input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Multi-Lingual Application - Blind SQL Injection
|
This is a webapps exploit for asp platform. Description: Multi-Lingual Application - Blind SQL Injection. Author: R3d-D3V!L
|
Analyze the security implications of: Multi-Lingual Application - Blind SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Unreal Engine 3 - Failed Memory Allocation Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Unreal Engine 3 - Failed Memory Allocation Remote Denial of Service. Author: Luigi Auriemma
|
Analyze the security implications of: Unreal Engine 3 - Failed Memory Allocation Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Micro Focus Filr 2 2.0.0.421/1.2 1.2.0.846 - Multiple Vulnerabilities
|
This is a webapps exploit for java platform. Description: Micro Focus Filr 2 2.0.0.421/1.2 1.2.0.846 - Multiple Vulnerabilities. Author: SEC Consult
|
Analyze the security implications of: Micro Focus Filr 2 2.0.0.421/1.2 1.2.0.846 - Multiple Vulnerabilities
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: EDItran Communications Platform (editcp) 4.1 - Remote Buffer Overflow
|
This is a dos exploit for multiple platform. Description: EDItran Communications Platform (editcp) 4.1 - Remote Buffer Overflow. Author: Pedro Andujar
|
Analyze the security implications of: EDItran Communications Platform (editcp) 4.1 - Remote Buffer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Dolibarr ERP/CRM < 3.2.0 / < 3.1.1 - OS Command Injection
|
This is a webapps exploit for php platform. Description: Dolibarr ERP/CRM < 3.2.0 / < 3.1.1 - OS Command Injection. Author: Nahuel Grisolia
|
Analyze the security implications of: Dolibarr ERP/CRM < 3.2.0 / < 3.1.1 - OS Command Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Easypx41 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Easypx41 - Multiple Cross-Site Scripting Vulnerabilities. Author: FalconDeOro
|
Analyze the security implications of: Easypx41 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AmpJuke 0.7 - 'index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: AmpJuke 0.7 - 'index.php' Cross-Site Scripting. Author: ShaFuck31
|
Analyze the security implications of: AmpJuke 0.7 - 'index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EasyClassifields 3.0 - 'go' SQL Injection
|
This is a webapps exploit for php platform. Description: EasyClassifields 3.0 - 'go' SQL Injection. Author: e.wiZz!
|
Analyze the security implications of: EasyClassifields 3.0 - 'go' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jettweb PHP Hazır Haber Sitesi Scripti V2 - SQL Injection (Authentication Bypass)
|
This is a webapps exploit for php platform. Description: Jettweb PHP Hazır Haber Sitesi Scripti V2 - SQL Injection (Authentication Bypass). Author: Ahmet Ümit BAYRAM
|
Analyze the security implications of: Jettweb PHP Hazır Haber Sitesi Scripti V2 - SQL Injection (Authentication Bypass)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Renista CMS - SQL Injection
|
This is a webapps exploit for asp platform. Description: Renista CMS - SQL Injection. Author: Amir Afghanian
|
Analyze the security implications of: Renista CMS - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: eXtplorer<= 2.1.14 - Authentication Bypass & Remote Code Execution (RCE)
|
This is a webapps exploit for php platform. Description: eXtplorer<= 2.1.14 - Authentication Bypass & Remote Code Execution (RCE). Author: ErPaciocco
|
Analyze the security implications of: eXtplorer<= 2.1.14 - Authentication Bypass & Remote Code Execution (RCE)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AIX 4.1/4.2 - 'pdnsd' Remote Buffer Overflow
|
This is a remote exploit for aix platform. Description: AIX 4.1/4.2 - 'pdnsd' Remote Buffer Overflow. Author: Last Stage of Delirium
|
Analyze the security implications of: AIX 4.1/4.2 - 'pdnsd' Remote Buffer Overflow
|
This exploit targets aix systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: FreePBX 2.9.0/2.10.0 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: FreePBX 2.9.0/2.10.0 - Multiple Vulnerabilities. Author: Martin Tschirsich
|
Analyze the security implications of: FreePBX 2.9.0/2.10.0 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ask Expert Script 3.0.5 - Cross Site Scripting / SQL Injection
|
This is a webapps exploit for php platform. Description: Ask Expert Script 3.0.5 - Cross Site Scripting / SQL Injection. Author: Mr Winst0n
|
Analyze the security implications of: Ask Expert Script 3.0.5 - Cross Site Scripting / SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linksys Routers - LanD Packet Denial of Service
|
This is a dos exploit for hardware platform. Description: Linksys Routers - LanD Packet Denial of Service. Author: Justin M. Wray
|
Analyze the security implications of: Linksys Routers - LanD Packet Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: GNU libc/regcomp(3) - Multiple Vulnerabilities
|
This is a dos exploit for linux platform. Description: GNU libc/regcomp(3) - Multiple Vulnerabilities. Author: Maksymilian Arciemowicz
|
Analyze the security implications of: GNU libc/regcomp(3) - Multiple Vulnerabilities
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: PGP4Pine 1.75.6/1.76 - 'Message Line' Remote Buffer Overflow
|
This is a remote exploit for linux platform. Description: PGP4Pine 1.75.6/1.76 - 'Message Line' Remote Buffer Overflow. Author: Eric AUGE
|
Analyze the security implications of: PGP4Pine 1.75.6/1.76 - 'Message Line' Remote Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_pcchess - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_pcchess - Local File Inclusion. Author: team_elite
|
Analyze the security implications of: Joomla! Component com_pcchess - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Active Web Helpdesk 2 - Authentication Bypass
|
This is a webapps exploit for asp platform. Description: Active Web Helpdesk 2 - Authentication Bypass. Author: Cyber-Zone
|
Analyze the security implications of: Active Web Helpdesk 2 - Authentication Bypass
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: CollabNet Subversion Edge Log Parser - HTML Injection
|
This is a remote exploit for multiple platform. Description: CollabNet Subversion Edge Log Parser - HTML Injection. Author: Sumit Kumar Soni
|
Analyze the security implications of: CollabNet Subversion Edge Log Parser - HTML Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Adobe Flash - Setting Value Use-After-Free
|
This is a dos exploit for multiple platform. Description: Adobe Flash - Setting Value Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - Setting Value Use-After-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Salim Gasmi GLD (Greylisting Daemon) 1.x - Postfix Greylisting Daemon Buffer Overflow
|
This is a remote exploit for linux platform. Description: Salim Gasmi GLD (Greylisting Daemon) 1.x - Postfix Greylisting Daemon Buffer Overflow. Author: Xpl017Elz
|
Analyze the security implications of: Salim Gasmi GLD (Greylisting Daemon) 1.x - Postfix Greylisting Daemon Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: FLABER 1.1 RC1 - Remote Command Execution
|
This is a webapps exploit for php platform. Description: FLABER 1.1 RC1 - Remote Command Execution. Author: EgiX
|
Analyze the security implications of: FLABER 1.1 RC1 - Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_bookflip - 'book_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_bookflip - 'book_id' SQL Injection. Author: boom3rang
|
Analyze the security implications of: Joomla! Component com_bookflip - 'book_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Netgear R7000 Router - Remote Code Execution
|
This is a webapps exploit for hardware platform. Description: Netgear R7000 Router - Remote Code Execution. Author: grimm-co
|
Analyze the security implications of: Netgear R7000 Router - Remote Code Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: E-Vendejo 0.2 - 'Articles.php' SQL Injection
|
This is a webapps exploit for php platform. Description: E-Vendejo 0.2 - 'Articles.php' SQL Injection. Author: r00t
|
Analyze the security implications of: E-Vendejo 0.2 - 'Articles.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco Adaptive Security Response - HTTP Response Splitting
|
This is a remote exploit for hardware platform. Description: Cisco Adaptive Security Response - HTTP Response Splitting. Author: Daniel King
|
Analyze the security implications of: Cisco Adaptive Security Response - HTTP Response Splitting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: BlackCat CMS 1.3.6 - 'Display name' Cross Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: BlackCat CMS 1.3.6 - 'Display name' Cross Site Scripting (XSS). Author: Kamaljeet Kumar
|
Analyze the security implications of: BlackCat CMS 1.3.6 - 'Display name' Cross Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CMS Made Simple 1.11.10 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: CMS Made Simple 1.11.10 - Multiple Cross-Site Scripting Vulnerabilities. Author: Blessen Thomas
|
Analyze the security implications of: CMS Made Simple 1.11.10 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GitHub Enterprise < 2.8.7 - Remote Code Execution
|
This is a webapps exploit for multiple platform. Description: GitHub Enterprise < 2.8.7 - Remote Code Execution. Author: orange
|
Analyze the security implications of: GitHub Enterprise < 2.8.7 - Remote Code Execution
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component JE Job 1.0 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component JE Job 1.0 - Local File Inclusion. Author: Valentin
|
Analyze the security implications of: Joomla! Component JE Job 1.0 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: aspwebalbum 3.2 - Arbitrary File Upload / SQL Injection / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: aspwebalbum 3.2 - Arbitrary File Upload / SQL Injection / Cross-Site Scripting. Author: Alemin_Krali
|
Analyze the security implications of: aspwebalbum 3.2 - Arbitrary File Upload / SQL Injection / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Flash Image Gallery - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Flash Image Gallery - Remote File Inclusion. Author: Mehmet Ince
|
Analyze the security implications of: Joomla! Component Flash Image Gallery - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EMC CMCNE 11.2.1 - FileUploadController Remote Code Execution (Metasploit)
|
This is a remote exploit for java platform. Description: EMC CMCNE 11.2.1 - FileUploadController Remote Code Execution (Metasploit). Author: James Fitts
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.