input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Habari Blog - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeBSD 3.x/4.0/5.0 / NetBSD 1.4.1/1.4.2 / OpenBSD 2.x - Denial of Service | This is a dos exploit for bsd platform. Description: FreeBSD 3.x/4.0/5.0 / NetBSD 1.4.1/1.4.2 / OpenBSD 2.x - Denial of Service. Author: Ussr Labs |
Analyze the security implications of: FreeBSD 3.x/4.0/5.0 / NetBSD 1.4.1/1.4.2 / OpenBSD 2.x - Denial of Service | This exploit targets bsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: KDE Konqueror 3.5.9 - JavaScript 'load' Denial of Service | This is a dos exploit for linux platform. Description: KDE Konqueror 3.5.9 - JavaScript 'load' Denial of Service. Author: Jeremy Brown |
Analyze the security implications of: KDE Konqueror 3.5.9 - JavaScript 'load' Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: X-Chat 2.0.6 - Remote Denial of Service | This is a dos exploit for linux platform. Description: X-Chat 2.0.6 - Remote Denial of Service. Author: Stefan Hecker |
Analyze the security implications of: X-Chat 2.0.6 - Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: cTorrent/DTorrent - '.torrent' Local Buffer Overflow | This is a local exploit for linux platform. Description: cTorrent/DTorrent - '.torrent' Local Buffer Overflow. Author: Michael Brooks |
Analyze the security implications of: cTorrent/DTorrent - '.torrent' Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple Mac OSX 10.4.7 - Mach Exception Handling Privilege Escalation | This is a local exploit for osx platform. Description: Apple Mac OSX 10.4.7 - Mach Exception Handling Privilege Escalation. Author: xmath |
Analyze the security implications of: Apple Mac OSX 10.4.7 - Mach Exception Handling Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Sun Java System Directory Server 7.0 - 'core_get_proxyauth_dn' Denial of Service | This is a dos exploit for multiple platform. Description: Sun Java System Directory Server 7.0 - 'core_get_proxyauth_dn' Denial of Service. Author: Intevydis |
Analyze the security implications of: Sun Java System Directory Server 7.0 - 'core_get_proxyauth_dn' Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_products - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Joomla! Component com_products - Multiple SQL Injections. Author: the_cyber_nuxbie |
Analyze the security implications of: Joomla! Component com_products - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CANDID - '/image/view.php?image_id' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CANDID - '/image/view.php?image_id' Cross-Site Scripting. Author: L0rd CrusAd3r |
Analyze the security implications of: CANDID - '/image/view.php?image_id' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Group Logic ExtremeZ-IP File and Print Servers 5.1.2 x15 - Multiple Vulnerabilities | This is a remote exploit for hardware platform. Description: Group Logic ExtremeZ-IP File and Print Servers 5.1.2 x15 - Multiple Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: Group Logic ExtremeZ-IP File and Print Servers 5.1.2 x15 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component com_books - 'book_id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_books - 'book_id' SQL Injection. Author: boom3rang |
Analyze the security implications of: Joomla! Component com_books - 'book_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Gallery 2.0.7 - 'readfile()' / SQL Injection | This is a webapps exploit for php platform. Description: Invision Gallery 2.0.7 - 'readfile()' / SQL Injection. Author: 1nf3ct0r |
Analyze the security implications of: Invision Gallery 2.0.7 - 'readfile()' / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cypress Solutions CTM-200/CTM-ONE - Hard-coded Credentials Remote Root (Telnet/SSH) | This is a remote exploit for hardware platform. Description: Cypress Solutions CTM-200/CTM-ONE - Hard-coded Credentials Remote Root (Telnet/SSH). Author: LiquidWorm |
Analyze the security implications of: Cypress Solutions CTM-200/CTM-ONE - Hard-coded Credentials Remote Root (Telnet/SSH) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Free PHP Petition Signing Script - Authentication Bypass | This is a webapps exploit for php platform. Description: Free PHP Petition Signing Script - Authentication Bypass. Author: Qabandi |
Analyze the security implications of: Free PHP Petition Signing Script - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Illogator Shop - SQL Injection Bypass | This is a webapps exploit for php platform. Description: Illogator Shop - SQL Injection Bypass. Author: bi0 |
Analyze the security implications of: Illogator Shop - SQL Injection Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Leap CMS 0.1.4 - SQL Injection / Cross-Site Scripting / Arbitrary File Upload | This is a webapps exploit for php platform. Description: Leap CMS 0.1.4 - SQL Injection / Cross-Site Scripting / Arbitrary File Upload. Author: YEnH4ckEr |
Analyze the security implications of: Leap CMS 0.1.4 - SQL Injection / Cross-Site Scripting / Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hannon Hill Cascade Server - (Authenticated) Command Execution | This is a webapps exploit for cgi platform. Description: Hannon Hill Cascade Server - (Authenticated) Command Execution. Author: Emory University |
Analyze the security implications of: Hannon Hill Cascade Server - (Authenticated) Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: ISPworker 1.21 - 'download.php' Remote File Disclosure | This is a webapps exploit for php platform. Description: ISPworker 1.21 - 'download.php' Remote File Disclosure. Author: GoLd_M |
Analyze the security implications of: ISPworker 1.21 - 'download.php' Remote File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pelco Sarix/Spectra Cameras - Cross-Site Request Forgery / Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Pelco Sarix/Spectra Cameras - Cross-Site Request Forgery / Cross-Site Scripting. Author: LiquidWorm |
Analyze the security implications of: Pelco Sarix/Spectra Cameras - Cross-Site Request Forgery / Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: EverSync 0.5 - Arbitrary File Download | This is a webapps exploit for php platform. Description: EverSync 0.5 - Arbitrary File Download. Author: Ihsan Sencan |
Analyze the security implications of: EverSync 0.5 - Arbitrary File Download | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Hotel Booking System - Cross-Site Scripting / SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Hotel Booking System - Cross-Site Scripting / SQL Injection. Author: K-159 |
Analyze the security implications of: Joomla! Component Hotel Booking System - Cross-Site Scripting / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_hello - 'Controller' Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_hello - 'Controller' Local File Inclusion. Author: AJAX Security Team |
Analyze the security implications of: Joomla! Component com_hello - 'Controller' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Claroline E-Learning 1.6 - Remote Hash SQL Injection (2) | This is a webapps exploit for php platform. Description: Claroline E-Learning 1.6 - Remote Hash SQL Injection (2). Author: K-C0d3r |
Analyze the security implications of: Claroline E-Learning 1.6 - Remote Hash SQL Injection (2) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Clantools 1.5 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Clantools 1.5 - Blind SQL Injection. Author: Solidmedia |
Analyze the security implications of: Joomla! Component Clantools 1.5 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alcatel-Lucent OmniPCX Enterprise 7.1 - Remote Command Execution | This is a webapps exploit for cgi platform. Description: Alcatel-Lucent OmniPCX Enterprise 7.1 - Remote Command Execution. Author: RedTeam Pentesting GmbH |
Analyze the security implications of: Alcatel-Lucent OmniPCX Enterprise 7.1 - Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Zabbix 1.1.2 - Multiple Remote Code Execution Vulnerabilities | This is a dos exploit for linux platform. Description: Zabbix 1.1.2 - Multiple Remote Code Execution Vulnerabilities. Author: Max Vozeler |
Analyze the security implications of: Zabbix 1.1.2 - Multiple Remote Code Execution Vulnerabilities | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: McAfee Virus Scan Enterprise for Linux 1.9.2 < 2.0.2 - Remote Code Execution | This is a remote exploit for linux platform. Description: McAfee Virus Scan Enterprise for Linux 1.9.2 < 2.0.2 - Remote Code Execution. Author: Andrew Fasano |
Analyze the security implications of: McAfee Virus Scan Enterprise for Linux 1.9.2 < 2.0.2 - Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Grandstream GSD3710 1.0.11.13 - Stack Buffer Overflow | This is a remote exploit for multiple platform. Description: Grandstream GSD3710 1.0.11.13 - Stack Buffer Overflow. Author: Pepelux |
Analyze the security implications of: Grandstream GSD3710 1.0.11.13 - Stack Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Live TV Script - SQL Injection | This is a webapps exploit for php platform. Description: Live TV Script - SQL Injection. Author: R3d-D3V!L |
Analyze the security implications of: Live TV Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Grapixel New Media 2 - 'pageref' SQL Injection | This is a webapps exploit for php platform. Description: Grapixel New Media 2 - 'pageref' SQL Injection. Author: Berk Dusunur |
Analyze the security implications of: Grapixel New Media 2 - 'pageref' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alpin CMS 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Alpin CMS 1.0 - SQL Injection. Author: Th3 RDX |
Analyze the security implications of: Alpin CMS 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NCSA 1.3/1.4.x/1.5 / Apache HTTPd 0.8.11/0.8.14 - ScriptAlias Source Retrieval | This is a remote exploit for multiple platform. Description: NCSA 1.3/1.4.x/1.5 / Apache HTTPd 0.8.11/0.8.14 - ScriptAlias Source Retrieval. Author: anonymous |
Analyze the security implications of: NCSA 1.3/1.4.x/1.5 / Apache HTTPd 0.8.11/0.8.14 - ScriptAlias Source Retrieval | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FreeBSD 10.2 (x64) - 'amd64_set_ldt' Heap Overflow | This is a dos exploit for freebsd_x86-64 platform. Description: FreeBSD 10.2 (x64) - 'amd64_set_ldt' Heap Overflow. Author: Core Security |
Analyze the security implications of: FreeBSD 10.2 (x64) - 'amd64_set_ldt' Heap Overflow | This exploit targets freebsd_x86-64 systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd_x86-64 platform |
What is this exploit about: Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) | This is a remote exploit for php platform. Description: Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.