input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Web-APP.net WebAPP 0.9.x - '/mods/calendar/index.cgi?vsSD' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: allinta CMS 2.3.2 - 'faq.asp?s' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: allinta CMS 2.3.2 - 'faq.asp?s' Cross-Site Scripting. Author: r0t3d3Vil |
Analyze the security implications of: allinta CMS 2.3.2 - 'faq.asp?s' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Mambo Open Source 4.0.14 - 'PollBooth.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: Mambo Open Source 4.0.14 - 'PollBooth.php' Multiple SQL Injections. Author: frog |
Analyze the security implications of: Mambo Open Source 4.0.14 - 'PollBooth.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GestioIP 3.5.7 - Reflected Cross-Site Scripting (Reflected XSS) | This is a remote exploit for multiple platform. Description: GestioIP 3.5.7 - Reflected Cross-Site Scripting (Reflected XSS). Author: Maximiliano Belino |
Analyze the security implications of: GestioIP 3.5.7 - Reflected Cross-Site Scripting (Reflected XSS) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Citadel/UX 6.23 - Remote USER Directive | This is a remote exploit for linux platform. Description: Citadel/UX 6.23 - Remote USER Directive. Author: Nebunu |
Analyze the security implications of: Citadel/UX 6.23 - Remote USER Directive | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: IDM-OS 1.0 - 'Filename' File Disclosure | This is a webapps exploit for php platform. Description: IDM-OS 1.0 - 'Filename' File Disclosure. Author: MhZ91 |
Analyze the security implications of: IDM-OS 1.0 - 'Filename' File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TP-Link Archer C50 Wireless Router 171227 - Cross-Site Request Forgery (Configuration File Disclosure) | This is a webapps exploit for hardware platform. Description: TP-Link Archer C50 Wireless Router 171227 - Cross-Site Request Forgery (Configuration File Disclosure). Author: Wadeek |
Analyze the security implications of: TP-Link Archer C50 Wireless Router 171227 - Cross-Site Request Forgery (Configuration File Disclosure) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FunkBoard 0.66 - 'reply.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: FunkBoard 0.66 - 'reply.php' Multiple Cross-Site Scripting Vulnerabilities. Author: rgod |
Analyze the security implications of: FunkBoard 0.66 - 'reply.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Ignite Gallery 0.8.3 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Ignite Gallery 0.8.3 - SQL Injection. Author: H!tm@N |
Analyze the security implications of: Joomla! Component Ignite Gallery 0.8.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ChurchCRM v4.5.4 - Reflected XSS via Image (Authenticated) | This is a webapps exploit for php platform. Description: ChurchCRM v4.5.4 - Reflected XSS via Image (Authenticated). Author: Rahad Chowdhury |
Analyze the security implications of: ChurchCRM v4.5.4 - Reflected XSS via Image (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Seagate Business NAS 2014.00319 - Remote Code Execution | This is a webapps exploit for hardware platform. Description: Seagate Business NAS 2014.00319 - Remote Code Execution. Author: OJ Reeves |
Analyze the security implications of: Seagate Business NAS 2014.00319 - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: OmniWeb 5.5.1 - JavaScript alert() Remote Format String (PoC) | This is a dos exploit for osx platform. Description: OmniWeb 5.5.1 - JavaScript alert() Remote Format String (PoC). Author: MoAB |
Analyze the security implications of: OmniWeb 5.5.1 - JavaScript alert() Remote Format String (PoC) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Basic Forum by JM LLC - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Basic Forum by JM LLC - Multiple Vulnerabilities. Author: Sp3ctrecore |
Analyze the security implications of: Basic Forum by JM LLC - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNS3 Mac OS-X 1.5.2 - 'ubridge' Local Privilege Escalation | This is a local exploit for osx platform. Description: GNS3 Mac OS-X 1.5.2 - 'ubridge' Local Privilege Escalation. Author: Hacker Fantastic |
Analyze the security implications of: GNS3 Mac OS-X 1.5.2 - 'ubridge' Local Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Multiple Vendor - TCP Sequence Number Approximation (1) | This is a remote exploit for multiple platform. Description: Multiple Vendor - TCP Sequence Number Approximation (1). Author: Matt Edman |
Analyze the security implications of: Multiple Vendor - TCP Sequence Number Approximation (1) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Getsimple CMS 3.3.1 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Getsimple CMS 3.3.1 - Persistent Cross-Site Scripting. Author: Jeroen - IT Nerdbox |
Analyze the security implications of: Getsimple CMS 3.3.1 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cygnus Network Security 4.0/KerbNet 5.0 / MIT Kerberos 4/5 / RedHat 6.2 - Compatibility 'krb_rd_req()' Remote Buffer Overflow (3) | This is a remote exploit for linux platform. Description: Cygnus Network Security 4.0/KerbNet 5.0 / MIT Kerberos 4/5 / RedHat 6.2 - Compatibility 'krb_rd_req()' Remote Buffer Overflow (3). Author: Jim Paris |
Analyze the security implications of: Cygnus Network Security 4.0/KerbNet 5.0 / MIT Kerberos 4/5 / RedHat 6.2 - Compatibility 'krb_rd_req()' Remote Buffer Overflow (3) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Oracle 8i - TNS Listener Local Command Parameter Buffer Overflow | This is a local exploit for linux platform. Description: Oracle 8i - TNS Listener Local Command Parameter Buffer Overflow. Author: the itch |
Analyze the security implications of: Oracle 8i - TNS Listener Local Command Parameter Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Dropbear / OpenSSH Server - 'MAX_UNAUTH_CLIENTS' Denial of Service | This is a dos exploit for multiple platform. Description: Dropbear / OpenSSH Server - 'MAX_UNAUTH_CLIENTS' Denial of Service. Author: str0ke |
Analyze the security implications of: Dropbear / OpenSSH Server - 'MAX_UNAUTH_CLIENTS' Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: RankEm - 'siteID' SQL Injection | This is a webapps exploit for asp platform. Description: RankEm - 'siteID' SQL Injection. Author: AlpHaNiX |
Analyze the security implications of: RankEm - 'siteID' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: BRU 17.0 - SetLicense Script Insecure Temporary File Symbolic Link | This is a local exploit for linux platform. Description: BRU 17.0 - SetLicense Script Insecure Temporary File Symbolic Link. Author: Andrew Griffiths |
Analyze the security implications of: BRU 17.0 - SetLicense Script Insecure Temporary File Symbolic Link | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Amazon S3 Uploadify Script - 'Uploadify.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: Amazon S3 Uploadify Script - 'Uploadify.php' Arbitrary File Upload. Author: Sammy FORGIT |
Analyze the security implications of: Amazon S3 Uploadify Script - 'Uploadify.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Brave Browser 1.2.16/1.9.56 - Address Bar URL Spoofing | This is a dos exploit for multiple platform. Description: Brave Browser 1.2.16/1.9.56 - Address Bar URL Spoofing. Author: Aaditya Purani |
Analyze the security implications of: Brave Browser 1.2.16/1.9.56 - Address Bar URL Spoofing | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Code-Crafters Ability Mail Server 1.18 - 'errormsg' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Code-Crafters Ability Mail Server 1.18 - 'errormsg' Cross-Site Scripting. Author: dr_insane |
Analyze the security implications of: Code-Crafters Ability Mail Server 1.18 - 'errormsg' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GNU glibc - 'regcomp()' Stack Exhaustion Denial of Service | This is a dos exploit for linux platform. Description: GNU glibc - 'regcomp()' Stack Exhaustion Denial of Service. Author: Maksymilian Arciemowicz |
Analyze the security implications of: GNU glibc - 'regcomp()' Stack Exhaustion Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: iOS Impact PDF Reader 2.0 - POST Method Remote Denial of Service | This is a dos exploit for ios platform. Description: iOS Impact PDF Reader 2.0 - POST Method Remote Denial of Service. Author: Nishant Das Patnaik |
Analyze the security implications of: iOS Impact PDF Reader 2.0 - POST Method Remote Denial of Service | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Joomla! Component TRAVELbook 1.0.1 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component TRAVELbook 1.0.1 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component TRAVELbook 1.0.1 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TOPSEC Firewalls - 'ELIGIBLEBACHELOR' Remote Command Execution | This is a remote exploit for hardware platform. Description: TOPSEC Firewalls - 'ELIGIBLEBACHELOR' Remote Command Execution. Author: Shadow Brokers |
Analyze the security implications of: TOPSEC Firewalls - 'ELIGIBLEBACHELOR' Remote Command Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Microsoft Content Management Server 2001 - Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Microsoft Content Management Server 2001 - Cross-Site Scripting. Author: overclocking_a_la_abuela |
Analyze the security implications of: Microsoft Content Management Server 2001 - Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Anchor CMS 0.12.7 - Persistent Cross-Site Scripting (Authenticated) | This is a webapps exploit for php platform. Description: Anchor CMS 0.12.7 - Persistent Cross-Site Scripting (Authenticated). Author: Sinem Şahin |
Analyze the security implications of: Anchor CMS 0.12.7 - Persistent Cross-Site Scripting (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CascadianFAQ 4.1 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: CascadianFAQ 4.1 - 'index.php' SQL Injection. Author: ajann |
Analyze the security implications of: CascadianFAQ 4.1 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IcrediBB 1.1 - Script Injection | This is a webapps exploit for php platform. Description: IcrediBB 1.1 - Script Injection. Author: Daniel Nyström |
Analyze the security implications of: IcrediBB 1.1 - Script Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WSMP3 0.0.x - Remote Command Execution | This is a remote exploit for linux platform. Description: WSMP3 0.0.x - Remote Command Execution. Author: dong-h0un U |
Analyze the security implications of: WSMP3 0.0.x - Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WordPress Core < 5.3.x - 'xmlrpc.php' Denial of Service | This is a dos exploit for php platform. Description: WordPress Core < 5.3.x - 'xmlrpc.php' Denial of Service. Author: roddux |
Analyze the security implications of: WordPress Core < 5.3.x - 'xmlrpc.php' Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.