input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: ProtWare HTML Guardian 6.x - Encryption | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Hot Open Tickets 11012004 - 'CLASS_PATH' Remote File Inclusion | This is a webapps exploit for php platform. Description: Hot Open Tickets 11012004 - 'CLASS_PATH' Remote File Inclusion. Author: Kacper |
Analyze the security implications of: Hot Open Tickets 11012004 - 'CLASS_PATH' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ocean12 Mailing LisManager Gold 2.04 - 'Email' SQL Injection | This is a webapps exploit for asp platform. Description: Ocean12 Mailing LisManager Gold 2.04 - 'Email' SQL Injection. Author: Charalambous Glafkos |
Analyze the security implications of: Ocean12 Mailing LisManager Gold 2.04 - 'Email' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: CuteNews 0.88/1.3 - 'example1.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CuteNews 0.88/1.3 - 'example1.php' Cross-Site Scripting. Author: DarkBicho |
Analyze the security implications of: CuteNews 0.88/1.3 - 'example1.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eLearning server 4g - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: eLearning server 4g - Multiple Vulnerabilities. Author: Andrey Komarov |
Analyze the security implications of: eLearning server 4g - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CASAP Automated Enrollment System 1.0 - 'First Name' Stored XSS | This is a webapps exploit for php platform. Description: CASAP Automated Enrollment System 1.0 - 'First Name' Stored XSS. Author: Anita Gaud |
Analyze the security implications of: CASAP Automated Enrollment System 1.0 - 'First Name' Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kryn.cms 6.0 - Cross-Site Request Forgery / HTML Injection | This is a webapps exploit for multiple platform. Description: Kryn.cms 6.0 - Cross-Site Request Forgery / HTML Injection. Author: TurboBorland |
Analyze the security implications of: Kryn.cms 6.0 - Cross-Site Request Forgery / HTML Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ifwatchd - Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: ifwatchd - Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: ifwatchd - Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Advanced Guestbook 2.4.4 - 'Smilies' Persistent Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Advanced Guestbook 2.4.4 - 'Smilies' Persistent Cross-Site Scripting (XSS). Author: Abdulkadir AYDOGAN |
Analyze the security implications of: Advanced Guestbook 2.4.4 - 'Smilies' Persistent Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: jDisk (stickto) 2.0.3 iOS - Multiple Vulnerabilities | This is a webapps exploit for ios platform. Description: jDisk (stickto) 2.0.3 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: jDisk (stickto) 2.0.3 iOS - Multiple Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Advanced Comment System 1.0 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Advanced Comment System 1.0 - Multiple Remote File Inclusions. Author: Kurd-Team |
Analyze the security implications of: Advanced Comment System 1.0 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LetterIt 2 - 'Language' Local File Inclusion | This is a webapps exploit for php platform. Description: LetterIt 2 - 'Language' Local File Inclusion. Author: NoGe |
Analyze the security implications of: LetterIt 2 - 'Language' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple macOS 10.13.4 - Denial of Service (PoC) | This is a dos exploit for macos platform. Description: Apple macOS 10.13.4 - Denial of Service (PoC). Author: Sriram |
Analyze the security implications of: Apple macOS 10.13.4 - Denial of Service (PoC) | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Linux Kernel < 2.6.26.4 - SCTP Kernel Memory Disclosure | This is a local exploit for linux platform. Description: Linux Kernel < 2.6.26.4 - SCTP Kernel Memory Disclosure. Author: Jon Oberheide |
Analyze the security implications of: Linux Kernel < 2.6.26.4 - SCTP Kernel Memory Disclosure | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: OpenBSD 4.6 / NetBSD 5.0.1 - 'printf(1)' Format String Parsing Denial of Service | This is a dos exploit for bsd platform. Description: OpenBSD 4.6 / NetBSD 5.0.1 - 'printf(1)' Format String Parsing Denial of Service. Author: Maksymilian Arciemowicz |
Analyze the security implications of: OpenBSD 4.6 / NetBSD 5.0.1 - 'printf(1)' Format String Parsing Denial of Service | This exploit targets bsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: DALIM SOFTWARE ES Core 5.0 build 7184.1 - Cross-Site Scripting / Cross-Site Request Forgery | This is a webapps exploit for jsp platform. Description: DALIM SOFTWARE ES Core 5.0 build 7184.1 - Cross-Site Scripting / Cross-Site Request Forgery. Author: LiquidWorm |
Analyze the security implications of: DALIM SOFTWARE ES Core 5.0 build 7184.1 - Cross-Site Scripting / Cross-Site Request Forgery | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: CPCommerce 1.1.0 - Cross-Site Scripting / Local File Inclusion | This is a webapps exploit for php platform. Description: CPCommerce 1.1.0 - Cross-Site Scripting / Local File Inclusion. Author: BugReport.IR |
Analyze the security implications of: CPCommerce 1.1.0 - Cross-Site Scripting / Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_jomtube - 'user_id' Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_jomtube - 'user_id' Blind SQL Injection. Author: SixP4ck3r |
Analyze the security implications of: Joomla! Component com_jomtube - 'user_id' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: B2B Alibaba Clone Script - 'IndustryID' SQL Injection | This is a webapps exploit for php platform. Description: B2B Alibaba Clone Script - 'IndustryID' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: B2B Alibaba Clone Script - 'IndustryID' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kaltura 11.1.0-2 - Remote Code Execution (Metasploit) | This is a remote exploit for php platform. Description: Kaltura 11.1.0-2 - Remote Code Execution (Metasploit). Author: Mehmet Ince |
Analyze the security implications of: Kaltura 11.1.0-2 - Remote Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Novell ServiceDesk 6.5/7.0.3/7.1.0 - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: Novell ServiceDesk 6.5/7.0.3/7.1.0 - Multiple Vulnerabilities. Author: Pedro Ribeiro |
Analyze the security implications of: Novell ServiceDesk 6.5/7.0.3/7.1.0 - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: WebFileSys 2.31.0 - Directory Path Traversal | This is a webapps exploit for multiple platform. Description: WebFileSys 2.31.0 - Directory Path Traversal. Author: Korn Chaisuwan_ Charanin Thongudom_ Pongtorn Angsuchotmetee |
Analyze the security implications of: WebFileSys 2.31.0 - Directory Path Traversal | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple WebKit / Safari 10.0.2(12602.3.12.0.1) - 'operationSpreadGeneric' Universal Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Apple WebKit / Safari 10.0.2(12602.3.12.0.1) - 'operationSpreadGeneric' Universal Cross-Site Scripting. Author: Google Security Research |
Analyze the security implications of: Apple WebKit / Safari 10.0.2(12602.3.12.0.1) - 'operationSpreadGeneric' Universal Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Vodafone Mobile Wifi - Reset Admin Password | This is a webapps exploit for hardware platform. Description: Vodafone Mobile Wifi - Reset Admin Password. Author: Daniele Linguaglossa |
Analyze the security implications of: Vodafone Mobile Wifi - Reset Admin Password | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Electrolink FM/DAB/TV Transmitter (login.htm/mail.htm) - Credentials Disclosure | This is a webapps exploit for hardware platform. Description: Electrolink FM/DAB/TV Transmitter (login.htm/mail.htm) - Credentials Disclosure. Author: LiquidWorm |
Analyze the security implications of: Electrolink FM/DAB/TV Transmitter (login.htm/mail.htm) - Credentials Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Nanopool Claymore Dual Miner - APIs Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Nanopool Claymore Dual Miner - APIs Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Nanopool Claymore Dual Miner - APIs Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Barracuda - Multiple Unauthentication Logfile Downloads | This is a webapps exploit for hardware platform. Description: Barracuda - Multiple Unauthentication Logfile Downloads. Author: 4CKnowLedge |
Analyze the security implications of: Barracuda - Multiple Unauthentication Logfile Downloads | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Sonicwall SonicOS 7.0 - Host Header Injection | This is a webapps exploit for hardware platform. Description: Sonicwall SonicOS 7.0 - Host Header Injection. Author: Ramikan |
Analyze the security implications of: Sonicwall SonicOS 7.0 - Host Header Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ACS Blog 0.8/0.9/1.0/1.1 - 'Name' HTML Injection | This is a webapps exploit for asp platform. Description: ACS Blog 0.8/0.9/1.0/1.1 - 'Name' HTML Injection. Author: Dan Crowley |
Analyze the security implications of: ACS Blog 0.8/0.9/1.0/1.1 - 'Name' HTML Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apple WebKit 10.0.2 (12602.3.12.0.1) - 'disconnectSubframes' Universal Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Apple WebKit 10.0.2 (12602.3.12.0.1) - 'disconnectSubframes' Universal Cross-Site Scripting. Author: Google Security Research |
Analyze the security implications of: Apple WebKit 10.0.2 (12602.3.12.0.1) - 'disconnectSubframes' Universal Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Blog:CMS 4.2.1 e - Multiple HTML Injections / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Blog:CMS 4.2.1 e - Multiple HTML Injections / Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: Blog:CMS 4.2.1 e - Multiple HTML Injections / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: dotWidget for articles 2.0 - 'showarticle.php?file_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: dotWidget for articles 2.0 - 'showarticle.php?file_path' Remote File Inclusion. Author: SwEET-DeViL |
Analyze the security implications of: dotWidget for articles 2.0 - 'showarticle.php?file_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DFLabs PTK 1.0.5 - Steal Authentication Credentials | This is a webapps exploit for php platform. Description: DFLabs PTK 1.0.5 - Steal Authentication Credentials. Author: Ivano Binetti |
Analyze the security implications of: DFLabs PTK 1.0.5 - Steal Authentication Credentials | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP OpenView OmniBack II A.03.50 - Command Execution (Metasploit) | This is a remote exploit for multiple platform. Description: HP OpenView OmniBack II A.03.50 - Command Execution (Metasploit). Author: H D Moore |
Analyze the security implications of: HP OpenView OmniBack II A.03.50 - Command Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.