input
stringlengths 39
228
| output
stringlengths 32
324
|
|---|---|
What is this exploit about: Joomla! Component Intranet Attendance Track 2.6.5 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Intranet Attendance Track 2.6.5 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Intranet Attendance Track 2.6.5 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FreeRadius < 1.1.8 - Zero-Length Tunnel-Password Denial of Service
|
This is a dos exploit for multiple platform. Description: FreeRadius < 1.1.8 - Zero-Length Tunnel-Password Denial of Service. Author: Matthew Gillespie
|
Analyze the security implications of: FreeRadius < 1.1.8 - Zero-Length Tunnel-Password Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apache Tomcat 4.0.3 - Requests Containing MS-DOS Device Names Information Disclosure
|
This is a remote exploit for multiple platform. Description: Apache Tomcat 4.0.3 - Requests Containing MS-DOS Device Names Information Disclosure. Author: security curmudgeon
|
Analyze the security implications of: Apache Tomcat 4.0.3 - Requests Containing MS-DOS Device Names Information Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: D-Link DI-614+ - IP Fragment Reassembly Denial of Service
|
This is a dos exploit for hardware platform. Description: D-Link DI-614+ - IP Fragment Reassembly Denial of Service. Author: humble
|
Analyze the security implications of: D-Link DI-614+ - IP Fragment Reassembly Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: goffgrafix Design's - SQL Injection
|
This is a webapps exploit for php platform. Description: goffgrafix Design's - SQL Injection. Author: XroGuE
|
Analyze the security implications of: goffgrafix Design's - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: e107 CMS v3.2.1 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: e107 CMS v3.2.1 - Multiple Vulnerabilities. Author: Hubert Wojciechowski
|
Analyze the security implications of: e107 CMS v3.2.1 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CCleague Pro 1.0.1RC1 - 'cookie' Remote Code Execution
|
This is a webapps exploit for php platform. Description: CCleague Pro 1.0.1RC1 - 'cookie' Remote Code Execution. Author: Kacper
|
Analyze the security implications of: CCleague Pro 1.0.1RC1 - 'cookie' Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: exim 4.90 - Remote Code Execution
|
This is a remote exploit for linux platform. Description: exim 4.90 - Remote Code Execution. Author: hackk.gr
|
Analyze the security implications of: exim 4.90 - Remote Code Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_na_newsdescription - 'newsid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_na_newsdescription - 'newsid' SQL Injection. Author: EcHoLL
|
Analyze the security implications of: Joomla! Component com_na_newsdescription - 'newsid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CoDeSys 3.4 - Null Pointer Invalid HTTP Request Parsing Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: CoDeSys 3.4 - Null Pointer Invalid HTTP Request Parsing Remote Denial of Service. Author: Luigi Auriemma
|
Analyze the security implications of: CoDeSys 3.4 - Null Pointer Invalid HTTP Request Parsing Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: GeekLog 1.3.x - HTML Injection
|
This is a webapps exploit for php platform. Description: GeekLog 1.3.x - HTML Injection. Author: Jelmer
|
Analyze the security implications of: GeekLog 1.3.x - HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Coupon 3.5 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Coupon 3.5 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Coupon 3.5 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: KISGB 5.1.1 - 'Authenticate.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: KISGB 5.1.1 - 'Authenticate.php' Remote File Inclusion. Author: mdx
|
Analyze the security implications of: KISGB 5.1.1 - 'Authenticate.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Asteriskguru Queue Statistics - 'warning' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Asteriskguru Queue Statistics - 'warning' Cross-Site Scripting. Author: Manuel García Cárdenas
|
Analyze the security implications of: Asteriskguru Queue Statistics - 'warning' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Tuleap 9.6 - Second-Order PHP Object Injection (Metasploit)
|
This is a remote exploit for php platform. Description: Tuleap 9.6 - Second-Order PHP Object Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: Tuleap 9.6 - Second-Order PHP Object Injection (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Openfire Server 3.6.0a - Admin Console Authentication Bypass (Metasploit)
|
This is a webapps exploit for jsp platform. Description: Openfire Server 3.6.0a - Admin Console Authentication Bypass (Metasploit). Author: Metasploit
|
Analyze the security implications of: Openfire Server 3.6.0a - Admin Console Authentication Bypass (Metasploit)
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: dalbum 1.43 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: dalbum 1.43 - Multiple Vulnerabilities. Author: High-Tech Bridge SA
|
Analyze the security implications of: dalbum 1.43 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: RealServer - Describe Buffer Overflow (Metasploit)
|
This is a remote exploit for multiple platform. Description: RealServer - Describe Buffer Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: RealServer - Describe Buffer Overflow (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: cms s.builder 3.7 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: cms s.builder 3.7 - Remote File Inclusion. Author: cr0w
|
Analyze the security implications of: cms s.builder 3.7 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Docker 0.11 - VMM-Container Breakout
|
This is a local exploit for linux platform. Description: Docker 0.11 - VMM-Container Breakout. Author: Sebastian Krahmer
|
Analyze the security implications of: Docker 0.11 - VMM-Container Breakout
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Azerbaijan Development Group AzDGDatingPlatinum 1.1.0 - 'view.php?id' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Azerbaijan Development Group AzDGDatingPlatinum 1.1.0 - 'view.php?id' Cross-Site Scripting. Author: kre0n
|
Analyze the security implications of: Azerbaijan Development Group AzDGDatingPlatinum 1.1.0 - 'view.php?id' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dune 0.6.7 - GET Remote Buffer Overrun
|
This is a remote exploit for linux platform. Description: Dune 0.6.7 - GET Remote Buffer Overrun. Author: V9
|
Analyze the security implications of: Dune 0.6.7 - GET Remote Buffer Overrun
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Ger Versluis 2000 5.5 24 - 'SITE_fiche.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Ger Versluis 2000 5.5 24 - 'SITE_fiche.php' SQL Injection. Author: DeCo017
|
Analyze the security implications of: Ger Versluis 2000 5.5 24 - 'SITE_fiche.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Audistats 1.3 - SQL Injection
|
This is a webapps exploit for php platform. Description: Audistats 1.3 - SQL Injection. Author: kaMtiEz
|
Analyze the security implications of: Audistats 1.3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MiniDVBLinux <=5.4 - Config Download Exploit
|
This is a remote exploit for hardware platform. Description: MiniDVBLinux <=5.4 - Config Download Exploit. Author: LiquidWorm
|
Analyze the security implications of: MiniDVBLinux <=5.4 - Config Download Exploit
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Snitz Forums 2000 - 'TOPIC_ID' SQL Injection
|
This is a webapps exploit for asp platform. Description: Snitz Forums 2000 - 'TOPIC_ID' SQL Injection. Author: snup
|
Analyze the security implications of: Snitz Forums 2000 - 'TOPIC_ID' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ACWeb 1.14/1.8 - Cross-Site Scripting
|
This is a remote exploit for linux platform. Description: ACWeb 1.14/1.8 - Cross-Site Scripting. Author: DownBload
|
Analyze the security implications of: ACWeb 1.14/1.8 - Cross-Site Scripting
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AneCMS 2e2c583 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: AneCMS 2e2c583 - Local File Inclusion. Author: I2sec-Jong Hwan Park
|
Analyze the security implications of: AneCMS 2e2c583 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HP HP-UX 10.34 rlpdaemon - Remote Overflow
|
This is a remote exploit for linux platform. Description: HP HP-UX 10.34 rlpdaemon - Remote Overflow. Author: RSI Advise
|
Analyze the security implications of: HP HP-UX 10.34 rlpdaemon - Remote Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Pimcore < 5.71 - Unserialize Remote Code Execution (Metasploit)
|
This is a remote exploit for php platform. Description: Pimcore < 5.71 - Unserialize Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Pimcore < 5.71 - Unserialize Remote Code Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link DIR-605L - Captcha Handling Buffer Overflow (Metasploit)
|
This is a remote exploit for hardware platform. Description: D-Link DIR-605L - Captcha Handling Buffer Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: D-Link DIR-605L - Captcha Handling Buffer Overflow (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Fool's Workshop Owl's Workshop 1.0 - 'glossary.php' Arbitrary File Access
|
This is a webapps exploit for php platform. Description: Fool's Workshop Owl's Workshop 1.0 - 'glossary.php' Arbitrary File Access. Author: G00db0y
|
Analyze the security implications of: Fool's Workshop Owl's Workshop 1.0 - 'glossary.php' Arbitrary File Access
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adobe Unix Acrobat Reader 4.0/5.0 - WWWLaunchNetscape Buffer Overflow
|
This is a dos exploit for linux platform. Description: Adobe Unix Acrobat Reader 4.0/5.0 - WWWLaunchNetscape Buffer Overflow. Author: Paul Szabo
|
Analyze the security implications of: Adobe Unix Acrobat Reader 4.0/5.0 - WWWLaunchNetscape Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: SonicWALL Global VPN Client 4.0 - Log File Remote Format String
|
This is a remote exploit for hardware platform. Description: SonicWALL Global VPN Client 4.0 - Log File Remote Format String. Author: lofi42
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.