Mambo Module Weather - 'absolute_path' Remote File Inclusion. Author: Cold Zero
|
Analyze the security implications of: Mambo Module Weather - 'absolute_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.