input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: VeriSign Kontiki Delivery Management System 5.0 - 'action' Cross-Site Scripting
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: NTPsec 1.1.2 - 'ntp_control' (Authenticated) NULL Pointer Dereference (PoC)
|
This is a dos exploit for linux platform. Description: NTPsec 1.1.2 - 'ntp_control' (Authenticated) NULL Pointer Dereference (PoC). Author: Magnus Klaaborg Stubman
|
Analyze the security implications of: NTPsec 1.1.2 - 'ntp_control' (Authenticated) NULL Pointer Dereference (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Vorbis Tools oggenc 1.4.0 - '.wav' Denial of Service
|
This is a dos exploit for linux platform. Description: Vorbis Tools oggenc 1.4.0 - '.wav' Denial of Service. Author: qflb.wu
|
Analyze the security implications of: Vorbis Tools oggenc 1.4.0 - '.wav' Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: gpEasy 1.6.1 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for php platform. Description: gpEasy 1.6.1 - Cross-Site Request Forgery (Add Admin). Author: Giuseppe 'giudinvx' D'Inverno
|
Analyze the security implications of: gpEasy 1.6.1 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Progress Database 9.1 - Environment Variable Privilege Escalation
|
This is a local exploit for linux platform. Description: Progress Database 9.1 - Environment Variable Privilege Escalation. Author: kf
|
Analyze the security implications of: Progress Database 9.1 - Environment Variable Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Mozilla Firefox 1.0.7 (Mozilla 1.7.12) - Denial of Service
|
This is a dos exploit for multiple platform. Description: Mozilla Firefox 1.0.7 (Mozilla 1.7.12) - Denial of Service. Author: Kubbo
|
Analyze the security implications of: Mozilla Firefox 1.0.7 (Mozilla 1.7.12) - Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: 2z Project 0.9.5 - 'rating.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: 2z Project 0.9.5 - 'rating.php' Cross-Site Scripting. Author: Janek Vind
|
Analyze the security implications of: 2z Project 0.9.5 - 'rating.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Help Center Live 2.0.6 - 'module=helpcenter&file=' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Help Center Live 2.0.6 - 'module=helpcenter&file=' Local File Inclusion. Author: 41.w4r10r
|
Analyze the security implications of: Help Center Live 2.0.6 - 'module=helpcenter&file=' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: National Instruments LabVIEW 5.1.1/6.0/6.1 - HTTP Request Denial of Service
|
This is a dos exploit for multiple platform. Description: National Instruments LabVIEW 5.1.1/6.0/6.1 - HTTP Request Denial of Service. Author: Steve Zins
|
Analyze the security implications of: National Instruments LabVIEW 5.1.1/6.0/6.1 - HTTP Request Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: FtpLocate - HTML Injection
|
This is a webapps exploit for cgi platform. Description: FtpLocate - HTML Injection. Author: Chako
|
Analyze the security implications of: FtpLocate - HTML Injection
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: PostgreSQL 8.3.6 - Conversion Encoding Remote Denial of Service
|
This is a dos exploit for linux platform. Description: PostgreSQL 8.3.6 - Conversion Encoding Remote Denial of Service. Author: Afonin Denis
|
Analyze the security implications of: PostgreSQL 8.3.6 - Conversion Encoding Remote Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Leafpub 1.1.9 - Stored Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Leafpub 1.1.9 - Stored Cross-Site Scripting (XSS). Author: Ahmet Ümit BAYRAM
|
Analyze the security implications of: Leafpub 1.1.9 - Stored Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: v0pCr3w (Web Shell) - Remote Code Execution (Metasploit)
|
This is a remote exploit for multiple platform. Description: v0pCr3w (Web Shell) - Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: v0pCr3w (Web Shell) - Remote Code Execution (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: QNX RTOS 4.25/6.1 - 'phgrafx-startup' Local Privilege Escalation
|
This is a local exploit for linux platform. Description: QNX RTOS 4.25/6.1 - 'phgrafx-startup' Local Privilege Escalation. Author: badc0ded
|
Analyze the security implications of: QNX RTOS 4.25/6.1 - 'phgrafx-startup' Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: SonicWALL SonicOS 5.8.1.8 WAF - Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: SonicWALL SonicOS 5.8.1.8 WAF - Cross-Site Scripting. Author: Vulnerability-Lab
|
Analyze the security implications of: SonicWALL SonicOS 5.8.1.8 WAF - Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Nokia IPSO 3.4.x - Voyager ReadFile.TCL Remote File Reading
|
This is a remote exploit for hardware platform. Description: Nokia IPSO 3.4.x - Voyager ReadFile.TCL Remote File Reading. Author: Jonas Eriksson
|
Analyze the security implications of: Nokia IPSO 3.4.x - Voyager ReadFile.TCL Remote File Reading
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: LoveCMS 1.6.2 Final - Update Settings
|
This is a webapps exploit for php platform. Description: LoveCMS 1.6.2 Final - Update Settings. Author: PoMdaPiMp
|
Analyze the security implications of: LoveCMS 1.6.2 Final - Update Settings
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Capexweb 1.1 - SQL Injection
|
This is a webapps exploit for multiple platform. Description: Capexweb 1.1 - SQL Injection. Author: D1rt3 Dud3
|
Analyze the security implications of: Capexweb 1.1 - SQL Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Linux Kernel 2.6.x - IPTables Logging Rules Integer Underflow Remote (PoC)
|
This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - IPTables Logging Rules Integer Underflow Remote (PoC). Author: Richard Hart
|
Analyze the security implications of: Linux Kernel 2.6.x - IPTables Logging Rules Integer Underflow Remote (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: eGroupWare 1.0 - 'index.php?cats_app' SQL Injection
|
This is a webapps exploit for php platform. Description: eGroupWare 1.0 - 'index.php?cats_app' SQL Injection. Author: GulfTech Security
|
Analyze the security implications of: eGroupWare 1.0 - 'index.php?cats_app' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component xstandard editor 1.5.8 - Local Directory Traversal
|
This is a webapps exploit for php platform. Description: Joomla! Component xstandard editor 1.5.8 - Local Directory Traversal. Author: irk4z
|
Analyze the security implications of: Joomla! Component xstandard editor 1.5.8 - Local Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux-HA Heartbeat 2.0.6 - Remote Denial of Service
|
This is a dos exploit for linux platform. Description: Linux-HA Heartbeat 2.0.6 - Remote Denial of Service. Author: Yan Rong Ge
|
Analyze the security implications of: Linux-HA Heartbeat 2.0.6 - Remote Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Cyberoam Central Console 2.00.2 - Remote File Inclusion
|
This is a webapps exploit for multiple platform. Description: Cyberoam Central Console 2.00.2 - Remote File Inclusion. Author: Vulnerability-Lab
|
Analyze the security implications of: Cyberoam Central Console 2.00.2 - Remote File Inclusion
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Citrix Netscaler SOAP Handler - Remote Code Execution (Metasploit)
|
This is a remote exploit for bsd platform. Description: Citrix Netscaler SOAP Handler - Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Citrix Netscaler SOAP Handler - Remote Code Execution (Metasploit)
|
This exploit targets bsd systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets bsd platform
|
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_qry_alert.php?base_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_qry_alert.php?base_path' Remote File Inclusion. Author: indoushka
|
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_qry_alert.php?base_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Wireshark - Misaligned Memory Denial of Service
|
This is a dos exploit for multiple platform. Description: Wireshark - Misaligned Memory Denial of Service. Author: Klaus Heckelmann
|
Analyze the security implications of: Wireshark - Misaligned Memory Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Open DC Hub 0.7.14 - Remote Buffer Overflow
|
This is a remote exploit for multiple platform. Description: Open DC Hub 0.7.14 - Remote Buffer Overflow. Author: Donato Ferrante
|
Analyze the security implications of: Open DC Hub 0.7.14 - Remote Buffer Overflow
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CMS Easyway - 'mid' SQL Injection
|
This is a webapps exploit for php platform. Description: CMS Easyway - 'mid' SQL Injection. Author: Lidloses_Auge
|
Analyze the security implications of: CMS Easyway - 'mid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Yaws < 1.80 - Multiple Headers Remote Denial of Service Vulnerabilities
|
This is a dos exploit for multiple platform. Description: Yaws < 1.80 - Multiple Headers Remote Denial of Service Vulnerabilities. Author: Praveen Darshanam
|
Analyze the security implications of: Yaws < 1.80 - Multiple Headers Remote Denial of Service Vulnerabilities
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Adobe Flash Player 10.1.51 - Local File Access Information Disclosure
|
This is a remote exploit for multiple platform. Description: Adobe Flash Player 10.1.51 - Local File Access Information Disclosure. Author: lis cker
|
Analyze the security implications of: Adobe Flash Player 10.1.51 - Local File Access Information Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: HP-UX 11.0 - '/bin/cu' Local Privilege Escalation
|
This is a local exploit for hp-ux platform. Description: HP-UX 11.0 - '/bin/cu' Local Privilege Escalation. Author: zorgon
|
Analyze the security implications of: HP-UX 11.0 - '/bin/cu' Local Privilege Escalation
|
This exploit targets hp-ux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hp-ux platform
|
What is this exploit about: Nginx 1.3.9 < 1.4.0 - Denial of Service (PoC)
|
This is a dos exploit for linux platform. Description: Nginx 1.3.9 < 1.4.0 - Denial of Service (PoC). Author: Mert SARICA
|
Analyze the security implications of: Nginx 1.3.9 < 1.4.0 - Denial of Service (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: GNU groff 1.11 a / HP-UX 10.0/11.0 / SGI IRIX 6.5.3 - Malicious Manpage
|
This is a local exploit for multiple platform. Description: GNU groff 1.11 a / HP-UX 10.0/11.0 / SGI IRIX 6.5.3 - Malicious Manpage. Author: Pawel Wilk
|
Analyze the security implications of: GNU groff 1.11 a / HP-UX 10.0/11.0 / SGI IRIX 6.5.3 - Malicious Manpage
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Employee Management System 1.0 - 'admin_id' SQLi
|
This is a webapps exploit for php platform. Description: Employee Management System 1.0 - 'admin_id' SQLi. Author: Shubham Pandey
|
Analyze the security implications of: Employee Management System 1.0 - 'admin_id' SQLi
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.