input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Basic Forum 1.1 - 'edit.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: DUportal 3.1.2 - 'channel.asp?iChannel' SQL Injection | This is a webapps exploit for asp platform. Description: DUportal 3.1.2 - 'channel.asp?iChannel' SQL Injection. Author: Dcrab |
Analyze the security implications of: DUportal 3.1.2 - 'channel.asp?iChannel' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Human Resource Information System 0.1 - 'First Name' Persistent Cross-Site Scripting (Authenticated) | This is a webapps exploit for php platform. Description: Human Resource Information System 0.1 - 'First Name' Persistent Cross-Site Scripting (Authenticated). Author: Reza Afsahi |
Analyze the security implications of: Human Resource Information System 0.1 - 'First Name' Persistent Cross-Site Scripting (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sakai 10.7 - Multiple Vulnerabilities | This is a webapps exploit for java platform. Description: Sakai 10.7 - Multiple Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: Sakai 10.7 - Multiple Vulnerabilities | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: C4B XPhone UC Web 4.1.890S R1 - Cross-Site Scripting | This is a webapps exploit for asp platform. Description: C4B XPhone UC Web 4.1.890S R1 - Cross-Site Scripting. Author: Vulnerability-Lab |
Analyze the security implications of: C4B XPhone UC Web 4.1.890S R1 - Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Cisco Unified Communications Manager 8.0 - Invalid Argument Privilege Escalation | This is a local exploit for hardware platform. Description: Cisco Unified Communications Manager 8.0 - Invalid Argument Privilege Escalation. Author: Knud Erik Hjgaard |
Analyze the security implications of: Cisco Unified Communications Manager 8.0 - Invalid Argument Privilege Escalation | This exploit targets hardware systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Oracle8i Standard Edition 8.1.5 for Linux Installer - Local Privilege Escalation | This is a local exploit for linux platform. Description: Oracle8i Standard Edition 8.1.5 for Linux Installer - Local Privilege Escalation. Author: Keyser Soze |
Analyze the security implications of: Oracle8i Standard Edition 8.1.5 for Linux Installer - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Fortify Software Security Center (SSC) 17.10/17.20/18.10 - Information Disclosure (2) | This is a webapps exploit for multiple platform. Description: Fortify Software Security Center (SSC) 17.10/17.20/18.10 - Information Disclosure (2). Author: alt3kx |
Analyze the security implications of: Fortify Software Security Center (SSC) 17.10/17.20/18.10 - Information Disclosure (2) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: K Web CMS - 'sayfala.asp' SQL Injection | This is a webapps exploit for asp platform. Description: K Web CMS - 'sayfala.asp' SQL Injection. Author: baltazar |
Analyze the security implications of: K Web CMS - 'sayfala.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linux Kernel < 2.4.36.9/2.6.27.5 - Unix Sockets Local Kernel Panic (Denial of Service) | This is a dos exploit for linux platform. Description: Linux Kernel < 2.4.36.9/2.6.27.5 - Unix Sockets Local Kernel Panic (Denial of Service). Author: Andrea Bittau |
Analyze the security implications of: Linux Kernel < 2.4.36.9/2.6.27.5 - Unix Sockets Local Kernel Panic (Denial of Service) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CreaCMS - '/fonctions/get_liste_langue.php?cfg[base_uri_admin]' Remote File Inclusion | This is a webapps exploit for php platform. Description: CreaCMS - '/fonctions/get_liste_langue.php?cfg[base_uri_admin]' Remote File Inclusion. Author: Ciph3r |
Analyze the security implications of: CreaCMS - '/fonctions/get_liste_langue.php?cfg[base_uri_admin]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dokeos Lms 1.8.5 - 'Include' Remote Code Execution | This is a webapps exploit for php platform. Description: Dokeos Lms 1.8.5 - 'Include' Remote Code Execution. Author: StAkeR |
Analyze the security implications of: Dokeos Lms 1.8.5 - 'Include' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_biblestudy - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_biblestudy - Local File Inclusion. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_biblestudy - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle TimesTen - Remote Format String (PoC) | This is a dos exploit for multiple platform. Description: Oracle TimesTen - Remote Format String (PoC). Author: Joxean Koret |
Analyze the security implications of: Oracle TimesTen - Remote Format String (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component education - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component education - SQL Injection. Author: bumble_be |
Analyze the security implications of: Joomla! Component education - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Component N-Frettir - SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component N-Frettir - SQL Injection. Author: CoBRa_21 |
Analyze the security implications of: Mambo Component N-Frettir - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CartWIZ 1.10 - 'ProductDetails.asp' SQL Injection | This is a webapps exploit for asp platform. Description: CartWIZ 1.10 - 'ProductDetails.asp' SQL Injection. Author: Dcrab |
Analyze the security implications of: CartWIZ 1.10 - 'ProductDetails.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Sun Cobalt RaQ 1.1/2.0/3.0/4.0 - 'Message.cgi' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Sun Cobalt RaQ 1.1/2.0/3.0/4.0 - 'Message.cgi' Cross-Site Scripting. Author: Lorenzo Hernandez Garcia-Hierro |
Analyze the security implications of: Sun Cobalt RaQ 1.1/2.0/3.0/4.0 - 'Message.cgi' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: NcFTPd 2.8.5 - Remote Jail Breakout | This is a remote exploit for freebsd platform. Description: NcFTPd 2.8.5 - Remote Jail Breakout. Author: kingcope |
Analyze the security implications of: NcFTPd 2.8.5 - Remote Jail Breakout | This exploit targets freebsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Sophos Cyberoam UTM CR25iNG - 10.6.3 MR-5 - Direct Object Reference | This is a webapps exploit for jsp platform. Description: Sophos Cyberoam UTM CR25iNG - 10.6.3 MR-5 - Direct Object Reference. Author: Frogy |
Analyze the security implications of: Sophos Cyberoam UTM CR25iNG - 10.6.3 MR-5 - Direct Object Reference | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: ASPCode CMS 1.5.8 - 'default.asp' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: ASPCode CMS 1.5.8 - 'default.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: Alberto Fontanella |
Analyze the security implications of: ASPCode CMS 1.5.8 - 'default.asp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: KnowledgeQuest 2.6 - SQL Injection | This is a webapps exploit for php platform. Description: KnowledgeQuest 2.6 - SQL Injection. Author: Virangar Security |
Analyze the security implications of: KnowledgeQuest 2.6 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iScripts ReserveLogic 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: iScripts ReserveLogic 1.0 - SQL Injection. Author: Salvatore Fresta |
Analyze the security implications of: iScripts ReserveLogic 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gastebuch 1.3.2 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Gastebuch 1.3.2 - Cross-Site Scripting. Author: Micha Borrmann |
Analyze the security implications of: Gastebuch 1.3.2 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JibberBook 2.3 - 'Login_form.php' Authentication Bypass | This is a webapps exploit for php platform. Description: JibberBook 2.3 - 'Login_form.php' Authentication Bypass. Author: L3b-r1'z |
Analyze the security implications of: JibberBook 2.3 - 'Login_form.php' Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.4.22 - 'do_brk()' Local Privilege Escalation (1) | This is a local exploit for linux platform. Description: Linux Kernel 2.4.22 - 'do_brk()' Local Privilege Escalation (1). Author: Christophe Devine |
Analyze the security implications of: Linux Kernel 2.4.22 - 'do_brk()' Local Privilege Escalation (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linksys WAP55AG 1.0.7 - SNMP Community String Insecure Configuration | This is a remote exploit for hardware platform. Description: Linksys WAP55AG 1.0.7 - SNMP Community String Insecure Configuration. Author: NN Poster |
Analyze the security implications of: Linksys WAP55AG 1.0.7 - SNMP Community String Insecure Configuration | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: OpenBSD 4.5 - IP datagrams Remote Denial of Service | This is a dos exploit for openbsd platform. Description: OpenBSD 4.5 - IP datagrams Remote Denial of Service. Author: Rembrandt |
Analyze the security implications of: OpenBSD 4.5 - IP datagrams Remote Denial of Service | This exploit targets openbsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets openbsd platform |
What is this exploit about: macOS < 10.14.3 / iOS < 12.1.3 - Kernel Heap Overflow in PF_KEY due to Lack of Bounds Checking when Retrieving Statistics | This is a dos exploit for multiple platform. Description: macOS < 10.14.3 / iOS < 12.1.3 - Kernel Heap Overflow in PF_KEY due to Lack of Bounds Checking when Retrieving Statistics. Author: Google Security Research |
Analyze the security implications of: macOS < 10.14.3 / iOS < 12.1.3 - Kernel Heap Overflow in PF_KEY due to Lack of Bounds Checking when Retrieving Statistics | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Opera Web Browser 9 - CSS Background URI Memory Corruption | This is a dos exploit for multiple platform. Description: Opera Web Browser 9 - CSS Background URI Memory Corruption. Author: hdm |
Analyze the security implications of: Opera Web Browser 9 - CSS Background URI Memory Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Jeformcr - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Jeformcr - 'id' SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component Jeformcr - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RichStrong CMS - 'cat' SQL Injection | This is a webapps exploit for asp platform. Description: RichStrong CMS - 'cat' SQL Injection. Author: JosS |
Analyze the security implications of: RichStrong CMS - 'cat' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: AR Web Content Manager (AWCM) - 'cookie_gen.php' Arbitrary Cookie Generation | This is a webapps exploit for php platform. Description: AR Web Content Manager (AWCM) - 'cookie_gen.php' Arbitrary Cookie Generation. Author: Sooel Son |
Analyze the security implications of: AR Web Content Manager (AWCM) - 'cookie_gen.php' Arbitrary Cookie Generation | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ManageEngine ServiceDesk Plus 9.1 build 9110 - Directory Traversal | This is a webapps exploit for jsp platform. Description: ManageEngine ServiceDesk Plus 9.1 build 9110 - Directory Traversal. Author: xistence |
Analyze the security implications of: ManageEngine ServiceDesk Plus 9.1 build 9110 - Directory Traversal | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.