input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Netscape Navigator 7.1 - Embedded Image URI Obfuscation
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Opera Web browser 7.54 java implementation - Multiple Vulnerabilities (2)
|
This is a dos exploit for linux platform. Description: Opera Web browser 7.54 java implementation - Multiple Vulnerabilities (2). Author: Marc Schoenefeld
|
Analyze the security implications of: Opera Web browser 7.54 java implementation - Multiple Vulnerabilities (2)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: CMScout IBrowser TinyMCE Plugin 2.3.4.3 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: CMScout IBrowser TinyMCE Plugin 2.3.4.3 - Local File Inclusion. Author: John Leitch
|
Analyze the security implications of: CMScout IBrowser TinyMCE Plugin 2.3.4.3 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ProductCart 1.5/1.6/2.0 - 'MSG.asp' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: ProductCart 1.5/1.6/2.0 - 'MSG.asp' Cross-Site Scripting. Author: atomix
|
Analyze the security implications of: ProductCart 1.5/1.6/2.0 - 'MSG.asp' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: WebCom datakommunikation Guestbook 0.1 - 'rguest.exe' Arbitrary File Access
|
This is a remote exploit for cgi platform. Description: WebCom datakommunikation Guestbook 0.1 - 'rguest.exe' Arbitrary File Access. Author: Mnemonix
|
Analyze the security implications of: WebCom datakommunikation Guestbook 0.1 - 'rguest.exe' Arbitrary File Access
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Baran CMS 1.0 - 'Arbitrary '.ASP' File Upload / File Disclosure / SQL Injection / Cross-Site Scripting / Cookie Manipulation
|
This is a webapps exploit for asp platform. Description: Baran CMS 1.0 - 'Arbitrary '.ASP' File Upload / File Disclosure / SQL Injection / Cross-Site Scripting / Cookie Manipulation. Author: Aria-Security Team
|
Analyze the security implications of: Baran CMS 1.0 - 'Arbitrary '.ASP' File Upload / File Disclosure / SQL Injection / Cross-Site Scripting / Cookie Manipulation
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: zgv - '$HOME' Local Buffer Overflow
|
This is a local exploit for linux platform. Description: zgv - '$HOME' Local Buffer Overflow. Author: BeastMaster V
|
Analyze the security implications of: zgv - '$HOME' Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apple Mac OSX 10.10 - BlueTooth BlueToothHCIChangeLocalName Crash (PoC)
|
This is a dos exploit for osx platform. Description: Apple Mac OSX 10.10 - BlueTooth BlueToothHCIChangeLocalName Crash (PoC). Author: rpaleari & joystick
|
Analyze the security implications of: Apple Mac OSX 10.10 - BlueTooth BlueToothHCIChangeLocalName Crash (PoC)
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Artica Web Proxy 3.06 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: Artica Web Proxy 3.06 - Remote Code Execution. Author: hyp3rlinx
|
Analyze the security implications of: Artica Web Proxy 3.06 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 2.6.x - File Lock Lease Local Denial of Service
|
This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - File Lock Lease Local Denial of Service. Author: J. Bruce Fields
|
Analyze the security implications of: Linux Kernel 2.6.x - File Lock Lease Local Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: iboss Secure Web Gateway - Stored Cross-Site Scripting (XSS)
|
This is a webapps exploit for multiple platform. Description: iboss Secure Web Gateway - Stored Cross-Site Scripting (XSS). Author: modrnProph3t
|
Analyze the security implications of: iboss Secure Web Gateway - Stored Cross-Site Scripting (XSS)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Aircrack-NG Tools svn r1675 - Remote Heap Buffer Overflow (PoC)
|
This is a dos exploit for multiple platform. Description: Aircrack-NG Tools svn r1675 - Remote Heap Buffer Overflow (PoC). Author: Lukas Lueg
|
Analyze the security implications of: Aircrack-NG Tools svn r1675 - Remote Heap Buffer Overflow (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Forma LMS 1.3 - Multiple PHP Object Injection Vulnerabilities
|
This is a webapps exploit for php platform. Description: Forma LMS 1.3 - Multiple PHP Object Injection Vulnerabilities. Author: Filippo Roncari
|
Analyze the security implications of: Forma LMS 1.3 - Multiple PHP Object Injection Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Poll 1.0.10 - Arbitrary Add Votes
|
This is a webapps exploit for php platform. Description: Joomla! Component Poll 1.0.10 - Arbitrary Add Votes. Author: trueend5
|
Analyze the security implications of: Joomla! Component Poll 1.0.10 - Arbitrary Add Votes
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dokeos 1.x - '/forum/viewforum.php?forum' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Dokeos 1.x - '/forum/viewforum.php?forum' Cross-Site Scripting. Author: Doz
|
Analyze the security implications of: Dokeos 1.x - '/forum/viewforum.php?forum' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eLms Pro - SQL Injection / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: eLms Pro - SQL Injection / Cross-Site Scripting. Author: Sid3^effects
|
Analyze the security implications of: eLms Pro - SQL Injection / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GNU Info 4.7 - Follow XRef Buffer Overrun
|
This is a dos exploit for linux platform. Description: GNU Info 4.7 - Follow XRef Buffer Overrun. Author: Josh Martin
|
Analyze the security implications of: GNU Info 4.7 - Follow XRef Buffer Overrun
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: SuSE 7.0 - KFM Insecure '.TMP' File Creation
|
This is a local exploit for linux platform. Description: SuSE 7.0 - KFM Insecure '.TMP' File Creation. Author: Paul Starzetz
|
Analyze the security implications of: SuSE 7.0 - KFM Insecure '.TMP' File Creation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Bakeshop Online Ordering System 1.0 - 'Owner' Persistent Cross-site scripting
|
This is a webapps exploit for multiple platform. Description: Bakeshop Online Ordering System 1.0 - 'Owner' Persistent Cross-site scripting. Author: Parshwa Bhavsar
|
Analyze the security implications of: Bakeshop Online Ordering System 1.0 - 'Owner' Persistent Cross-site scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apple Mac OSX 10.4.x - 'Shared_Region_Make_Private_Np' Kernel Function Local Memory Corruption
|
This is a local exploit for osx platform. Description: Apple Mac OSX 10.4.x - 'Shared_Region_Make_Private_Np' Kernel Function Local Memory Corruption. Author: LMH
|
Analyze the security implications of: Apple Mac OSX 10.4.x - 'Shared_Region_Make_Private_Np' Kernel Function Local Memory Corruption
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Geeklog 1.3.7 - 'Homepage User' HTML Injection
|
This is a webapps exploit for php platform. Description: Geeklog 1.3.7 - 'Homepage User' HTML Injection. Author: snooq
|
Analyze the security implications of: Geeklog 1.3.7 - 'Homepage User' HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Borland Interbase - 'PWD_db_aliased()' Remote Buffer Overflow (Metasploit)
|
This is a remote exploit for linux platform. Description: Borland Interbase - 'PWD_db_aliased()' Remote Buffer Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: Borland Interbase - 'PWD_db_aliased()' Remote Buffer Overflow (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: DA Mailing List System 2 - Multiple Vulnerabilities
|
This is a webapps exploit for asp platform. Description: DA Mailing List System 2 - Multiple Vulnerabilities. Author: Phenom
|
Analyze the security implications of: DA Mailing List System 2 - Multiple Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Longshine Multiple Print Servers - Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: Longshine Multiple Print Servers - Cross-Site Scripting. Author: b0telh0
|
Analyze the security implications of: Longshine Multiple Print Servers - Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Ledscripts LedForums - Multiple HTML Injections
|
This is a webapps exploit for php platform. Description: Ledscripts LedForums - Multiple HTML Injections. Author: ProXy
|
Analyze the security implications of: Ledscripts LedForums - Multiple HTML Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: W3C Amaya 9.4 - legend color Attribute Value Overflow
|
This is a dos exploit for multiple platform. Description: W3C Amaya 9.4 - legend color Attribute Value Overflow. Author: Thomas Waldegger
|
Analyze the security implications of: W3C Amaya 9.4 - legend color Attribute Value Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: BeyondTrust Remote Support 6.0 - Reflected Cross-Site Scripting (XSS) (Unauthenticated)
|
This is a webapps exploit for multiple platform. Description: BeyondTrust Remote Support 6.0 - Reflected Cross-Site Scripting (XSS) (Unauthenticated). Author: Malcrove
|
Analyze the security implications of: BeyondTrust Remote Support 6.0 - Reflected Cross-Site Scripting (XSS) (Unauthenticated)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CCMS 3.1 - 'skin' Local File Inclusion
|
This is a webapps exploit for php platform. Description: CCMS 3.1 - 'skin' Local File Inclusion. Author: SirGod
|
Analyze the security implications of: CCMS 3.1 - 'skin' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IceWarp Web Mail 5.5.1 - 'blank.html?id' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: IceWarp Web Mail 5.5.1 - 'blank.html?id' Cross-Site Scripting. Author: ss_contacts
|
Analyze the security implications of: IceWarp Web Mail 5.5.1 - 'blank.html?id' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CaupoShop Pro (2.x < 3.70) Classic 3.01 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: CaupoShop Pro (2.x < 3.70) Classic 3.01 - Local File Inclusion. Author: Rami Salama
|
Analyze the security implications of: CaupoShop Pro (2.x < 3.70) Classic 3.01 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HP Client 9.1/9.0/8.1/7.9 - Command Injection
|
This is a remote exploit for multiple platform. Description: HP Client 9.1/9.0/8.1/7.9 - Command Injection. Author: SlidingWindow
|
Analyze the security implications of: HP Client 9.1/9.0/8.1/7.9 - Command Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: T1lib - 'intT1_Env_GetCompletePath' Buffer Overflow (PoC)
|
This is a dos exploit for php platform. Description: T1lib - 'intT1_Env_GetCompletePath' Buffer Overflow (PoC). Author: r0ut3r
|
Analyze the security implications of: T1lib - 'intT1_Env_GetCompletePath' Buffer Overflow (PoC)
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Flash Poker 2.0 - 'game' SQL Injection
|
This is a webapps exploit for php platform. Description: Flash Poker 2.0 - 'game' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Flash Poker 2.0 - 'game' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Huawei EchoLife HG520 - Remote Information Disclosure
|
This is a remote exploit for hardware platform. Description: Huawei EchoLife HG520 - Remote Information Disclosure. Author: hkm
|
Analyze the security implications of: Huawei EchoLife HG520 - Remote Information Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.