input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Multi-Lingual Application - Blind SQL Injection | This is a webapps exploit for asp platform. Description: Multi-Lingual Application - Blind SQL Injection. Author: R3d-D3V!L |
Analyze the security implications of: Multi-Lingual Application - Blind SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Unreal Engine 3 - Failed Memory Allocation Remote Denial of Service | This is a dos exploit for multiple platform. Description: Unreal Engine 3 - Failed Memory Allocation Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Unreal Engine 3 - Failed Memory Allocation Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Micro Focus Filr 2 2.0.0.421/1.2 1.2.0.846 - Multiple Vulnerabilities | This is a webapps exploit for java platform. Description: Micro Focus Filr 2 2.0.0.421/1.2 1.2.0.846 - Multiple Vulnerabilities. Author: SEC Consult |
Analyze the security implications of: Micro Focus Filr 2 2.0.0.421/1.2 1.2.0.846 - Multiple Vulnerabilities | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: EDItran Communications Platform (editcp) 4.1 - Remote Buffer Overflow | This is a dos exploit for multiple platform. Description: EDItran Communications Platform (editcp) 4.1 - Remote Buffer Overflow. Author: Pedro Andujar |
Analyze the security implications of: EDItran Communications Platform (editcp) 4.1 - Remote Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Dolibarr ERP/CRM < 3.2.0 / < 3.1.1 - OS Command Injection | This is a webapps exploit for php platform. Description: Dolibarr ERP/CRM < 3.2.0 / < 3.1.1 - OS Command Injection. Author: Nahuel Grisolia |
Analyze the security implications of: Dolibarr ERP/CRM < 3.2.0 / < 3.1.1 - OS Command Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Easypx41 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Easypx41 - Multiple Cross-Site Scripting Vulnerabilities. Author: FalconDeOro |
Analyze the security implications of: Easypx41 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AmpJuke 0.7 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: AmpJuke 0.7 - 'index.php' Cross-Site Scripting. Author: ShaFuck31 |
Analyze the security implications of: AmpJuke 0.7 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EasyClassifields 3.0 - 'go' SQL Injection | This is a webapps exploit for php platform. Description: EasyClassifields 3.0 - 'go' SQL Injection. Author: e.wiZz! |
Analyze the security implications of: EasyClassifields 3.0 - 'go' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jettweb PHP Hazır Haber Sitesi Scripti V2 - SQL Injection (Authentication Bypass) | This is a webapps exploit for php platform. Description: Jettweb PHP Hazır Haber Sitesi Scripti V2 - SQL Injection (Authentication Bypass). Author: Ahmet Ümit BAYRAM |
Analyze the security implications of: Jettweb PHP Hazır Haber Sitesi Scripti V2 - SQL Injection (Authentication Bypass) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Renista CMS - SQL Injection | This is a webapps exploit for asp platform. Description: Renista CMS - SQL Injection. Author: Amir Afghanian |
Analyze the security implications of: Renista CMS - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: eXtplorer<= 2.1.14 - Authentication Bypass & Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: eXtplorer<= 2.1.14 - Authentication Bypass & Remote Code Execution (RCE). Author: ErPaciocco |
Analyze the security implications of: eXtplorer<= 2.1.14 - Authentication Bypass & Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AIX 4.1/4.2 - 'pdnsd' Remote Buffer Overflow | This is a remote exploit for aix platform. Description: AIX 4.1/4.2 - 'pdnsd' Remote Buffer Overflow. Author: Last Stage of Delirium |
Analyze the security implications of: AIX 4.1/4.2 - 'pdnsd' Remote Buffer Overflow | This exploit targets aix systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: FreePBX 2.9.0/2.10.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: FreePBX 2.9.0/2.10.0 - Multiple Vulnerabilities. Author: Martin Tschirsich |
Analyze the security implications of: FreePBX 2.9.0/2.10.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ask Expert Script 3.0.5 - Cross Site Scripting / SQL Injection | This is a webapps exploit for php platform. Description: Ask Expert Script 3.0.5 - Cross Site Scripting / SQL Injection. Author: Mr Winst0n |
Analyze the security implications of: Ask Expert Script 3.0.5 - Cross Site Scripting / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linksys Routers - LanD Packet Denial of Service | This is a dos exploit for hardware platform. Description: Linksys Routers - LanD Packet Denial of Service. Author: Justin M. Wray |
Analyze the security implications of: Linksys Routers - LanD Packet Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GNU libc/regcomp(3) - Multiple Vulnerabilities | This is a dos exploit for linux platform. Description: GNU libc/regcomp(3) - Multiple Vulnerabilities. Author: Maksymilian Arciemowicz |
Analyze the security implications of: GNU libc/regcomp(3) - Multiple Vulnerabilities | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PGP4Pine 1.75.6/1.76 - 'Message Line' Remote Buffer Overflow | This is a remote exploit for linux platform. Description: PGP4Pine 1.75.6/1.76 - 'Message Line' Remote Buffer Overflow. Author: Eric AUGE |
Analyze the security implications of: PGP4Pine 1.75.6/1.76 - 'Message Line' Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_pcchess - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_pcchess - Local File Inclusion. Author: team_elite |
Analyze the security implications of: Joomla! Component com_pcchess - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Active Web Helpdesk 2 - Authentication Bypass | This is a webapps exploit for asp platform. Description: Active Web Helpdesk 2 - Authentication Bypass. Author: Cyber-Zone |
Analyze the security implications of: Active Web Helpdesk 2 - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: CollabNet Subversion Edge Log Parser - HTML Injection | This is a remote exploit for multiple platform. Description: CollabNet Subversion Edge Log Parser - HTML Injection. Author: Sumit Kumar Soni |
Analyze the security implications of: CollabNet Subversion Edge Log Parser - HTML Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Adobe Flash - Setting Value Use-After-Free | This is a dos exploit for multiple platform. Description: Adobe Flash - Setting Value Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Setting Value Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Salim Gasmi GLD (Greylisting Daemon) 1.x - Postfix Greylisting Daemon Buffer Overflow | This is a remote exploit for linux platform. Description: Salim Gasmi GLD (Greylisting Daemon) 1.x - Postfix Greylisting Daemon Buffer Overflow. Author: Xpl017Elz |
Analyze the security implications of: Salim Gasmi GLD (Greylisting Daemon) 1.x - Postfix Greylisting Daemon Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FLABER 1.1 RC1 - Remote Command Execution | This is a webapps exploit for php platform. Description: FLABER 1.1 RC1 - Remote Command Execution. Author: EgiX |
Analyze the security implications of: FLABER 1.1 RC1 - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_bookflip - 'book_id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_bookflip - 'book_id' SQL Injection. Author: boom3rang |
Analyze the security implications of: Joomla! Component com_bookflip - 'book_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Netgear R7000 Router - Remote Code Execution | This is a webapps exploit for hardware platform. Description: Netgear R7000 Router - Remote Code Execution. Author: grimm-co |
Analyze the security implications of: Netgear R7000 Router - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: E-Vendejo 0.2 - 'Articles.php' SQL Injection | This is a webapps exploit for php platform. Description: E-Vendejo 0.2 - 'Articles.php' SQL Injection. Author: r00t |
Analyze the security implications of: E-Vendejo 0.2 - 'Articles.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco Adaptive Security Response - HTTP Response Splitting | This is a remote exploit for hardware platform. Description: Cisco Adaptive Security Response - HTTP Response Splitting. Author: Daniel King |
Analyze the security implications of: Cisco Adaptive Security Response - HTTP Response Splitting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BlackCat CMS 1.3.6 - 'Display name' Cross Site Scripting (XSS) | This is a webapps exploit for php platform. Description: BlackCat CMS 1.3.6 - 'Display name' Cross Site Scripting (XSS). Author: Kamaljeet Kumar |
Analyze the security implications of: BlackCat CMS 1.3.6 - 'Display name' Cross Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Made Simple 1.11.10 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: CMS Made Simple 1.11.10 - Multiple Cross-Site Scripting Vulnerabilities. Author: Blessen Thomas |
Analyze the security implications of: CMS Made Simple 1.11.10 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GitHub Enterprise < 2.8.7 - Remote Code Execution | This is a webapps exploit for multiple platform. Description: GitHub Enterprise < 2.8.7 - Remote Code Execution. Author: orange |
Analyze the security implications of: GitHub Enterprise < 2.8.7 - Remote Code Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component JE Job 1.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component JE Job 1.0 - Local File Inclusion. Author: Valentin |
Analyze the security implications of: Joomla! Component JE Job 1.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: aspwebalbum 3.2 - Arbitrary File Upload / SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: aspwebalbum 3.2 - Arbitrary File Upload / SQL Injection / Cross-Site Scripting. Author: Alemin_Krali |
Analyze the security implications of: aspwebalbum 3.2 - Arbitrary File Upload / SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Flash Image Gallery - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Flash Image Gallery - Remote File Inclusion. Author: Mehmet Ince |
Analyze the security implications of: Joomla! Component Flash Image Gallery - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EMC CMCNE 11.2.1 - FileUploadController Remote Code Execution (Metasploit) | This is a remote exploit for java platform. Description: EMC CMCNE 11.2.1 - FileUploadController Remote Code Execution (Metasploit). Author: James Fitts |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.