input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: DIY-CMS blog mod - SQL Injection | This is a webapps exploit for php platform. Description: DIY-CMS blog mod - SQL Injection. Author: snup |
Analyze the security implications of: DIY-CMS blog mod - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GD Graphics Library 2.0.34 - 'libgd' gdImageCreateXbm Function Unspecified Denial of Service | This is a dos exploit for linux platform. Description: GD Graphics Library 2.0.34 - 'libgd' gdImageCreateXbm Function Unspecified Denial of Service. Author: anonymous |
Analyze the security implications of: GD Graphics Library 2.0.34 - 'libgd' gdImageCreateXbm Function Unspecified Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Advance B2B Script 2.1.3 - 'show_id' / 'pid' SQL Injection | This is a webapps exploit for php platform. Description: Advance B2B Script 2.1.3 - 'show_id' / 'pid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Advance B2B Script 2.1.3 - 'show_id' / 'pid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: All browsers - Crash | This is a dos exploit for multiple platform. Description: All browsers - Crash. Author: Inj3ct0r |
Analyze the security implications of: All browsers - Crash | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: LayerBB Forum 1.1.1 - 'search_query' SQL Injection | This is a webapps exploit for php platform. Description: LayerBB Forum 1.1.1 - 'search_query' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: LayerBB Forum 1.1.1 - 'search_query' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNU UnRTF 0.19.3 - Font Table Conversion Buffer Overflow | This is a remote exploit for linux platform. Description: GNU UnRTF 0.19.3 - Font Table Conversion Buffer Overflow. Author: Yosef Klein |
Analyze the security implications of: GNU UnRTF 0.19.3 - Font Table Conversion Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Craft CMS 3.0.25 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Craft CMS 3.0.25 - Cross-Site Scripting. Author: Raif Berkay Dincel |
Analyze the security implications of: Craft CMS 3.0.25 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.0.0 - 'simplexml_load_file()' Local Denial of Service | This is a dos exploit for php platform. Description: PHP 5.0.0 - 'simplexml_load_file()' Local Denial of Service. Author: Yakir Wizman |
Analyze the security implications of: PHP 5.0.0 - 'simplexml_load_file()' Local Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Eagle Software Aeries Student Information System 3.7.2.2/3.8.2.8 - 'GradebookStuScores.asp?GrdBk' SQL Injection | This is a webapps exploit for php platform. Description: Eagle Software Aeries Student Information System 3.7.2.2/3.8.2.8 - 'GradebookStuScores.asp?GrdBk' SQL Injection. Author: Arsalan Emamjomehkashan |
Analyze the security implications of: Eagle Software Aeries Student Information System 3.7.2.2/3.8.2.8 - 'GradebookStuScores.asp?GrdBk' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HESK 2.2 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: HESK 2.2 - Multiple Cross-Site Scripting Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: HESK 2.2 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Vik Appointments 1.5 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Vik Appointments 1.5 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Vik Appointments 1.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CentOS Control Web Panel 0.9.8.836 - Authentication Bypass | This is a webapps exploit for linux platform. Description: CentOS Control Web Panel 0.9.8.836 - Authentication Bypass. Author: Pongtorn Angsuchotmetee |
Analyze the security implications of: CentOS Control Web Panel 0.9.8.836 - Authentication Bypass | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: eTransfer Lite - 'file name' HTML Injection | This is a webapps exploit for php platform. Description: eTransfer Lite - 'file name' HTML Injection. Author: Benjamin Kunz Mejri |
Analyze the security implications of: eTransfer Lite - 'file name' HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Granding MA300 - Traffic Sniffing Man In The Middle Fingerprint PIN Disclosure | This is a remote exploit for multiple platform. Description: Granding MA300 - Traffic Sniffing Man In The Middle Fingerprint PIN Disclosure. Author: Eric Sesterhenn |
Analyze the security implications of: Granding MA300 - Traffic Sniffing Man In The Middle Fingerprint PIN Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CrushFTP 11.3.1 - Authentication Bypass | This is a remote exploit for multiple platform. Description: CrushFTP 11.3.1 - Authentication Bypass. Author: İbrahimsql |
Analyze the security implications of: CrushFTP 11.3.1 - Authentication Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Razer Sila - Command Injection | This is a webapps exploit for hardware platform. Description: Razer Sila - Command Injection. Author: Kevin Randall |
Analyze the security implications of: Razer Sila - Command Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: WebKit - 'WebCore::SVGTRefElement::updateReferencedText' Use-After-Free | This is a dos exploit for multiple platform. Description: WebKit - 'WebCore::SVGTRefElement::updateReferencedText' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: WebKit - 'WebCore::SVGTRefElement::updateReferencedText' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ASPPortal 3.2.5 - Database Disclosure | This is a webapps exploit for asp platform. Description: ASPPortal 3.2.5 - Database Disclosure. Author: CWH Underground |
Analyze the security implications of: ASPPortal 3.2.5 - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Dokeos 1.6.4 - Multiple Remote File Inclusions Vulnerabilities | This is a webapps exploit for php platform. Description: Dokeos 1.6.4 - Multiple Remote File Inclusions Vulnerabilities. Author: viper-haCker |
Analyze the security implications of: Dokeos 1.6.4 - Multiple Remote File Inclusions Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla Browser 1.5 - URI MouseOver Obfuscation | This is a remote exploit for multiple platform. Description: Mozilla Browser 1.5 - URI MouseOver Obfuscation. Author: netmask |
Analyze the security implications of: Mozilla Browser 1.5 - URI MouseOver Obfuscation | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: I-net Enquiry Management Script - SQL Injection | This is a webapps exploit for php platform. Description: I-net Enquiry Management Script - SQL Injection. Author: D4rk357 |
Analyze the security implications of: I-net Enquiry Management Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cmsimple 5.4 - Remote Code Execution (RCE) (Authenticated) | This is a webapps exploit for php platform. Description: Cmsimple 5.4 - Remote Code Execution (RCE) (Authenticated). Author: pussycat0x |
Analyze the security implications of: Cmsimple 5.4 - Remote Code Execution (RCE) (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: flashlight free edition - Local File Inclusion / SQL Injection | This is a webapps exploit for php platform. Description: flashlight free edition - Local File Inclusion / SQL Injection. Author: K4m1k451 |
Analyze the security implications of: flashlight free edition - Local File Inclusion / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FingerTec Fingerprint Reader - Remote Access and Remote Enrolment | This is a remote exploit for hardware platform. Description: FingerTec Fingerprint Reader - Remote Access and Remote Enrolment. Author: Daniel Lawson |
Analyze the security implications of: FingerTec Fingerprint Reader - Remote Access and Remote Enrolment | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Magic Photo Storage Website - '/admin/add_welcome_text.php?_config[site_path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/admin/add_welcome_text.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina |
Analyze the security implications of: Magic Photo Storage Website - '/admin/add_welcome_text.php?_config[site_path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Streamripper 1.61.25 - HTTP Header Parsing Buffer Overflow (1) | This is a remote exploit for linux platform. Description: Streamripper 1.61.25 - HTTP Header Parsing Buffer Overflow (1). Author: Expanders |
Analyze the security implications of: Streamripper 1.61.25 - HTTP Header Parsing Buffer Overflow (1) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DevelopItEasy Membership System 1.3 - Authentication Bypass | This is a webapps exploit for php platform. Description: DevelopItEasy Membership System 1.3 - Authentication Bypass. Author: InjEctOr5 |
Analyze the security implications of: DevelopItEasy Membership System 1.3 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BlackBoard Academic Suite 6.2.3.23 - Frameset.jsp Cross-Domain Frameset Loading | This is a webapps exploit for jsp platform. Description: BlackBoard Academic Suite 6.2.3.23 - Frameset.jsp Cross-Domain Frameset Loading. Author: dr_insane |
Analyze the security implications of: BlackBoard Academic Suite 6.2.3.23 - Frameset.jsp Cross-Domain Frameset Loading | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Lotfian.com DATABASE DRIVEN TRAVEL SITE - SQL Injection | This is a webapps exploit for php platform. Description: Lotfian.com DATABASE DRIVEN TRAVEL SITE - SQL Injection. Author: Aria-Security Team |
Analyze the security implications of: Lotfian.com DATABASE DRIVEN TRAVEL SITE - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 1024 CMS 1.1.0 Beta - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: 1024 CMS 1.1.0 Beta - Multiple Input Validation Vulnerabilities. Author: QSecure & Demetris Papapetrou |
Analyze the security implications of: 1024 CMS 1.1.0 Beta - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_booklibrary - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_booklibrary - SQL Injection. Author: Marc Doudiet |
Analyze the security implications of: Joomla! Component com_booklibrary - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Core 1.5.x com_ - Denial of Service | This is a dos exploit for php platform. Description: Joomla! Component Core 1.5.x com_ - Denial of Service. Author: emgent |
Analyze the security implications of: Joomla! Component Core 1.5.x com_ - Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Novell Groupwise 6.5 Webaccess - 'User.Id' Cross-Site Scripting | This is a remote exploit for novell platform. Description: Novell Groupwise 6.5 Webaccess - 'User.Id' Cross-Site Scripting. Author: 0x000000 |
Analyze the security implications of: Novell Groupwise 6.5 Webaccess - 'User.Id' Cross-Site Scripting | This exploit targets novell systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: Multiple Vendor - PF Null Pointer Dereference | This is a dos exploit for bsd platform. Description: Multiple Vendor - PF Null Pointer Dereference. Author: Rembrandt |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.