input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Gattaca Server 2003 - Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: Gattaca Server 2003 - Cross-Site Scripting. Author: dr_insane
|
Analyze the security implications of: Gattaca Server 2003 - Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Guestbook 4.0 - Sensitive Information Disclosure
|
This is a webapps exploit for cgi platform. Description: Guestbook 4.0 - Sensitive Information Disclosure. Author: Over_G
|
Analyze the security implications of: Guestbook 4.0 - Sensitive Information Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Joomla! / Mambo Component com_guide - 'category' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_guide - 'category' SQL Injection. Author: The-0utl4w
|
Analyze the security implications of: Joomla! / Mambo Component com_guide - 'category' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: KubeBlog - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: KubeBlog - Cross-Site Request Forgery. Author: The.Morpheus
|
Analyze the security implications of: KubeBlog - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Music Collection 3.0.3 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Music Collection 3.0.3 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Music Collection 3.0.3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component JBuildozer 1.4.1 - 'appid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JBuildozer 1.4.1 - 'appid' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component JBuildozer 1.4.1 - 'appid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP 4.4.3/5.1.4 - 'sscanf' Local Buffer Overflow
|
This is a local exploit for linux platform. Description: PHP 4.4.3/5.1.4 - 'sscanf' Local Buffer Overflow. Author: Andi
|
Analyze the security implications of: PHP 4.4.3/5.1.4 - 'sscanf' Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: faust Informatics FreeStyle chat 4.1 sr2 - Directory Traversal
|
This is a remote exploit for multiple platform. Description: faust Informatics FreeStyle chat 4.1 sr2 - Directory Traversal. Author: nemesystm
|
Analyze the security implications of: faust Informatics FreeStyle chat 4.1 sr2 - Directory Traversal
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: WebKit JSC - 'Intl.getCanonicalLocales' Heap Buffer Overflow
|
This is a dos exploit for multiple platform. Description: WebKit JSC - 'Intl.getCanonicalLocales' Heap Buffer Overflow. Author: Google Security Research
|
Analyze the security implications of: WebKit JSC - 'Intl.getCanonicalLocales' Heap Buffer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component Simple Membership 3.3.3 - 'userId' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Simple Membership 3.3.3 - 'userId' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Simple Membership 3.3.3 - 'userId' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LogicBill 1.0 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: LogicBill 1.0 - Multiple SQL Injections. Author: r0t3d3Vil
|
Analyze the security implications of: LogicBill 1.0 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mozilla Products - 'Host:' Buffer Overflow (Denial of Service) (PoC) String
|
This is a dos exploit for multiple platform. Description: Mozilla Products - 'Host:' Buffer Overflow (Denial of Service) (PoC) String. Author: Tom Ferris
|
Analyze the security implications of: Mozilla Products - 'Host:' Buffer Overflow (Denial of Service) (PoC) String
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: DomainMOD 4.11.01 - Custom Domain Fields Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DomainMOD 4.11.01 - Custom Domain Fields Cross-Site Scripting. Author: Mohammed Abdul Raheem
|
Analyze the security implications of: DomainMOD 4.11.01 - Custom Domain Fields Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GNU Bash - Environment Variable Command Injection (Metasploit)
|
This is a remote exploit for cgi platform. Description: GNU Bash - Environment Variable Command Injection (Metasploit). Author: Shaun Colley
|
Analyze the security implications of: GNU Bash - Environment Variable Command Injection (Metasploit)
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: MidHosting FTP Daemon 1.0.1 - Shared Memory Local Denial of Service
|
This is a dos exploit for linux platform. Description: MidHosting FTP Daemon 1.0.1 - Shared Memory Local Denial of Service. Author: Frank DENIS
|
Analyze the security implications of: MidHosting FTP Daemon 1.0.1 - Shared Memory Local Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Android - 'zygote->init;' Chain from USB Privilege Escalation
|
This is a local exploit for android platform. Description: Android - 'zygote->init;' Chain from USB Privilege Escalation. Author: Google Security Research
|
Analyze the security implications of: Android - 'zygote->init;' Chain from USB Privilege Escalation
|
This exploit targets android systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: SpamAssassin spamd - Remote Command Execution (Metasploit)
|
This is a remote exploit for linux platform. Description: SpamAssassin spamd - Remote Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: SpamAssassin spamd - Remote Command Execution (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Drupal Module CAPTCHA - Security Bypass
|
This is a webapps exploit for php platform. Description: Drupal Module CAPTCHA - Security Bypass. Author: anonymous
|
Analyze the security implications of: Drupal Module CAPTCHA - Security Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ametys CMS 3.5.2 - 'lang' XPath Injection
|
This is a webapps exploit for java platform. Description: Ametys CMS 3.5.2 - 'lang' XPath Injection. Author: LiquidWorm
|
Analyze the security implications of: Ametys CMS 3.5.2 - 'lang' XPath Injection
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Mozilla Firefox 2.0.x - Nested 'window.print()' Denial of Service
|
This is a dos exploit for multiple platform. Description: Mozilla Firefox 2.0.x - Nested 'window.print()' Denial of Service. Author: b3hz4d
|
Analyze the security implications of: Mozilla Firefox 2.0.x - Nested 'window.print()' Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Extract Website - 'Filename' File Disclosure
|
This is a webapps exploit for php platform. Description: Extract Website - 'Filename' File Disclosure. Author: Cold Zero
|
Analyze the security implications of: Extract Website - 'Filename' File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Keller Web Admin CMS 0.94 Pro - Local File Inclusion (1)
|
This is a webapps exploit for php platform. Description: Keller Web Admin CMS 0.94 Pro - Local File Inclusion (1). Author: CWH Underground
|
Analyze the security implications of: Keller Web Admin CMS 0.94 Pro - Local File Inclusion (1)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Allomani Web Links 1.0 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for php platform. Description: Allomani Web Links 1.0 - Cross-Site Request Forgery (Add Admin). Author: AtT4CKxT3rR0r1ST
|
Analyze the security implications of: Allomani Web Links 1.0 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mambo 4.6.4 - 'Output.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Mambo 4.6.4 - 'Output.php' Remote File Inclusion. Author: irk4z
|
Analyze the security implications of: Mambo 4.6.4 - 'Output.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LinksPro - 'OrderDirection' SQL Injection
|
This is a webapps exploit for asp platform. Description: LinksPro - 'OrderDirection' SQL Injection. Author: Pouya_Server
|
Analyze the security implications of: LinksPro - 'OrderDirection' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Custom Dating Biz 1.0 - Multiple Input Validation Vulnerabilities
|
This is a webapps exploit for php platform. Description: Custom Dating Biz 1.0 - Multiple Input Validation Vulnerabilities. Author: Luny
|
Analyze the security implications of: Custom Dating Biz 1.0 - Multiple Input Validation Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 3CX Phone System 15.5.3554.1 - Directory Traversal
|
This is a webapps exploit for linux platform. Description: 3CX Phone System 15.5.3554.1 - Directory Traversal. Author: Jens Regel
|
Analyze the security implications of: 3CX Phone System 15.5.3554.1 - Directory Traversal
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: BigACE 1.8.2 - 'admin.cmd.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: BigACE 1.8.2 - 'admin.cmd.php' Remote File Inclusion. Author: Vampire
|
Analyze the security implications of: BigACE 1.8.2 - 'admin.cmd.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_commedia - 'task' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_commedia - 'task' SQL Injection. Author: D4NB4R
|
Analyze the security implications of: Joomla! Component com_commedia - 'task' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jaws 0.2/0.3 - Cookie Manipulation Authentication Bypass
|
This is a webapps exploit for php platform. Description: Jaws 0.2/0.3 - Cookie Manipulation Authentication Bypass. Author: Fernando Quintero
|
Analyze the security implications of: Jaws 0.2/0.3 - Cookie Manipulation Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Exjune Officer Message System 1 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Exjune Officer Message System 1 - Multiple Vulnerabilities. Author: ByALBAYX
|
Analyze the security implications of: Exjune Officer Message System 1 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DotNetNuke DNNArticle Module 10.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: DotNetNuke DNNArticle Module 10.0 - SQL Injection. Author: Sajjad Pourali
|
Analyze the security implications of: DotNetNuke DNNArticle Module 10.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Horde 3.3.5 - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Horde 3.3.5 - Cross-Site Scripting. Author: Juan Galiana Lara
|
Analyze the security implications of: Horde 3.3.5 - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Citadel/UX BBS 6.07 - Remote Overflow
|
This is a remote exploit for linux platform. Description: Citadel/UX BBS 6.07 - Remote Overflow. Author: Carl Livitt
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.