input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Joomla! / Mambo Component Artists - 'idgalery' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache 1.1 / NCSA HTTPd 1.5.2 / Netscape Server 1.12/1.1/2.0 - a nph-test-cgi | This is a dos exploit for multiple platform. Description: Apache 1.1 / NCSA HTTPd 1.5.2 / Netscape Server 1.12/1.1/2.0 - a nph-test-cgi. Author: Josh Richards |
Analyze the security implications of: Apache 1.1 / NCSA HTTPd 1.5.2 / Netscape Server 1.12/1.1/2.0 - a nph-test-cgi | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ubisoft Ghost Recon Advanced Warfighter - Integer Overflow / Array Indexing Overflow | This is a dos exploit for multiple platform. Description: Ubisoft Ghost Recon Advanced Warfighter - Integer Overflow / Array Indexing Overflow. Author: Luigi Auriemma |
Analyze the security implications of: Ubisoft Ghost Recon Advanced Warfighter - Integer Overflow / Array Indexing Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component TTVideo 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component TTVideo 1.0 - SQL Injection. Author: Salvatore Fresta |
Analyze the security implications of: Joomla! Component TTVideo 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eTicket 1.5.5.2 - 'search.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: eTicket 1.5.5.2 - 'search.php' Multiple SQL Injections. Author: L4teral |
Analyze the security implications of: eTicket 1.5.5.2 - 'search.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nginx 0.6.36 - Directory Traversal | This is a remote exploit for multiple platform. Description: Nginx 0.6.36 - Directory Traversal. Author: cp77fk4r |
Analyze the security implications of: Nginx 0.6.36 - Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: MySQL 5.5.45 - procedure analyse Function Denial of Service | This is a dos exploit for multiple platform. Description: MySQL 5.5.45 - procedure analyse Function Denial of Service. Author: Osanda Malith Jayathissa |
Analyze the security implications of: MySQL 5.5.45 - procedure analyse Function Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: eGroupWare 1.0 - '/tts/index.php?filter' SQL Injection | This is a webapps exploit for php platform. Description: eGroupWare 1.0 - '/tts/index.php?filter' SQL Injection. Author: GulfTech Security |
Analyze the security implications of: eGroupWare 1.0 - '/tts/index.php?filter' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX - Local Security Bypass | This is a local exploit for osx platform. Description: Apple Mac OSX - Local Security Bypass. Author: Ian Beer |
Analyze the security implications of: Apple Mac OSX - Local Security Bypass | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: OpenBSD 2.x < 3.3 - 'exec_ibcs2_coff_prep_zmagic()' kernel stack overflow | This is a local exploit for bsd platform. Description: OpenBSD 2.x < 3.3 - 'exec_ibcs2_coff_prep_zmagic()' kernel stack overflow. Author: Sinan Eren |
Analyze the security implications of: OpenBSD 2.x < 3.3 - 'exec_ibcs2_coff_prep_zmagic()' kernel stack overflow | This exploit targets bsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Marconi ASX-1000 - Administration Denial of Service | This is a dos exploit for hardware platform. Description: Marconi ASX-1000 - Administration Denial of Service. Author: J.K. Garvey |
Analyze the security implications of: Marconi ASX-1000 - Administration Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Article Directory Script Seo 3.2 - Improper Access Restrictions | This is a webapps exploit for php platform. Description: Article Directory Script Seo 3.2 - Improper Access Restrictions. Author: Ihsan Sencan |
Analyze the security implications of: Article Directory Script Seo 3.2 - Improper Access Restrictions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla Firefox - unclamped loop Denial of Service | This is a dos exploit for multiple platform. Description: Mozilla Firefox - unclamped loop Denial of Service. Author: Thierry Zoller |
Analyze the security implications of: Mozilla Firefox - unclamped loop Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: dotProject 2.0 - '/includes/session.php?baseDir' Remote File Inclusion | This is a webapps exploit for php platform. Description: dotProject 2.0 - '/includes/session.php?baseDir' Remote File Inclusion. Author: r.verton |
Analyze the security implications of: dotProject 2.0 - '/includes/session.php?baseDir' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Content 1.0.0 - 'itemID' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Content 1.0.0 - 'itemID' SQL Injection. Author: unknown_styler |
Analyze the security implications of: Joomla! Component Content 1.0.0 - 'itemID' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EFront 3.6.9 Community Edition - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: EFront 3.6.9 Community Edition - Multiple Vulnerabilities. Author: IHTeam |
Analyze the security implications of: EFront 3.6.9 Community Edition - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GreenCMS 2.x - Arbitrary File Download | This is a webapps exploit for php platform. Description: GreenCMS 2.x - Arbitrary File Download. Author: Ihsan Sencan |
Analyze the security implications of: GreenCMS 2.x - Arbitrary File Download | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 8E6 R3000 Internet Filter 2.0.5.33 - URI SecURIty Bypass | This is a remote exploit for hardware platform. Description: 8E6 R3000 Internet Filter 2.0.5.33 - URI SecURIty Bypass. Author: nnposter |
Analyze the security implications of: 8E6 R3000 Internet Filter 2.0.5.33 - URI SecURIty Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Dell OpenManage Network Manager 6.2.0.51 SP3 - Multiple Vulnerabilities | This is a webapps exploit for linux platform. Description: Dell OpenManage Network Manager 6.2.0.51 SP3 - Multiple Vulnerabilities. Author: KoreLogic |
Analyze the security implications of: Dell OpenManage Network Manager 6.2.0.51 SP3 - Multiple Vulnerabilities | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GNU TAR 1.15.91 / CPIO 2.5.90 - 'safer_name_suffix' Remote Denial of Service | This is a dos exploit for linux platform. Description: GNU TAR 1.15.91 / CPIO 2.5.90 - 'safer_name_suffix' Remote Denial of Service. Author: Dmitry V. Levin |
Analyze the security implications of: GNU TAR 1.15.91 / CPIO 2.5.90 - 'safer_name_suffix' Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux Kernel 2.4.27/2.6.8 - 'binfmt_elf' Executable File Read | This is a local exploit for linux platform. Description: Linux Kernel 2.4.27/2.6.8 - 'binfmt_elf' Executable File Read. Author: Paul Starzetz |
Analyze the security implications of: Linux Kernel 2.4.27/2.6.8 - 'binfmt_elf' Executable File Read | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component AWDwall 1.5.4 - Local File Inclusion / SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component AWDwall 1.5.4 - Local File Inclusion / SQL Injection. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component AWDwall 1.5.4 - Local File Inclusion / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Manage Engine ServiceDesk Plus 10.0 - Privilege Escalation | This is a webapps exploit for jsp platform. Description: Manage Engine ServiceDesk Plus 10.0 - Privilege Escalation. Author: Ata Hakçıl_ Melih Kaan Yıldız |
Analyze the security implications of: Manage Engine ServiceDesk Plus 10.0 - Privilege Escalation | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Garment Center - 'index.cgi' Local File Inclusion | This is a webapps exploit for cgi platform. Description: Garment Center - 'index.cgi' Local File Inclusion. Author: Smasher |
Analyze the security implications of: Garment Center - 'index.cgi' Local File Inclusion | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: DM Database Server - 'SP_DEL_BAK_EXPIRED' Memory Corruption | This is a dos exploit for multiple platform. Description: DM Database Server - 'SP_DEL_BAK_EXPIRED' Memory Corruption. Author: Shennan Wang HuaweiSymantec SRT |
Analyze the security implications of: DM Database Server - 'SP_DEL_BAK_EXPIRED' Memory Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Craft CMS 3.1.12 Pro - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Craft CMS 3.1.12 Pro - Cross-Site Scripting. Author: Ismail Tasdelen |
Analyze the security implications of: Craft CMS 3.1.12 Pro - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Revize CMS HTTPTranslatorServlet - Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Revize CMS HTTPTranslatorServlet - Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: Revize CMS HTTPTranslatorServlet - Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Big Forum - 'forum.php?id' SQL Injection | This is a webapps exploit for php platform. Description: Big Forum - 'forum.php?id' SQL Injection. Author: JaMbA |
Analyze the security implications of: Big Forum - 'forum.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Proxmox VE - TOTP Brute Force | This is a remote exploit for linux platform. Description: Proxmox VE - TOTP Brute Force. Author: Cory Cline_ Gabe Rust |
Analyze the security implications of: Proxmox VE - TOTP Brute Force | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Laravel Valet 2.0.3 - Local Privilege Escalation (macOS) | This is a local exploit for macos platform. Description: Laravel Valet 2.0.3 - Local Privilege Escalation (macOS). Author: leonjza |
Analyze the security implications of: Laravel Valet 2.0.3 - Local Privilege Escalation (macOS) | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: libxml2 - xmlParseEndTag2 Heap Buffer Overread | This is a dos exploit for linux platform. Description: libxml2 - xmlParseEndTag2 Heap Buffer Overread. Author: Google Security Research |
Analyze the security implications of: libxml2 - xmlParseEndTag2 Heap Buffer Overread | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: INFINICART - 'browse_group.asp?groupid' SQL Injection | This is a webapps exploit for asp platform. Description: INFINICART - 'browse_group.asp?groupid' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: INFINICART - 'browse_group.asp?groupid' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Motorola SB4200 - Remote Denial of Service | This is a dos exploit for hardware platform. Description: Motorola SB4200 - Remote Denial of Service. Author: Dave Gil |
Analyze the security implications of: Motorola SB4200 - Remote Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Geutebruck 5.02024 G-Cam/EFD-2250 - 'testaction.cgi' Remote Command Execution (Metasploit) | This is a webapps exploit for hardware platform. Description: Geutebruck 5.02024 G-Cam/EFD-2250 - 'testaction.cgi' Remote Command Execution (Metasploit). Author: RandoriSec |
Analyze the security implications of: Geutebruck 5.02024 G-Cam/EFD-2250 - 'testaction.cgi' Remote Command Execution (Metasploit) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.