input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Unreal Tournament 3 - Memory Corruption (Denial of Service) | This is a dos exploit for multiple platform. Description: Unreal Tournament 3 - Memory Corruption (Denial of Service). Author: Luigi Auriemma |
Analyze the security implications of: Unreal Tournament 3 - Memory Corruption (Denial of Service) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: People-Trak - Login SQL Injection | This is a webapps exploit for asp platform. Description: People-Trak - Login SQL Injection. Author: Mormoroth.net |
Analyze the security implications of: People-Trak - Login SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Sony BRAVIA Digital Signage 1.7.8 - Unauthenticated Remote File Inclusion | This is a webapps exploit for hardware platform. Description: Sony BRAVIA Digital Signage 1.7.8 - Unauthenticated Remote File Inclusion. Author: LiquidWorm |
Analyze the security implications of: Sony BRAVIA Digital Signage 1.7.8 - Unauthenticated Remote File Inclusion | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Nagios Xi 5.6.6 - Authenticated Remote Code Execution (RCE) | This is a webapps exploit for multiple platform. Description: Nagios Xi 5.6.6 - Authenticated Remote Code Execution (RCE). Author: Calil Khalil |
Analyze the security implications of: Nagios Xi 5.6.6 - Authenticated Remote Code Execution (RCE) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Technicolor TC7200 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for hardware platform. Description: Technicolor TC7200 - Multiple Cross-Site Scripting Vulnerabilities. Author: Jeroen - IT Nerdbox |
Analyze the security implications of: Technicolor TC7200 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Grestul 1.x - Cookie Authentication Bypass | This is a webapps exploit for php platform. Description: Grestul 1.x - Cookie Authentication Bypass. Author: x0r |
Analyze the security implications of: Grestul 1.x - Cookie Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LAN Management System (LMS) 1.9.6 - Remote File Inclusion | This is a webapps exploit for php platform. Description: LAN Management System (LMS) 1.9.6 - Remote File Inclusion. Author: Kw3[R]Ln |
Analyze the security implications of: LAN Management System (LMS) 1.9.6 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX Kernel - Null Pointer Dereference in AppleGraphicsDeviceControl | This is a dos exploit for osx platform. Description: Apple Mac OSX Kernel - Null Pointer Dereference in AppleGraphicsDeviceControl. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX Kernel - Null Pointer Dereference in AppleGraphicsDeviceControl | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: BackLinkSpider 1.3.1774 - 'cat_id' SQL Injection | This is a webapps exploit for php platform. Description: BackLinkSpider 1.3.1774 - 'cat_id' SQL Injection. Author: sniper ip |
Analyze the security implications of: BackLinkSpider 1.3.1774 - 'cat_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JPodium 2.7.3 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JPodium 2.7.3 - SQL Injection. Author: RoAd_KiLlEr |
Analyze the security implications of: Joomla! Component JPodium 2.7.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ltwCalendar 4.1.3 - 'calendar.php' SQL Injection | This is a webapps exploit for php platform. Description: ltwCalendar 4.1.3 - 'calendar.php' SQL Injection. Author: r0t |
Analyze the security implications of: ltwCalendar 4.1.3 - 'calendar.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Contra Haber Sistemi 1.0 - 'Haber.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Contra Haber Sistemi 1.0 - 'Haber.asp' SQL Injection. Author: ShaFuck31 |
Analyze the security implications of: Contra Haber Sistemi 1.0 - 'Haber.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apache Tomcat 3.x - Null Byte Directory / File Disclosure | This is a remote exploit for linux platform. Description: Apache Tomcat 3.x - Null Byte Directory / File Disclosure. Author: Jouko Pynnönen |
Analyze the security implications of: Apache Tomcat 3.x - Null Byte Directory / File Disclosure | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Barracuda Spam Firewall 3.5.11.020 Model 600 - SQL Injection | This is a remote exploit for hardware platform. Description: Barracuda Spam Firewall 3.5.11.020 Model 600 - SQL Injection. Author: Marian Ventuneac |
Analyze the security implications of: Barracuda Spam Firewall 3.5.11.020 Model 600 - SQL Injection | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: NetVIOS 2.0 - 'page.asp' SQL Injection | This is a webapps exploit for asp platform. Description: NetVIOS 2.0 - 'page.asp' SQL Injection. Author: ajann |
Analyze the security implications of: NetVIOS 2.0 - 'page.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Alibaba Clone Diamond Version - SQL Injection | This is a webapps exploit for php platform. Description: Alibaba Clone Diamond Version - SQL Injection. Author: Easy Laster |
Analyze the security implications of: Alibaba Clone Diamond Version - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.1.89/2.2.x - Zero-Length Fragment | This is a dos exploit for linux platform. Description: Linux Kernel 2.1.89/2.2.x - Zero-Length Fragment. Author: John McDonald |
Analyze the security implications of: Linux Kernel 2.1.89/2.2.x - Zero-Length Fragment | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: EsContacts 1.0 - 'login.php?msg' Cross-Site Scripting | This is a webapps exploit for php platform. Description: EsContacts 1.0 - 'login.php?msg' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: EsContacts 1.0 - 'login.php?msg' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component QuickTime VR 0.1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component QuickTime VR 0.1 - SQL Injection. Author: Houssamix |
Analyze the security implications of: Joomla! Component QuickTime VR 0.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AJ Article 1.0 - 'featured_article.php' SQL Injection | This is a webapps exploit for php platform. Description: AJ Article 1.0 - 'featured_article.php' SQL Injection. Author: t0pP8uZz |
Analyze the security implications of: AJ Article 1.0 - 'featured_article.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Yanf 0.4 - HTTP Response Buffer Overflow | This is a remote exploit for multiple platform. Description: Yanf 0.4 - HTTP Response Buffer Overflow. Author: Ariel Berkman |
Analyze the security implications of: Yanf 0.4 - HTTP Response Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: LiveCart 1.0.1 - 'return' Cross-Site Scripting (1) | This is a webapps exploit for php platform. Description: LiveCart 1.0.1 - 'return' Cross-Site Scripting (1). Author: Doz |
Analyze the security implications of: LiveCart 1.0.1 - 'return' Cross-Site Scripting (1) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NetSupport Manager Agent - Remote Buffer Overflow (1) | This is a remote exploit for multiple platform. Description: NetSupport Manager Agent - Remote Buffer Overflow (1). Author: ikki |
Analyze the security implications of: NetSupport Manager Agent - Remote Buffer Overflow (1) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: D3Jeeb Pro 3 - 'fastlinks.php?catid' SQL Injection | This is a webapps exploit for php platform. Description: D3Jeeb Pro 3 - 'fastlinks.php?catid' SQL Injection. Author: SAUDI |
Analyze the security implications of: D3Jeeb Pro 3 - 'fastlinks.php?catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Samba 3.0.29 (Client) - 'receive_smb_raw()' Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: Samba 3.0.29 (Client) - 'receive_smb_raw()' Buffer Overflow (PoC). Author: Guido Landi |
Analyze the security implications of: Samba 3.0.29 (Client) - 'receive_smb_raw()' Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux Kernel 2.4.29-rc2 - 'uselib()' Local Privilege Escalation (1) | This is a local exploit for linux platform. Description: Linux Kernel 2.4.29-rc2 - 'uselib()' Local Privilege Escalation (1). Author: Paul Starzetz |
Analyze the security implications of: Linux Kernel 2.4.29-rc2 - 'uselib()' Local Privilege Escalation (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: libextractor 0.5.13 - Multiple Heap Overflows (PoC) | This is a dos exploit for multiple platform. Description: libextractor 0.5.13 - Multiple Heap Overflows (PoC). Author: Luigi Auriemma |
Analyze the security implications of: libextractor 0.5.13 - Multiple Heap Overflows (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Openfire 4.6.0 - 'groupchatJID' Stored XSS | This is a webapps exploit for jsp platform. Description: Openfire 4.6.0 - 'groupchatJID' Stored XSS. Author: j5s |
Analyze the security implications of: Openfire 4.6.0 - 'groupchatJID' Stored XSS | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Oracle Fatwire 6.3 - Multiple Vulnerabilities | This is a webapps exploit for multiple platform. Description: Oracle Fatwire 6.3 - Multiple Vulnerabilities. Author: J. Francisco Bolivar |
Analyze the security implications of: Oracle Fatwire 6.3 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component hwdVideoShare - 'flash_upload.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component hwdVideoShare - 'flash_upload.php' Arbitrary File Upload. Author: Sammy FORGIT |
Analyze the security implications of: Joomla! Component hwdVideoShare - 'flash_upload.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: blog ink - Bypass Setting | This is a webapps exploit for php platform. Description: blog ink - Bypass Setting. Author: indoushka |
Analyze the security implications of: blog ink - Bypass Setting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AIOCP 1.3.x - 'cp_show_ec_products.php' Full Path Disclosure | This is a webapps exploit for php platform. Description: AIOCP 1.3.x - 'cp_show_ec_products.php' Full Path Disclosure. Author: laurent gaffie |
Analyze the security implications of: AIOCP 1.3.x - 'cp_show_ec_products.php' Full Path Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Aireplay-ng 1.2 beta3 - 'tcp_test' Length Stack Overflow | This is a remote exploit for linux platform. Description: Aireplay-ng 1.2 beta3 - 'tcp_test' Length Stack Overflow. Author: Nick Sampanis |
Analyze the security implications of: Aireplay-ng 1.2 beta3 - 'tcp_test' Length Stack Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Car Rental Script 2.0.4 - 'val' SQL Injection | This is a webapps exploit for php platform. Description: Car Rental Script 2.0.4 - 'val' SQL Injection. Author: Ihsan Sencan |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.