input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Mozilla 1.x / opera 6/7 - Timed document.write Method Cross Domain Policy | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cisco Wireless Lan Solution Engine - ArchiveApplyDisplay.jsp Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Cisco Wireless Lan Solution Engine - ArchiveApplyDisplay.jsp Cross-Site Scripting. Author: Adam Pointon |
Analyze the security implications of: Cisco Wireless Lan Solution Engine - ArchiveApplyDisplay.jsp Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Absolute Form Processor XE 1.5 - 'login.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Absolute Form Processor XE 1.5 - 'login.asp' SQL Injection. Author: ThE g0bL!N |
Analyze the security implications of: Absolute Form Processor XE 1.5 - 'login.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Downstat 1.8 - 'art' Remote File Inclusion | This is a webapps exploit for php platform. Description: Downstat 1.8 - 'art' Remote File Inclusion. Author: SilenZ |
Analyze the security implications of: Downstat 1.8 - 'art' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EZ Server 1.0 - Long Argument Local Denial of Service | This is a dos exploit for linux platform. Description: EZ Server 1.0 - Long Argument Local Denial of Service. Author: gregory Le Bras |
Analyze the security implications of: EZ Server 1.0 - Long Argument Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: iScripts EasyCreate 2.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: iScripts EasyCreate 2.0 - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: iScripts EasyCreate 2.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pragma TelnetServer 7.0.4.589 - NULL-Pointer Dereference Denial of Service | This is a dos exploit for multiple platform. Description: Pragma TelnetServer 7.0.4.589 - NULL-Pointer Dereference Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Pragma TelnetServer 7.0.4.589 - NULL-Pointer Dereference Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: OpenFire 3.10.2 < 4.0.1 - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: OpenFire 3.10.2 < 4.0.1 - Multiple Vulnerabilities. Author: Sysdream |
Analyze the security implications of: OpenFire 3.10.2 < 4.0.1 - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: D-Link DNR-322L <=2.60B15 - Authenticated Remote Code Execution | This is a remote exploit for hardware platform. Description: D-Link DNR-322L <=2.60B15 - Authenticated Remote Code Execution. Author: luka |
Analyze the security implications of: D-Link DNR-322L <=2.60B15 - Authenticated Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Exim < 4.90.1 - 'base64d' Remote Code Execution | This is a remote exploit for linux platform. Description: Exim < 4.90.1 - 'base64d' Remote Code Execution. Author: straight_blast |
Analyze the security implications of: Exim < 4.90.1 - 'base64d' Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ENTAB ERP 1.0 - Username PII leak | This is a webapps exploit for asp platform. Description: ENTAB ERP 1.0 - Username PII leak. Author: Deb Prasad Banerjee |
Analyze the security implications of: ENTAB ERP 1.0 - Username PII leak | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Axous 1.1.1 - Cross-Site Request Forgery / Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Axous 1.1.1 - Cross-Site Request Forgery / Persistent Cross-Site Scripting. Author: Ivano Binetti |
Analyze the security implications of: Axous 1.1.1 - Cross-Site Request Forgery / Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cab Booking Script 1.0 - 'city' SQL Injection | This is a webapps exploit for php platform. Description: Cab Booking Script 1.0 - 'city' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Cab Booking Script 1.0 - 'city' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component WMI 1.5.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component WMI 1.5.0 - Local File Inclusion. Author: wishnusakti + inc0mp13te |
Analyze the security implications of: Joomla! Component WMI 1.5.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BigPond 3G21WB - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: BigPond 3G21WB - Multiple Vulnerabilities. Author: Roberto Paleari |
Analyze the security implications of: BigPond 3G21WB - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CMS Made Simple 1.2 - Remote Code Execution | This is a webapps exploit for php platform. Description: CMS Made Simple 1.2 - Remote Code Execution. Author: irk4z |
Analyze the security implications of: CMS Made Simple 1.2 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kayako SupportSuite 3.0.32 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Kayako SupportSuite 3.0.32 - 'index.php' Cross-Site Scripting. Author: Dr.HAiL |
Analyze the security implications of: Kayako SupportSuite 3.0.32 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Drupal avatar_uploader v7.x-1.0-beta8 - Arbitrary File Disclosure | This is a webapps exploit for php platform. Description: Drupal avatar_uploader v7.x-1.0-beta8 - Arbitrary File Disclosure. Author: Larry W. Cashdollar |
Analyze the security implications of: Drupal avatar_uploader v7.x-1.0-beta8 - Arbitrary File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BomberClone < 0.11.6.2 - Error Messages Remote Buffer Overflow | This is a remote exploit for multiple platform. Description: BomberClone < 0.11.6.2 - Error Messages Remote Buffer Overflow. Author: esca zoo |
Analyze the security implications of: BomberClone < 0.11.6.2 - Error Messages Remote Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: JCCorp URLShrink Free 1.3.1 - 'CreateURL.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: JCCorp URLShrink Free 1.3.1 - 'CreateURL.php' Remote File Inclusion. Author: Hasadya Raed |
Analyze the security implications of: JCCorp URLShrink Free 1.3.1 - 'CreateURL.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Shopware 5.2.5/5.3 - Cross-Site Scripting | This is a webapps exploit for json platform. Description: Shopware 5.2.5/5.3 - Cross-Site Scripting. Author: Vulnerability-Lab |
Analyze the security implications of: Shopware 5.2.5/5.3 - Cross-Site Scripting | This exploit targets json systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets json platform |
What is this exploit about: Cisco IOS - using hping Remote Denial of Service | This is a dos exploit for hardware platform. Description: Cisco IOS - using hping Remote Denial of Service. Author: zerash |
Analyze the security implications of: Cisco IOS - using hping Remote Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Horde - Horde_Image::factory driver Argument Local File Inclusion | This is a webapps exploit for php platform. Description: Horde - Horde_Image::factory driver Argument Local File Inclusion. Author: skysbsb |
Analyze the security implications of: Horde - Horde_Image::factory driver Argument Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASP Product Catalog 1.0 - Cross-Site Scripting / File Disclosure | This is a webapps exploit for php platform. Description: ASP Product Catalog 1.0 - Cross-Site Scripting / File Disclosure. Author: AlpHaNiX |
Analyze the security implications of: ASP Product Catalog 1.0 - Cross-Site Scripting / File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Technicolor DT5130 2.05.C29GV - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Technicolor DT5130 2.05.C29GV - Multiple Vulnerabilities. Author: Crash |
Analyze the security implications of: Technicolor DT5130 2.05.C29GV - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Mahara 19.10.2 CMS - Persistent Cross-Site Scripting | This is a webapps exploit for linux platform. Description: Mahara 19.10.2 CMS - Persistent Cross-Site Scripting. Author: Vulnerability-Lab |
Analyze the security implications of: Mahara 19.10.2 CMS - Persistent Cross-Site Scripting | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DMXReady News Manager 1.1 - Arbitrary Category Change | This is a webapps exploit for asp platform. Description: DMXReady News Manager 1.1 - Arbitrary Category Change. Author: ajann |
Analyze the security implications of: DMXReady News Manager 1.1 - Arbitrary Category Change | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apple Safari 3.2 WebKit - 'alink' Property Memory Leak Remote Denial of Service (2) | This is a dos exploit for osx platform. Description: Apple Safari 3.2 WebKit - 'alink' Property Memory Leak Remote Denial of Service (2). Author: Pr0T3cT10n |
Analyze the security implications of: Apple Safari 3.2 WebKit - 'alink' Property Memory Leak Remote Denial of Service (2) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: KMail 1.x - HTML Element Handling Denial of Service | This is a dos exploit for linux platform. Description: KMail 1.x - HTML Element Handling Denial of Service. Author: nnp |
Analyze the security implications of: KMail 1.x - HTML Element Handling Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CubeCart < 3.0.12 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: CubeCart < 3.0.12 - Multiple Vulnerabilities. Author: GulfTech Security |
Analyze the security implications of: CubeCart < 3.0.12 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache Tomcat 6.0.16 - 'RequestDispatcher' Information Disclosure | This is a remote exploit for multiple platform. Description: Apache Tomcat 6.0.16 - 'RequestDispatcher' Information Disclosure. Author: Stefano Di Paola |
Analyze the security implications of: Apache Tomcat 6.0.16 - 'RequestDispatcher' Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Sendmail with clamav-milter < 0.91.2 - Remote Command Execution | This is a remote exploit for multiple platform. Description: Sendmail with clamav-milter < 0.91.2 - Remote Command Execution. Author: eliteboy |
Analyze the security implications of: Sendmail with clamav-milter < 0.91.2 - Remote Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CyberCMS - SQL Injection | This is a webapps exploit for php platform. Description: CyberCMS - SQL Injection. Author: hc0de |
Analyze the security implications of: CyberCMS - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: H-Sphere 2.x - HTML Template Inclusion Cross-Site Scripting | This is a webapps exploit for java platform. Description: H-Sphere 2.x - HTML Template Inclusion Cross-Site Scripting. Author: Lorenzo Hernandez Garcia-Hierro |
Analyze the security implications of: H-Sphere 2.x - HTML Template Inclusion Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.