input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: GEdit 2.0/2.2 - Large IOStream File Memory Corruption
|
This is a dos exploit for linux platform. Description: GEdit 2.0/2.2 - Large IOStream File Memory Corruption. Author: MegaHz
|
Analyze the security implications of: GEdit 2.0/2.2 - Large IOStream File Memory Corruption
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Barracuda Spam Firewall 3.3.03.053 - Remote Code Execution (2)
|
This is a remote exploit for hardware platform. Description: Barracuda Spam Firewall 3.3.03.053 - Remote Code Execution (2). Author: PATz
|
Analyze the security implications of: Barracuda Spam Firewall 3.3.03.053 - Remote Code Execution (2)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component com_abbrev - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_abbrev - Local File Inclusion. Author: FL0RiX
|
Analyze the security implications of: Joomla! Component com_abbrev - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: TP-Link TL-WR740N - Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: TP-Link TL-WR740N - Cross-Site Scripting. Author: bl00dy
|
Analyze the security implications of: TP-Link TL-WR740N - Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Campcodes Online Matrimonial Website System v3.3 - Code Execution via malicious SVG file upload
|
This is a webapps exploit for php platform. Description: Campcodes Online Matrimonial Website System v3.3 - Code Execution via malicious SVG file upload. Author: Rajdip Dey Sarkar
|
Analyze the security implications of: Campcodes Online Matrimonial Website System v3.3 - Code Execution via malicious SVG file upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component J-CruisePortal 6.0.4 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component J-CruisePortal 6.0.4 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component J-CruisePortal 6.0.4 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Fleetco Fleet Maintenance Management 1.2 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: Fleetco Fleet Maintenance Management 1.2 - Remote Code Execution. Author: AkkuS
|
Analyze the security implications of: Fleetco Fleet Maintenance Management 1.2 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Geeklog 1.5.2 - 'usersettings.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Geeklog 1.5.2 - 'usersettings.php' SQL Injection. Author: Nine:Situations:Group::bookoo
|
Analyze the security implications of: Geeklog 1.5.2 - 'usersettings.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iGuard Security Access Control Device Firmware 3.6.7427A - Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: iGuard Security Access Control Device Firmware 3.6.7427A - Cross-Site Scripting. Author: Usman Saeed
|
Analyze the security implications of: iGuard Security Access Control Device Firmware 3.6.7427A - Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ATX MiniCMTS200a Broadband Gateway 2.0 - Credential Disclosure
|
This is a webapps exploit for hardware platform. Description: ATX MiniCMTS200a Broadband Gateway 2.0 - Credential Disclosure. Author: Zagros Bingol
|
Analyze the security implications of: ATX MiniCMTS200a Broadband Gateway 2.0 - Credential Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Real Estate Listing Website Application Template Login Dialog - SQL Injection
|
This is a webapps exploit for asp platform. Description: Real Estate Listing Website Application Template Login Dialog - SQL Injection. Author: Aria-Security Team
|
Analyze the security implications of: Real Estate Listing Website Application Template Login Dialog - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: WSO2 Carbon 4.4.5 - Denial of Service / Cross-Site Request Forgery
|
This is a webapps exploit for jsp platform. Description: WSO2 Carbon 4.4.5 - Denial of Service / Cross-Site Request Forgery. Author: hyp3rlinx
|
Analyze the security implications of: WSO2 Carbon 4.4.5 - Denial of Service / Cross-Site Request Forgery
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Zhone ADSL2+ 4P Bridge & Router (Broadcom) - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Zhone ADSL2+ 4P Bridge & Router (Broadcom) - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: Zhone ADSL2+ 4P Bridge & Router (Broadcom) - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Samba 3.5.0 - Remote Code Execution
|
This is a remote exploit for linux platform. Description: Samba 3.5.0 - Remote Code Execution. Author: steelo
|
Analyze the security implications of: Samba 3.5.0 - Remote Code Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Interbase 6.x - External Table File Verification
|
This is a remote exploit for multiple platform. Description: Interbase 6.x - External Table File Verification. Author: Kotala Zdenek
|
Analyze the security implications of: Interbase 6.x - External Table File Verification
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: rdesktop 1.5.0 - 'iso_recv_msg()' Integer Underflow (PoC)
|
This is a dos exploit for linux platform. Description: rdesktop 1.5.0 - 'iso_recv_msg()' Integer Underflow (PoC). Author: Guido Landi
|
Analyze the security implications of: rdesktop 1.5.0 - 'iso_recv_msg()' Integer Underflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! / Mambo Component Mod_Forum - 'PHPBB_Root.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! / Mambo Component Mod_Forum - 'PHPBB_Root.php' Remote File Inclusion. Author: spymeta
|
Analyze the security implications of: Joomla! / Mambo Component Mod_Forum - 'PHPBB_Root.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Juniper Networks Secure Access 2000 Web - Root Full Path Disclosure
|
This is a webapps exploit for cgi platform. Description: Juniper Networks Secure Access 2000 Web - Root Full Path Disclosure. Author: Richard Brain
|
Analyze the security implications of: Juniper Networks Secure Access 2000 Web - Root Full Path Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: HP AutoPass License Server - Arbitrary File Upload (Metasploit)
|
This is a remote exploit for java platform. Description: HP AutoPass License Server - Arbitrary File Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: HP AutoPass License Server - Arbitrary File Upload (Metasploit)
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Joomla! Component Wap4Joomla! - 'wapmain.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Wap4Joomla! - 'wapmain.php' SQL Injection. Author: Manas58
|
Analyze the security implications of: Joomla! Component Wap4Joomla! - 'wapmain.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Blue Eye CMS 1.0.0 - Remote Cookie SQL Injection
|
This is a webapps exploit for php platform. Description: Blue Eye CMS 1.0.0 - Remote Cookie SQL Injection. Author: ka0x
|
Analyze the security implications of: Blue Eye CMS 1.0.0 - Remote Cookie SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: TradeMC E-Ticaret - SQL Injection / Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: TradeMC E-Ticaret - SQL Injection / Cross-Site Scripting. Author: KnocKout
|
Analyze the security implications of: TradeMC E-Ticaret - SQL Injection / Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Arab Portal 2.2 - Blind Cookie Authentication Bypass
|
This is a webapps exploit for php platform. Description: Arab Portal 2.2 - Blind Cookie Authentication Bypass. Author: Jafer Al Zidjali
|
Analyze the security implications of: Arab Portal 2.2 - Blind Cookie Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ASP Classifieds - SQL Injection
|
This is a webapps exploit for php platform. Description: ASP Classifieds - SQL Injection. Author: r45c4l
|
Analyze the security implications of: ASP Classifieds - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ICAuction 2.2 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: ICAuction 2.2 - 'id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: ICAuction 2.2 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ARCservIT 6.61/6.63 Client - inetd.tmp Arbitrary File Overwrite
|
This is a local exploit for linux platform. Description: ARCservIT 6.61/6.63 Client - inetd.tmp Arbitrary File Overwrite. Author: Jonas Eriksson
|
Analyze the security implications of: ARCservIT 6.61/6.63 Client - inetd.tmp Arbitrary File Overwrite
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Itech Dating Script 3.26 - 'send_gift.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Itech Dating Script 3.26 - 'send_gift.php' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Itech Dating Script 3.26 - 'send_gift.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WonderWare InBatch 9.0sp1 - Buffer Overflow
|
This is a dos exploit for multiple platform. Description: WonderWare InBatch 9.0sp1 - Buffer Overflow. Author: Luigi Auriemma
|
Analyze the security implications of: WonderWare InBatch 9.0sp1 - Buffer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: iDev Rentals 1.0 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: iDev Rentals 1.0 - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: iDev Rentals 1.0 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OpenSSL < 0.9.8i - DTLS ChangeCipherSpec Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: OpenSSL < 0.9.8i - DTLS ChangeCipherSpec Remote Denial of Service. Author: Jon Oberheide
|
Analyze the security implications of: OpenSSL < 0.9.8i - DTLS ChangeCipherSpec Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ClassSystem 2.0/2.3 - 'HomepageTop.php?teacher_id' SQL Injection
|
This is a webapps exploit for php platform. Description: ClassSystem 2.0/2.3 - 'HomepageTop.php?teacher_id' SQL Injection. Author: Unohope
|
Analyze the security implications of: ClassSystem 2.0/2.3 - 'HomepageTop.php?teacher_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Calacode @Mail Webmail 4.51 - Filtering Engine HTML Injection
|
This is a webapps exploit for php platform. Description: Calacode @Mail Webmail 4.51 - Filtering Engine HTML Injection. Author: Philippe C. Caturegli
|
Analyze the security implications of: Calacode @Mail Webmail 4.51 - Filtering Engine HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: libxslt XSL 1.1.23 - File Processing Buffer Overflow
|
This is a dos exploit for linux platform. Description: libxslt XSL 1.1.23 - File Processing Buffer Overflow. Author: Anthony de Almeida Lopes
|
Analyze the security implications of: libxslt XSL 1.1.23 - File Processing Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.