input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Joomla! Component Intranet Attendance Track 2.6.5 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Intranet Attendance Track 2.6.5 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Intranet Attendance Track 2.6.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeRadius < 1.1.8 - Zero-Length Tunnel-Password Denial of Service | This is a dos exploit for multiple platform. Description: FreeRadius < 1.1.8 - Zero-Length Tunnel-Password Denial of Service. Author: Matthew Gillespie |
Analyze the security implications of: FreeRadius < 1.1.8 - Zero-Length Tunnel-Password Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache Tomcat 4.0.3 - Requests Containing MS-DOS Device Names Information Disclosure | This is a remote exploit for multiple platform. Description: Apache Tomcat 4.0.3 - Requests Containing MS-DOS Device Names Information Disclosure. Author: security curmudgeon |
Analyze the security implications of: Apache Tomcat 4.0.3 - Requests Containing MS-DOS Device Names Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: D-Link DI-614+ - IP Fragment Reassembly Denial of Service | This is a dos exploit for hardware platform. Description: D-Link DI-614+ - IP Fragment Reassembly Denial of Service. Author: humble |
Analyze the security implications of: D-Link DI-614+ - IP Fragment Reassembly Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: goffgrafix Design's - SQL Injection | This is a webapps exploit for php platform. Description: goffgrafix Design's - SQL Injection. Author: XroGuE |
Analyze the security implications of: goffgrafix Design's - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: e107 CMS v3.2.1 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: e107 CMS v3.2.1 - Multiple Vulnerabilities. Author: Hubert Wojciechowski |
Analyze the security implications of: e107 CMS v3.2.1 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CCleague Pro 1.0.1RC1 - 'cookie' Remote Code Execution | This is a webapps exploit for php platform. Description: CCleague Pro 1.0.1RC1 - 'cookie' Remote Code Execution. Author: Kacper |
Analyze the security implications of: CCleague Pro 1.0.1RC1 - 'cookie' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: exim 4.90 - Remote Code Execution | This is a remote exploit for linux platform. Description: exim 4.90 - Remote Code Execution. Author: hackk.gr |
Analyze the security implications of: exim 4.90 - Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_na_newsdescription - 'newsid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_na_newsdescription - 'newsid' SQL Injection. Author: EcHoLL |
Analyze the security implications of: Joomla! Component com_na_newsdescription - 'newsid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CoDeSys 3.4 - Null Pointer Invalid HTTP Request Parsing Remote Denial of Service | This is a dos exploit for multiple platform. Description: CoDeSys 3.4 - Null Pointer Invalid HTTP Request Parsing Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: CoDeSys 3.4 - Null Pointer Invalid HTTP Request Parsing Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GeekLog 1.3.x - HTML Injection | This is a webapps exploit for php platform. Description: GeekLog 1.3.x - HTML Injection. Author: Jelmer |
Analyze the security implications of: GeekLog 1.3.x - HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Coupon 3.5 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Coupon 3.5 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Coupon 3.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KISGB 5.1.1 - 'Authenticate.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: KISGB 5.1.1 - 'Authenticate.php' Remote File Inclusion. Author: mdx |
Analyze the security implications of: KISGB 5.1.1 - 'Authenticate.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Asteriskguru Queue Statistics - 'warning' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Asteriskguru Queue Statistics - 'warning' Cross-Site Scripting. Author: Manuel García Cárdenas |
Analyze the security implications of: Asteriskguru Queue Statistics - 'warning' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Tuleap 9.6 - Second-Order PHP Object Injection (Metasploit) | This is a remote exploit for php platform. Description: Tuleap 9.6 - Second-Order PHP Object Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Tuleap 9.6 - Second-Order PHP Object Injection (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Openfire Server 3.6.0a - Admin Console Authentication Bypass (Metasploit) | This is a webapps exploit for jsp platform. Description: Openfire Server 3.6.0a - Admin Console Authentication Bypass (Metasploit). Author: Metasploit |
Analyze the security implications of: Openfire Server 3.6.0a - Admin Console Authentication Bypass (Metasploit) | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: dalbum 1.43 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: dalbum 1.43 - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: dalbum 1.43 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RealServer - Describe Buffer Overflow (Metasploit) | This is a remote exploit for multiple platform. Description: RealServer - Describe Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: RealServer - Describe Buffer Overflow (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: cms s.builder 3.7 - Remote File Inclusion | This is a webapps exploit for php platform. Description: cms s.builder 3.7 - Remote File Inclusion. Author: cr0w |
Analyze the security implications of: cms s.builder 3.7 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Docker 0.11 - VMM-Container Breakout | This is a local exploit for linux platform. Description: Docker 0.11 - VMM-Container Breakout. Author: Sebastian Krahmer |
Analyze the security implications of: Docker 0.11 - VMM-Container Breakout | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Azerbaijan Development Group AzDGDatingPlatinum 1.1.0 - 'view.php?id' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Azerbaijan Development Group AzDGDatingPlatinum 1.1.0 - 'view.php?id' Cross-Site Scripting. Author: kre0n |
Analyze the security implications of: Azerbaijan Development Group AzDGDatingPlatinum 1.1.0 - 'view.php?id' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dune 0.6.7 - GET Remote Buffer Overrun | This is a remote exploit for linux platform. Description: Dune 0.6.7 - GET Remote Buffer Overrun. Author: V9 |
Analyze the security implications of: Dune 0.6.7 - GET Remote Buffer Overrun | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Ger Versluis 2000 5.5 24 - 'SITE_fiche.php' SQL Injection | This is a webapps exploit for php platform. Description: Ger Versluis 2000 5.5 24 - 'SITE_fiche.php' SQL Injection. Author: DeCo017 |
Analyze the security implications of: Ger Versluis 2000 5.5 24 - 'SITE_fiche.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Audistats 1.3 - SQL Injection | This is a webapps exploit for php platform. Description: Audistats 1.3 - SQL Injection. Author: kaMtiEz |
Analyze the security implications of: Audistats 1.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MiniDVBLinux <=5.4 - Config Download Exploit | This is a remote exploit for hardware platform. Description: MiniDVBLinux <=5.4 - Config Download Exploit. Author: LiquidWorm |
Analyze the security implications of: MiniDVBLinux <=5.4 - Config Download Exploit | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Snitz Forums 2000 - 'TOPIC_ID' SQL Injection | This is a webapps exploit for asp platform. Description: Snitz Forums 2000 - 'TOPIC_ID' SQL Injection. Author: snup |
Analyze the security implications of: Snitz Forums 2000 - 'TOPIC_ID' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ACWeb 1.14/1.8 - Cross-Site Scripting | This is a remote exploit for linux platform. Description: ACWeb 1.14/1.8 - Cross-Site Scripting. Author: DownBload |
Analyze the security implications of: ACWeb 1.14/1.8 - Cross-Site Scripting | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AneCMS 2e2c583 - Local File Inclusion | This is a webapps exploit for php platform. Description: AneCMS 2e2c583 - Local File Inclusion. Author: I2sec-Jong Hwan Park |
Analyze the security implications of: AneCMS 2e2c583 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP HP-UX 10.34 rlpdaemon - Remote Overflow | This is a remote exploit for linux platform. Description: HP HP-UX 10.34 rlpdaemon - Remote Overflow. Author: RSI Advise |
Analyze the security implications of: HP HP-UX 10.34 rlpdaemon - Remote Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Pimcore < 5.71 - Unserialize Remote Code Execution (Metasploit) | This is a remote exploit for php platform. Description: Pimcore < 5.71 - Unserialize Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Pimcore < 5.71 - Unserialize Remote Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DIR-605L - Captcha Handling Buffer Overflow (Metasploit) | This is a remote exploit for hardware platform. Description: D-Link DIR-605L - Captcha Handling Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: D-Link DIR-605L - Captcha Handling Buffer Overflow (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Fool's Workshop Owl's Workshop 1.0 - 'glossary.php' Arbitrary File Access | This is a webapps exploit for php platform. Description: Fool's Workshop Owl's Workshop 1.0 - 'glossary.php' Arbitrary File Access. Author: G00db0y |
Analyze the security implications of: Fool's Workshop Owl's Workshop 1.0 - 'glossary.php' Arbitrary File Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Unix Acrobat Reader 4.0/5.0 - WWWLaunchNetscape Buffer Overflow | This is a dos exploit for linux platform. Description: Adobe Unix Acrobat Reader 4.0/5.0 - WWWLaunchNetscape Buffer Overflow. Author: Paul Szabo |
Analyze the security implications of: Adobe Unix Acrobat Reader 4.0/5.0 - WWWLaunchNetscape Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SonicWALL Global VPN Client 4.0 - Log File Remote Format String | This is a remote exploit for hardware platform. Description: SonicWALL Global VPN Client 4.0 - Log File Remote Format String. Author: lofi42 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.