input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: 68 Classifieds 4.1 - 'viewmember.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: elitecms 1.01 - SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: elitecms 1.01 - SQL Injection / Cross-Site Scripting. Author: xeno_hive |
Analyze the security implications of: elitecms 1.01 - SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FMyClone 2.3 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: FMyClone 2.3 - Multiple SQL Injections. Author: learn3r hacker |
Analyze the security implications of: FMyClone 2.3 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Astaro Security Linux 6.0 01 - HTTP CONNECT Unauthorized Access | This is a remote exploit for linux platform. Description: Astaro Security Linux 6.0 01 - HTTP CONNECT Unauthorized Access. Author: Oliver Karow |
Analyze the security implications of: Astaro Security Linux 6.0 01 - HTTP CONNECT Unauthorized Access | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Indexu 5.0/5.3 - 'send_pwd.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Indexu 5.0/5.3 - 'send_pwd.php' Multiple Cross-Site Scripting Vulnerabilities. Author: SwEET-DeViL |
Analyze the security implications of: Indexu 5.0/5.3 - 'send_pwd.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache Struts 2 - DefaultActionMapper Prefixes OGNL Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Apache Struts 2 - DefaultActionMapper Prefixes OGNL Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Apache Struts 2 - DefaultActionMapper Prefixes OGNL Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: HEAT Call Logging 8.01 - SQL Injection | This is a webapps exploit for asp platform. Description: HEAT Call Logging 8.01 - SQL Injection. Author: 0 0 |
Analyze the security implications of: HEAT Call Logging 8.01 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Graphite2 - NameTable::getName Multiple Heap Out-of-Bounds Reads | This is a dos exploit for multiple platform. Description: Graphite2 - NameTable::getName Multiple Heap Out-of-Bounds Reads. Author: Google Security Research |
Analyze the security implications of: Graphite2 - NameTable::getName Multiple Heap Out-of-Bounds Reads | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Whale Communications e-Gap Security Appliance 2.5 - Login Page Source Code Disclosure | This is a remote exploit for hardware platform. Description: Whale Communications e-Gap Security Appliance 2.5 - Login Page Source Code Disclosure. Author: Procheckup |
Analyze the security implications of: Whale Communications e-Gap Security Appliance 2.5 - Login Page Source Code Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: EasyNews 40tr - SQL Injection / Cross-Site Scripting / Local File Inclusion | This is a webapps exploit for php platform. Description: EasyNews 40tr - SQL Injection / Cross-Site Scripting / Local File Inclusion. Author: Khashayar Fereidani |
Analyze the security implications of: EasyNews 40tr - SQL Injection / Cross-Site Scripting / Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 4.x - 'socket_recv()' Signed Integer Memory Corruption | This is a dos exploit for php platform. Description: PHP 4.x - 'socket_recv()' Signed Integer Memory Corruption. Author: Sir Mordred |
Analyze the security implications of: PHP 4.x - 'socket_recv()' Signed Integer Memory Corruption | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SysAid Help Desk 'rdslogs' - Arbitrary File Upload (Metasploit) | This is a remote exploit for java platform. Description: SysAid Help Desk 'rdslogs' - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: SysAid Help Desk 'rdslogs' - Arbitrary File Upload (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Joomla! Component Artlinks 1.0b4 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Artlinks 1.0b4 - Remote File Inclusion. Author: camino |
Analyze the security implications of: Joomla! Component Artlinks 1.0b4 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: INCA IM-204 - Information Disclosure | This is a remote exploit for hardware platform. Description: INCA IM-204 - Information Disclosure. Author: Crackers_Child |
Analyze the security implications of: INCA IM-204 - Information Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CMSimple 3.3 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CMSimple 3.3 - 'index.php' Cross-Site Scripting. Author: Stefan Schurtz |
Analyze the security implications of: CMSimple 3.3 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Calendar Express 2.2 - 'month.php' SQL Injection | This is a webapps exploit for php platform. Description: Calendar Express 2.2 - 'month.php' SQL Injection. Author: CrAzY CrAcKeR |
Analyze the security implications of: Calendar Express 2.2 - 'month.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MyServer 0.6.2 - 'math_sum.mscgi' Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for cgi platform. Description: MyServer 0.6.2 - 'math_sum.mscgi' Multiple Cross-Site Scripting Vulnerabilities. Author: dr_insane |
Analyze the security implications of: MyServer 0.6.2 - 'math_sum.mscgi' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: DivFix++ 0.34 - Denial of Service | This is a dos exploit for linux platform. Description: DivFix++ 0.34 - Denial of Service. Author: qflb.wu |
Analyze the security implications of: DivFix++ 0.34 - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: glFusion 1.1.x/1.2.1 - 'users.php' SQL Injection | This is a webapps exploit for php platform. Description: glFusion 1.1.x/1.2.1 - 'users.php' SQL Injection. Author: H3X |
Analyze the security implications of: glFusion 1.1.x/1.2.1 - 'users.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TightVNC 2.8.83 - Control Pipe Manipulation | This is a local exploit for multiple platform. Description: TightVNC 2.8.83 - Control Pipe Manipulation. Author: Ionut Zevedei |
Analyze the security implications of: TightVNC 2.8.83 - Control Pipe Manipulation | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BlueDragon Server 6.2.1 - '.cfm' Denial of Service | This is a dos exploit for cfm platform. Description: BlueDragon Server 6.2.1 - '.cfm' Denial of Service. Author: Tan Chew Keong |
Analyze the security implications of: BlueDragon Server 6.2.1 - '.cfm' Denial of Service | This exploit targets cfm systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: Joomla! Component com_listbingo 1.3 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component com_listbingo 1.3 - Multiple Vulnerabilities. Author: jdc |
Analyze the security implications of: Joomla! Component com_listbingo 1.3 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Altenergy Power Control Software C1.2.5 - OS command injection | This is a webapps exploit for hardware platform. Description: Altenergy Power Control Software C1.2.5 - OS command injection. Author: Ahmed Alroky |
Analyze the security implications of: Altenergy Power Control Software C1.2.5 - OS command injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component Rapid Recipe 1.6.5 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Rapid Recipe 1.6.5 - SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! Component Rapid Recipe 1.6.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fishing Reservation System 7.5 - 'uid' SQL Injection | This is a webapps exploit for php platform. Description: Fishing Reservation System 7.5 - 'uid' SQL Injection. Author: Vulnerability-Lab |
Analyze the security implications of: Fishing Reservation System 7.5 - 'uid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Microsoft IIS 3.0/4.0 / Microsoft Personal Web Server 2.0/3.0/4.0 - ASP Alternate Data Streams | This is a remote exploit for multiple platform. Description: Microsoft IIS 3.0/4.0 / Microsoft Personal Web Server 2.0/3.0/4.0 - ASP Alternate Data Streams. Author: Paul Ashton |
Analyze the security implications of: Microsoft IIS 3.0/4.0 / Microsoft Personal Web Server 2.0/3.0/4.0 - ASP Alternate Data Streams | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: LayerBB 1.1.2 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: LayerBB 1.1.2 - Cross-Site Request Forgery (Add Admin). Author: 0xB9 |
Analyze the security implications of: LayerBB 1.1.2 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenSLP 2.0.0 - Multiple Vulnerabilities | This is a local exploit for linux platform. Description: OpenSLP 2.0.0 - Multiple Vulnerabilities. Author: Magnus Klaaborg Stubman |
Analyze the security implications of: OpenSLP 2.0.0 - Multiple Vulnerabilities | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache 1.2 - Denial of Service | This is a dos exploit for multiple platform. Description: Apache 1.2 - Denial of Service. Author: Michal Zalewski |
Analyze the security implications of: Apache 1.2 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux Kernel 2.6.x - KSM Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - KSM Local Denial of Service. Author: Andrea Righi |
Analyze the security implications of: Linux Kernel 2.6.x - KSM Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GreenCMS 2.3.0603 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: GreenCMS 2.3.0603 - Cross-Site Request Forgery (Add Admin). Author: xichao |
Analyze the security implications of: GreenCMS 2.3.0603 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CodePaul ClipMass - SQL Injection | This is a webapps exploit for php platform. Description: CodePaul ClipMass - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: CodePaul ClipMass - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cockpit Version 234 - Server-Side Request Forgery (Unauthenticated) | This is a webapps exploit for multiple platform. Description: Cockpit Version 234 - Server-Side Request Forgery (Unauthenticated). Author: Metin Yunus Kandemir |
Analyze the security implications of: Cockpit Version 234 - Server-Side Request Forgery (Unauthenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: KVM (Nested Virtualization) - L1 Guest Privilege Escalation | This is a dos exploit for linux platform. Description: KVM (Nested Virtualization) - L1 Guest Privilege Escalation. Author: Google Security Research |
Analyze the security implications of: KVM (Nested Virtualization) - L1 Guest Privilege Escalation | This exploit targets linux systems. Type: dos. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.