input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: ProductCart 1.5/1.6/2.0 - 'login.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Livingcolor Livingmailing 1.3 - 'login.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Livingcolor Livingmailing 1.3 - 'login.asp' SQL Injection. Author: Dj romty |
Analyze the security implications of: Livingcolor Livingmailing 1.3 - 'login.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: A+ PHP Scripts - Nms Insecure Cookie Handling | This is a webapps exploit for php platform. Description: A+ PHP Scripts - Nms Insecure Cookie Handling. Author: Virangar Security |
Analyze the security implications of: A+ PHP Scripts - Nms Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Asterisk 0.x/1.0/1.2 Voicemail - Unauthorized Access | This is a webapps exploit for cgi platform. Description: Asterisk 0.x/1.0/1.2 Voicemail - Unauthorized Access. Author: Adam Pointon |
Analyze the security implications of: Asterisk 0.x/1.0/1.2 Voicemail - Unauthorized Access | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: BlogEngine.NET 1.4 - 'search.aspx' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: BlogEngine.NET 1.4 - 'search.aspx' Cross-Site Scripting. Author: sk |
Analyze the security implications of: BlogEngine.NET 1.4 - 'search.aspx' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Crea8Social 1.3 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Crea8Social 1.3 - Persistent Cross-Site Scripting. Author: Halil Dalabasmaz |
Analyze the security implications of: Crea8Social 1.3 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CRE Loaded 6.2 - 'products_id' SQL Injection | This is a webapps exploit for php platform. Description: CRE Loaded 6.2 - 'products_id' SQL Injection. Author: Player |
Analyze the security implications of: CRE Loaded 6.2 - 'products_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.2.8 gd library - 'imageRotate()' Information Leak | This is a local exploit for multiple platform. Description: PHP 5.2.8 gd library - 'imageRotate()' Information Leak. Author: Hamid Ebadi |
Analyze the security implications of: PHP 5.2.8 gd library - 'imageRotate()' Information Leak | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CUPS 1.1.x - Negative Length HTTP Header | This is a remote exploit for linux platform. Description: CUPS 1.1.x - Negative Length HTTP Header. Author: iDefense |
Analyze the security implications of: CUPS 1.1.x - Negative Length HTTP Header | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple Mac OSX Adobe Version Cue - Local Privilege Escalation | This is a local exploit for osx platform. Description: Apple Mac OSX Adobe Version Cue - Local Privilege Escalation. Author: Jonathan Bringhurst |
Analyze the security implications of: Apple Mac OSX Adobe Version Cue - Local Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Nagios Core 4.4.1 - Denial of Service | This is a dos exploit for linux platform. Description: Nagios Core 4.4.1 - Denial of Service. Author: Fakhri Zulkifli |
Analyze the security implications of: Nagios Core 4.4.1 - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Exponent CMS 0.97 - 'Slideshow.js.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Exponent CMS 0.97 - 'Slideshow.js.php' Cross-Site Scripting. Author: Andrei Rimsa Alvares |
Analyze the security implications of: Exponent CMS 0.97 - 'Slideshow.js.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fiberhome AN5506-04-F RP2669 - Persistent Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Fiberhome AN5506-04-F RP2669 - Persistent Cross-Site Scripting. Author: Tauco |
Analyze the security implications of: Fiberhome AN5506-04-F RP2669 - Persistent Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Intergo Arcade Trade Script 1.0 - 'q' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Intergo Arcade Trade Script 1.0 - 'q' Cross-Site Scripting. Author: SmOk3 |
Analyze the security implications of: Intergo Arcade Trade Script 1.0 - 'q' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: XFree86 4.3 - Font Information File Buffer Overflow | This is a local exploit for linux platform. Description: XFree86 4.3 - Font Information File Buffer Overflow. Author: bender2@lonestar.org |
Analyze the security implications of: XFree86 4.3 - Font Information File Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Commercial Interactive Media SCOOP! 2.3 - 'lostPassword.asp' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: Commercial Interactive Media SCOOP! 2.3 - 'lostPassword.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t3d3Vil |
Analyze the security implications of: Commercial Interactive Media SCOOP! 2.3 - 'lostPassword.asp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Adobe ColdFusion versions 2018_15 (and earlier) and 2021_5 and earlier - Arbitrary File Read | This is a webapps exploit for multiple platform. Description: Adobe ColdFusion versions 2018_15 (and earlier) and 2021_5 and earlier - Arbitrary File Read. Author: Youssef Muhammad |
Analyze the security implications of: Adobe ColdFusion versions 2018_15 (and earlier) and 2021_5 and earlier - Arbitrary File Read | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: 2DayBiz Photo Sharing Script - SQL Injection (2) | This is a webapps exploit for php platform. Description: 2DayBiz Photo Sharing Script - SQL Injection (2). Author: Easy Laster |
Analyze the security implications of: 2DayBiz Photo Sharing Script - SQL Injection (2) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Jvehicles - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Jvehicles - Local File Inclusion. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component Jvehicles - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gibbon LMS < v26.0.00 - Authenticated RCE | This is a webapps exploit for php platform. Description: Gibbon LMS < v26.0.00 - Authenticated RCE. Author: Ali Maharramli_Fikrat Guliev_Islam Rzayev |
Analyze the security implications of: Gibbon LMS < v26.0.00 - Authenticated RCE | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kentico CMS 5.5R2.23 - 'userContextMenu_Parameter' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Kentico CMS 5.5R2.23 - 'userContextMenu_Parameter' Cross-Site Scripting. Author: LiquidWorm |
Analyze the security implications of: Kentico CMS 5.5R2.23 - 'userContextMenu_Parameter' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: DUClassmate 1.x - 'ICity' SQL Injection | This is a webapps exploit for asp platform. Description: DUClassmate 1.x - 'ICity' SQL Injection. Author: Aria-Security Team |
Analyze the security implications of: DUClassmate 1.x - 'ICity' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Veeam ONE Reporter 9.5.0.3201 - Persistent Cross-Site Scripting | This is a webapps exploit for ashx platform. Description: Veeam ONE Reporter 9.5.0.3201 - Persistent Cross-Site Scripting. Author: Seyed Sadegh Khatami |
Analyze the security implications of: Veeam ONE Reporter 9.5.0.3201 - Persistent Cross-Site Scripting | This exploit targets ashx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ashx platform |
What is this exploit about: PHP 4.4.4 - 'Unserialize()' ZVAL Reference Counter Overflow (PoC) | This is a dos exploit for linux platform. Description: PHP 4.4.4 - 'Unserialize()' ZVAL Reference Counter Overflow (PoC). Author: Stefan Esser |
Analyze the security implications of: PHP 4.4.4 - 'Unserialize()' ZVAL Reference Counter Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Wireshark 1.4.3 - NTLMSSP Null Pointer Dereference Denial of Service | This is a dos exploit for linux platform. Description: Wireshark 1.4.3 - NTLMSSP Null Pointer Dereference Denial of Service. Author: Buildbot Builder |
Analyze the security implications of: Wireshark 1.4.3 - NTLMSSP Null Pointer Dereference Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: P-News 1.16 - Administrative Account Creation | This is a remote exploit for multiple platform. Description: P-News 1.16 - Administrative Account Creation. Author: Peter Winter-Smith |
Analyze the security implications of: P-News 1.16 - Administrative Account Creation | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux - Broken Permission and Object Lifetime Handling for PTRACE_TRACEME | This is a local exploit for linux platform. Description: Linux - Broken Permission and Object Lifetime Handling for PTRACE_TRACEME. Author: Google Security Research |
Analyze the security implications of: Linux - Broken Permission and Object Lifetime Handling for PTRACE_TRACEME | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Invision Power Board (IP.Board) 1.0/1.1/1.2 - 'admin.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) 1.0/1.1/1.2 - 'admin.php' Cross-Site Scripting. Author: Boy Bear |
Analyze the security implications of: Invision Power Board (IP.Board) 1.0/1.1/1.2 - 'admin.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Click2Magic 1.1.5 - Stored Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Click2Magic 1.1.5 - Stored Cross-Site Scripting. Author: Shivam Verma |
Analyze the security implications of: Click2Magic 1.1.5 - Stored Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_jreservation 1.5 - 'pid' Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_jreservation 1.5 - 'pid' Blind SQL Injection. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component com_jreservation 1.5 - 'pid' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: glibc - NUL Byte gconv_translit_find Off-by-One | This is a local exploit for linux platform. Description: glibc - NUL Byte gconv_translit_find Off-by-One. Author: taviso & scarybeasts |
Analyze the security implications of: glibc - NUL Byte gconv_translit_find Off-by-One | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: E-Store Kit-1 < 2 PayPal Edition - 'pid' SQL Injection | This is a webapps exploit for php platform. Description: E-Store Kit-1 < 2 PayPal Edition - 'pid' SQL Injection. Author: Mr.SQL |
Analyze the security implications of: E-Store Kit-1 < 2 PayPal Edition - 'pid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NSClient++ 0.5.2.35 - Authenticated Remote Code Execution | This is a webapps exploit for json platform. Description: NSClient++ 0.5.2.35 - Authenticated Remote Code Execution. Author: kindredsec |
Analyze the security implications of: NSClient++ 0.5.2.35 - Authenticated Remote Code Execution | This exploit targets json systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets json platform |
What is this exploit about: NetMan 204 - Backdoor Account | This is a remote exploit for hardware platform. Description: NetMan 204 - Backdoor Account. Author: Saeed reza Zamanian |
Analyze the security implications of: NetMan 204 - Backdoor Account | This exploit targets hardware systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.