input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: DieselScripts jokes - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CutePHP CuteNews 1.4.1 Editnews Module - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: CutePHP CuteNews 1.4.1 Editnews Module - Cross-Site Scripting. Author: LoK-Crew
|
Analyze the security implications of: CutePHP CuteNews 1.4.1 Editnews Module - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Respondus for WebCT 1.1.2 - Weak Password Encryption
|
This is a local exploit for multiple platform. Description: Respondus for WebCT 1.1.2 - Weak Password Encryption. Author: Desmond Irvine
|
Analyze the security implications of: Respondus for WebCT 1.1.2 - Weak Password Encryption
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Microsoft ASP.NET 1.0/1.1 - Unicode Character Conversion Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for asp platform. Description: Microsoft ASP.NET 1.0/1.1 - Unicode Character Conversion Multiple Cross-Site Scripting Vulnerabilities. Author: Andrey Rusyaev
|
Analyze the security implications of: Microsoft ASP.NET 1.0/1.1 - Unicode Character Conversion Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Apache OFBiz - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Apache OFBiz - Multiple Cross-Site Scripting Vulnerabilities. Author: Lucas Apa
|
Analyze the security implications of: Apache OFBiz - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Phoenix Exploit Kit - Remote Code Execution (Metasploit)
|
This is a remote exploit for php platform. Description: Phoenix Exploit Kit - Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Phoenix Exploit Kit - Remote Code Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WapServ 1.0 - Denial of Service
|
This is a dos exploit for multiple platform. Description: WapServ 1.0 - Denial of Service. Author: Blue eyeguy4u
|
Analyze the security implications of: WapServ 1.0 - Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Alguest 1.1 - 'start' SQL Injection
|
This is a webapps exploit for php platform. Description: Alguest 1.1 - 'start' SQL Injection. Author: Aliaksandr Hartsuyeu
|
Analyze the security implications of: Alguest 1.1 - 'start' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adobe Flash - Out-of-Bounds Write in MP4 Edge Processing
|
This is a dos exploit for multiple platform. Description: Adobe Flash - Out-of-Bounds Write in MP4 Edge Processing. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - Out-of-Bounds Write in MP4 Edge Processing
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: EasyPage - SQL Injection
|
This is a webapps exploit for asp platform. Description: EasyPage - SQL Injection. Author: Red Security TEAM
|
Analyze the security implications of: EasyPage - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: MySQL 3.23.x/4.0.x - Remote Buffer Overflow
|
This is a remote exploit for linux platform. Description: MySQL 3.23.x/4.0.x - Remote Buffer Overflow. Author: bkbll
|
Analyze the security implications of: MySQL 3.23.x/4.0.x - Remote Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: NeoSys Neon Webmail for Java 5.06/5.07 - 'updateuser?in_name' Servlet Cross-Site Scripting
|
This is a webapps exploit for jsp platform. Description: NeoSys Neon Webmail for Java 5.06/5.07 - 'updateuser?in_name' Servlet Cross-Site Scripting. Author: Tan Chew Keong
|
Analyze the security implications of: NeoSys Neon Webmail for Java 5.06/5.07 - 'updateuser?in_name' Servlet Cross-Site Scripting
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: M/Monit 3.7.2 - Privilege Escalation
|
This is a webapps exploit for multiple platform. Description: M/Monit 3.7.2 - Privilege Escalation. Author: Dolev Farhi
|
Analyze the security implications of: M/Monit 3.7.2 - Privilege Escalation
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: PHP DateTime - Use-After-Free
|
This is a dos exploit for php platform. Description: PHP DateTime - Use-After-Free. Author: Taoguang Chen
|
Analyze the security implications of: PHP DateTime - Use-After-Free
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: e107 Website System 0.555 - 'db.php' Information Disclosure
|
This is a webapps exploit for php platform. Description: e107 Website System 0.555 - 'db.php' Information Disclosure. Author: Artoor Petrovich
|
Analyze the security implications of: e107 Website System 0.555 - 'db.php' Information Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Claroline 1.8 - 'learnPath/calendar/myagenda.php' Query String Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Claroline 1.8 - 'learnPath/calendar/myagenda.php' Query String Cross-Site Scripting. Author: DSecRG
|
Analyze the security implications of: Claroline 1.8 - 'learnPath/calendar/myagenda.php' Query String Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Micro Focus (HPE) Data Protector - SUID Privilege Escalation (Metasploit)
|
This is a local exploit for linux platform. Description: Micro Focus (HPE) Data Protector - SUID Privilege Escalation (Metasploit). Author: Metasploit
|
Analyze the security implications of: Micro Focus (HPE) Data Protector - SUID Privilege Escalation (Metasploit)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Attendance and Payroll System v1.0 - Remote Code Execution (RCE)
|
This is a webapps exploit for php platform. Description: Attendance and Payroll System v1.0 - Remote Code Execution (RCE). Author: pr0z
|
Analyze the security implications of: Attendance and Payroll System v1.0 - Remote Code Execution (RCE)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: KAME Racoon - 'Initial Contact' SA Deletion
|
This is a dos exploit for freebsd platform. Description: KAME Racoon - 'Initial Contact' SA Deletion. Author: Thomas Walpuski
|
Analyze the security implications of: KAME Racoon - 'Initial Contact' SA Deletion
|
This exploit targets freebsd systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: IBM AIX 5.3 SP6 - 'pioout' Arbitrary Library Loading Privilege Escalation
|
This is a local exploit for aix platform. Description: IBM AIX 5.3 SP6 - 'pioout' Arbitrary Library Loading Privilege Escalation. Author: qaaz
|
Analyze the security implications of: IBM AIX 5.3 SP6 - 'pioout' Arbitrary Library Loading Privilege Escalation
|
This exploit targets aix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: Jax PHP Scripts 1.0/1.34/2.14/3.31 - Guestbook File Client IP Disclosure
|
This is a webapps exploit for php platform. Description: Jax PHP Scripts 1.0/1.34/2.14/3.31 - Guestbook File Client IP Disclosure. Author: Lostmon
|
Analyze the security implications of: Jax PHP Scripts 1.0/1.34/2.14/3.31 - Guestbook File Client IP Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PuterJam's Blog PJBlog3 3.0.6 - 'action.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: PuterJam's Blog PJBlog3 3.0.6 - 'action.asp' SQL Injection. Author: anonymous
|
Analyze the security implications of: PuterJam's Blog PJBlog3 3.0.6 - 'action.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: WRT120N 1.0.0.7 - Remote Stack Overflow
|
This is a remote exploit for hardware platform. Description: WRT120N 1.0.0.7 - Remote Stack Overflow. Author: Craig Heffner
|
Analyze the security implications of: WRT120N 1.0.0.7 - Remote Stack Overflow
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Oracle Reports Server 6.0.8/9.0.x - Unauthorized Report Execution
|
This is a remote exploit for multiple platform. Description: Oracle Reports Server 6.0.8/9.0.x - Unauthorized Report Execution. Author: Alexander Kornbrust
|
Analyze the security implications of: Oracle Reports Server 6.0.8/9.0.x - Unauthorized Report Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Nginx 0.6.x - Arbitrary Code Execution NullByte Injection
|
This is a webapps exploit for multiple platform. Description: Nginx 0.6.x - Arbitrary Code Execution NullByte Injection. Author: Neal Poole
|
Analyze the security implications of: Nginx 0.6.x - Arbitrary Code Execution NullByte Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: eNdonesia 8.4 - 'banners.php?click Action bid' SQL Injection
|
This is a webapps exploit for php platform. Description: eNdonesia 8.4 - 'banners.php?click Action bid' SQL Injection. Author: laurent gaffie
|
Analyze the security implications of: eNdonesia 8.4 - 'banners.php?click Action bid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: etomite 1.1 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: etomite 1.1 - Multiple Vulnerabilities. Author: High-Tech Bridge SA
|
Analyze the security implications of: etomite 1.1 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: e107 < 0.6172 - 'resetcore.php' SQL Injection
|
This is a remote exploit for linux platform. Description: e107 < 0.6172 - 'resetcore.php' SQL Injection. Author: rgod
|
Analyze the security implications of: e107 < 0.6172 - 'resetcore.php' SQL Injection
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Gazelle CMS 1.0 - 'template' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Gazelle CMS 1.0 - 'template' Local File Inclusion. Author: fuzion
|
Analyze the security implications of: Gazelle CMS 1.0 - 'template' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mambo Module CBSms 1.0 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Mambo Module CBSms 1.0 - Remote File Inclusion. Author: Kw3[R]Ln
|
Analyze the security implications of: Mambo Module CBSms 1.0 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Exhibit Engine 1.22 - 'fetchsettings.php?toroot' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Exhibit Engine 1.22 - 'fetchsettings.php?toroot' Remote File Inclusion. Author: Cyber Security
|
Analyze the security implications of: Exhibit Engine 1.22 - 'fetchsettings.php?toroot' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Code::Blocks - Denial of Service
|
This is a dos exploit for multiple platform. Description: Code::Blocks - Denial of Service. Author: ariarat
|
Analyze the security implications of: Code::Blocks - Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: GLIBC locale - Format Strings
|
This is a local exploit for linux platform. Description: GLIBC locale - Format Strings. Author: logikal
|
Analyze the security implications of: GLIBC locale - Format Strings
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Adobe Flash - Overflow in Slab Rendering
|
This is a dos exploit for multiple platform. Description: Adobe Flash - Overflow in Slab Rendering. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - Overflow in Slab Rendering
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.