input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: e-cart 3.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MagnusSolution magnusbilling 7.3.0 - Command Injection | This is a webapps exploit for multiple platform. Description: MagnusSolution magnusbilling 7.3.0 - Command Injection. Author: CodeSecLab |
Analyze the security implications of: MagnusSolution magnusbilling 7.3.0 - Command Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Kandidat CMS 1.4.2 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Kandidat CMS 1.4.2 - Persistent Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: Kandidat CMS 1.4.2 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco Unified Communications Manager 7/8/9 - Directory Traversal | This is a webapps exploit for hardware platform. Description: Cisco Unified Communications Manager 7/8/9 - Directory Traversal. Author: justpentest |
Analyze the security implications of: Cisco Unified Communications Manager 7/8/9 - Directory Traversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BSDI BSD/OS 4.0 /FreeBSD 3.2 /NetBSD 1.4 x86 / OpenBSD 2.5 - UFS Secure Level 1 | This is a local exploit for bsd platform. Description: BSDI BSD/OS 4.0 /FreeBSD 3.2 /NetBSD 1.4 x86 / OpenBSD 2.5 - UFS Secure Level 1. Author: Stealth |
Analyze the security implications of: BSDI BSD/OS 4.0 /FreeBSD 3.2 /NetBSD 1.4 x86 / OpenBSD 2.5 - UFS Secure Level 1 | This exploit targets bsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: dotCMS 3.6.1 - Blind Boolean SQL Injection | This is a webapps exploit for php platform. Description: dotCMS 3.6.1 - Blind Boolean SQL Injection. Author: Ben Nott |
Analyze the security implications of: dotCMS 3.6.1 - Blind Boolean SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gaeste 1.6 - 'gastbuch.php' Remote File Disclosure | This is a webapps exploit for php platform. Description: Gaeste 1.6 - 'gastbuch.php' Remote File Disclosure. Author: bd0rk |
Analyze the security implications of: Gaeste 1.6 - 'gastbuch.php' Remote File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dell EqualLogic Storage - Directory Traversal | This is a webapps exploit for hardware platform. Description: Dell EqualLogic Storage - Directory Traversal. Author: XLabs Security |
Analyze the security implications of: Dell EqualLogic Storage - Directory Traversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Petrol Pump Management Software v.1.0 - SQL Injection | This is a remote exploit for php platform. Description: Petrol Pump Management Software v.1.0 - SQL Injection. Author: Shubham Pandey |
Analyze the security implications of: Petrol Pump Management Software v.1.0 - SQL Injection | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.2.11 - 'htmlspecialCharacters()' Malformed Multibyte Character Cross-Site Scripting (1) | This is a remote exploit for php platform. Description: PHP 5.2.11 - 'htmlspecialCharacters()' Malformed Multibyte Character Cross-Site Scripting (1). Author: hello@iwamot.com |
Analyze the security implications of: PHP 5.2.11 - 'htmlspecialCharacters()' Malformed Multibyte Character Cross-Site Scripting (1) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MySQL 5.0.20 - COM_TABLE_DUMP Memory Leak/Remote Buffer Overflow | This is a remote exploit for linux platform. Description: MySQL 5.0.20 - COM_TABLE_DUMP Memory Leak/Remote Buffer Overflow. Author: Stefano Di Paola |
Analyze the security implications of: MySQL 5.0.20 - COM_TABLE_DUMP Memory Leak/Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Allomani Super MultiMedia Library 2.5.0 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: Allomani Super MultiMedia Library 2.5.0 - Cross-Site Request Forgery (Add Admin). Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Allomani Super MultiMedia Library 2.5.0 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ManageEngine Password Manager Pro Build 5401 - Database Remote Unauthorized Access | This is a remote exploit for multiple platform. Description: ManageEngine Password Manager Pro Build 5401 - Database Remote Unauthorized Access. Author: anonymous |
Analyze the security implications of: ManageEngine Password Manager Pro Build 5401 - Database Remote Unauthorized Access | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Beanwebb Guestbook 1.0 - Unauthorized Administrative Access | This is a webapps exploit for php platform. Description: Beanwebb Guestbook 1.0 - Unauthorized Administrative Access. Author: euronymous |
Analyze the security implications of: Beanwebb Guestbook 1.0 - Unauthorized Administrative Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Imperva SecureSphere 11.5 / 12.0 / 13.0 - Privilege Escalation | This is a local exploit for linux platform. Description: Imperva SecureSphere 11.5 / 12.0 / 13.0 - Privilege Escalation. Author: 0x09AL |
Analyze the security implications of: Imperva SecureSphere 11.5 / 12.0 / 13.0 - Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ISC DHCP 4.x - Multiple Denial of Service Vulnerabilities | This is a dos exploit for linux platform. Description: ISC DHCP 4.x - Multiple Denial of Service Vulnerabilities. Author: Markus Hietava |
Analyze the security implications of: ISC DHCP 4.x - Multiple Denial of Service Vulnerabilities | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Auto Web Toolbox - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Auto Web Toolbox - 'id' SQL Injection. Author: Lazmania61 |
Analyze the security implications of: Auto Web Toolbox - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: gnome_segv - Local Buffer Overflow | This is a local exploit for linux platform. Description: gnome_segv - Local Buffer Overflow. Author: Cody Tubbs |
Analyze the security implications of: gnome_segv - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Markdown Explorer 0.1.1 - Persistent Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Markdown Explorer 0.1.1 - Persistent Cross-Site Scripting. Author: Taurus Omar |
Analyze the security implications of: Markdown Explorer 0.1.1 - Persistent Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux Kernel 3.10/3.18 /4.4 - Netfilter IPT_SO_SET_REPLACE Memory Corruption | This is a dos exploit for linux platform. Description: Linux Kernel 3.10/3.18 /4.4 - Netfilter IPT_SO_SET_REPLACE Memory Corruption. Author: Google Security Research |
Analyze the security implications of: Linux Kernel 3.10/3.18 /4.4 - Netfilter IPT_SO_SET_REPLACE Memory Corruption | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: InShop and InMail - Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: InShop and InMail - Cross-Site Scripting. Author: Carlos Ulver |
Analyze the security implications of: InShop and InMail - Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Mambo Open Source 4.5.1 (1.0.9) - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Mambo Open Source 4.5.1 (1.0.9) - Cross-Site Scripting. Author: Joxean Koret |
Analyze the security implications of: Mambo Open Source 4.5.1 (1.0.9) - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Monit 4.2 - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Monit 4.2 - Remote Buffer Overflow. Author: Abhisek Datta |
Analyze the security implications of: Monit 4.2 - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple Safari 6.0.1 for iOS 6.0 / Apple Mac OSX 10.7/8 - Heap Buffer Overflow | This is a remote exploit for ios platform. Description: Apple Safari 6.0.1 for iOS 6.0 / Apple Mac OSX 10.7/8 - Heap Buffer Overflow. Author: Vitaliy Toropov |
Analyze the security implications of: Apple Safari 6.0.1 for iOS 6.0 / Apple Mac OSX 10.7/8 - Heap Buffer Overflow | This exploit targets ios systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Joomla! Component com_bfsurvey_basic - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_bfsurvey_basic - SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_bfsurvey_basic - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Douran 3.9.7.8 - File Download/Source Code Disclosure | This is a webapps exploit for asp platform. Description: Douran 3.9.7.8 - File Download/Source Code Disclosure. Author: AJAX Security Team |
Analyze the security implications of: Douran 3.9.7.8 - File Download/Source Code Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Acal Calendar 2.2.6 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Acal Calendar 2.2.6 - Cross-Site Request Forgery. Author: Number 7 |
Analyze the security implications of: Acal Calendar 2.2.6 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Datafeed Studio - 'patch.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Datafeed Studio - 'patch.php' Remote File Inclusion. Author: Bug Researchers Group |
Analyze the security implications of: Datafeed Studio - 'patch.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TigerCom iFolder+ 1.2 iOS - Multiple Vulnerabilities | This is a webapps exploit for ios platform. Description: TigerCom iFolder+ 1.2 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: TigerCom iFolder+ 1.2 iOS - Multiple Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: InfraPower PPS-02-S Q213V1 - Insecure Direct Object Reference | This is a webapps exploit for php platform. Description: InfraPower PPS-02-S Q213V1 - Insecure Direct Object Reference. Author: LiquidWorm |
Analyze the security implications of: InfraPower PPS-02-S Q213V1 - Insecure Direct Object Reference | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: efiction 1.0/1.1/2.0 - 'uid' SQL Injection | This is a webapps exploit for php platform. Description: efiction 1.0/1.1/2.0 - 'uid' SQL Injection. Author: retrogod@aliceposta.it |
Analyze the security implications of: efiction 1.0/1.1/2.0 - 'uid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! < 1.7.0 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! < 1.7.0 - Multiple Cross-Site Scripting Vulnerabilities. Author: Aung Khant |
Analyze the security implications of: Joomla! < 1.7.0 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FS Food Delivery Script - 'keywords' SQL Injection | This is a webapps exploit for php platform. Description: FS Food Delivery Script - 'keywords' SQL Injection. Author: 8bitsec |
Analyze the security implications of: FS Food Delivery Script - 'keywords' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ActualAnalyzer Lite 2.81 - Command Execution | This is a webapps exploit for php platform. Description: ActualAnalyzer Lite 2.81 - Command Execution. Author: Benjamin Harris |
Analyze the security implications of: ActualAnalyzer Lite 2.81 - Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.