input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Adobe Flash Player 10.0.22 / AIR - 'intf_count' Integer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Billion / TrueOnline / ZyXEL Routers - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Billion / TrueOnline / ZyXEL Routers - Multiple Vulnerabilities. Author: Pedro Ribeiro
|
Analyze the security implications of: Billion / TrueOnline / ZyXEL Routers - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Auto Dealer Management System v1.0 - SQL Injection in sell_vehicle.php
|
This is a webapps exploit for php platform. Description: Auto Dealer Management System v1.0 - SQL Injection in sell_vehicle.php. Author: Muhammad Navaid Zafar Ansari
|
Analyze the security implications of: Auto Dealer Management System v1.0 - SQL Injection in sell_vehicle.php
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HP CIFS/9000 Server A.01.05/A.01.06 - Local Buffer Overflow
|
This is a local exploit for hp-ux platform. Description: HP CIFS/9000 Server A.01.05/A.01.06 - Local Buffer Overflow. Author: watercloud
|
Analyze the security implications of: HP CIFS/9000 Server A.01.05/A.01.06 - Local Buffer Overflow
|
This exploit targets hp-ux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hp-ux platform
|
What is this exploit about: SonicWALL Aventail SSL-VPN - SQL Injection
|
This is a webapps exploit for hardware platform. Description: SonicWALL Aventail SSL-VPN - SQL Injection. Author: Asheesh kumar
|
Analyze the security implications of: SonicWALL Aventail SSL-VPN - SQL Injection
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow
|
This is a remote exploit for freebsd platform. Description: Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow. Author: kingcope
|
Analyze the security implications of: Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow
|
This exploit targets freebsd systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: dreamlive Auktionshaus script - 'news.php?id' SQL Injection
|
This is a webapps exploit for php platform. Description: dreamlive Auktionshaus script - 'news.php?id' SQL Injection. Author: Easy Laster
|
Analyze the security implications of: dreamlive Auktionshaus script - 'news.php?id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component mDigg 2.2.8 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component mDigg 2.2.8 - SQL Injection. Author: Caddy Dz
|
Analyze the security implications of: Joomla! Component mDigg 2.2.8 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: dotProject 2.0 - '/modules/public/date_format.php?baseDir' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: dotProject 2.0 - '/modules/public/date_format.php?baseDir' Remote File Inclusion. Author: r.verton
|
Analyze the security implications of: dotProject 2.0 - '/modules/public/date_format.php?baseDir' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Maian Gallery 2.0 - Insecure Cookie Handling
|
This is a webapps exploit for php platform. Description: Maian Gallery 2.0 - Insecure Cookie Handling. Author: Saime
|
Analyze the security implications of: Maian Gallery 2.0 - Insecure Cookie Handling
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LanSuite 3.3.2 - 'design' Local File Inclusion
|
This is a webapps exploit for php platform. Description: LanSuite 3.3.2 - 'design' Local File Inclusion. Author: dun
|
Analyze the security implications of: LanSuite 3.3.2 - 'design' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component OnlineFlashQuiz 1.0.2 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component OnlineFlashQuiz 1.0.2 - Remote File Inclusion. Author: NoGe
|
Analyze the security implications of: Joomla! Component OnlineFlashQuiz 1.0.2 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MoinMoin 1.5.8/1.9 - Cross-Site Scripting / Information Disclosure
|
This is a webapps exploit for java platform. Description: MoinMoin 1.5.8/1.9 - Cross-Site Scripting / Information Disclosure. Author: Xia Shing Zee
|
Analyze the security implications of: MoinMoin 1.5.8/1.9 - Cross-Site Scripting / Information Disclosure
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: D-Link Routers - Authentication Bypass (1)
|
This is a webapps exploit for hardware platform. Description: D-Link Routers - Authentication Bypass (1). Author: Craig Heffner
|
Analyze the security implications of: D-Link Routers - Authentication Bypass (1)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: AIX 5.1 < 5.3 - paginit Local Stack Overflow
|
This is a local exploit for aix platform. Description: AIX 5.1 < 5.3 - paginit Local Stack Overflow. Author: cees-bart
|
Analyze the security implications of: AIX 5.1 < 5.3 - paginit Local Stack Overflow
|
This exploit targets aix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: FreePBX 2.11.0 - Remote Command Execution
|
This is a webapps exploit for php platform. Description: FreePBX 2.11.0 - Remote Command Execution. Author: @0x00string
|
Analyze the security implications of: FreePBX 2.11.0 - Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Barracuda SSL VPN - 'launchAgent.do?return-To' Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: Barracuda SSL VPN - 'launchAgent.do?return-To' Cross-Site Scripting. Author: Benjamin Kunz Mejri
|
Analyze the security implications of: Barracuda SSL VPN - 'launchAgent.do?return-To' Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Adobe Flash - Type Confusion in FileReference Constructor
|
This is a dos exploit for multiple platform. Description: Adobe Flash - Type Confusion in FileReference Constructor. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - Type Confusion in FileReference Constructor
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: FlatnuX CMS - Traversal Arbitrary File Access
|
This is a webapps exploit for php platform. Description: FlatnuX CMS - Traversal Arbitrary File Access. Author: Vulnerability Laboratory
|
Analyze the security implications of: FlatnuX CMS - Traversal Arbitrary File Access
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Fastpublish CMS 1.9999 - Local File Inclusion / SQL Injection
|
This is a webapps exploit for php platform. Description: Fastpublish CMS 1.9999 - Local File Inclusion / SQL Injection. Author: ~!Dok_tOR!~
|
Analyze the security implications of: Fastpublish CMS 1.9999 - Local File Inclusion / SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bludit CMS v3.14.1 - Stored Cross-Site Scripting (XSS) (Authenticated)
|
This is a webapps exploit for php platform. Description: Bludit CMS v3.14.1 - Stored Cross-Site Scripting (XSS) (Authenticated). Author: Rahad Chowdhury
|
Analyze the security implications of: Bludit CMS v3.14.1 - Stored Cross-Site Scripting (XSS) (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apache < 2.0.64 / < 2.2.21 mod_setenvif - Integer Overflow
|
This is a dos exploit for linux platform. Description: Apache < 2.0.64 / < 2.2.21 mod_setenvif - Integer Overflow. Author: halfdog
|
Analyze the security implications of: Apache < 2.0.64 / < 2.2.21 mod_setenvif - Integer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Chamilo LMS 1.11.8 - 'firstname' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Chamilo LMS 1.11.8 - 'firstname' Cross-Site Scripting. Author: cakes
|
Analyze the security implications of: Chamilo LMS 1.11.8 - 'firstname' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Texas Rankem - 'player_id' SQL Injection
|
This is a webapps exploit for asp platform. Description: Texas Rankem - 'player_id' SQL Injection. Author: R3d-D3V!L
|
Analyze the security implications of: Texas Rankem - 'player_id' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: iges CMS 2.0 - Cross-Site Scripting / SQL Injection
|
This is a webapps exploit for php platform. Description: iges CMS 2.0 - Cross-Site Scripting / SQL Injection. Author: BugReport.IR
|
Analyze the security implications of: iges CMS 2.0 - Cross-Site Scripting / SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco Unified Operations Manager 8.5 - '/iptm/faultmon/ui/dojo/Main/eventmon_wrapper.jsp' Multiple Cross-Site Scripting Vulnerabilities
|
This is a remote exploit for hardware platform. Description: Cisco Unified Operations Manager 8.5 - '/iptm/faultmon/ui/dojo/Main/eventmon_wrapper.jsp' Multiple Cross-Site Scripting Vulnerabilities. Author: Sense of Security
|
Analyze the security implications of: Cisco Unified Operations Manager 8.5 - '/iptm/faultmon/ui/dojo/Main/eventmon_wrapper.jsp' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: IBM Notes 8.5.x/9.0.x - Denial of Service (2)
|
This is a dos exploit for multiple platform. Description: IBM Notes 8.5.x/9.0.x - Denial of Service (2). Author: Dhiraj Mishra
|
Analyze the security implications of: IBM Notes 8.5.x/9.0.x - Denial of Service (2)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CMtextS 1.0 - '/users_logins/admin.txt' Credentials Disclosure
|
This is a webapps exploit for php platform. Description: CMtextS 1.0 - '/users_logins/admin.txt' Credentials Disclosure. Author: Kacper
|
Analyze the security implications of: CMtextS 1.0 - '/users_logins/admin.txt' Credentials Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OTRS 2.0 - AgentTicketPlain Action Multiple SQL Injections
|
This is a webapps exploit for cgi platform. Description: OTRS 2.0 - AgentTicketPlain Action Multiple SQL Injections. Author: Moritz Naumann
|
Analyze the security implications of: OTRS 2.0 - AgentTicketPlain Action Multiple SQL Injections
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Oracle Business Intelligence Enterprise Edition 11.1.1.7.140715 - Stored XSS
|
This is a webapps exploit for multiple platform. Description: Oracle Business Intelligence Enterprise Edition 11.1.1.7.140715 - Stored XSS. Author: omurugur
|
Analyze the security implications of: Oracle Business Intelligence Enterprise Edition 11.1.1.7.140715 - Stored XSS
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: eFront 3.6.15 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: eFront 3.6.15 - Multiple SQL Injections. Author: Filippo Roncari
|
Analyze the security implications of: eFront 3.6.15 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Grandora Rialto 1.6 - 'searchkey.asp' Multiple SQL Injections
|
This is a webapps exploit for asp platform. Description: Grandora Rialto 1.6 - 'searchkey.asp' Multiple SQL Injections. Author: laurent gaffie
|
Analyze the security implications of: Grandora Rialto 1.6 - 'searchkey.asp' Multiple SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: cPanel 5.0 - 'Guestbook.cgi' Remote Command Execution (2)
|
This is a webapps exploit for cgi platform. Description: cPanel 5.0 - 'Guestbook.cgi' Remote Command Execution (2). Author: CaMaLeoN
|
Analyze the security implications of: cPanel 5.0 - 'Guestbook.cgi' Remote Command Execution (2)
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Apache 2.0.44 (Linux) - Remote Denial of Service
|
This is a dos exploit for linux platform. Description: Apache 2.0.44 (Linux) - Remote Denial of Service. Author: Daniel Nystram
|
Analyze the security implications of: Apache 2.0.44 (Linux) - Remote Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.