input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Joomla! Component JoomlaPack 1.0.4a2 RE - 'CAltInstaller.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component JoomlaPack 1.0.4a2 RE - 'CAltInstaller.php' Remote File Inclusion. Author: Cold Zero |
Analyze the security implications of: Joomla! Component JoomlaPack 1.0.4a2 RE - 'CAltInstaller.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ICJobSite 1.1 - 'pid' SQL Injection | This is a webapps exploit for php platform. Description: ICJobSite 1.1 - 'pid' SQL Injection. Author: RoAd_KiLlEr |
Analyze the security implications of: ICJobSite 1.1 - 'pid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebKit - 'WebCore::SimpleLineLayout::RunResolver::runForPoint' Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: WebKit - 'WebCore::SimpleLineLayout::RunResolver::runForPoint' Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: WebKit - 'WebCore::SimpleLineLayout::RunResolver::runForPoint' Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linkspider 1.08 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Linkspider 1.08 - Multiple Remote File Inclusions. Author: Rohit Bansal |
Analyze the security implications of: Linkspider 1.08 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SAS Hotel Management System - Arbitrary File Upload | This is a webapps exploit for asp platform. Description: SAS Hotel Management System - Arbitrary File Upload. Author: ZoRLu |
Analyze the security implications of: SAS Hotel Management System - Arbitrary File Upload | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: JiRos Banner Experience 1.0 - Unauthorized Create Admin | This is a webapps exploit for asp platform. Description: JiRos Banner Experience 1.0 - Unauthorized Create Admin. Author: nukedx |
Analyze the security implications of: JiRos Banner Experience 1.0 - Unauthorized Create Admin | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Sysaid 20.1.11 b26 - Remote Command Execution | This is a webapps exploit for java platform. Description: Sysaid 20.1.11 b26 - Remote Command Execution. Author: Ahmed Sherif |
Analyze the security implications of: Sysaid 20.1.11 b26 - Remote Command Execution | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Netgear WG102 - Leaks SNMP Write Password With Read Access | This is a remote exploit for hardware platform. Description: Netgear WG102 - Leaks SNMP Write Password With Read Access. Author: Harm S.I. Vaittes |
Analyze the security implications of: Netgear WG102 - Leaks SNMP Write Password With Read Access | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: TwonkyMedia Server 7.0.11-8.5 - Directory Traversal | This is a webapps exploit for multiple platform. Description: TwonkyMedia Server 7.0.11-8.5 - Directory Traversal. Author: Sven Fassbender |
Analyze the security implications of: TwonkyMedia Server 7.0.11-8.5 - Directory Traversal | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux Kernel 2.6.x - VFat Compat IOCTLS Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - VFat Compat IOCTLS Local Denial of Service. Author: Bart Oldeman |
Analyze the security implications of: Linux Kernel 2.6.x - VFat Compat IOCTLS Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Stream / Raped (Windows) - Denial of Service | This is a dos exploit for multiple platform. Description: Stream / Raped (Windows) - Denial of Service. Author: Marco Del Percio |
Analyze the security implications of: Stream / Raped (Windows) - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ping IP - Authentication Bypass | This is a webapps exploit for asp platform. Description: Ping IP - Authentication Bypass. Author: ByALBAYX |
Analyze the security implications of: Ping IP - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: BlogEngine.NET 3.3.6 - Directory Traversal / Remote Code Execution | This is a webapps exploit for aspx platform. Description: BlogEngine.NET 3.3.6 - Directory Traversal / Remote Code Execution. Author: Dustin Cobb |
Analyze the security implications of: BlogEngine.NET 3.3.6 - Directory Traversal / Remote Code Execution | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Active Auction House - 'WatchThisItem.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Active Auction House - 'WatchThisItem.asp' Cross-Site Scripting. Author: Dcrab |
Analyze the security implications of: Active Auction House - 'WatchThisItem.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linksys E-series - Remote Code Execution | This is a remote exploit for hardware platform. Description: Linksys E-series - Remote Code Execution. Author: Rew |
Analyze the security implications of: Linksys E-series - Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: SquirrelMail 1.x - Email Header HTML Injection | This is a remote exploit for linux platform. Description: SquirrelMail 1.x - Email Header HTML Injection. Author: Roman Medina |
Analyze the security implications of: SquirrelMail 1.x - Email Header HTML Injection | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Auktionshaus 3.0.0.1 - 'news.php?id' SQL Injection | This is a webapps exploit for php platform. Description: Auktionshaus 3.0.0.1 - 'news.php?id' SQL Injection. Author: Easy Laster |
Analyze the security implications of: Auktionshaus 3.0.0.1 - 'news.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EXoops - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: EXoops - Multiple Input Validation Vulnerabilities. Author: Diabolic Crab |
Analyze the security implications of: EXoops - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iManage CMS 4.0.12 - 'absolute_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: iManage CMS 4.0.12 - 'absolute_path' Remote File Inclusion. Author: Matdhule |
Analyze the security implications of: iManage CMS 4.0.12 - 'absolute_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NetGear D1500 V1.0.0.21_1.0.1PE - 'Wireless Repeater' Stored Cross-Site Scripting (XSS) | This is a webapps exploit for hardware platform. Description: NetGear D1500 V1.0.0.21_1.0.1PE - 'Wireless Repeater' Stored Cross-Site Scripting (XSS). Author: Securityium |
Analyze the security implications of: NetGear D1500 V1.0.0.21_1.0.1PE - 'Wireless Repeater' Stored Cross-Site Scripting (XSS) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Orchard Core RC1 - Persistent Cross-Site Scripting | This is a webapps exploit for aspx platform. Description: Orchard Core RC1 - Persistent Cross-Site Scripting. Author: SunCSR |
Analyze the security implications of: Orchard Core RC1 - Persistent Cross-Site Scripting | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Jinfornet Jreport 15.6 - Unauthenticated Directory Traversal | This is a webapps exploit for java platform. Description: Jinfornet Jreport 15.6 - Unauthenticated Directory Traversal. Author: hongphukt |
Analyze the security implications of: Jinfornet Jreport 15.6 - Unauthenticated Directory Traversal | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: EPESI 1.8.2 rev20170830 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: EPESI 1.8.2 rev20170830 - Cross-Site Scripting. Author: Zeeshan Shaikh |
Analyze the security implications of: EPESI 1.8.2 rev20170830 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Chrome < M72 - PaymentRequest Service Use-After-Free | This is a dos exploit for multiple platform. Description: Google Chrome < M72 - PaymentRequest Service Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Google Chrome < M72 - PaymentRequest Service Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Netatalk 3.1.12 - Authentication Bypass | This is a remote exploit for multiple platform. Description: Netatalk 3.1.12 - Authentication Bypass. Author: Jacob Baines |
Analyze the security implications of: Netatalk 3.1.12 - Authentication Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PHP 5 - 'wddx_deserialize()' String Append Crash | This is a dos exploit for multiple platform. Description: PHP 5 - 'wddx_deserialize()' String Append Crash. Author: Stefan Esser |
Analyze the security implications of: PHP 5 - 'wddx_deserialize()' String Append Crash | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! 1.5.x - Cross-Site Scripting / Information Disclosure | This is a webapps exploit for php platform. Description: Joomla! 1.5.x - Cross-Site Scripting / Information Disclosure. Author: Juan Galiana Lara |
Analyze the security implications of: Joomla! 1.5.x - Cross-Site Scripting / Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GOUAE DWD Realty - 'Password' SQL Injection | This is a webapps exploit for asp platform. Description: GOUAE DWD Realty - 'Password' SQL Injection. Author: Aria-Security Team |
Analyze the security implications of: GOUAE DWD Realty - 'Password' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Adult Script Pro 2.2.4 - SQL Injection | This is a webapps exploit for php platform. Description: Adult Script Pro 2.2.4 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Adult Script Pro 2.2.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Midicart ASP - Remote Customer Information Retrieval | This is a webapps exploit for asp platform. Description: Midicart ASP - Remote Customer Information Retrieval. Author: Dimitri Sekhniashvili |
Analyze the security implications of: Midicart ASP - Remote Customer Information Retrieval | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linux Kernel 4.8.0-22/3.10.0-327 (Ubuntu 16.10 / RedHat) - 'keyctl' Null Pointer Dereference | This is a dos exploit for linux platform. Description: Linux Kernel 4.8.0-22/3.10.0-327 (Ubuntu 16.10 / RedHat) - 'keyctl' Null Pointer Dereference. Author: OpenSource Security |
Analyze the security implications of: Linux Kernel 4.8.0-22/3.10.0-327 (Ubuntu 16.10 / RedHat) - 'keyctl' Null Pointer Dereference | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Ladder System 6.0 - 'faqid' SQL Injection | This is a webapps exploit for php platform. Description: Ladder System 6.0 - 'faqid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Ladder System 6.0 - 'faqid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SitesOutlet eCommerce Kit - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: SitesOutlet eCommerce Kit - Multiple SQL Injections. Author: laurent gaffie |
Analyze the security implications of: SitesOutlet eCommerce Kit - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: DD-WRT 24-preSP2 - Information Disclosure | This is a remote exploit for hardware platform. Description: DD-WRT 24-preSP2 - Information Disclosure. Author: Craig Heffner |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.