input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: BIND - 'TSIG' Denial of Service | This is a dos exploit for multiple platform. Description: BIND - 'TSIG' Denial of Service. Author: Teppei Fukuda |
Analyze the security implications of: BIND - 'TSIG' Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_tpjobs - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_tpjobs - Blind SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_tpjobs - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DWdirectory 2.1 - SQL Injection | This is a webapps exploit for php platform. Description: DWdirectory 2.1 - SQL Injection. Author: t0pP8uZz |
Analyze the security implications of: DWdirectory 2.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PlanetDNS PlanetWeb 1.14 - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: PlanetDNS PlanetWeb 1.14 - Remote Buffer Overflow. Author: securma massine |
Analyze the security implications of: PlanetDNS PlanetWeb 1.14 - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component Jobline 1.3.1 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Jobline 1.3.1 - Blind SQL Injection. Author: ManhLuat93 |
Analyze the security implications of: Joomla! Component Jobline 1.3.1 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: X.Org xorg-x11-xfs 1.0.2-3.1 - Local Race Condition | This is a local exploit for linux platform. Description: X.Org xorg-x11-xfs 1.0.2-3.1 - Local Race Condition. Author: vl4dZ |
Analyze the security implications of: X.Org xorg-x11-xfs 1.0.2-3.1 - Local Race Condition | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Gopherd 3.0.5 - FTP Gateway Remote Overflow | This is a remote exploit for linux platform. Description: Gopherd 3.0.5 - FTP Gateway Remote Overflow. Author: vade79 |
Analyze the security implications of: Gopherd 3.0.5 - FTP Gateway Remote Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: B-swiss 3 Digital Signage System 3.6.5 - Database Disclosure | This is a webapps exploit for multiple platform. Description: B-swiss 3 Digital Signage System 3.6.5 - Database Disclosure. Author: LiquidWorm |
Analyze the security implications of: B-swiss 3 Digital Signage System 3.6.5 - Database Disclosure | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Easy-Clanpage 2.01 - SQL Injection | This is a webapps exploit for php platform. Description: Easy-Clanpage 2.01 - SQL Injection. Author: Easy Laster |
Analyze the security implications of: Easy-Clanpage 2.01 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Symantec Messaging Gateway 10.6.3-2 - Root Remote Command Execution | This is a webapps exploit for jsp platform. Description: Symantec Messaging Gateway 10.6.3-2 - Root Remote Command Execution. Author: Philip Pettersson |
Analyze the security implications of: Symantec Messaging Gateway 10.6.3-2 - Root Remote Command Execution | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Joomla! Component JMultipleHotelReservation 6.0.7 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JMultipleHotelReservation 6.0.7 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JMultipleHotelReservation 6.0.7 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Absolute Live Support 5.1 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Absolute Live Support 5.1 - Insecure Cookie Handling. Author: Hakxer |
Analyze the security implications of: Absolute Live Support 5.1 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Command School Student Management System - '/sw/admin_terms.php?id' SQL Injection | This is a webapps exploit for php platform. Description: Command School Student Management System - '/sw/admin_terms.php?id' SQL Injection. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Command School Student Management System - '/sw/admin_terms.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Luxbum 0.5.5/stable - Authentication Bypass | This is a webapps exploit for php platform. Description: Luxbum 0.5.5/stable - Authentication Bypass. Author: knxone |
Analyze the security implications of: Luxbum 0.5.5/stable - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Easy Shop 1.2.3 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Easy Shop 1.2.3 - Local File Inclusion. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Easy Shop 1.2.3 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - 'rpc.ypupdated' Command Execution (1) | This is a remote exploit for multiple platform. Description: HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - 'rpc.ypupdated' Command Execution (1). Author: Josh D |
Analyze the security implications of: HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - 'rpc.ypupdated' Command Execution (1) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ipswitch WhatsUp Professional 2006 - Remote Denial of Service | This is a dos exploit for asp platform. Description: Ipswitch WhatsUp Professional 2006 - Remote Denial of Service. Author: Josh Zlatin-Amishav |
Analyze the security implications of: Ipswitch WhatsUp Professional 2006 - Remote Denial of Service | This exploit targets asp systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Gravity Board X 1.1 - Login SQL Injection | This is a webapps exploit for php platform. Description: Gravity Board X 1.1 - Login SQL Injection. Author: rgod |
Analyze the security implications of: Gravity Board X 1.1 - Login SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component QPersonel 1.0.2 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component QPersonel 1.0.2 - SQL Injection. Author: Valentin |
Analyze the security implications of: Joomla! Component QPersonel 1.0.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10.x - AirPort Wireless Driver Multiple Buffer Overflow Vulnerabilities | This is a remote exploit for osx platform. Description: Apple Mac OSX 10.x - AirPort Wireless Driver Multiple Buffer Overflow Vulnerabilities. Author: David Maynor |
Analyze the security implications of: Apple Mac OSX 10.x - AirPort Wireless Driver Multiple Buffer Overflow Vulnerabilities | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: greenpants 0.1.7 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: greenpants 0.1.7 - Multiple Vulnerabilities. Author: Ptrace Security |
Analyze the security implications of: greenpants 0.1.7 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sony XAV-AX5500 1.13 - Firmware Update Validation Remote Code Execution (RCE) | This is a remote exploit for multiple platform. Description: Sony XAV-AX5500 1.13 - Firmware Update Validation Remote Code Execution (RCE). Author: lkushinada |
Analyze the security implications of: Sony XAV-AX5500 1.13 - Firmware Update Validation Remote Code Execution (RCE) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Nokia SGSN DX200 - Remote SNMP Information Disclosure | This is a remote exploit for hardware platform. Description: Nokia SGSN DX200 - Remote SNMP Information Disclosure. Author: Ollie Whitehouse |
Analyze the security implications of: Nokia SGSN DX200 - Remote SNMP Information Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component Soccer Bet 4.1.5 - 'userid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Soccer Bet 4.1.5 - 'userid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Soccer Bet 4.1.5 - 'userid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FUSE fusermount Tool - Race Condition | This is a dos exploit for linux platform. Description: FUSE fusermount Tool - Race Condition. Author: halfdog |
Analyze the security implications of: FUSE fusermount Tool - Race Condition | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SmarterMail Enterprise and Standard 11.x - Persistent Cross-Site Scripting | This is a webapps exploit for asp platform. Description: SmarterMail Enterprise and Standard 11.x - Persistent Cross-Site Scripting. Author: Saeed reza Zamanian |
Analyze the security implications of: SmarterMail Enterprise and Standard 11.x - Persistent Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Atar2b CMS 4.0.1 - 'pageH.php?id' SQL Injection | This is a webapps exploit for php platform. Description: Atar2b CMS 4.0.1 - 'pageH.php?id' SQL Injection. Author: BHG Security Center |
Analyze the security implications of: Atar2b CMS 4.0.1 - 'pageH.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PNPSCADA 2.200816204020 - 'interf' SQL Injection (Authenticated) | This is a webapps exploit for hardware platform. Description: PNPSCADA 2.200816204020 - 'interf' SQL Injection (Authenticated). Author: İsmail ERKEK |
Analyze the security implications of: PNPSCADA 2.200816204020 - 'interf' SQL Injection (Authenticated) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Atlassian Confluence Widget Connector Macro - SSTI | This is a webapps exploit for multiple platform. Description: Atlassian Confluence Widget Connector Macro - SSTI. Author: 46o60 |
Analyze the security implications of: Atlassian Confluence Widget Connector Macro - SSTI | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: pinfo 0.6.9 - Local Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: pinfo 0.6.9 - Local Buffer Overflow (PoC). Author: Nassim Asrir |
Analyze the security implications of: pinfo 0.6.9 - Local Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WebKit - 'WebCore::RenderSearchField::addSearchResult' Heap Buffer Overflow | This is a dos exploit for multiple platform. Description: WebKit - 'WebCore::RenderSearchField::addSearchResult' Heap Buffer Overflow. Author: Google Security Research |
Analyze the security implications of: WebKit - 'WebCore::RenderSearchField::addSearchResult' Heap Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PHP 4.4.5/4.4.6 - 'session_decode()' Double-Free (PoC) | This is a dos exploit for linux platform. Description: PHP 4.4.5/4.4.6 - 'session_decode()' Double-Free (PoC). Author: Stefan Esser |
Analyze the security implications of: PHP 4.4.5/4.4.6 - 'session_decode()' Double-Free (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Collabtive 0.4.8 - Cross-Site Scripting / Authentication Bypass / Arbitrary File Upload | This is a webapps exploit for php platform. Description: Collabtive 0.4.8 - Cross-Site Scripting / Authentication Bypass / Arbitrary File Upload. Author: USH |
Analyze the security implications of: Collabtive 0.4.8 - Cross-Site Scripting / Authentication Bypass / Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel < 2.6.7-rc3 (Slackware 9.1 / Debian 3.0) - 'sys_chown()' Group Ownership Alteration Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel < 2.6.7-rc3 (Slackware 9.1 / Debian 3.0) - 'sys_chown()' Group Ownership Alteration Privilege Escalation. Author: Marco Ivaldi |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.