input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Engineers Online Portal 1.0 - 'multiple' Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP Data Protector (Linux) - Remote Command Execution | This is a remote exploit for linux platform. Description: HP Data Protector (Linux) - Remote Command Execution. Author: SZ |
Analyze the security implications of: HP Data Protector (Linux) - Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Creative SplashWorks-SplashSite - 'page.php' Blind SQL Injection | This is a webapps exploit for php platform. Description: Creative SplashWorks-SplashSite - 'page.php' Blind SQL Injection. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Creative SplashWorks-SplashSite - 'page.php' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sendmail 8.11/8.12 Debugger - Arbitrary Code Execution (2) | This is a local exploit for linux platform. Description: Sendmail 8.11/8.12 Debugger - Arbitrary Code Execution (2). Author: sd@sf.cz |
Analyze the security implications of: Sendmail 8.11/8.12 Debugger - Arbitrary Code Execution (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: e-Ark 1.0 - '/src/ark_inc.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: e-Ark 1.0 - '/src/ark_inc.php' Remote File Inclusion. Author: DeltahackingTEAM |
Analyze the security implications of: e-Ark 1.0 - '/src/ark_inc.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Squid 2.4.1 - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Squid 2.4.1 - Remote Buffer Overflow. Author: Teso |
Analyze the security implications of: Squid 2.4.1 - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SAP MaxDB 7.6.03.07 - Remote Command Execution | This is a remote exploit for multiple platform. Description: SAP MaxDB 7.6.03.07 - Remote Command Execution. Author: Luigi Auriemma |
Analyze the security implications of: SAP MaxDB 7.6.03.07 - Remote Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: I-Gallery - Folder Argument Cross-Site Scripting | This is a webapps exploit for asp platform. Description: I-Gallery - Folder Argument Cross-Site Scripting. Author: Seyed Hamid Kashfi |
Analyze the security implications of: I-Gallery - Folder Argument Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Oracle Reports Server 10g - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for jsp platform. Description: Oracle Reports Server 10g - Multiple Cross-Site Scripting Vulnerabilities. Author: Paolo |
Analyze the security implications of: Oracle Reports Server 10g - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Novell Netware Enterprise Web Server 5.1/6.0 - 'CGI2Perl.NLM' Buffer Overflow (PoC) | This is a dos exploit for netware platform. Description: Novell Netware Enterprise Web Server 5.1/6.0 - 'CGI2Perl.NLM' Buffer Overflow (PoC). Author: Uffe Nielsen |
Analyze the security implications of: Novell Netware Enterprise Web Server 5.1/6.0 - 'CGI2Perl.NLM' Buffer Overflow (PoC) | This exploit targets netware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets netware platform |
What is this exploit about: Ascom COLTSOHO / Brocade Fabric OS / MatchBox / Win98/NT4 / Solaris / Xyplex - SNMP World Writeable Community | This is a remote exploit for multiple platform. Description: Ascom COLTSOHO / Brocade Fabric OS / MatchBox / Win98/NT4 / Solaris / Xyplex - SNMP World Writeable Community. Author: Michal Zalewski |
Analyze the security implications of: Ascom COLTSOHO / Brocade Fabric OS / MatchBox / Win98/NT4 / Solaris / Xyplex - SNMP World Writeable Community | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Net Gitar Shop 1.0 - Database Disclosure | This is a webapps exploit for asp platform. Description: Net Gitar Shop 1.0 - Database Disclosure. Author: indoushka |
Analyze the security implications of: Net Gitar Shop 1.0 - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Samba 2.2.x - 'nttrans' Remote Overflow (Metasploit) | This is a remote exploit for linux platform. Description: Samba 2.2.x - 'nttrans' Remote Overflow (Metasploit). Author: H D Moore |
Analyze the security implications of: Samba 2.2.x - 'nttrans' Remote Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: libupnp 1.6.18 - Stack-based buffer overflow (DoS) | This is a dos exploit for linux platform. Description: libupnp 1.6.18 - Stack-based buffer overflow (DoS). Author: Patrik Lantz |
Analyze the security implications of: libupnp 1.6.18 - Stack-based buffer overflow (DoS) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Job Portal Platform 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Job Portal Platform 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Job Portal Platform 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AllReader 1.0 iOS - Multiple Vulnerabilities | This is a webapps exploit for ios platform. Description: AllReader 1.0 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: AllReader 1.0 iOS - Multiple Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Dark Age CMS 2.0 - 'login.php' SQL Injection | This is a webapps exploit for php platform. Description: Dark Age CMS 2.0 - 'login.php' SQL Injection. Author: darkjoker |
Analyze the security implications of: Dark Age CMS 2.0 - 'login.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component d3000 1.0.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component d3000 1.0.0 - SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! Component d3000 1.0.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Comersus 8 Shopping Cart - SQL Injection / Cross-Site Request Forgery | This is a webapps exploit for asp platform. Description: Comersus 8 Shopping Cart - SQL Injection / Cross-Site Request Forgery. Author: Sid3^effects |
Analyze the security implications of: Comersus 8 Shopping Cart - SQL Injection / Cross-Site Request Forgery | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apple Mac OS X + Safari - Local Javascript Quarantine Bypass | This is a local exploit for osx platform. Description: Apple Mac OS X + Safari - Local Javascript Quarantine Bypass. Author: Filippo Cavallarin |
Analyze the security implications of: Apple Mac OS X + Safari - Local Javascript Quarantine Bypass | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: LanSuite 3.3.2 - 'FCKeditor' Arbitrary File Upload | This is a webapps exploit for php platform. Description: LanSuite 3.3.2 - 'FCKeditor' Arbitrary File Upload. Author: Stack |
Analyze the security implications of: LanSuite 3.3.2 - 'FCKeditor' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM ENOVIA SmarTeam - 'LoginPage.aspx' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: IBM ENOVIA SmarTeam - 'LoginPage.aspx' Cross-Site Scripting. Author: Lament |
Analyze the security implications of: IBM ENOVIA SmarTeam - 'LoginPage.aspx' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linux PolicyKit - Race Condition Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: Linux PolicyKit - Race Condition Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Linux PolicyKit - Race Condition Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Easy Banner 2009.05.18 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Easy Banner 2009.05.18 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Aliaksandr Hartsuyeu |
Analyze the security implications of: Easy Banner 2009.05.18 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Clicksor - SQL Injection | This is a webapps exploit for php platform. Description: Clicksor - SQL Injection. Author: JM511 |
Analyze the security implications of: Clicksor - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flexcustomer 0.0.6 - Admin Authentication Bypass / Possible PHP Code Writing | This is a webapps exploit for php platform. Description: Flexcustomer 0.0.6 - Admin Authentication Bypass / Possible PHP Code Writing. Author: Osirys |
Analyze the security implications of: Flexcustomer 0.0.6 - Admin Authentication Bypass / Possible PHP Code Writing | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache mod_wsgi - Information Disclosure | This is a remote exploit for linux platform. Description: Apache mod_wsgi - Information Disclosure. Author: Buck Golemon |
Analyze the security implications of: Apache mod_wsgi - Information Disclosure | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: eCommerce Corporation Online Store Kit 3.0 - 'shop.php?cat' SQL Injection | This is a webapps exploit for php platform. Description: eCommerce Corporation Online Store Kit 3.0 - 'shop.php?cat' SQL Injection. Author: G00db0y |
Analyze the security implications of: eCommerce Corporation Online Store Kit 3.0 - 'shop.php?cat' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo < 4.5.4 - SQL Injection | This is a webapps exploit for php platform. Description: Mambo < 4.5.4 - SQL Injection. Author: GulfTech Security |
Analyze the security implications of: Mambo < 4.5.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BlogWorx 1.0 Blog - Database Disclosure | This is a webapps exploit for asp platform. Description: BlogWorx 1.0 Blog - Database Disclosure. Author: LionTurk |
Analyze the security implications of: BlogWorx 1.0 Blog - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Free Photo Gallery Site Script - 'path' File Disclosure | This is a webapps exploit for php platform. Description: Free Photo Gallery Site Script - 'path' File Disclosure. Author: JIKO |
Analyze the security implications of: Free Photo Gallery Site Script - 'path' File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ardeacore 2.2 - Remote File Inclusion | This is a webapps exploit for php platform. Description: ardeacore 2.2 - Remote File Inclusion. Author: cr4wl3r |
Analyze the security implications of: ardeacore 2.2 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 4Images 1.7.9 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: 4Images 1.7.9 - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: 4Images 1.7.9 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Acoem 01dB CUBE/DUO Smart Noise Monitor - Password Change | This is a remote exploit for hardware platform. Description: Acoem 01dB CUBE/DUO Smart Noise Monitor - Password Change. Author: Todor Donev |
Analyze the security implications of: Acoem 01dB CUBE/DUO Smart Noise Monitor - Password Change | This exploit targets hardware systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.