input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Ez Blog 1.0 - Cross-Site Scripting / Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Ez Blog 1.0 - Cross-Site Scripting / Cross-Site Request Forgery. Author: Milos Zivanovic |
Analyze the security implications of: Ez Blog 1.0 - Cross-Site Scripting / Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CarLine Forum Russian Board 4.2 - 'reply.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: CarLine Forum Russian Board 4.2 - 'reply.php' Multiple Cross-Site Scripting Vulnerabilities. Author: 1dt.w0lf |
Analyze the security implications of: CarLine Forum Russian Board 4.2 - 'reply.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Rxvt 2.6.1/2.6.2 - Local Buffer Overflow | This is a local exploit for linux platform. Description: Rxvt 2.6.1/2.6.2 - Local Buffer Overflow. Author: MasterSecuritY |
Analyze the security implications of: Rxvt 2.6.1/2.6.2 - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Naxtor E-directory 1.0 - 'default.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Naxtor E-directory 1.0 - 'default.asp' SQL Injection. Author: basher13 |
Analyze the security implications of: Naxtor E-directory 1.0 - 'default.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: PHPortal 1.2 - 'gunaysoft.php' Remote File Inclusion | This is a webapps exploit for asp platform. Description: PHPortal 1.2 - 'gunaysoft.php' Remote File Inclusion. Author: Ma3sTr0-Dz |
Analyze the security implications of: PHPortal 1.2 - 'gunaysoft.php' Remote File Inclusion | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: CUPS 1.3.7 - Cross-Site Request Forgery (Add RSS Subscription) Remote Crash | This is a dos exploit for linux platform. Description: CUPS 1.3.7 - Cross-Site Request Forgery (Add RSS Subscription) Remote Crash. Author: Adrian _pagvac_ Pastor |
Analyze the security implications of: CUPS 1.3.7 - Cross-Site Request Forgery (Add RSS Subscription) Remote Crash | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Adserver Script 5.6 - SQL Injection | This is a webapps exploit for php platform. Description: Adserver Script 5.6 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Adserver Script 5.6 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Discuz! Plugin JiangHu 1.1 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Discuz! Plugin JiangHu 1.1 - 'id' SQL Injection. Author: ZhaoHuAn |
Analyze the security implications of: Discuz! Plugin JiangHu 1.1 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX xnu 1228.9.59 - Kernel Privilege Escalation | This is a local exploit for osx platform. Description: Apple Mac OSX xnu 1228.9.59 - Kernel Privilege Escalation. Author: mu-b |
Analyze the security implications of: Apple Mac OSX xnu 1228.9.59 - Kernel Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: LG MRA58K - Missing Bounds-Checking in AVI Stream Parsing | This is a dos exploit for android platform. Description: LG MRA58K - Missing Bounds-Checking in AVI Stream Parsing. Author: Google Security Research |
Analyze the security implications of: LG MRA58K - Missing Bounds-Checking in AVI Stream Parsing | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Linux Kernel 2.6.18 < 2.6.18-20 - Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel 2.6.18 < 2.6.18-20 - Local Privilege Escalation. Author: DigitALL |
Analyze the security implications of: Linux Kernel 2.6.18 < 2.6.18-20 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: LimeSurvey 4.1.11 - 'Survey Groups' Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: LimeSurvey 4.1.11 - 'Survey Groups' Persistent Cross-Site Scripting. Author: Matthew Aberegg |
Analyze the security implications of: LimeSurvey 4.1.11 - 'Survey Groups' Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Virtual Programming VP-ASP 4/5 - 'shopdisplayproducts.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Virtual Programming VP-ASP 4/5 - 'shopdisplayproducts.asp' Cross-Site Scripting. Author: Xnuxer Research |
Analyze the security implications of: Virtual Programming VP-ASP 4/5 - 'shopdisplayproducts.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Qbik WinGate Standard 3.0.5 - Log Service Directory Traversal | This is a remote exploit for multiple platform. Description: Qbik WinGate Standard 3.0.5 - Log Service Directory Traversal. Author: eEYe |
Analyze the security implications of: Qbik WinGate Standard 3.0.5 - Log Service Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Liferay Portal < 7.0.4 - Server-Side Request Forgery | This is a webapps exploit for java platform. Description: Liferay Portal < 7.0.4 - Server-Side Request Forgery. Author: Mehmet Ince |
Analyze the security implications of: Liferay Portal < 7.0.4 - Server-Side Request Forgery | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Joomla! Component beamospetition 1.0.12 - SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component beamospetition 1.0.12 - SQL Injection / Cross-Site Scripting. Author: vds_s |
Analyze the security implications of: Joomla! Component beamospetition 1.0.12 - SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco AS5350 - Universal Gateway Portscan Denial of Service | This is a dos exploit for hardware platform. Description: Cisco AS5350 - Universal Gateway Portscan Denial of Service. Author: Thomas Munn |
Analyze the security implications of: Cisco AS5350 - Universal Gateway Portscan Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ATutor 1.5.1 - Chat Logs Remote Information Disclosure | This is a webapps exploit for php platform. Description: ATutor 1.5.1 - Chat Logs Remote Information Disclosure. Author: rgod |
Analyze the security implications of: ATutor 1.5.1 - Chat Logs Remote Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MyCal Personal Events Calendar - Database Disclosure | This is a webapps exploit for asp platform. Description: MyCal Personal Events Calendar - Database Disclosure. Author: CoBRa_21 |
Analyze the security implications of: MyCal Personal Events Calendar - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: File Transfer iFamily 2.1 - Directory Traversal | This is a webapps exploit for ios platform. Description: File Transfer iFamily 2.1 - Directory Traversal. Author: Vulnerability-Lab |
Analyze the security implications of: File Transfer iFamily 2.1 - Directory Traversal | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Easynet4u Forum Host - 'forum.php' SQL Injection | This is a webapps exploit for php platform. Description: Easynet4u Forum Host - 'forum.php' SQL Injection. Author: SuB-ZeRo |
Analyze the security implications of: Easynet4u Forum Host - 'forum.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component OS Services Booking 2.5.1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component OS Services Booking 2.5.1 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component OS Services Booking 2.5.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FlatFile Login System - Remote Password Disclosure | This is a webapps exploit for php platform. Description: FlatFile Login System - Remote Password Disclosure. Author: ViRuSMaN |
Analyze the security implications of: FlatFile Login System - Remote Password Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle Java Runtime Environment - Heap Corruption During TTF font Rendering in GlyphIterator::setCurrGlyphID | This is a dos exploit for multiple platform. Description: Oracle Java Runtime Environment - Heap Corruption During TTF font Rendering in GlyphIterator::setCurrGlyphID. Author: Google Security Research |
Analyze the security implications of: Oracle Java Runtime Environment - Heap Corruption During TTF font Rendering in GlyphIterator::setCurrGlyphID | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Calibre E-Book Reader - Local Privilege Escalation (2) | This is a local exploit for linux platform. Description: Calibre E-Book Reader - Local Privilege Escalation (2). Author: zx2c4 |
Analyze the security implications of: Calibre E-Book Reader - Local Privilege Escalation (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ftp Admin 0.1.0 - Local File Inclusion / Cross-Site Scripting / Authentication Bypass | This is a webapps exploit for php platform. Description: ftp Admin 0.1.0 - Local File Inclusion / Cross-Site Scripting / Authentication Bypass. Author: Omni |
Analyze the security implications of: ftp Admin 0.1.0 - Local File Inclusion / Cross-Site Scripting / Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Chipmunk Board Script 1.x - Multiple Cross-Site Request Forgery Vulnerabilities | This is a webapps exploit for php platform. Description: Chipmunk Board Script 1.x - Multiple Cross-Site Request Forgery Vulnerabilities. Author: Milos Zivanovic |
Analyze the security implications of: Chipmunk Board Script 1.x - Multiple Cross-Site Request Forgery Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fluorine CMS 0.1 rc 1 - File Disclosure / SQL Injection / Command Execution | This is a webapps exploit for php platform. Description: Fluorine CMS 0.1 rc 1 - File Disclosure / SQL Injection / Command Execution. Author: Osirys |
Analyze the security implications of: Fluorine CMS 0.1 rc 1 - File Disclosure / SQL Injection / Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SAP Database 7.3/7.4 - SDBINST Race Condition | This is a local exploit for linux platform. Description: SAP Database 7.3/7.4 - SDBINST Race Condition. Author: Larry W. Cashdollar |
Analyze the security implications of: SAP Database 7.3/7.4 - SDBINST Race Condition | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: iDevSpot iDevCart 1.10 - Multiple Local File Inclusions | This is a webapps exploit for php platform. Description: iDevSpot iDevCart 1.10 - Multiple Local File Inclusions. Author: v3n0m |
Analyze the security implications of: iDevSpot iDevCart 1.10 - Multiple Local File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX (Lion) Kernel xnu-1699.32.7 except xnu-1699.24.8 NFS Mount - Local Privilege Escalation | This is a local exploit for osx platform. Description: Apple Mac OSX (Lion) Kernel xnu-1699.32.7 except xnu-1699.24.8 NFS Mount - Local Privilege Escalation. Author: Kenzley Alphonse |
Analyze the security implications of: Apple Mac OSX (Lion) Kernel xnu-1699.32.7 except xnu-1699.24.8 NFS Mount - Local Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: OnlineArts DailyDose 1.1 - 'dose.pl' Remote Command Execution | This is a webapps exploit for cgi platform. Description: OnlineArts DailyDose 1.1 - 'dose.pl' Remote Command Execution. Author: Don_Huan |
Analyze the security implications of: OnlineArts DailyDose 1.1 - 'dose.pl' Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: htmlArea 2.03 - Database Disclosure | This is a webapps exploit for asp platform. Description: htmlArea 2.03 - Database Disclosure. Author: indoushka |
Analyze the security implications of: htmlArea 2.03 - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component NinjaMonials - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component NinjaMonials - Blind SQL Injection. Author: Sid3^effects |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.