input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Joomla! Component com_jooproperty 1.13.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component com_jooproperty 1.13.0 - Multiple Vulnerabilities. Author: D4NB4R |
Analyze the security implications of: Joomla! Component com_jooproperty 1.13.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kwintv - Local Buffer Overflow | This is a local exploit for linux platform. Description: Kwintv - Local Buffer Overflow. Author: Cody Tubbs |
Analyze the security implications of: Kwintv - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Progress Database 8.3/9.1 - Multiple Buffer Overflows | This is a local exploit for multiple platform. Description: Progress Database 8.3/9.1 - Multiple Buffer Overflows. Author: kf |
Analyze the security implications of: Progress Database 8.3/9.1 - Multiple Buffer Overflows | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Download Center 2.2 - SQL Injection | This is a webapps exploit for php platform. Description: Download Center 2.2 - SQL Injection. Author: DeadLy DeMon |
Analyze the security implications of: Download Center 2.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_oprykningspoint_mc - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component com_oprykningspoint_mc - Cross-Site Scripting. Author: Pyske |
Analyze the security implications of: Joomla! Component com_oprykningspoint_mc - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Drupal 5.2 - PHP Zend Hash ation Vector | This is a webapps exploit for php platform. Description: Drupal 5.2 - PHP Zend Hash ation Vector. Author: ShAnKaR |
Analyze the security implications of: Drupal 5.2 - PHP Zend Hash ation Vector | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Banex PHP MySQL Banner Exchange 2.21 - 'signup.php?site_name' SQL Injection | This is a webapps exploit for php platform. Description: Banex PHP MySQL Banner Exchange 2.21 - 'signup.php?site_name' SQL Injection. Author: SirDarckCat |
Analyze the security implications of: Banex PHP MySQL Banner Exchange 2.21 - 'signup.php?site_name' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linksys BEFSR41 1.4x - 'Gozila.cgi' Denial of Service | This is a dos exploit for hardware platform. Description: Linksys BEFSR41 1.4x - 'Gozila.cgi' Denial of Service. Author: Jeep 94 |
Analyze the security implications of: Linksys BEFSR41 1.4x - 'Gozila.cgi' Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Aircrack-NG 0.7 - 'Specially Crafted 802.11 Packets' Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Aircrack-NG 0.7 - 'Specially Crafted 802.11 Packets' Remote Buffer Overflow. Author: Jonathan So |
Analyze the security implications of: Aircrack-NG 0.7 - 'Specially Crafted 802.11 Packets' Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PowerScripts PlusMail WebConsole 1.0 - Weak Authentication (3) | This is a remote exploit for cgi platform. Description: PowerScripts PlusMail WebConsole 1.0 - Weak Authentication (3). Author: ytcracker |
Analyze the security implications of: PowerScripts PlusMail WebConsole 1.0 - Weak Authentication (3) | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: FreeBSD 12.0 - 'fd' Local Privilege Escalation | This is a local exploit for freebsd platform. Description: FreeBSD 12.0 - 'fd' Local Privilege Escalation. Author: gr4yf0x |
Analyze the security implications of: FreeBSD 12.0 - 'fd' Local Privilege Escalation | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Invision Power Top Site List 1.0/1.1 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Invision Power Top Site List 1.0/1.1 - 'id' SQL Injection. Author: JeiAr |
Analyze the security implications of: Invision Power Top Site List 1.0/1.1 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dotclear 2.4.1.2 - '/admin/comments.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Dotclear 2.4.1.2 - '/admin/comments.php' Multiple Cross-Site Scripting Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: Dotclear 2.4.1.2 - '/admin/comments.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iPhone - 'WebCore::CSSSelector()' Remote Crash | This is a dos exploit for hardware platform. Description: iPhone - 'WebCore::CSSSelector()' Remote Crash. Author: t12 |
Analyze the security implications of: iPhone - 'WebCore::CSSSelector()' Remote Crash | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: SAP NetWeaver 6.4/7.0 - 'wsnavigator' Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: SAP NetWeaver 6.4/7.0 - 'wsnavigator' Cross-Site Scripting. Author: Alexandr Polyakov |
Analyze the security implications of: SAP NetWeaver 6.4/7.0 - 'wsnavigator' Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: CFMBLOG - 'categorynbr' Blind SQL Injection | This is a webapps exploit for asp platform. Description: CFMBLOG - 'categorynbr' Blind SQL Injection. Author: AlpHaNiX |
Analyze the security implications of: CFMBLOG - 'categorynbr' Blind SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Cisco Unified Operations Manager 8.5 - '/iptm/logicalTopo.do' Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for hardware platform. Description: Cisco Unified Operations Manager 8.5 - '/iptm/logicalTopo.do' Multiple Cross-Site Scripting Vulnerabilities. Author: Sense of Security |
Analyze the security implications of: Cisco Unified Operations Manager 8.5 - '/iptm/logicalTopo.do' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: MySQL 4.1/5.0 - Zero-Length Password Authentication Bypass | This is a remote exploit for multiple platform. Description: MySQL 4.1/5.0 - Zero-Length Password Authentication Bypass. Author: Eli Kara |
Analyze the security implications of: MySQL 4.1/5.0 - Zero-Length Password Authentication Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: D-Link DSL-2730U/2750U/2750E ADSL Router - Remote File Disclosure | This is a remote exploit for hardware platform. Description: D-Link DSL-2730U/2750U/2750E ADSL Router - Remote File Disclosure. Author: Todor Donev |
Analyze the security implications of: D-Link DSL-2730U/2750U/2750E ADSL Router - Remote File Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component com_cgtestimonial 2.2 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component com_cgtestimonial 2.2 - Multiple Vulnerabilities. Author: Salvatore Fresta |
Analyze the security implications of: Joomla! Component com_cgtestimonial 2.2 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Epiphany 3.28.2.1 - Denial of Service | This is a dos exploit for multiple platform. Description: Epiphany 3.28.2.1 - Denial of Service. Author: Dhiraj Mishra |
Analyze the security implications of: Epiphany 3.28.2.1 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Asterisk 1.8.x - SIP INVITE Request User Enumeration | This is a remote exploit for multiple platform. Description: Asterisk 1.8.x - SIP INVITE Request User Enumeration. Author: Francesco Tornieri |
Analyze the security implications of: Asterisk 1.8.x - SIP INVITE Request User Enumeration | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ruby on Rails - Known Secret Session Cookie Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Ruby on Rails - Known Secret Session Cookie Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Ruby on Rails - Known Secret Session Cookie Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Banshee 2.6.2 - '.mp3' Crash (PoC) | This is a dos exploit for linux platform. Description: Banshee 2.6.2 - '.mp3' Crash (PoC). Author: Ilca Lucian |
Analyze the security implications of: Banshee 2.6.2 - '.mp3' Crash (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Lock Photos Album&Videos Safe 4.3 - Directory Traversal | This is a webapps exploit for ios platform. Description: Lock Photos Album&Videos Safe 4.3 - Directory Traversal. Author: Vulnerability-Lab |
Analyze the security implications of: Lock Photos Album&Videos Safe 4.3 - Directory Traversal | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Microsoft Outlook 2003 - Web Access Login Form Remote URI redirection | This is a webapps exploit for asp platform. Description: Microsoft Outlook 2003 - Web Access Login Form Remote URI redirection. Author: Morning Wood |
Analyze the security implications of: Microsoft Outlook 2003 - Web Access Login Form Remote URI redirection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Groovy Gallery 1.0.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Groovy Gallery 1.0.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Groovy Gallery 1.0.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kamads Classifieds 2.0 - Admin Hash Disclosure | This is a webapps exploit for php platform. Description: Kamads Classifieds 2.0 - Admin Hash Disclosure. Author: Mr.tro0oqy |
Analyze the security implications of: Kamads Classifieds 2.0 - Admin Hash Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Vik Booking 1.7 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Vik Booking 1.7 - SQL Injection. Author: Persian Hack Team |
Analyze the security implications of: Joomla! Component Vik Booking 1.7 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Multiple Ad Server Solutions Products - 'logon_processing.jsp' SQL Injection | This is a webapps exploit for jsp platform. Description: Multiple Ad Server Solutions Products - 'logon_processing.jsp' SQL Injection. Author: 3d D3v!L |
Analyze the security implications of: Multiple Ad Server Solutions Products - 'logon_processing.jsp' SQL Injection | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Joomla! Component Kunena 3.0.4 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component Kunena 3.0.4 - Persistent Cross-Site Scripting. Author: Qoppa |
Analyze the security implications of: Joomla! Component Kunena 3.0.4 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Monolith Lithtech Game Engine - Memory Corruption | This is a dos exploit for multiple platform. Description: Monolith Lithtech Game Engine - Memory Corruption. Author: Luigi Auriemma |
Analyze the security implications of: Monolith Lithtech Game Engine - Memory Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache Tomcat 5.5.25 - Cross-Site Request Forgery | This is a webapps exploit for multiple platform. Description: Apache Tomcat 5.5.25 - Cross-Site Request Forgery. Author: Ivano Binetti |
Analyze the security implications of: Apache Tomcat 5.5.25 - Cross-Site Request Forgery | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Allomani E-Store 1.0 - Cross-Site Request Forgery (Add Admin) (2) | This is a webapps exploit for php platform. Description: Allomani E-Store 1.0 - Cross-Site Request Forgery (Add Admin) (2). Author: AtT4CKxT3rR0r1ST |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.