input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Adobe Flash Player 10.0.22 / AIR - 'intf_count' Integer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Billion / TrueOnline / ZyXEL Routers - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Billion / TrueOnline / ZyXEL Routers - Multiple Vulnerabilities. Author: Pedro Ribeiro |
Analyze the security implications of: Billion / TrueOnline / ZyXEL Routers - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Auto Dealer Management System v1.0 - SQL Injection in sell_vehicle.php | This is a webapps exploit for php platform. Description: Auto Dealer Management System v1.0 - SQL Injection in sell_vehicle.php. Author: Muhammad Navaid Zafar Ansari |
Analyze the security implications of: Auto Dealer Management System v1.0 - SQL Injection in sell_vehicle.php | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP CIFS/9000 Server A.01.05/A.01.06 - Local Buffer Overflow | This is a local exploit for hp-ux platform. Description: HP CIFS/9000 Server A.01.05/A.01.06 - Local Buffer Overflow. Author: watercloud |
Analyze the security implications of: HP CIFS/9000 Server A.01.05/A.01.06 - Local Buffer Overflow | This exploit targets hp-ux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: SonicWALL Aventail SSL-VPN - SQL Injection | This is a webapps exploit for hardware platform. Description: SonicWALL Aventail SSL-VPN - SQL Injection. Author: Asheesh kumar |
Analyze the security implications of: SonicWALL Aventail SSL-VPN - SQL Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow | This is a remote exploit for freebsd platform. Description: Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow. Author: kingcope |
Analyze the security implications of: Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow | This exploit targets freebsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: dreamlive Auktionshaus script - 'news.php?id' SQL Injection | This is a webapps exploit for php platform. Description: dreamlive Auktionshaus script - 'news.php?id' SQL Injection. Author: Easy Laster |
Analyze the security implications of: dreamlive Auktionshaus script - 'news.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component mDigg 2.2.8 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component mDigg 2.2.8 - SQL Injection. Author: Caddy Dz |
Analyze the security implications of: Joomla! Component mDigg 2.2.8 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: dotProject 2.0 - '/modules/public/date_format.php?baseDir' Remote File Inclusion | This is a webapps exploit for php platform. Description: dotProject 2.0 - '/modules/public/date_format.php?baseDir' Remote File Inclusion. Author: r.verton |
Analyze the security implications of: dotProject 2.0 - '/modules/public/date_format.php?baseDir' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Maian Gallery 2.0 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Maian Gallery 2.0 - Insecure Cookie Handling. Author: Saime |
Analyze the security implications of: Maian Gallery 2.0 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LanSuite 3.3.2 - 'design' Local File Inclusion | This is a webapps exploit for php platform. Description: LanSuite 3.3.2 - 'design' Local File Inclusion. Author: dun |
Analyze the security implications of: LanSuite 3.3.2 - 'design' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component OnlineFlashQuiz 1.0.2 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component OnlineFlashQuiz 1.0.2 - Remote File Inclusion. Author: NoGe |
Analyze the security implications of: Joomla! Component OnlineFlashQuiz 1.0.2 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MoinMoin 1.5.8/1.9 - Cross-Site Scripting / Information Disclosure | This is a webapps exploit for java platform. Description: MoinMoin 1.5.8/1.9 - Cross-Site Scripting / Information Disclosure. Author: Xia Shing Zee |
Analyze the security implications of: MoinMoin 1.5.8/1.9 - Cross-Site Scripting / Information Disclosure | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: D-Link Routers - Authentication Bypass (1) | This is a webapps exploit for hardware platform. Description: D-Link Routers - Authentication Bypass (1). Author: Craig Heffner |
Analyze the security implications of: D-Link Routers - Authentication Bypass (1) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AIX 5.1 < 5.3 - paginit Local Stack Overflow | This is a local exploit for aix platform. Description: AIX 5.1 < 5.3 - paginit Local Stack Overflow. Author: cees-bart |
Analyze the security implications of: AIX 5.1 < 5.3 - paginit Local Stack Overflow | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: FreePBX 2.11.0 - Remote Command Execution | This is a webapps exploit for php platform. Description: FreePBX 2.11.0 - Remote Command Execution. Author: @0x00string |
Analyze the security implications of: FreePBX 2.11.0 - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Barracuda SSL VPN - 'launchAgent.do?return-To' Cross-Site Scripting | This is a remote exploit for hardware platform. Description: Barracuda SSL VPN - 'launchAgent.do?return-To' Cross-Site Scripting. Author: Benjamin Kunz Mejri |
Analyze the security implications of: Barracuda SSL VPN - 'launchAgent.do?return-To' Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Adobe Flash - Type Confusion in FileReference Constructor | This is a dos exploit for multiple platform. Description: Adobe Flash - Type Confusion in FileReference Constructor. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Type Confusion in FileReference Constructor | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FlatnuX CMS - Traversal Arbitrary File Access | This is a webapps exploit for php platform. Description: FlatnuX CMS - Traversal Arbitrary File Access. Author: Vulnerability Laboratory |
Analyze the security implications of: FlatnuX CMS - Traversal Arbitrary File Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fastpublish CMS 1.9999 - Local File Inclusion / SQL Injection | This is a webapps exploit for php platform. Description: Fastpublish CMS 1.9999 - Local File Inclusion / SQL Injection. Author: ~!Dok_tOR!~ |
Analyze the security implications of: Fastpublish CMS 1.9999 - Local File Inclusion / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bludit CMS v3.14.1 - Stored Cross-Site Scripting (XSS) (Authenticated) | This is a webapps exploit for php platform. Description: Bludit CMS v3.14.1 - Stored Cross-Site Scripting (XSS) (Authenticated). Author: Rahad Chowdhury |
Analyze the security implications of: Bludit CMS v3.14.1 - Stored Cross-Site Scripting (XSS) (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache < 2.0.64 / < 2.2.21 mod_setenvif - Integer Overflow | This is a dos exploit for linux platform. Description: Apache < 2.0.64 / < 2.2.21 mod_setenvif - Integer Overflow. Author: halfdog |
Analyze the security implications of: Apache < 2.0.64 / < 2.2.21 mod_setenvif - Integer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Chamilo LMS 1.11.8 - 'firstname' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Chamilo LMS 1.11.8 - 'firstname' Cross-Site Scripting. Author: cakes |
Analyze the security implications of: Chamilo LMS 1.11.8 - 'firstname' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Texas Rankem - 'player_id' SQL Injection | This is a webapps exploit for asp platform. Description: Texas Rankem - 'player_id' SQL Injection. Author: R3d-D3V!L |
Analyze the security implications of: Texas Rankem - 'player_id' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: iges CMS 2.0 - Cross-Site Scripting / SQL Injection | This is a webapps exploit for php platform. Description: iges CMS 2.0 - Cross-Site Scripting / SQL Injection. Author: BugReport.IR |
Analyze the security implications of: iges CMS 2.0 - Cross-Site Scripting / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco Unified Operations Manager 8.5 - '/iptm/faultmon/ui/dojo/Main/eventmon_wrapper.jsp' Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for hardware platform. Description: Cisco Unified Operations Manager 8.5 - '/iptm/faultmon/ui/dojo/Main/eventmon_wrapper.jsp' Multiple Cross-Site Scripting Vulnerabilities. Author: Sense of Security |
Analyze the security implications of: Cisco Unified Operations Manager 8.5 - '/iptm/faultmon/ui/dojo/Main/eventmon_wrapper.jsp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: IBM Notes 8.5.x/9.0.x - Denial of Service (2) | This is a dos exploit for multiple platform. Description: IBM Notes 8.5.x/9.0.x - Denial of Service (2). Author: Dhiraj Mishra |
Analyze the security implications of: IBM Notes 8.5.x/9.0.x - Denial of Service (2) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CMtextS 1.0 - '/users_logins/admin.txt' Credentials Disclosure | This is a webapps exploit for php platform. Description: CMtextS 1.0 - '/users_logins/admin.txt' Credentials Disclosure. Author: Kacper |
Analyze the security implications of: CMtextS 1.0 - '/users_logins/admin.txt' Credentials Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OTRS 2.0 - AgentTicketPlain Action Multiple SQL Injections | This is a webapps exploit for cgi platform. Description: OTRS 2.0 - AgentTicketPlain Action Multiple SQL Injections. Author: Moritz Naumann |
Analyze the security implications of: OTRS 2.0 - AgentTicketPlain Action Multiple SQL Injections | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Oracle Business Intelligence Enterprise Edition 11.1.1.7.140715 - Stored XSS | This is a webapps exploit for multiple platform. Description: Oracle Business Intelligence Enterprise Edition 11.1.1.7.140715 - Stored XSS. Author: omurugur |
Analyze the security implications of: Oracle Business Intelligence Enterprise Edition 11.1.1.7.140715 - Stored XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: eFront 3.6.15 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: eFront 3.6.15 - Multiple SQL Injections. Author: Filippo Roncari |
Analyze the security implications of: eFront 3.6.15 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Grandora Rialto 1.6 - 'searchkey.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Grandora Rialto 1.6 - 'searchkey.asp' Multiple SQL Injections. Author: laurent gaffie |
Analyze the security implications of: Grandora Rialto 1.6 - 'searchkey.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: cPanel 5.0 - 'Guestbook.cgi' Remote Command Execution (2) | This is a webapps exploit for cgi platform. Description: cPanel 5.0 - 'Guestbook.cgi' Remote Command Execution (2). Author: CaMaLeoN |
Analyze the security implications of: cPanel 5.0 - 'Guestbook.cgi' Remote Command Execution (2) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Apache 2.0.44 (Linux) - Remote Denial of Service | This is a dos exploit for linux platform. Description: Apache 2.0.44 (Linux) - Remote Denial of Service. Author: Daniel Nystram |
Analyze the security implications of: Apache 2.0.44 (Linux) - Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.