input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Joomla! Component com_alphacontent - 'limitstart' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Grafik CMS 1.1.2 - Multiple Cross-Site Request Forgery Vulnerabilities | This is a webapps exploit for php platform. Description: Grafik CMS 1.1.2 - Multiple Cross-Site Request Forgery Vulnerabilities. Author: 10n1z3d |
Analyze the security implications of: Grafik CMS 1.1.2 - Multiple Cross-Site Request Forgery Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Django 3.0 - Cross-Site Request Forgery Token Bypass | This is a webapps exploit for php platform. Description: Django 3.0 - Cross-Site Request Forgery Token Bypass. Author: Spad Security Group |
Analyze the security implications of: Django 3.0 - Cross-Site Request Forgery Token Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Rockliffe MailSite 5.3.4/6.1.22/7.0.3 - HTTP Mail Management Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Rockliffe MailSite 5.3.4/6.1.22/7.0.3 - HTTP Mail Management Cross-Site Scripting. Author: OS2A BTO |
Analyze the security implications of: Rockliffe MailSite 5.3.4/6.1.22/7.0.3 - HTTP Mail Management Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: DMXReady Secure Login Manager 1.0 - '/applications/SecureLoginManager/inc_secureloginmanager.asp?sent' SQL Injection | This is a webapps exploit for asp platform. Description: DMXReady Secure Login Manager 1.0 - '/applications/SecureLoginManager/inc_secureloginmanager.asp?sent' SQL Injection. Author: Doz |
Analyze the security implications of: DMXReady Secure Login Manager 1.0 - '/applications/SecureLoginManager/inc_secureloginmanager.asp?sent' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: PHP Session Deserializer - Use-After-Free | This is a dos exploit for php platform. Description: PHP Session Deserializer - Use-After-Free. Author: Taoguang Chen |
Analyze the security implications of: PHP Session Deserializer - Use-After-Free | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle 9i Application Server 9.0.2 Web Cache Administration Tool - Denial of Service | This is a dos exploit for multiple platform. Description: Oracle 9i Application Server 9.0.2 Web Cache Administration Tool - Denial of Service. Author: @stake |
Analyze the security implications of: Oracle 9i Application Server 9.0.2 Web Cache Administration Tool - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ignition 1.2 - 'comment' Remote Code Injection | This is a webapps exploit for php platform. Description: Ignition 1.2 - 'comment' Remote Code Injection. Author: Khashayar Fereidani |
Analyze the security implications of: Ignition 1.2 - 'comment' Remote Code Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JetPhoto 1.0/2.0/2.1 - 'Slideshow.php?name' Cross-Site Scripting | This is a webapps exploit for php platform. Description: JetPhoto 1.0/2.0/2.1 - 'Slideshow.php?name' Cross-Site Scripting. Author: 0o_zeus_o0 |
Analyze the security implications of: JetPhoto 1.0/2.0/2.1 - 'Slideshow.php?name' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Grsecurity Kernel PaX - Local Privilege Escalation | This is a local exploit for linux platform. Description: Grsecurity Kernel PaX - Local Privilege Escalation. Author: anonymous |
Analyze the security implications of: Grsecurity Kernel PaX - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component Sponsor Wall 7.0 - 'wallid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Sponsor Wall 7.0 - 'wallid' SQL Injection. Author: Persian Hack Team |
Analyze the security implications of: Joomla! Component Sponsor Wall 7.0 - 'wallid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: E107 - 'Chatbox.php' Denial of Service | This is a dos exploit for php platform. Description: E107 - 'Chatbox.php' Denial of Service. Author: Blademaster |
Analyze the security implications of: E107 - 'Chatbox.php' Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SBox 1.0.4 - Full Path Disclosure | This is a remote exploit for cgi platform. Description: SBox 1.0.4 - Full Path Disclosure. Author: Julio e2fsck Cesar |
Analyze the security implications of: SBox 1.0.4 - Full Path Disclosure | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Sigma Portal - 'ShowObjectPicture.aspx' Denial of Service | This is a dos exploit for asp platform. Description: Sigma Portal - 'ShowObjectPicture.aspx' Denial of Service. Author: Pouya Daneshmand |
Analyze the security implications of: Sigma Portal - 'ShowObjectPicture.aspx' Denial of Service | This exploit targets asp systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: BEA WebLogic 7.0/8.1 - Administration Console Error Page Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: BEA WebLogic 7.0/8.1 - Administration Console Error Page Cross-Site Scripting. Author: Team SHATTER |
Analyze the security implications of: BEA WebLogic 7.0/8.1 - Administration Console Error Page Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Citrix Receiver/Receiver Desktop Lock 4.5 - Authentication Bypass | This is a local exploit for multiple platform. Description: Citrix Receiver/Receiver Desktop Lock 4.5 - Authentication Bypass. Author: Rithwik Jayasimha |
Analyze the security implications of: Citrix Receiver/Receiver Desktop Lock 4.5 - Authentication Bypass | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects | This is a dos exploit for multiple platform. Description: JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects. Author: Google Security Research |
Analyze the security implications of: JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: WebWasher Classic 2.2/3.3 - Error Message Cross-Site Scripting | This is a remote exploit for multiple platform. Description: WebWasher Classic 2.2/3.3 - Error Message Cross-Site Scripting. Author: Oliver Karow |
Analyze the security implications of: WebWasher Classic 2.2/3.3 - Error Message Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' 'PTRACE_POKEDATA' Race Condition Privilege Escalation (/etc/passwd Method) | This is a local exploit for linux platform. Description: Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' 'PTRACE_POKEDATA' Race Condition Privilege Escalation (/etc/passwd Method). Author: FireFart |
Analyze the security implications of: Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' 'PTRACE_POKEDATA' Race Condition Privilege Escalation (/etc/passwd Method) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WebSTAR FTP Server 5.3.2 (OSX) - USER Overflow (Metasploit) | This is a remote exploit for osx platform. Description: WebSTAR FTP Server 5.3.2 (OSX) - USER Overflow (Metasploit). Author: ddz |
Analyze the security implications of: WebSTAR FTP Server 5.3.2 (OSX) - USER Overflow (Metasploit) | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: InfraPower PPS-02-S Q213V1 - Hard-Coded Credentials | This is a remote exploit for hardware platform. Description: InfraPower PPS-02-S Q213V1 - Hard-Coded Credentials. Author: LiquidWorm |
Analyze the security implications of: InfraPower PPS-02-S Q213V1 - Hard-Coded Credentials | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: LearnLoop 2.0beta7 - 'sFilePath' Remote File Disclosure | This is a webapps exploit for php platform. Description: LearnLoop 2.0beta7 - 'sFilePath' Remote File Disclosure. Author: GoLd_M |
Analyze the security implications of: LearnLoop 2.0beta7 - 'sFilePath' Remote File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Snitz Forum 2000 - 'post.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Snitz Forum 2000 - 'post.asp' Cross-Site Scripting. Author: h4xorcrew |
Analyze the security implications of: Snitz Forum 2000 - 'post.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: IQrouter 3.3.1 Firmware - Remote Code Execution | This is a webapps exploit for hardware platform. Description: IQrouter 3.3.1 Firmware - Remote Code Execution. Author: drakylar |
Analyze the security implications of: IQrouter 3.3.1 Firmware - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apple WebKit - 'JSC::B3::Procedure::resetReachability' Use-After-Free | This is a dos exploit for multiple platform. Description: Apple WebKit - 'JSC::B3::Procedure::resetReachability' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Apple WebKit - 'JSC::B3::Procedure::resetReachability' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: WebGlimpse 2.18.7 - 'DOC' Directory Traversal | This is a webapps exploit for cgi platform. Description: WebGlimpse 2.18.7 - 'DOC' Directory Traversal. Author: MustLive |
Analyze the security implications of: WebGlimpse 2.18.7 - 'DOC' Directory Traversal | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Palm Pre WebOS 1.1 - Denial of Service | This is a dos exploit for hardware platform. Description: Palm Pre WebOS 1.1 - Denial of Service. Author: Townsend Harris |
Analyze the security implications of: Palm Pre WebOS 1.1 - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Baby Care System 1.0 - 'Post title' Stored XSS | This is a webapps exploit for php platform. Description: Baby Care System 1.0 - 'Post title' Stored XSS. Author: Hardik Solanki |
Analyze the security implications of: Baby Care System 1.0 - 'Post title' Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AdaptCMS Lite 1.5 - Arbitrary Add Admin | This is a webapps exploit for php platform. Description: AdaptCMS Lite 1.5 - Arbitrary Add Admin. Author: ITSecTeam |
Analyze the security implications of: AdaptCMS Lite 1.5 - Arbitrary Add Admin | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RedHat 6.2 Restore and Dump - Local Privilege Escalation | This is a local exploit for linux platform. Description: RedHat 6.2 Restore and Dump - Local Privilege Escalation. Author: Tlabs |
Analyze the security implications of: RedHat 6.2 Restore and Dump - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Microsoft Commercial Internet System 2.0/2.5 / IIS 4.0 / Site Server Commerce Edition 3.0 alpha/3.0 - Denial of Service | This is a dos exploit for multiple platform. Description: Microsoft Commercial Internet System 2.0/2.5 / IIS 4.0 / Site Server Commerce Edition 3.0 alpha/3.0 - Denial of Service. Author: Nobuo Miwa |
Analyze the security implications of: Microsoft Commercial Internet System 2.0/2.5 / IIS 4.0 / Site Server Commerce Edition 3.0 alpha/3.0 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ManageEngine DeviceExpert 5.6 Java Server ScheduleResultViewer servlet - Directory Traversal | This is a webapps exploit for jsp platform. Description: ManageEngine DeviceExpert 5.6 Java Server ScheduleResultViewer servlet - Directory Traversal. Author: rgod |
Analyze the security implications of: ManageEngine DeviceExpert 5.6 Java Server ScheduleResultViewer servlet - Directory Traversal | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: ManageEngine Password Manager Pro / ManageEngine IT360 - SQL Injection | This is a webapps exploit for multiple platform. Description: ManageEngine Password Manager Pro / ManageEngine IT360 - SQL Injection. Author: Pedro Ribeiro |
Analyze the security implications of: ManageEngine Password Manager Pro / ManageEngine IT360 - SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Brecht Claerhout Sniffit 0.3.6 HIP/0.3.7 Beta - Mail Logging Buffer Overflow (3) | This is a remote exploit for multiple platform. Description: Brecht Claerhout Sniffit 0.3.6 HIP/0.3.7 Beta - Mail Logging Buffer Overflow (3). Author: g463 |
Analyze the security implications of: Brecht Claerhout Sniffit 0.3.6 HIP/0.3.7 Beta - Mail Logging Buffer Overflow (3) | This exploit targets multiple systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.