input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: RedHat Linux 6.1 i386 - Tmpwatch Recursive Write Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Clever Copy 3.0 - Admin Auth Details / SQL Injection | This is a webapps exploit for php platform. Description: Clever Copy 3.0 - Admin Auth Details / SQL Injection. Author: rgod |
Analyze the security implications of: Clever Copy 3.0 - Admin Auth Details / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Collaborative Passwords Manager 1.07 - Multiple Local File Inclusions | This is a webapps exploit for php platform. Description: Collaborative Passwords Manager 1.07 - Multiple Local File Inclusions. Author: sh00t0ut |
Analyze the security implications of: Collaborative Passwords Manager 1.07 - Multiple Local File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zyxel USG FLEX H series uOS 1.31 - Privilege Escalation | This is a local exploit for multiple platform. Description: Zyxel USG FLEX H series uOS 1.31 - Privilege Escalation. Author: Marco Ivaldi |
Analyze the security implications of: Zyxel USG FLEX H series uOS 1.31 - Privilege Escalation | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_universal - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_universal - Remote File Inclusion. Author: eidelweiss |
Analyze the security implications of: Joomla! Component com_universal - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mesut Manþet Haber 1.0 - Authentication Bypass | This is a webapps exploit for asp platform. Description: Mesut Manþet Haber 1.0 - Authentication Bypass. Author: LionTurk |
Analyze the security implications of: Mesut Manþet Haber 1.0 - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: jPORTAL 2.2.1 - 'print.php' SQL Injection | This is a webapps exploit for php platform. Description: jPORTAL 2.2.1 - 'print.php' SQL Injection. Author: Maciek Wierciski |
Analyze the security implications of: jPORTAL 2.2.1 - 'print.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Graphics 1.0.6 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Graphics 1.0.6 - Local File Inclusion. Author: wishnusakti + inc0mp13te |
Analyze the security implications of: Joomla! Component Graphics 1.0.6 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: guanxiCRM Business Solution 0.9.1 - Remote File Inclusion | This is a webapps exploit for php platform. Description: guanxiCRM Business Solution 0.9.1 - Remote File Inclusion. Author: SHiKaA |
Analyze the security implications of: guanxiCRM Business Solution 0.9.1 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Web Protector 2.0 - Trivial Encryption | This is a remote exploit for multiple platform. Description: Web Protector 2.0 - Trivial Encryption. Author: rjfix |
Analyze the security implications of: Web Protector 2.0 - Trivial Encryption | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: free QBoard 1.1 - 'faq.php?qb_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: free QBoard 1.1 - 'faq.php?qb_path' Remote File Inclusion. Author: CrAsh_oVeR_rIdE |
Analyze the security implications of: free QBoard 1.1 - 'faq.php?qb_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jack (tR) Jax LinkLists 1.00 - 'jax_linklists.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Jack (tR) Jax LinkLists 1.00 - 'jax_linklists.php' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: Jack (tR) Jax LinkLists 1.00 - 'jax_linklists.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iPhone Guitar - Directory Traversal | This is a remote exploit for hardware platform. Description: iPhone Guitar - Directory Traversal. Author: Khashayar Fereidani |
Analyze the security implications of: iPhone Guitar - Directory Traversal | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PHPMailer < 5.2.19 - Sendmail Argument Injection (Metasploit) | This is a webapps exploit for multiple platform. Description: PHPMailer < 5.2.19 - Sendmail Argument Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: PHPMailer < 5.2.19 - Sendmail Argument Injection (Metasploit) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Eyeland Studio Inc. - SQL Injection | This is a webapps exploit for php platform. Description: Eyeland Studio Inc. - SQL Injection. Author: Mr.P3rfekT |
Analyze the security implications of: Eyeland Studio Inc. - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Browsers Browsers - Navigation Download Trick | This is a local exploit for multiple platform. Description: Browsers Browsers - Navigation Download Trick. Author: Michal Zalewski |
Analyze the security implications of: Browsers Browsers - Navigation Download Trick | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CDRDAO - Local Privilege Escalation | This is a local exploit for linux platform. Description: CDRDAO - Local Privilege Escalation. Author: Karol Wiêsek |
Analyze the security implications of: CDRDAO - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SirsiDynix e-Library 3.5.x - Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: SirsiDynix e-Library 3.5.x - Cross-Site Scripting. Author: AkkuS |
Analyze the security implications of: SirsiDynix e-Library 3.5.x - Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Gecko CMS 2.3 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Gecko CMS 2.3 - Multiple Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: Gecko CMS 2.3 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: aBitWhizzy - 'abitwhizzy.php' Information Disclosure | This is a webapps exploit for php platform. Description: aBitWhizzy - 'abitwhizzy.php' Information Disclosure. Author: Security Access Point |
Analyze the security implications of: aBitWhizzy - 'abitwhizzy.php' Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component MMS Blog 2.3.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component MMS Blog 2.3.0 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component MMS Blog 2.3.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_kunena - 'search' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_kunena - 'search' SQL Injection. Author: D35m0nd142 |
Analyze the security implications of: Joomla! Component com_kunena - 'search' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AvailScript Job Portal Script - 'applynow.php' SQL Injection | This is a webapps exploit for php platform. Description: AvailScript Job Portal Script - 'applynow.php' SQL Injection. Author: InjEctOr5 |
Analyze the security implications of: AvailScript Job Portal Script - 'applynow.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: School Management System Pro 6.0.0 - Backup Dump | This is a webapps exploit for asp platform. Description: School Management System Pro 6.0.0 - Backup Dump. Author: indoushka |
Analyze the security implications of: School Management System Pro 6.0.0 - Backup Dump | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component com_aml_2 - 'art' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_aml_2 - 'art' SQL Injection. Author: Metropolis |
Analyze the security implications of: Joomla! Component com_aml_2 - 'art' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EPIC MyChart - X-Path Injection | This is a webapps exploit for asp platform. Description: EPIC MyChart - X-Path Injection. Author: Shayan S |
Analyze the security implications of: EPIC MyChart - X-Path Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: IBM Websphere 5.0/5.1/6.0 - Application Server Web Server Root JSP Source Code Disclosure | This is a remote exploit for multiple platform. Description: IBM Websphere 5.0/5.1/6.0 - Application Server Web Server Root JSP Source Code Disclosure. Author: SPI Labs |
Analyze the security implications of: IBM Websphere 5.0/5.1/6.0 - Application Server Web Server Root JSP Source Code Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: File Share scriptFile share - SQL Injection | This is a webapps exploit for php platform. Description: File Share scriptFile share - SQL Injection. Author: MouDy-Dz |
Analyze the security implications of: File Share scriptFile share - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: VMWAre vCloud Director 9.7.0.15498291 - Remote Code Execution | This is a webapps exploit for java platform. Description: VMWAre vCloud Director 9.7.0.15498291 - Remote Code Execution. Author: Tomas Melicher |
Analyze the security implications of: VMWAre vCloud Director 9.7.0.15498291 - Remote Code Execution | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Sophos UTM 9.410 - 'loginuser' 'confd' Service Privilege Escalation | This is a local exploit for linux platform. Description: Sophos UTM 9.410 - 'loginuser' 'confd' Service Privilege Escalation. Author: KoreLogic |
Analyze the security implications of: Sophos UTM 9.410 - 'loginuser' 'confd' Service Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: eNews 0.1 - 'delete.php' Arbitrary Delete Post | This is a webapps exploit for php platform. Description: eNews 0.1 - 'delete.php' Arbitrary Delete Post. Author: ilker Kandemir |
Analyze the security implications of: eNews 0.1 - 'delete.php' Arbitrary Delete Post | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.x - SET_MEMPOLICY Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - SET_MEMPOLICY Local Denial of Service. Author: Doug Chapman |
Analyze the security implications of: Linux Kernel 2.6.x - SET_MEMPOLICY Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: epesi BIM 1.2 rev 8154 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: epesi BIM 1.2 rev 8154 - Multiple Cross-Site Scripting Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: epesi BIM 1.2 rev 8154 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Casinosoft Casino Script 3.2 - 'config.php' SQL Injection | This is a webapps exploit for php platform. Description: Casinosoft Casino Script 3.2 - 'config.php' SQL Injection. Author: G1UK |
Analyze the security implications of: Casinosoft Casino Script 3.2 - 'config.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.