input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Active Auction House - 'sendpassword.asp' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: Active Auction House - 'sendpassword.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: Dcrab |
Analyze the security implications of: Active Auction House - 'sendpassword.asp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Babe Logger 2.0 - 'comments.php?id' SQL Injection | This is a webapps exploit for php platform. Description: Babe Logger 2.0 - 'comments.php?id' SQL Injection. Author: r0t |
Analyze the security implications of: Babe Logger 2.0 - 'comments.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla Firefox 1.5 (OSX) - 'location.QueryInterface()' Code Execution (Metasploit) | This is a remote exploit for osx platform. Description: Mozilla Firefox 1.5 (OSX) - 'location.QueryInterface()' Code Execution (Metasploit). Author: H D Moore |
Analyze the security implications of: Mozilla Firefox 1.5 (OSX) - 'location.QueryInterface()' Code Execution (Metasploit) | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Fastgraf's whois.cgi - Remote Command Execution | This is a webapps exploit for cgi platform. Description: Fastgraf's whois.cgi - Remote Command Execution. Author: Marco van Berkum |
Analyze the security implications of: Fastgraf's whois.cgi - Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: ClanSuite 2.9 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: ClanSuite 2.9 - Arbitrary File Upload. Author: Adrien Thierry |
Analyze the security implications of: ClanSuite 2.9 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JS Autoz 1.0.9 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JS Autoz 1.0.9 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JS Autoz 1.0.9 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! J2 JOBS 1.3.0 - 'sortby' Authenticated SQL Injection | This is a webapps exploit for php platform. Description: Joomla! J2 JOBS 1.3.0 - 'sortby' Authenticated SQL Injection. Author: Mehmet Kelepçe |
Analyze the security implications of: Joomla! J2 JOBS 1.3.0 - 'sortby' Authenticated SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Advanced Webhost Billing System (AWBS) 2.7.1 - 'news.php' SQL Injection | This is a webapps exploit for php platform. Description: Advanced Webhost Billing System (AWBS) 2.7.1 - 'news.php' SQL Injection. Author: Mr.SQL |
Analyze the security implications of: Advanced Webhost Billing System (AWBS) 2.7.1 - 'news.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LocazoList Classifieds 1.0 - 'SearchDB.asp' Input Validation | This is a webapps exploit for asp platform. Description: LocazoList Classifieds 1.0 - 'SearchDB.asp' Input Validation. Author: r0t3d3Vil |
Analyze the security implications of: LocazoList Classifieds 1.0 - 'SearchDB.asp' Input Validation | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Batflat CMS 1.3.6 - 'multiple' Stored XSS | This is a webapps exploit for php platform. Description: Batflat CMS 1.3.6 - 'multiple' Stored XSS. Author: Tadjmen |
Analyze the security implications of: Batflat CMS 1.3.6 - 'multiple' Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wireshark - getRate Stack Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: Wireshark - getRate Stack Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: Wireshark - getRate Stack Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Railo 4.2.1 - Remote File Inclusion (Metasploit) | This is a remote exploit for multiple platform. Description: Railo 4.2.1 - Remote File Inclusion (Metasploit). Author: Metasploit |
Analyze the security implications of: Railo 4.2.1 - Remote File Inclusion (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SAP NetWeaver Web Dynpro 6.4 < 7.5 - Information Disclosure | This is a webapps exploit for linux platform. Description: SAP NetWeaver Web Dynpro 6.4 < 7.5 - Information Disclosure. Author: Richard Alviarez |
Analyze the security implications of: SAP NetWeaver Web Dynpro 6.4 < 7.5 - Information Disclosure | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! 1.5.0 Beta - 'pcltar.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! 1.5.0 Beta - 'pcltar.php' Remote File Inclusion. Author: Omid |
Analyze the security implications of: Joomla! 1.5.0 Beta - 'pcltar.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Enalean Tuleap 7.4.99.5 - Remote Command Execution | This is a webapps exploit for php platform. Description: Enalean Tuleap 7.4.99.5 - Remote Command Execution. Author: Portcullis |
Analyze the security implications of: Enalean Tuleap 7.4.99.5 - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Geeklog 1.3.5 - Calendar Event Form Script Injection | This is a webapps exploit for php platform. Description: Geeklog 1.3.5 - Calendar Event Form Script Injection. Author: Ahmet Sabri ALPER |
Analyze the security implications of: Geeklog 1.3.5 - Calendar Event Form Script Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ClamAV / UnRAR - .RAR Handling Remote Null Pointer Dereference | This is a remote exploit for linux platform. Description: ClamAV / UnRAR - .RAR Handling Remote Null Pointer Dereference. Author: Metaeye Security Group |
Analyze the security implications of: ClamAV / UnRAR - .RAR Handling Remote Null Pointer Dereference | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: TIPS MailPost 5.1.1 - Remote File Enumeration | This is a webapps exploit for cgi platform. Description: TIPS MailPost 5.1.1 - Remote File Enumeration. Author: Gemma Hughes |
Analyze the security implications of: TIPS MailPost 5.1.1 - Remote File Enumeration | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! Component NoticeBoard 1.3 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component NoticeBoard 1.3 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component NoticeBoard 1.3 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ManageEngine Support Center Plus 7916 - Directory Traversal | This is a webapps exploit for php platform. Description: ManageEngine Support Center Plus 7916 - Directory Traversal. Author: xistence |
Analyze the security implications of: ManageEngine Support Center Plus 7916 - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SAP Business Objects Crystal Reports 7-10 - 'viewreport.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: SAP Business Objects Crystal Reports 7-10 - 'viewreport.asp' Cross-Site Scripting. Author: Bugs NotHugs |
Analyze the security implications of: SAP Business Objects Crystal Reports 7-10 - 'viewreport.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Axis M10 Series Network Cameras - Cross-Site Scripting | This is a remote exploit for hardware platform. Description: Axis M10 Series Network Cameras - Cross-Site Scripting. Author: Matt Metzger |
Analyze the security implications of: Axis M10 Series Network Cameras - Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: iPhone4 FTP Server 1.0 - Empty CWD-RETR Remote Crash | This is a dos exploit for hardware platform. Description: iPhone4 FTP Server 1.0 - Empty CWD-RETR Remote Crash. Author: offsetIntruder |
Analyze the security implications of: iPhone4 FTP Server 1.0 - Empty CWD-RETR Remote Crash | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GPS Tracking System 2.12 - 'username' SQL Injection | This is a webapps exploit for php platform. Description: GPS Tracking System 2.12 - 'username' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: GPS Tracking System 2.12 - 'username' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kshop 2.22 - 'kshop_search.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Kshop 2.22 - 'kshop_search.php' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: Kshop 2.22 - 'kshop_search.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IceBB 1.0-rc5 - Remote Create Admin | This is a webapps exploit for php platform. Description: IceBB 1.0-rc5 - Remote Create Admin. Author: Hessam-x |
Analyze the security implications of: IceBB 1.0-rc5 - Remote Create Admin | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ACGV News 0.9.1 - 'glossaire.php?id' Cross-Site Scripting | This is a webapps exploit for php platform. Description: ACGV News 0.9.1 - 'glossaire.php?id' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: ACGV News 0.9.1 - 'glossaire.php?id' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Innovate Portal 2.0 - 'cat' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Innovate Portal 2.0 - 'cat' Cross-Site Scripting. Author: Eyup CELIK |
Analyze the security implications of: Innovate Portal 2.0 - 'cat' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fluig 1.7.0 - Path Traversal | This is a webapps exploit for multiple platform. Description: Fluig 1.7.0 - Path Traversal. Author: Lucas Souza |
Analyze the security implications of: Fluig 1.7.0 - Path Traversal | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: eBrigade ERP 4.5 - SQL Injection | This is a webapps exploit for php platform. Description: eBrigade ERP 4.5 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: eBrigade ERP 4.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 'Exif' Extension - 'exif_read_data()' Remote Denial of Service | This is a dos exploit for multiple platform. Description: PHP 'Exif' Extension - 'exif_read_data()' Remote Denial of Service. Author: _ikki & paradoxengine |
Analyze the security implications of: PHP 'Exif' Extension - 'exif_read_data()' Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PolicyKit-1 0.105-31 - Privilege Escalation | This is a local exploit for linux platform. Description: PolicyKit-1 0.105-31 - Privilege Escalation. Author: Lance Biggerstaff |
Analyze the security implications of: PolicyKit-1 0.105-31 - Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mambo 4.5.2 - Globals Overwrite / Remote Command Execution | This is a webapps exploit for php platform. Description: Mambo 4.5.2 - Globals Overwrite / Remote Command Execution. Author: rgod |
Analyze the security implications of: Mambo 4.5.2 - Globals Overwrite / Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CFAGCMS 1 - Remote File Inclusion | This is a webapps exploit for php platform. Description: CFAGCMS 1 - Remote File Inclusion. Author: BeyazKurt |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.