input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Maxwebportal 1.3 - 'dl_toprated.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: PHP 4.4.4 - 'Zip_Entry_Read()' Integer Overflow | This is a remote exploit for php platform. Description: PHP 4.4.4 - 'Zip_Entry_Read()' Integer Overflow. Author: Stefan Esser |
Analyze the security implications of: PHP 4.4.4 - 'Zip_Entry_Read()' Integer Overflow | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bitweaver 2.8.1 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Bitweaver 2.8.1 - Multiple Vulnerabilities. Author: Trustwave's SpiderLabs |
Analyze the security implications of: Bitweaver 2.8.1 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ncube server manager 1.0 - Directory Traversal | This is a webapps exploit for cgi platform. Description: ncube server manager 1.0 - Directory Traversal. Author: Beck Mr.R |
Analyze the security implications of: ncube server manager 1.0 - Directory Traversal | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: ASP Forum Script - 'messages.asp?forum_id' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: ASP Forum Script - 'messages.asp?forum_id' Cross-Site Scripting. Author: Pouya_Server |
Analyze the security implications of: ASP Forum Script - 'messages.asp?forum_id' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: hits script 1.0 - 'item_name' SQL Injection | This is a webapps exploit for php platform. Description: hits script 1.0 - 'item_name' SQL Injection. Author: SajjadBnd |
Analyze the security implications of: hits script 1.0 - 'item_name' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Madness Pro 1.14 - SQL Injection | This is a webapps exploit for php platform. Description: Madness Pro 1.14 - SQL Injection. Author: bwall |
Analyze the security implications of: Madness Pro 1.14 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: F5 Big-IP 13.1.3 Build 0.0.6 - Local File Inclusion | This is a webapps exploit for hardware platform. Description: F5 Big-IP 13.1.3 Build 0.0.6 - Local File Inclusion. Author: Carlos E. Vieira |
Analyze the security implications of: F5 Big-IP 13.1.3 Build 0.0.6 - Local File Inclusion | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FHEM 6.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: FHEM 6.0 - Local File Inclusion. Author: Emre ÖVÜNÇ |
Analyze the security implications of: FHEM 6.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: xloadimage 4.1 - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: xloadimage 4.1 - Remote Buffer Overflow. Author: zenith parsec |
Analyze the security implications of: xloadimage 4.1 - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GNU CFEngine 2.0.x - CFServD Transaction Packet Buffer Overrun (2) | This is a remote exploit for linux platform. Description: GNU CFEngine 2.0.x - CFServD Transaction Packet Buffer Overrun (2). Author: snooq |
Analyze the security implications of: GNU CFEngine 2.0.x - CFServD Transaction Packet Buffer Overrun (2) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache Mod_Auth_OpenID - Session Stealing | This is a local exploit for linux platform. Description: Apache Mod_Auth_OpenID - Session Stealing. Author: Peter Ellehauge |
Analyze the security implications of: Apache Mod_Auth_OpenID - Session Stealing | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: E-Zone Media FuzeTalk 2.0 - 'AddUser.cfm' Administrator Command Execution | This is a webapps exploit for cfm platform. Description: E-Zone Media FuzeTalk 2.0 - 'AddUser.cfm' Administrator Command Execution. Author: Stuart Jamieson |
Analyze the security implications of: E-Zone Media FuzeTalk 2.0 - 'AddUser.cfm' Administrator Command Execution | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: PHP 5.4.3 - PDO Memory Access Violation Denial of Service | This is a dos exploit for php platform. Description: PHP 5.4.3 - PDO Memory Access Violation Denial of Service. Author: 0x721427D8 |
Analyze the security implications of: PHP 5.4.3 - PDO Memory Access Violation Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Desktop - Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Google Desktop - Cross-Site Scripting. Author: Yair Amit |
Analyze the security implications of: Google Desktop - Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Allied Telesis AT-MCF2000M 3.0.2 - Remote Command Execution | This is a remote exploit for hardware platform. Description: Allied Telesis AT-MCF2000M 3.0.2 - Remote Command Execution. Author: dun |
Analyze the security implications of: Allied Telesis AT-MCF2000M 3.0.2 - Remote Command Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: e107 Plugin BLOG Engine 2.2 - 'rid' Blind SQL Injection | This is a webapps exploit for php platform. Description: e107 Plugin BLOG Engine 2.2 - 'rid' Blind SQL Injection. Author: Saime |
Analyze the security implications of: e107 Plugin BLOG Engine 2.2 - 'rid' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SSH (x2) - Remote Command Execution | This is a remote exploit for multiple platform. Description: SSH (x2) - Remote Command Execution. Author: Teso |
Analyze the security implications of: SSH (x2) - Remote Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache mod_jk 1.2.19/1.2.20 - Remote Buffer Overflow | This is a remote exploit for multiple platform. Description: Apache mod_jk 1.2.19/1.2.20 - Remote Buffer Overflow. Author: eliteboy |
Analyze the security implications of: Apache mod_jk 1.2.19/1.2.20 - Remote Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: autonomous lan party 0.98.1.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: autonomous lan party 0.98.1.0 - Remote File Inclusion. Author: Codexploder |
Analyze the security implications of: autonomous lan party 0.98.1.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla 0.9.x/1.0 - JavaScript URL Host Spoofing Arbitrary Cookie Access | This is a remote exploit for multiple platform. Description: Mozilla 0.9.x/1.0 - JavaScript URL Host Spoofing Arbitrary Cookie Access. Author: Andreas Sandblad |
Analyze the security implications of: Mozilla 0.9.x/1.0 - JavaScript URL Host Spoofing Arbitrary Cookie Access | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Amiro.CMS 5.4 - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: Amiro.CMS 5.4 - Multiple Input Validation Vulnerabilities. Author: Vladimir Vorontsov |
Analyze the security implications of: Amiro.CMS 5.4 - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AlienVault Unified Security Management (USM) 5.4.2 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: AlienVault Unified Security Management (USM) 5.4.2 - Cross-Site Request Forgery. Author: Julien Ahrens |
Analyze the security implications of: AlienVault Unified Security Management (USM) 5.4.2 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebKit - 'WebCore::AccessibilityRenderObject::handleAriaExpandedChanged' Use-After-Free | This is a dos exploit for multiple platform. Description: WebKit - 'WebCore::AccessibilityRenderObject::handleAriaExpandedChanged' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: WebKit - 'WebCore::AccessibilityRenderObject::handleAriaExpandedChanged' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Car Rental Management System 1.0 - 'car_id' Sql Injection | This is a webapps exploit for php platform. Description: Car Rental Management System 1.0 - 'car_id' Sql Injection. Author: Mehmet Kelepçe |
Analyze the security implications of: Car Rental Management System 1.0 - 'car_id' Sql Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: QNX RTOS 2.4 - File Disclosure | This is a local exploit for linux platform. Description: QNX RTOS 2.4 - File Disclosure. Author: teknophreak |
Analyze the security implications of: QNX RTOS 2.4 - File Disclosure | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux < 4.14.103 / < 4.19.25 - Out-of-Bounds Read and Write in SNMP NAT Module | This is a dos exploit for linux platform. Description: Linux < 4.14.103 / < 4.19.25 - Out-of-Bounds Read and Write in SNMP NAT Module. Author: Google Security Research |
Analyze the security implications of: Linux < 4.14.103 / < 4.19.25 - Out-of-Bounds Read and Write in SNMP NAT Module | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Honey Soft Web Solution - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Honey Soft Web Solution - Multiple Vulnerabilities. Author: **RoAd_KiLlEr** |
Analyze the security implications of: Honey Soft Web Solution - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flatnuke 2.7.1 - 'level' Privilege Escalation | This is a webapps exploit for php platform. Description: Flatnuke 2.7.1 - 'level' Privilege Escalation. Author: StAkeR |
Analyze the security implications of: Flatnuke 2.7.1 - 'level' Privilege Escalation | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Samba 3.0.10 < 3.3.5 - Format String / Security Bypass | This is a remote exploit for multiple platform. Description: Samba 3.0.10 < 3.3.5 - Format String / Security Bypass. Author: Jeremy Allison |
Analyze the security implications of: Samba 3.0.10 < 3.3.5 - Format String / Security Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_lead - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_lead - SQL Injection. Author: ByEge |
Analyze the security implications of: Joomla! Component com_lead - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS-School 2005 - 'showarticle.php' SQL Injection | This is a webapps exploit for php platform. Description: CMS-School 2005 - 'showarticle.php' SQL Injection. Author: Cyber-Zone |
Analyze the security implications of: CMS-School 2005 - 'showarticle.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DCP-Portal 3.7/4.x/5.x - 'contents.php?cid' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DCP-Portal 3.7/4.x/5.x - 'contents.php?cid' Cross-Site Scripting. Author: Alexander Antipov |
Analyze the security implications of: DCP-Portal 3.7/4.x/5.x - 'contents.php?cid' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: diafan.cms 4.3 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: diafan.cms 4.3 - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: diafan.cms 4.3 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.