input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Employee Management System v1 - 'email' SQL Injection | This is a webapps exploit for php platform. Description: Employee Management System v1 - 'email' SQL Injection. Author: SoSPiro |
Analyze the security implications of: Employee Management System v1 - 'email' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ABB Cylon Aspect 3.08.03 (webServerDeviceLabelUpdate.php) - File Write DoS | This is a hardware exploit for php platform. Description: ABB Cylon Aspect 3.08.03 (webServerDeviceLabelUpdate.php) - File Write DoS. Author: LiquidWorm |
Analyze the security implications of: ABB Cylon Aspect 3.08.03 (webServerDeviceLabelUpdate.php) - File Write DoS | This exploit targets php systems. Type: hardware. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Rivettracker 1.03 - Multiple SQL Injections | This is a webapps exploit for multiple platform. Description: Rivettracker 1.03 - Multiple SQL Injections. Author: Ali Raheem |
Analyze the security implications of: Rivettracker 1.03 - Multiple SQL Injections | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Conceptronic Grab'n'Go and Sitecom Storage Center - Password Disclosure | This is a webapps exploit for hardware platform. Description: Conceptronic Grab'n'Go and Sitecom Storage Center - Password Disclosure. Author: Mattijs van Ommeren |
Analyze the security implications of: Conceptronic Grab'n'Go and Sitecom Storage Center - Password Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Mambo Component Ricette 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component Ricette 1.0 - SQL Injection. Author: S@BUN |
Analyze the security implications of: Mambo Component Ricette 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNU Mailutils imap4d 0.6 - Remote Format String | This is a remote exploit for linux platform. Description: GNU Mailutils imap4d 0.6 - Remote Format String. Author: CoKi |
Analyze the security implications of: GNU Mailutils imap4d 0.6 - Remote Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FreeBSD 4.x - Process Concealment Bypass | This is a local exploit for freebsd platform. Description: FreeBSD 4.x - Process Concealment Bypass. Author: anonymous |
Analyze the security implications of: FreeBSD 4.x - Process Concealment Bypass | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Mozilla Firefox - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Mozilla Firefox - Remote Denial of Service. Author: Jean Pascal Pereira |
Analyze the security implications of: Mozilla Firefox - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: JTL-Shop 2 - 'druckansicht.php' SQL Injection | This is a webapps exploit for php platform. Description: JTL-Shop 2 - 'druckansicht.php' SQL Injection. Author: Lo$T |
Analyze the security implications of: JTL-Shop 2 - 'druckansicht.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pandora FMS - Ping Authenticated Remote Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: Pandora FMS - Ping Authenticated Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Pandora FMS - Ping Authenticated Remote Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: MagpieRSS 0.72 - Cross-Site Scripting / HTML Injection | This is a webapps exploit for php platform. Description: MagpieRSS 0.72 - Cross-Site Scripting / HTML Injection. Author: Justin Klein Keane |
Analyze the security implications of: MagpieRSS 0.72 - Cross-Site Scripting / HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LinksCaffe 3.0 - 'links.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: LinksCaffe 3.0 - 'links.php' Multiple SQL Injections. Author: simo64 |
Analyze the security implications of: LinksCaffe 3.0 - 'links.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ClearBudget 0.6.1 - Insecure Cookie Handling / Local File Inclusion | This is a webapps exploit for php platform. Description: ClearBudget 0.6.1 - Insecure Cookie Handling / Local File Inclusion. Author: SirGod |
Analyze the security implications of: ClearBudget 0.6.1 - Insecure Cookie Handling / Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Blood Bank 1.0 - 'bid' SQLi | This is a webapps exploit for php platform. Description: Blood Bank 1.0 - 'bid' SQLi. Author: Ersin Erenler |
Analyze the security implications of: Blood Bank 1.0 - 'bid' SQLi | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_tour - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_tour - SQL Injection. Author: DevilZ TM |
Analyze the security implications of: Joomla! Component com_tour - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Source - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: CMS Source - Multiple Input Validation Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: CMS Source - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Novell NetWare 5.1/6.0 - POST Arbitrary Perl Code Execution | This is a remote exploit for novell platform. Description: Novell NetWare 5.1/6.0 - POST Arbitrary Perl Code Execution. Author: Dan Elder |
Analyze the security implications of: Novell NetWare 5.1/6.0 - POST Arbitrary Perl Code Execution | This exploit targets novell systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: Link Up Gold - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: Link Up Gold - Cross-Site Request Forgery (Add Admin). Author: bi0 |
Analyze the security implications of: Link Up Gold - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wireshark - dissect_nbap_MACdPDU_Size SIGSEGV | This is a dos exploit for multiple platform. Description: Wireshark - dissect_nbap_MACdPDU_Size SIGSEGV. Author: Google Security Research |
Analyze the security implications of: Wireshark - dissect_nbap_MACdPDU_Size SIGSEGV | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Classifieds Script - 'type' SQL Injection | This is a webapps exploit for php platform. Description: Classifieds Script - 'type' SQL Injection. Author: Hussin X |
Analyze the security implications of: Classifieds Script - 'type' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (1) | This is a remote exploit for multiple platform. Description: OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (1). Author: prdelka |
Analyze the security implications of: OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (1) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Academic Timetable Final Build 7.0b - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: Academic Timetable Final Build 7.0b - Cross-Site Request Forgery (Add Admin). Author: Ihsan Sencan |
Analyze the security implications of: Academic Timetable Final Build 7.0b - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LightOpenCMS 0.1 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: LightOpenCMS 0.1 - 'id' SQL Injection. Author: Mi4night |
Analyze the security implications of: LightOpenCMS 0.1 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component mod_jfancy - 'script.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component mod_jfancy - 'script.php' Arbitrary File Upload. Author: Sammy FORGIT |
Analyze the security implications of: Joomla! Component mod_jfancy - 'script.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TualBLOG 1.0 - 'icerikno' SQL Injection | This is a webapps exploit for asp platform. Description: TualBLOG 1.0 - 'icerikno' SQL Injection. Author: RMx |
Analyze the security implications of: TualBLOG 1.0 - 'icerikno' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ManageEngine EventLog Analyzer 10.0 - Information Disclosure | This is a webapps exploit for java platform. Description: ManageEngine EventLog Analyzer 10.0 - Information Disclosure. Author: Scott Goodwin |
Analyze the security implications of: ManageEngine EventLog Analyzer 10.0 - Information Disclosure | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Cyclades Serial Console Server 3.3.0 - Local Privilege Escalation | This is a local exploit for hardware platform. Description: Cyclades Serial Console Server 3.3.0 - Local Privilege Escalation. Author: ibby |
Analyze the security implications of: Cyclades Serial Console Server 3.3.0 - Local Privilege Escalation | This exploit targets hardware systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: QuickTime Streaming Server - 'parse_xml.cgi' Remote Execution (Metasploit) | This is a webapps exploit for cgi platform. Description: QuickTime Streaming Server - 'parse_xml.cgi' Remote Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: QuickTime Streaming Server - 'parse_xml.cgi' Remote Execution (Metasploit) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: IBM HTTP Server 1.3.x - Source Code Disclosure | This is a remote exploit for multiple platform. Description: IBM HTTP Server 1.3.x - Source Code Disclosure. Author: Felix Huber |
Analyze the security implications of: IBM HTTP Server 1.3.x - Source Code Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: RedHat 8/9 - Directory Server Crafted Search Pattern Denial of Service | This is a dos exploit for linux platform. Description: RedHat 8/9 - Directory Server Crafted Search Pattern Denial of Service. Author: Ulf Weltman |
Analyze the security implications of: RedHat 8/9 - Directory Server Crafted Search Pattern Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ColdFusion 8.0.1 - Arbitrary File Upload / Execution (Metasploit) | This is a webapps exploit for cfm platform. Description: ColdFusion 8.0.1 - Arbitrary File Upload / Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: ColdFusion 8.0.1 - Arbitrary File Upload / Execution (Metasploit) | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: Joomla! Component DentroVideo 1.2 - 'upload.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component DentroVideo 1.2 - 'upload.php' Arbitrary File Upload. Author: Sammy FORGIT |
Analyze the security implications of: Joomla! Component DentroVideo 1.2 - 'upload.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GR Note 0.94 Beta - (Authentication Bypass) Remote Database Backup | This is a webapps exploit for asp platform. Description: GR Note 0.94 Beta - (Authentication Bypass) Remote Database Backup. Author: JosS |
Analyze the security implications of: GR Note 0.94 Beta - (Authentication Bypass) Remote Database Backup | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.