input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Mafya Oyun Scrpti - 'profil.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Mafya Oyun Scrpti - 'profil.php' SQL Injection. Author: DeadLy DeMon
|
Analyze the security implications of: Mafya Oyun Scrpti - 'profil.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle Hyperion Planning 11.1.2.3 - XML External Entity
|
This is a webapps exploit for multiple platform. Description: Oracle Hyperion Planning 11.1.2.3 - XML External Entity. Author: Lucas Dinucci
|
Analyze the security implications of: Oracle Hyperion Planning 11.1.2.3 - XML External Entity
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Adobe Document Server 6.0 Extensions - 'AlterCast?op' Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: Adobe Document Server 6.0 Extensions - 'AlterCast?op' Cross-Site Scripting. Author: Tan Chew Keong
|
Analyze the security implications of: Adobe Document Server 6.0 Extensions - 'AlterCast?op' Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: radscan conquest 8.2 - Multiple Vulnerabilities
|
This is a dos exploit for linux platform. Description: radscan conquest 8.2 - Multiple Vulnerabilities. Author: Luigi Auriemma
|
Analyze the security implications of: radscan conquest 8.2 - Multiple Vulnerabilities
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AVideo Platform 8.1 - Information Disclosure (User Enumeration)
|
This is a webapps exploit for json platform. Description: AVideo Platform 8.1 - Information Disclosure (User Enumeration). Author: Ihsan Sencan
|
Analyze the security implications of: AVideo Platform 8.1 - Information Disclosure (User Enumeration)
|
This exploit targets json systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets json platform
|
What is this exploit about: Qualcomm Adreno GPU MSM Driver - perfcounter Query Heap Overflow
|
This is a dos exploit for android platform. Description: Qualcomm Adreno GPU MSM Driver - perfcounter Query Heap Overflow. Author: Google Security Research
|
Analyze the security implications of: Qualcomm Adreno GPU MSM Driver - perfcounter Query Heap Overflow
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Zyxel NWA-1100-NH - Command Injection
|
This is a remote exploit for hardware platform. Description: Zyxel NWA-1100-NH - Command Injection. Author: Ahmed Alroky
|
Analyze the security implications of: Zyxel NWA-1100-NH - Command Injection
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Bitweaver 1.3 - 'tmpImagePath' Attachment mod_mime
|
This is a webapps exploit for php platform. Description: Bitweaver 1.3 - 'tmpImagePath' Attachment mod_mime. Author: rgod
|
Analyze the security implications of: Bitweaver 1.3 - 'tmpImagePath' Attachment mod_mime
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Novell Netware 6.5 - OpenSSH Remote Stack Overflow
|
This is a dos exploit for novell platform. Description: Novell Netware 6.5 - OpenSSH Remote Stack Overflow. Author: Francis Provencher
|
Analyze the security implications of: Novell Netware 6.5 - OpenSSH Remote Stack Overflow
|
This exploit targets novell systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets novell platform
|
What is this exploit about: CSE Bookstore 1.0 - Multiple SQL Injection
|
This is a webapps exploit for php platform. Description: CSE Bookstore 1.0 - Multiple SQL Injection. Author: Musyoka Ian
|
Analyze the security implications of: CSE Bookstore 1.0 - Multiple SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AIOCP 1.3.x - 'cp_dpage.php' SQL Injection
|
This is a webapps exploit for php platform. Description: AIOCP 1.3.x - 'cp_dpage.php' SQL Injection. Author: laurent gaffie
|
Analyze the security implications of: AIOCP 1.3.x - 'cp_dpage.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: All In One Control Panel 1.3.x - 'cp_downloads.php?did' SQL Injection
|
This is a webapps exploit for php platform. Description: All In One Control Panel 1.3.x - 'cp_downloads.php?did' SQL Injection. Author: Coloss
|
Analyze the security implications of: All In One Control Panel 1.3.x - 'cp_downloads.php?did' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: inClick Cloud Server 5.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: inClick Cloud Server 5.0 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: inClick Cloud Server 5.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component mediaslide - 'albumnum' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component mediaslide - 'albumnum' Blind SQL Injection. Author: Inphex
|
Analyze the security implications of: Joomla! Component mediaslide - 'albumnum' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component live chat - SQL Injection / Open Proxy
|
This is a webapps exploit for php platform. Description: Joomla! Component live chat - SQL Injection / Open Proxy. Author: jdc
|
Analyze the security implications of: Joomla! Component live chat - SQL Injection / Open Proxy
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component JE Quotation Form 1.0b1 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component JE Quotation Form 1.0b1 - Local File Inclusion. Author: ALTBTA
|
Analyze the security implications of: Joomla! Component JE Quotation Form 1.0b1 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Football Pool 3.1 - Database Disclosure
|
This is a webapps exploit for asp platform. Description: Football Pool 3.1 - Database Disclosure. Author: LionTurk
|
Analyze the security implications of: Football Pool 3.1 - Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component JoomRecipe 1.0.4 - 'search_author' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JoomRecipe 1.0.4 - 'search_author' SQL Injection. Author: Teng
|
Analyze the security implications of: Joomla! Component JoomRecipe 1.0.4 - 'search_author' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Borland Interbase - 'open_marker_file()' Remote Buffer Overflow (Metasploit)
|
This is a remote exploit for linux platform. Description: Borland Interbase - 'open_marker_file()' Remote Buffer Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: Borland Interbase - 'open_marker_file()' Remote Buffer Overflow (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Codice CMS 2 - Command Execution (via SQL Injection)
|
This is a webapps exploit for php platform. Description: Codice CMS 2 - Command Execution (via SQL Injection). Author: darkjoker
|
Analyze the security implications of: Codice CMS 2 - Command Execution (via SQL Injection)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ruby 1.9 - regex engine Remote Socket Memory Leak
|
This is a dos exploit for multiple platform. Description: Ruby 1.9 - regex engine Remote Socket Memory Leak. Author: laurent gaffié
|
Analyze the security implications of: Ruby 1.9 - regex engine Remote Socket Memory Leak
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Course Registration Management System - Cross-Site Scripting / SQL Injection
|
This is a webapps exploit for php platform. Description: Course Registration Management System - Cross-Site Scripting / SQL Injection. Author: Omar Kurt
|
Analyze the security implications of: Course Registration Management System - Cross-Site Scripting / SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Comersus Cart 7.0.7 - 'comersus_customerAuthenticateForm.asp' redirectUrl Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Comersus Cart 7.0.7 - 'comersus_customerAuthenticateForm.asp' redirectUrl Cross-Site Scripting. Author: Doz
|
Analyze the security implications of: Comersus Cart 7.0.7 - 'comersus_customerAuthenticateForm.asp' redirectUrl Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Blue Coat Reporter - Directory Traversal
|
This is a remote exploit for hardware platform. Description: Blue Coat Reporter - Directory Traversal. Author: nitr0us
|
Analyze the security implications of: Blue Coat Reporter - Directory Traversal
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ICEstate 1.1 - 'id' SQL Injection
|
This is a webapps exploit for aspx platform. Description: ICEstate 1.1 - 'id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: ICEstate 1.1 - 'id' SQL Injection
|
This exploit targets aspx systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aspx platform
|
What is this exploit about: Mambo Component Quran 1.1 - 'surano' SQL Injection
|
This is a webapps exploit for php platform. Description: Mambo Component Quran 1.1 - 'surano' SQL Injection. Author: Don
|
Analyze the security implications of: Mambo Component Quran 1.1 - 'surano' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Epic 1.0.1/1.0.x - CTCP Nickname Server Message Buffer Overrun
|
This is a remote exploit for linux platform. Description: Epic 1.0.1/1.0.x - CTCP Nickname Server Message Buffer Overrun. Author: Li0n7
|
Analyze the security implications of: Epic 1.0.1/1.0.x - CTCP Nickname Server Message Buffer Overrun
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Liferay Portal 5.1.2 - Persistent Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: Liferay Portal 5.1.2 - Persistent Cross-Site Scripting. Author: Sarim Kiani
|
Analyze the security implications of: Liferay Portal 5.1.2 - Persistent Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: All Enthusiast ReviewPost PHP Pro 2.5 - 'showproduct.php' SQL Injection
|
This is a webapps exploit for php platform. Description: All Enthusiast ReviewPost PHP Pro 2.5 - 'showproduct.php' SQL Injection. Author: G00db0y
|
Analyze the security implications of: All Enthusiast ReviewPost PHP Pro 2.5 - 'showproduct.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Le Forum - 'Fichier_Acceuil' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Le Forum - 'Fichier_Acceuil' Remote File Inclusion. Author: ZoRLu
|
Analyze the security implications of: Le Forum - 'Fichier_Acceuil' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DanPHPSupport 0.5 - 'admin.php?do' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DanPHPSupport 0.5 - 'admin.php?do' Cross-Site Scripting. Author: You_You
|
Analyze the security implications of: DanPHPSupport 0.5 - 'admin.php?do' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EffectOffice Server 2.6 - Remote Service Buffer Overflow (PoC)
|
This is a dos exploit for multiple platform. Description: EffectOffice Server 2.6 - Remote Service Buffer Overflow (PoC). Author: D_BuG
|
Analyze the security implications of: EffectOffice Server 2.6 - Remote Service Buffer Overflow (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Oracle Siebel Sales 8.1 - Persistent Cross-Site Scripting
|
This is a webapps exploit for java platform. Description: Oracle Siebel Sales 8.1 - Persistent Cross-Site Scripting. Author: omurugur
|
Analyze the security implications of: Oracle Siebel Sales 8.1 - Persistent Cross-Site Scripting
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Cisco Adaptive Security Appliance 8.x - Web VPN FTP or CIFS Authentication Form Phishing
|
This is a remote exploit for hardware platform. Description: Cisco Adaptive Security Appliance 8.x - Web VPN FTP or CIFS Authentication Form Phishing. Author: David Byrne
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.