input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Mambo Component AkoGallery - SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component AkoGallery - SQL Injection. Author: snakespc |
Analyze the security implications of: Mambo Component AkoGallery - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Android - Binder Generic ASLR Leak | This is a dos exploit for android platform. Description: Google Android - Binder Generic ASLR Leak. Author: Google Security Research |
Analyze the security implications of: Google Android - Binder Generic ASLR Leak | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Google Android Kernel 2.6 - Local Denial of Service Crash (PoC) | This is a dos exploit for android platform. Description: Google Android Kernel 2.6 - Local Denial of Service Crash (PoC). Author: G13 |
Analyze the security implications of: Google Android Kernel 2.6 - Local Denial of Service Crash (PoC) | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: IntranetApp 3.3 - 'content.asp' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: IntranetApp 3.3 - 'content.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t |
Analyze the security implications of: IntranetApp 3.3 - 'content.asp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: IBM OmniFind - Buffer Overflow | This is a dos exploit for multiple platform. Description: IBM OmniFind - Buffer Overflow. Author: Fatih Kilic |
Analyze the security implications of: IBM OmniFind - Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Pragma Systems FortressSSH 5.0 - 'msvcrt.dll' Exception Handling Remote Denial of Service | This is a dos exploit for multiple platform. Description: Pragma Systems FortressSSH 5.0 - 'msvcrt.dll' Exception Handling Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Pragma Systems FortressSSH 5.0 - 'msvcrt.dll' Exception Handling Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_google - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_google - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component com_google - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CarLine Forum Russian Board 4.2 - 'set.php?name_ig_array[]' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CarLine Forum Russian Board 4.2 - 'set.php?name_ig_array[]' Cross-Site Scripting. Author: 1dt.w0lf |
Analyze the security implications of: CarLine Forum Russian Board 4.2 - 'set.php?name_ig_array[]' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component SmartSite 1.0.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component SmartSite 1.0.0 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component SmartSite 1.0.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Active Photo Gallery - 'catid' SQL Injection | This is a webapps exploit for asp platform. Description: Active Photo Gallery - 'catid' SQL Injection. Author: CyberGhost |
Analyze the security implications of: Active Photo Gallery - 'catid' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ViRobot Linux Server 2.0 - Local Overflow | This is a local exploit for linux platform. Description: ViRobot Linux Server 2.0 - Local Overflow. Author: kf |
Analyze the security implications of: ViRobot Linux Server 2.0 - Local Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component Shoutbox Pro - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Shoutbox Pro - Local File Inclusion. Author: Vrs-hCk |
Analyze the security implications of: Joomla! Component Shoutbox Pro - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Free Simple Software - SQL Injection | This is a webapps exploit for php platform. Description: Free Simple Software - SQL Injection. Author: Mark Stanislav |
Analyze the security implications of: Free Simple Software - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Answers 2.3beta - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component Answers 2.3beta - Multiple Vulnerabilities. Author: jdc |
Analyze the security implications of: Joomla! Component Answers 2.3beta - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ConverTo Video Downloader & Converter 1.4.1 - Arbitrary File Download | This is a webapps exploit for php platform. Description: ConverTo Video Downloader & Converter 1.4.1 - Arbitrary File Download. Author: Ihsan Sencan |
Analyze the security implications of: ConverTo Video Downloader & Converter 1.4.1 - Arbitrary File Download | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Easebay Resources Paypal Subscription - Manager Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: Easebay Resources Paypal Subscription - Manager Multiple Input Validation Vulnerabilities. Author: Doz |
Analyze the security implications of: Easebay Resources Paypal Subscription - Manager Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BSA Radar 1.6.7234.24750 - Local File Inclusion | This is a webapps exploit for multiple platform. Description: BSA Radar 1.6.7234.24750 - Local File Inclusion. Author: William Summerhill |
Analyze the security implications of: BSA Radar 1.6.7234.24750 - Local File Inclusion | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: NASdeluxe NDL-2400r 2.01.09 - OS Command Injection | This is a webapps exploit for hardware platform. Description: NASdeluxe NDL-2400r 2.01.09 - OS Command Injection. Author: SySS GmbH |
Analyze the security implications of: NASdeluxe NDL-2400r 2.01.09 - OS Command Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FOGProject 1.5.9 - File Upload RCE (Authenticated) | This is a webapps exploit for php platform. Description: FOGProject 1.5.9 - File Upload RCE (Authenticated). Author: sml |
Analyze the security implications of: FOGProject 1.5.9 - File Upload RCE (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sendmail 8.9.x/8.10.x/8.11.x/8.12.x - File Locking Denial of Service (2) | This is a dos exploit for linux platform. Description: Sendmail 8.9.x/8.10.x/8.11.x/8.12.x - File Locking Denial of Service (2). Author: zillion |
Analyze the security implications of: Sendmail 8.9.x/8.10.x/8.11.x/8.12.x - File Locking Denial of Service (2) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! 1.0.7 / Mambo 4.5.3 - 'feed' Full Path Disclosure / Denial of Service | This is a webapps exploit for php platform. Description: Joomla! 1.0.7 / Mambo 4.5.3 - 'feed' Full Path Disclosure / Denial of Service. Author: trueend5 |
Analyze the security implications of: Joomla! 1.0.7 / Mambo 4.5.3 - 'feed' Full Path Disclosure / Denial of Service | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ISC BIND 9 - Denial of Service | This is a dos exploit for multiple platform. Description: ISC BIND 9 - Denial of Service. Author: Infobyte |
Analyze the security implications of: ISC BIND 9 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ecommerse v1.0 - Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Ecommerse v1.0 - Cross-Site Scripting (XSS). Author: nu11secur1ty |
Analyze the security implications of: Ecommerse v1.0 - Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Logitech Media Server 7.9.0 - 'favorites' Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Logitech Media Server 7.9.0 - 'favorites' Cross-Site Scripting. Author: Dewank Pant |
Analyze the security implications of: Logitech Media Server 7.9.0 - 'favorites' Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Zotonic < 0.47.0 mod_admin - Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Zotonic < 0.47.0 mod_admin - Cross-Site Scripting. Author: Ramòn Janssen |
Analyze the security implications of: Zotonic < 0.47.0 mod_admin - Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Knox Arkeia Backup Client Type 77 (OSX) - Remote Overflow (Metasploit) | This is a remote exploit for osx platform. Description: Knox Arkeia Backup Client Type 77 (OSX) - Remote Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Knox Arkeia Backup Client Type 77 (OSX) - Remote Overflow (Metasploit) | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Adobe Flash - Stage.align Setter Use-After-Free | This is a dos exploit for multiple platform. Description: Adobe Flash - Stage.align Setter Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Stage.align Setter Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: NovaSTOR NovaNET 12.0 - Remote SYSTEM | This is a remote exploit for multiple platform. Description: NovaSTOR NovaNET 12.0 - Remote SYSTEM. Author: mu-b |
Analyze the security implications of: NovaSTOR NovaNET 12.0 - Remote SYSTEM | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: APNGDis 2.8 - 'filename' Stack Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: APNGDis 2.8 - 'filename' Stack Buffer Overflow (PoC). Author: Alwin Peppels |
Analyze the security implications of: APNGDis 2.8 - 'filename' Stack Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ac4p Mobile - '/cp/index.php?pagenav' Cross-Site Scripting | This is a webapps exploit for php platform. Description: ac4p Mobile - '/cp/index.php?pagenav' Cross-Site Scripting. Author: AL-garnei |
Analyze the security implications of: ac4p Mobile - '/cp/index.php?pagenav' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CGIScript.net - 'csPassword.cgi' 1.0 Information Disclosure | This is a webapps exploit for cgi platform. Description: CGIScript.net - 'csPassword.cgi' 1.0 Information Disclosure. Author: Steve Gustin |
Analyze the security implications of: CGIScript.net - 'csPassword.cgi' 1.0 Information Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! Component ChronoConnectivity - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component ChronoConnectivity - Blind SQL Injection. Author: _mlk_ |
Analyze the security implications of: Joomla! Component ChronoConnectivity - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gnuboard5 5.3.2.8 - SQL Injection | This is a webapps exploit for php platform. Description: Gnuboard5 5.3.2.8 - SQL Injection. Author: CodeSecLab |
Analyze the security implications of: Gnuboard5 5.3.2.8 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iScripts AutoHoster - 'checktransferstatusbck.php' SQL Injection | This is a webapps exploit for php platform. Description: iScripts AutoHoster - 'checktransferstatusbck.php' SQL Injection. Author: i-Hmx |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.