input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: JaxCMS 1.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Foxit PDF Reader 1.0.1.0925 - CFX_WideString::operator= Invalid Read | This is a dos exploit for linux platform. Description: Foxit PDF Reader 1.0.1.0925 - CFX_WideString::operator= Invalid Read. Author: Google Security Research |
Analyze the security implications of: Foxit PDF Reader 1.0.1.0925 - CFX_WideString::operator= Invalid Read | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ICSurvey 1.1 - SQL Injection | This is a webapps exploit for php platform. Description: ICSurvey 1.1 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: ICSurvey 1.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MySQL 4/5 - SUID Routine Miscalculation Arbitrary DML Statement Execution | This is a remote exploit for linux platform. Description: MySQL 4/5 - SUID Routine Miscalculation Arbitrary DML Statement Execution. Author: Michal Prokopiuk |
Analyze the security implications of: MySQL 4/5 - SUID Routine Miscalculation Arbitrary DML Statement Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! 1.5.12 TinyMCE - Remote Code Execution (via Arbitrary File Upload) | This is a webapps exploit for php platform. Description: Joomla! 1.5.12 TinyMCE - Remote Code Execution (via Arbitrary File Upload). Author: daath |
Analyze the security implications of: Joomla! 1.5.12 TinyMCE - Remote Code Execution (via Arbitrary File Upload) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Chrome 0.3.154 - 'JavaScript:' URI in 'Refresh' Header Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Google Chrome 0.3.154 - 'JavaScript:' URI in 'Refresh' Header Cross-Site Scripting. Author: MustLive |
Analyze the security implications of: Google Chrome 0.3.154 - 'JavaScript:' URI in 'Refresh' Header Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CzarNews 1.14 - 'tpath' Remote File Inclusion | This is a webapps exploit for php platform. Description: CzarNews 1.14 - 'tpath' Remote File Inclusion. Author: SHiKaA |
Analyze the security implications of: CzarNews 1.14 - 'tpath' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eZoneScripts (Multiple Scripts) - Insecure Cookie Authentication Bypass | This is a webapps exploit for php platform. Description: eZoneScripts (Multiple Scripts) - Insecure Cookie Authentication Bypass. Author: JIKO |
Analyze the security implications of: eZoneScripts (Multiple Scripts) - Insecure Cookie Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Clipbucket 1.7.1 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Clipbucket 1.7.1 - Multiple SQL Injections. Author: Qabandi |
Analyze the security implications of: Clipbucket 1.7.1 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebKit JSC - 'JSArray::appendMemcpy' Uninitialized Memory Copy | This is a dos exploit for multiple platform. Description: WebKit JSC - 'JSArray::appendMemcpy' Uninitialized Memory Copy. Author: Google Security Research |
Analyze the security implications of: WebKit JSC - 'JSArray::appendMemcpy' Uninitialized Memory Copy | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: MPlayer 0.9/1.0 - MMST Get_Header Remote Client-Side Buffer Overflow | This is a remote exploit for linux platform. Description: MPlayer 0.9/1.0 - MMST Get_Header Remote Client-Side Buffer Overflow. Author: Ariel Berkman |
Analyze the security implications of: MPlayer 0.9/1.0 - MMST Get_Header Remote Client-Side Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CUPS - 'kerberos' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: CUPS - 'kerberos' Cross-Site Scripting. Author: Aaron Sigel |
Analyze the security implications of: CUPS - 'kerberos' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GitList 0.6.0 - Argument Injection (Metasploit) | This is a remote exploit for php platform. Description: GitList 0.6.0 - Argument Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: GitList 0.6.0 - Argument Injection (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BOA Web Server 0.94.14rc21 - Arbitrary File Access | This is a webapps exploit for linux platform. Description: BOA Web Server 0.94.14rc21 - Arbitrary File Access. Author: Miguel Mendez Z |
Analyze the security implications of: BOA Web Server 0.94.14rc21 - Arbitrary File Access | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: EduStar Udemy Clone Script 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: EduStar Udemy Clone Script 1.0 - SQL Injection. Author: 8bitsec |
Analyze the security implications of: EduStar Udemy Clone Script 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASP AutoDealer - SQL Injection / File Disclosure | This is a webapps exploit for asp platform. Description: ASP AutoDealer - SQL Injection / File Disclosure. Author: AlpHaNiX |
Analyze the security implications of: ASP AutoDealer - SQL Injection / File Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Atmail WebMail - 'INBOX.Trash?mailId' Reflected Cross-Site Scripting | This is a webapps exploit for php platform. Description: Atmail WebMail - 'INBOX.Trash?mailId' Reflected Cross-Site Scripting. Author: Vicente Aguilera Diaz |
Analyze the security implications of: Atmail WebMail - 'INBOX.Trash?mailId' Reflected Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BigTree 4.3.4 CMS - Multiple SQL Injection | This is a webapps exploit for php platform. Description: BigTree 4.3.4 CMS - Multiple SQL Injection. Author: Mehmet EMIROGLU |
Analyze the security implications of: BigTree 4.3.4 CMS - Multiple SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joovili 3.0.6 - 'joovili.images.php' Remote File Disclosure | This is a webapps exploit for php platform. Description: Joovili 3.0.6 - 'joovili.images.php' Remote File Disclosure. Author: EcHoLL |
Analyze the security implications of: Joovili 3.0.6 - 'joovili.images.php' Remote File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NUUO NVRMini2 3.8 - 'cgi_system' Buffer Overflow (Enable Telnet) | This is a remote exploit for hardware platform. Description: NUUO NVRMini2 3.8 - 'cgi_system' Buffer Overflow (Enable Telnet). Author: Jacob Baines |
Analyze the security implications of: NUUO NVRMini2 3.8 - 'cgi_system' Buffer Overflow (Enable Telnet) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Rakkarsoft RakNet 2.33 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Rakkarsoft RakNet 2.33 - Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Rakkarsoft RakNet 2.33 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: RedStar 3.0 Server - 'Shellshock' 'BEAM' / 'RSSMON' Command Injection | This is a local exploit for linux platform. Description: RedStar 3.0 Server - 'Shellshock' 'BEAM' / 'RSSMON' Command Injection. Author: Hacker Fantastic |
Analyze the security implications of: RedStar 3.0 Server - 'Shellshock' 'BEAM' / 'RSSMON' Command Injection | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Limbo CMS 1.0.4.2L - 'com_contact' Remote Code Execution | This is a webapps exploit for php platform. Description: Limbo CMS 1.0.4.2L - 'com_contact' Remote Code Execution. Author: rgod |
Analyze the security implications of: Limbo CMS 1.0.4.2L - 'com_contact' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MGinternet Property Site Manager - 'detail.asp?p' SQL Injection | This is a webapps exploit for asp platform. Description: MGinternet Property Site Manager - 'detail.asp?p' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: MGinternet Property Site Manager - 'detail.asp?p' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: LaGarde StoreFront 5.0 Shopping Cart - 'login.asp' SQL Injection | This is a webapps exploit for asp platform. Description: LaGarde StoreFront 5.0 Shopping Cart - 'login.asp' SQL Injection. Author: G00db0y |
Analyze the security implications of: LaGarde StoreFront 5.0 Shopping Cart - 'login.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Domain Marketplace Script - SQL Injection | This is a webapps exploit for php platform. Description: Domain Marketplace Script - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Domain Marketplace Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BetaParticle blog 2.0/3.0 - dbBlogMX.mdb Direct Request Database Disclosure | This is a webapps exploit for asp platform. Description: BetaParticle blog 2.0/3.0 - dbBlogMX.mdb Direct Request Database Disclosure. Author: farhad koosha |
Analyze the security implications of: BetaParticle blog 2.0/3.0 - dbBlogMX.mdb Direct Request Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Horde Groupware Web Mail Edition 5.1.2 - Cross-Site Request Forgery (2) | This is a webapps exploit for php platform. Description: Horde Groupware Web Mail Edition 5.1.2 - Cross-Site Request Forgery (2). Author: Marcela Benetrix |
Analyze the security implications of: Horde Groupware Web Mail Edition 5.1.2 - Cross-Site Request Forgery (2) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kalptaru Infotech Automated Link Exchange Portal - 'linking.page.php' SQL Injection | This is a webapps exploit for php platform. Description: Kalptaru Infotech Automated Link Exchange Portal - 'linking.page.php' SQL Injection. Author: HaCkeR_EgY |
Analyze the security implications of: Kalptaru Infotech Automated Link Exchange Portal - 'linking.page.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Cinema 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Cinema 1.0 - SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! Component Cinema 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iwiccle 1.01 - Local File Inclusion / SQL Injection | This is a webapps exploit for php platform. Description: iwiccle 1.01 - Local File Inclusion / SQL Injection. Author: SirGod |
Analyze the security implications of: iwiccle 1.01 - Local File Inclusion / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DL PayCart 1.01 - 'viewitem.php?ItemID' Blind SQL Injection | This is a webapps exploit for php platform. Description: DL PayCart 1.01 - 'viewitem.php?ItemID' Blind SQL Injection. Author: irvian |
Analyze the security implications of: DL PayCart 1.01 - 'viewitem.php?ItemID' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EZContents 1.4.5 - 'index.php?link' Remote File Disclosure | This is a webapps exploit for php platform. Description: EZContents 1.4.5 - 'index.php?link' Remote File Disclosure. Author: p4imi0 |
Analyze the security implications of: EZContents 1.4.5 - 'index.php?link' Remote File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP Network Automation 9.10 - SQL Injection | This is a webapps exploit for php platform. Description: HP Network Automation 9.10 - SQL Injection. Author: anonymous |
Analyze the security implications of: HP Network Automation 9.10 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.