input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Mambo Component AkoGallery - SQL Injection
|
This is a webapps exploit for php platform. Description: Mambo Component AkoGallery - SQL Injection. Author: snakespc
|
Analyze the security implications of: Mambo Component AkoGallery - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Google Android - Binder Generic ASLR Leak
|
This is a dos exploit for android platform. Description: Google Android - Binder Generic ASLR Leak. Author: Google Security Research
|
Analyze the security implications of: Google Android - Binder Generic ASLR Leak
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Google Android Kernel 2.6 - Local Denial of Service Crash (PoC)
|
This is a dos exploit for android platform. Description: Google Android Kernel 2.6 - Local Denial of Service Crash (PoC). Author: G13
|
Analyze the security implications of: Google Android Kernel 2.6 - Local Denial of Service Crash (PoC)
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: IntranetApp 3.3 - 'content.asp' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for asp platform. Description: IntranetApp 3.3 - 'content.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t
|
Analyze the security implications of: IntranetApp 3.3 - 'content.asp' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: IBM OmniFind - Buffer Overflow
|
This is a dos exploit for multiple platform. Description: IBM OmniFind - Buffer Overflow. Author: Fatih Kilic
|
Analyze the security implications of: IBM OmniFind - Buffer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Pragma Systems FortressSSH 5.0 - 'msvcrt.dll' Exception Handling Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Pragma Systems FortressSSH 5.0 - 'msvcrt.dll' Exception Handling Remote Denial of Service. Author: Luigi Auriemma
|
Analyze the security implications of: Pragma Systems FortressSSH 5.0 - 'msvcrt.dll' Exception Handling Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_google - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_google - Local File Inclusion. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component com_google - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CarLine Forum Russian Board 4.2 - 'set.php?name_ig_array[]' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: CarLine Forum Russian Board 4.2 - 'set.php?name_ig_array[]' Cross-Site Scripting. Author: 1dt.w0lf
|
Analyze the security implications of: CarLine Forum Russian Board 4.2 - 'set.php?name_ig_array[]' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component SmartSite 1.0.0 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component SmartSite 1.0.0 - Local File Inclusion. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component SmartSite 1.0.0 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Active Photo Gallery - 'catid' SQL Injection
|
This is a webapps exploit for asp platform. Description: Active Photo Gallery - 'catid' SQL Injection. Author: CyberGhost
|
Analyze the security implications of: Active Photo Gallery - 'catid' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ViRobot Linux Server 2.0 - Local Overflow
|
This is a local exploit for linux platform. Description: ViRobot Linux Server 2.0 - Local Overflow. Author: kf
|
Analyze the security implications of: ViRobot Linux Server 2.0 - Local Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component Shoutbox Pro - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Shoutbox Pro - Local File Inclusion. Author: Vrs-hCk
|
Analyze the security implications of: Joomla! Component Shoutbox Pro - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Free Simple Software - SQL Injection
|
This is a webapps exploit for php platform. Description: Free Simple Software - SQL Injection. Author: Mark Stanislav
|
Analyze the security implications of: Free Simple Software - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Answers 2.3beta - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Joomla! Component Answers 2.3beta - Multiple Vulnerabilities. Author: jdc
|
Analyze the security implications of: Joomla! Component Answers 2.3beta - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ConverTo Video Downloader & Converter 1.4.1 - Arbitrary File Download
|
This is a webapps exploit for php platform. Description: ConverTo Video Downloader & Converter 1.4.1 - Arbitrary File Download. Author: Ihsan Sencan
|
Analyze the security implications of: ConverTo Video Downloader & Converter 1.4.1 - Arbitrary File Download
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Easebay Resources Paypal Subscription - Manager Multiple Input Validation Vulnerabilities
|
This is a webapps exploit for php platform. Description: Easebay Resources Paypal Subscription - Manager Multiple Input Validation Vulnerabilities. Author: Doz
|
Analyze the security implications of: Easebay Resources Paypal Subscription - Manager Multiple Input Validation Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BSA Radar 1.6.7234.24750 - Local File Inclusion
|
This is a webapps exploit for multiple platform. Description: BSA Radar 1.6.7234.24750 - Local File Inclusion. Author: William Summerhill
|
Analyze the security implications of: BSA Radar 1.6.7234.24750 - Local File Inclusion
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: NASdeluxe NDL-2400r 2.01.09 - OS Command Injection
|
This is a webapps exploit for hardware platform. Description: NASdeluxe NDL-2400r 2.01.09 - OS Command Injection. Author: SySS GmbH
|
Analyze the security implications of: NASdeluxe NDL-2400r 2.01.09 - OS Command Injection
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: FOGProject 1.5.9 - File Upload RCE (Authenticated)
|
This is a webapps exploit for php platform. Description: FOGProject 1.5.9 - File Upload RCE (Authenticated). Author: sml
|
Analyze the security implications of: FOGProject 1.5.9 - File Upload RCE (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sendmail 8.9.x/8.10.x/8.11.x/8.12.x - File Locking Denial of Service (2)
|
This is a dos exploit for linux platform. Description: Sendmail 8.9.x/8.10.x/8.11.x/8.12.x - File Locking Denial of Service (2). Author: zillion
|
Analyze the security implications of: Sendmail 8.9.x/8.10.x/8.11.x/8.12.x - File Locking Denial of Service (2)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! 1.0.7 / Mambo 4.5.3 - 'feed' Full Path Disclosure / Denial of Service
|
This is a webapps exploit for php platform. Description: Joomla! 1.0.7 / Mambo 4.5.3 - 'feed' Full Path Disclosure / Denial of Service. Author: trueend5
|
Analyze the security implications of: Joomla! 1.0.7 / Mambo 4.5.3 - 'feed' Full Path Disclosure / Denial of Service
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ISC BIND 9 - Denial of Service
|
This is a dos exploit for multiple platform. Description: ISC BIND 9 - Denial of Service. Author: Infobyte
|
Analyze the security implications of: ISC BIND 9 - Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Ecommerse v1.0 - Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Ecommerse v1.0 - Cross-Site Scripting (XSS). Author: nu11secur1ty
|
Analyze the security implications of: Ecommerse v1.0 - Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Logitech Media Server 7.9.0 - 'favorites' Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: Logitech Media Server 7.9.0 - 'favorites' Cross-Site Scripting. Author: Dewank Pant
|
Analyze the security implications of: Logitech Media Server 7.9.0 - 'favorites' Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Zotonic < 0.47.0 mod_admin - Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: Zotonic < 0.47.0 mod_admin - Cross-Site Scripting. Author: Ramòn Janssen
|
Analyze the security implications of: Zotonic < 0.47.0 mod_admin - Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Knox Arkeia Backup Client Type 77 (OSX) - Remote Overflow (Metasploit)
|
This is a remote exploit for osx platform. Description: Knox Arkeia Backup Client Type 77 (OSX) - Remote Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: Knox Arkeia Backup Client Type 77 (OSX) - Remote Overflow (Metasploit)
|
This exploit targets osx systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Adobe Flash - Stage.align Setter Use-After-Free
|
This is a dos exploit for multiple platform. Description: Adobe Flash - Stage.align Setter Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - Stage.align Setter Use-After-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: NovaSTOR NovaNET 12.0 - Remote SYSTEM
|
This is a remote exploit for multiple platform. Description: NovaSTOR NovaNET 12.0 - Remote SYSTEM. Author: mu-b
|
Analyze the security implications of: NovaSTOR NovaNET 12.0 - Remote SYSTEM
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: APNGDis 2.8 - 'filename' Stack Buffer Overflow (PoC)
|
This is a dos exploit for multiple platform. Description: APNGDis 2.8 - 'filename' Stack Buffer Overflow (PoC). Author: Alwin Peppels
|
Analyze the security implications of: APNGDis 2.8 - 'filename' Stack Buffer Overflow (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ac4p Mobile - '/cp/index.php?pagenav' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: ac4p Mobile - '/cp/index.php?pagenav' Cross-Site Scripting. Author: AL-garnei
|
Analyze the security implications of: ac4p Mobile - '/cp/index.php?pagenav' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CGIScript.net - 'csPassword.cgi' 1.0 Information Disclosure
|
This is a webapps exploit for cgi platform. Description: CGIScript.net - 'csPassword.cgi' 1.0 Information Disclosure. Author: Steve Gustin
|
Analyze the security implications of: CGIScript.net - 'csPassword.cgi' 1.0 Information Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Joomla! Component ChronoConnectivity - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component ChronoConnectivity - Blind SQL Injection. Author: _mlk_
|
Analyze the security implications of: Joomla! Component ChronoConnectivity - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gnuboard5 5.3.2.8 - SQL Injection
|
This is a webapps exploit for php platform. Description: Gnuboard5 5.3.2.8 - SQL Injection. Author: CodeSecLab
|
Analyze the security implications of: Gnuboard5 5.3.2.8 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iScripts AutoHoster - 'checktransferstatusbck.php' SQL Injection
|
This is a webapps exploit for php platform. Description: iScripts AutoHoster - 'checktransferstatusbck.php' SQL Injection. Author: i-Hmx
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.