input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: AFFCommerce Shopping Cart 1.1.4 - 'subcategory.php?cl' SQL Injection
|
This is a webapps exploit for php platform. Description: AFFCommerce Shopping Cart 1.1.4 - 'subcategory.php?cl' SQL Injection. Author: r0t3d3Vil
|
Analyze the security implications of: AFFCommerce Shopping Cart 1.1.4 - 'subcategory.php?cl' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: KorWeblog 1.6.2 - Remote Directory Listing
|
This is a webapps exploit for php platform. Description: KorWeblog 1.6.2 - Remote Directory Listing. Author: Jeremy Bae
|
Analyze the security implications of: KorWeblog 1.6.2 - Remote Directory Listing
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 3.2.24 - 'fs/eventpoll.c' Local Denial of Service
|
This is a dos exploit for linux platform. Description: Linux Kernel 3.2.24 - 'fs/eventpoll.c' Local Denial of Service. Author: Yurij M. Plotnikov
|
Analyze the security implications of: Linux Kernel 3.2.24 - 'fs/eventpoll.c' Local Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: JBoss Remoting 6.14.18 - Denial of Service
|
This is a dos exploit for multiple platform. Description: JBoss Remoting 6.14.18 - Denial of Service. Author: Frank Spierings
|
Analyze the security implications of: JBoss Remoting 6.14.18 - Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Mambo Component com_koesubmit 1.0.0 - Remote File Inclusion
|
This is a webapps exploit for multiple platform. Description: Mambo Component com_koesubmit 1.0.0 - Remote File Inclusion. Author: Don Tukulesto
|
Analyze the security implications of: Mambo Component com_koesubmit 1.0.0 - Remote File Inclusion
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Oracle Database 10 g - XML DB xdb.xdb_pitrig_pkg Package PITRIG_TRUNCATE Function Overflow
|
This is a remote exploit for multiple platform. Description: Oracle Database 10 g - XML DB xdb.xdb_pitrig_pkg Package PITRIG_TRUNCATE Function Overflow. Author: sh2kerr
|
Analyze the security implications of: Oracle Database 10 g - XML DB xdb.xdb_pitrig_pkg Package PITRIG_TRUNCATE Function Overflow
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: elgg - Cross-Site Scripting / Cross-Site Request Forgery / Change Password
|
This is a webapps exploit for php platform. Description: elgg - Cross-Site Scripting / Cross-Site Request Forgery / Change Password. Author: lorddemon
|
Analyze the security implications of: elgg - Cross-Site Scripting / Cross-Site Request Forgery / Change Password
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Navetti PricePoint 4.6.0.0 - SQL Injection / Cross-Site Scripting / Cross-Site Request Forgery
|
This is a webapps exploit for multiple platform. Description: Navetti PricePoint 4.6.0.0 - SQL Injection / Cross-Site Scripting / Cross-Site Request Forgery. Author: SEC Consult
|
Analyze the security implications of: Navetti PricePoint 4.6.0.0 - SQL Injection / Cross-Site Scripting / Cross-Site Request Forgery
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: freeSSHd 1.2 - 'SSH2_MSG_NEWKEYS' Remote Denial of Service
|
This is a dos exploit for linux platform. Description: freeSSHd 1.2 - 'SSH2_MSG_NEWKEYS' Remote Denial of Service. Author: Luigi Auriemma
|
Analyze the security implications of: freeSSHd 1.2 - 'SSH2_MSG_NEWKEYS' Remote Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: RedHat Linux 5.0 - 'msgchk' Local Privilege Escalation
|
This is a local exploit for linux platform. Description: RedHat Linux 5.0 - 'msgchk' Local Privilege Escalation. Author: Cesar Tascon Alvarez
|
Analyze the security implications of: RedHat Linux 5.0 - 'msgchk' Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Tenda W308R v2 Wireless Router 5.07.48 - (Cookie Session) Remote DNS Change
|
This is a webapps exploit for asp platform. Description: Tenda W308R v2 Wireless Router 5.07.48 - (Cookie Session) Remote DNS Change. Author: Todor Donev
|
Analyze the security implications of: Tenda W308R v2 Wireless Router 5.07.48 - (Cookie Session) Remote DNS Change
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: djbdns 1.05 - Long Response Packet Remote Cache Poisoning
|
This is a remote exploit for linux platform. Description: djbdns 1.05 - Long Response Packet Remote Cache Poisoning. Author: Matthew Dempsky
|
Analyze the security implications of: djbdns 1.05 - Long Response Packet Remote Cache Poisoning
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Ez News Manager / Pro - Cross-Site Request Forgery (Change Admin Password)
|
This is a webapps exploit for php platform. Description: Ez News Manager / Pro - Cross-Site Request Forgery (Change Admin Password). Author: Milos Zivanovic
|
Analyze the security implications of: Ez News Manager / Pro - Cross-Site Request Forgery (Change Admin Password)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Invision Power Board (IP.Board) 2.0.4 - Search Action Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) 2.0.4 - Search Action Multiple Cross-Site Scripting Vulnerabilities. Author: Mr.SNAKE
|
Analyze the security implications of: Invision Power Board (IP.Board) 2.0.4 - Search Action Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: realnetworks realarcade 1.2.0.994 - Multiple Vulnerabilities
|
This is a remote exploit for multiple platform. Description: realnetworks realarcade 1.2.0.994 - Multiple Vulnerabilities. Author: Luigi Auriemma
|
Analyze the security implications of: realnetworks realarcade 1.2.0.994 - Multiple Vulnerabilities
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CarLine Forum Russian Board 4.2 - 'enter.php' Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: CarLine Forum Russian Board 4.2 - 'enter.php' Multiple SQL Injections. Author: 1dt.w0lf
|
Analyze the security implications of: CarLine Forum Russian Board 4.2 - 'enter.php' Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GLPI 0.85 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: GLPI 0.85 - Blind SQL Injection. Author: Kacper Szurek
|
Analyze the security implications of: GLPI 0.85 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adtran Personal Phone Manager 10.8.1 - 'Multiple' Reflected Cross-Site Scripting (XSS)
|
This is a webapps exploit for hardware platform. Description: Adtran Personal Phone Manager 10.8.1 - 'Multiple' Reflected Cross-Site Scripting (XSS). Author: 3ndG4me
|
Analyze the security implications of: Adtran Personal Phone Manager 10.8.1 - 'Multiple' Reflected Cross-Site Scripting (XSS)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: MySQLDumper 1.24.4 - 'install.php?language' Traversal Arbitrary File Access
|
This is a webapps exploit for perl platform. Description: MySQLDumper 1.24.4 - 'install.php?language' Traversal Arbitrary File Access. Author: AkaStep
|
Analyze the security implications of: MySQLDumper 1.24.4 - 'install.php?language' Traversal Arbitrary File Access
|
This exploit targets perl systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets perl platform
|
What is this exploit about: Maelstrom Server 3.0.x - Argument Buffer Overflow (1)
|
This is a local exploit for freebsd platform. Description: Maelstrom Server 3.0.x - Argument Buffer Overflow (1). Author: Luca Ercoli
|
Analyze the security implications of: Maelstrom Server 3.0.x - Argument Buffer Overflow (1)
|
This exploit targets freebsd systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: Invision Community Blog 1.0/1.1 - Multiple Input Validation Vulnerabilities
|
This is a webapps exploit for php platform. Description: Invision Community Blog 1.0/1.1 - Multiple Input Validation Vulnerabilities. Author: GulfTech Security
|
Analyze the security implications of: Invision Community Blog 1.0/1.1 - Multiple Input Validation Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GeSHi 1.0.x - XML Parsing Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: GeSHi 1.0.x - XML Parsing Remote Denial of Service. Author: Christian Hoffmann
|
Analyze the security implications of: GeSHi 1.0.x - XML Parsing Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: GoAutoDial CE 3.3-1406088000 - Authentication Bypass / Arbitrary File Upload / Command Injection
|
This is a webapps exploit for php platform. Description: GoAutoDial CE 3.3-1406088000 - Authentication Bypass / Arbitrary File Upload / Command Injection. Author: Chris McCurley
|
Analyze the security implications of: GoAutoDial CE 3.3-1406088000 - Authentication Bypass / Arbitrary File Upload / Command Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: husrevforum 1.0.1/2.0.1 - 'Philboard_forum.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: husrevforum 1.0.1/2.0.1 - 'Philboard_forum.asp' SQL Injection. Author: GeFORC3
|
Analyze the security implications of: husrevforum 1.0.1/2.0.1 - 'Philboard_forum.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ZeroShell 3.9.0 - Remote Command Execution
|
This is a webapps exploit for linux platform. Description: ZeroShell 3.9.0 - Remote Command Execution. Author: Fellipe Oliveira
|
Analyze the security implications of: ZeroShell 3.9.0 - Remote Command Execution
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Netgear SSL312 Router - Denial of Service
|
This is a dos exploit for hardware platform. Description: Netgear SSL312 Router - Denial of Service. Author: Rembrandt
|
Analyze the security implications of: Netgear SSL312 Router - Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Lexmark Services Monitor 2.27.4.0.39 - Directory Traversal
|
This is a webapps exploit for hardware platform. Description: Lexmark Services Monitor 2.27.4.0.39 - Directory Traversal. Author: Kevin Randall
|
Analyze the security implications of: Lexmark Services Monitor 2.27.4.0.39 - Directory Traversal
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component com_jsubscription - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_jsubscription - SQL Injection. Author: Sid3^effects
|
Analyze the security implications of: Joomla! Component com_jsubscription - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gongwalker API Manager 1.1 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Gongwalker API Manager 1.1 - Blind SQL Injection. Author: HaHwul
|
Analyze the security implications of: Gongwalker API Manager 1.1 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: glFTPd 2.11a - Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: glFTPd 2.11a - Remote Denial of Service. Author: xynmaps
|
Analyze the security implications of: glFTPd 2.11a - Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apple Mac OSX - io_service_close Use-After-Free
|
This is a dos exploit for osx platform. Description: Apple Mac OSX - io_service_close Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: Apple Mac OSX - io_service_close Use-After-Free
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Facil Helpdesk - Local File Inclusion / Remote File Inclusion / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Facil Helpdesk - Local File Inclusion / Remote File Inclusion / Cross-Site Scripting. Author: Moudi
|
Analyze the security implications of: Facil Helpdesk - Local File Inclusion / Remote File Inclusion / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Keybase keybase-redirector - '$PATH' Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Keybase keybase-redirector - '$PATH' Local Privilege Escalation. Author: mirchr
|
Analyze the security implications of: Keybase keybase-redirector - '$PATH' Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.