input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Mafya Oyun Scrpti - 'profil.php' SQL Injection | This is a webapps exploit for php platform. Description: Mafya Oyun Scrpti - 'profil.php' SQL Injection. Author: DeadLy DeMon |
Analyze the security implications of: Mafya Oyun Scrpti - 'profil.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle Hyperion Planning 11.1.2.3 - XML External Entity | This is a webapps exploit for multiple platform. Description: Oracle Hyperion Planning 11.1.2.3 - XML External Entity. Author: Lucas Dinucci |
Analyze the security implications of: Oracle Hyperion Planning 11.1.2.3 - XML External Entity | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Adobe Document Server 6.0 Extensions - 'AlterCast?op' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Adobe Document Server 6.0 Extensions - 'AlterCast?op' Cross-Site Scripting. Author: Tan Chew Keong |
Analyze the security implications of: Adobe Document Server 6.0 Extensions - 'AlterCast?op' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: radscan conquest 8.2 - Multiple Vulnerabilities | This is a dos exploit for linux platform. Description: radscan conquest 8.2 - Multiple Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: radscan conquest 8.2 - Multiple Vulnerabilities | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AVideo Platform 8.1 - Information Disclosure (User Enumeration) | This is a webapps exploit for json platform. Description: AVideo Platform 8.1 - Information Disclosure (User Enumeration). Author: Ihsan Sencan |
Analyze the security implications of: AVideo Platform 8.1 - Information Disclosure (User Enumeration) | This exploit targets json systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets json platform |
What is this exploit about: Qualcomm Adreno GPU MSM Driver - perfcounter Query Heap Overflow | This is a dos exploit for android platform. Description: Qualcomm Adreno GPU MSM Driver - perfcounter Query Heap Overflow. Author: Google Security Research |
Analyze the security implications of: Qualcomm Adreno GPU MSM Driver - perfcounter Query Heap Overflow | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Zyxel NWA-1100-NH - Command Injection | This is a remote exploit for hardware platform. Description: Zyxel NWA-1100-NH - Command Injection. Author: Ahmed Alroky |
Analyze the security implications of: Zyxel NWA-1100-NH - Command Injection | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Bitweaver 1.3 - 'tmpImagePath' Attachment mod_mime | This is a webapps exploit for php platform. Description: Bitweaver 1.3 - 'tmpImagePath' Attachment mod_mime. Author: rgod |
Analyze the security implications of: Bitweaver 1.3 - 'tmpImagePath' Attachment mod_mime | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Novell Netware 6.5 - OpenSSH Remote Stack Overflow | This is a dos exploit for novell platform. Description: Novell Netware 6.5 - OpenSSH Remote Stack Overflow. Author: Francis Provencher |
Analyze the security implications of: Novell Netware 6.5 - OpenSSH Remote Stack Overflow | This exploit targets novell systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: CSE Bookstore 1.0 - Multiple SQL Injection | This is a webapps exploit for php platform. Description: CSE Bookstore 1.0 - Multiple SQL Injection. Author: Musyoka Ian |
Analyze the security implications of: CSE Bookstore 1.0 - Multiple SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AIOCP 1.3.x - 'cp_dpage.php' SQL Injection | This is a webapps exploit for php platform. Description: AIOCP 1.3.x - 'cp_dpage.php' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: AIOCP 1.3.x - 'cp_dpage.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: All In One Control Panel 1.3.x - 'cp_downloads.php?did' SQL Injection | This is a webapps exploit for php platform. Description: All In One Control Panel 1.3.x - 'cp_downloads.php?did' SQL Injection. Author: Coloss |
Analyze the security implications of: All In One Control Panel 1.3.x - 'cp_downloads.php?did' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: inClick Cloud Server 5.0 - SQL Injection | This is a webapps exploit for php platform. Description: inClick Cloud Server 5.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: inClick Cloud Server 5.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component mediaslide - 'albumnum' Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component mediaslide - 'albumnum' Blind SQL Injection. Author: Inphex |
Analyze the security implications of: Joomla! Component mediaslide - 'albumnum' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component live chat - SQL Injection / Open Proxy | This is a webapps exploit for php platform. Description: Joomla! Component live chat - SQL Injection / Open Proxy. Author: jdc |
Analyze the security implications of: Joomla! Component live chat - SQL Injection / Open Proxy | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JE Quotation Form 1.0b1 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component JE Quotation Form 1.0b1 - Local File Inclusion. Author: ALTBTA |
Analyze the security implications of: Joomla! Component JE Quotation Form 1.0b1 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Football Pool 3.1 - Database Disclosure | This is a webapps exploit for asp platform. Description: Football Pool 3.1 - Database Disclosure. Author: LionTurk |
Analyze the security implications of: Football Pool 3.1 - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component JoomRecipe 1.0.4 - 'search_author' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JoomRecipe 1.0.4 - 'search_author' SQL Injection. Author: Teng |
Analyze the security implications of: Joomla! Component JoomRecipe 1.0.4 - 'search_author' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Borland Interbase - 'open_marker_file()' Remote Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: Borland Interbase - 'open_marker_file()' Remote Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Borland Interbase - 'open_marker_file()' Remote Buffer Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Codice CMS 2 - Command Execution (via SQL Injection) | This is a webapps exploit for php platform. Description: Codice CMS 2 - Command Execution (via SQL Injection). Author: darkjoker |
Analyze the security implications of: Codice CMS 2 - Command Execution (via SQL Injection) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ruby 1.9 - regex engine Remote Socket Memory Leak | This is a dos exploit for multiple platform. Description: Ruby 1.9 - regex engine Remote Socket Memory Leak. Author: laurent gaffié |
Analyze the security implications of: Ruby 1.9 - regex engine Remote Socket Memory Leak | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Course Registration Management System - Cross-Site Scripting / SQL Injection | This is a webapps exploit for php platform. Description: Course Registration Management System - Cross-Site Scripting / SQL Injection. Author: Omar Kurt |
Analyze the security implications of: Course Registration Management System - Cross-Site Scripting / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Comersus Cart 7.0.7 - 'comersus_customerAuthenticateForm.asp' redirectUrl Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Comersus Cart 7.0.7 - 'comersus_customerAuthenticateForm.asp' redirectUrl Cross-Site Scripting. Author: Doz |
Analyze the security implications of: Comersus Cart 7.0.7 - 'comersus_customerAuthenticateForm.asp' redirectUrl Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Blue Coat Reporter - Directory Traversal | This is a remote exploit for hardware platform. Description: Blue Coat Reporter - Directory Traversal. Author: nitr0us |
Analyze the security implications of: Blue Coat Reporter - Directory Traversal | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ICEstate 1.1 - 'id' SQL Injection | This is a webapps exploit for aspx platform. Description: ICEstate 1.1 - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: ICEstate 1.1 - 'id' SQL Injection | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Mambo Component Quran 1.1 - 'surano' SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component Quran 1.1 - 'surano' SQL Injection. Author: Don |
Analyze the security implications of: Mambo Component Quran 1.1 - 'surano' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Epic 1.0.1/1.0.x - CTCP Nickname Server Message Buffer Overrun | This is a remote exploit for linux platform. Description: Epic 1.0.1/1.0.x - CTCP Nickname Server Message Buffer Overrun. Author: Li0n7 |
Analyze the security implications of: Epic 1.0.1/1.0.x - CTCP Nickname Server Message Buffer Overrun | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Liferay Portal 5.1.2 - Persistent Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Liferay Portal 5.1.2 - Persistent Cross-Site Scripting. Author: Sarim Kiani |
Analyze the security implications of: Liferay Portal 5.1.2 - Persistent Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: All Enthusiast ReviewPost PHP Pro 2.5 - 'showproduct.php' SQL Injection | This is a webapps exploit for php platform. Description: All Enthusiast ReviewPost PHP Pro 2.5 - 'showproduct.php' SQL Injection. Author: G00db0y |
Analyze the security implications of: All Enthusiast ReviewPost PHP Pro 2.5 - 'showproduct.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Le Forum - 'Fichier_Acceuil' Remote File Inclusion | This is a webapps exploit for php platform. Description: Le Forum - 'Fichier_Acceuil' Remote File Inclusion. Author: ZoRLu |
Analyze the security implications of: Le Forum - 'Fichier_Acceuil' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DanPHPSupport 0.5 - 'admin.php?do' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DanPHPSupport 0.5 - 'admin.php?do' Cross-Site Scripting. Author: You_You |
Analyze the security implications of: DanPHPSupport 0.5 - 'admin.php?do' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EffectOffice Server 2.6 - Remote Service Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: EffectOffice Server 2.6 - Remote Service Buffer Overflow (PoC). Author: D_BuG |
Analyze the security implications of: EffectOffice Server 2.6 - Remote Service Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Oracle Siebel Sales 8.1 - Persistent Cross-Site Scripting | This is a webapps exploit for java platform. Description: Oracle Siebel Sales 8.1 - Persistent Cross-Site Scripting. Author: omurugur |
Analyze the security implications of: Oracle Siebel Sales 8.1 - Persistent Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Cisco Adaptive Security Appliance 8.x - Web VPN FTP or CIFS Authentication Form Phishing | This is a remote exploit for hardware platform. Description: Cisco Adaptive Security Appliance 8.x - Web VPN FTP or CIFS Authentication Form Phishing. Author: David Byrne |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.