input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Iatek PortalApp 3.3/4.0 - 'login.asp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Wireshark 1.12.0 < 1.12.12 / 2.0.0 < 2.0.4 - WSP Dissector Denial of Service | This is a dos exploit for multiple platform. Description: Wireshark 1.12.0 < 1.12.12 / 2.0.0 < 2.0.4 - WSP Dissector Denial of Service. Author: Chris Benedict |
Analyze the security implications of: Wireshark 1.12.0 < 1.12.12 / 2.0.0 < 2.0.4 - WSP Dissector Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: IBM AIX 4.2 - '/usr/sbin/lchangelv' Local Buffer Overflow | This is a local exploit for aix platform. Description: IBM AIX 4.2 - '/usr/sbin/lchangelv' Local Buffer Overflow. Author: Bryan P. Self |
Analyze the security implications of: IBM AIX 4.2 - '/usr/sbin/lchangelv' Local Buffer Overflow | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: vBulletin (Cyb - Advanced Forum Statistics) - 'misc.php' Denial of Service | This is a dos exploit for php platform. Description: vBulletin (Cyb - Advanced Forum Statistics) - 'misc.php' Denial of Service. Author: Andhra Hackers |
Analyze the security implications of: vBulletin (Cyb - Advanced Forum Statistics) - 'misc.php' Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Greasemonkey 0.3.3 - Multiple Remote Information Disclosure Vulnerabilities | This is a webapps exploit for cgi platform. Description: Greasemonkey 0.3.3 - Multiple Remote Information Disclosure Vulnerabilities. Author: Mark Pilgrim |
Analyze the security implications of: Greasemonkey 0.3.3 - Multiple Remote Information Disclosure Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: MagNet BeeHive CMS (header) - Remote File Inclusion | This is a webapps exploit for php platform. Description: MagNet BeeHive CMS (header) - Remote File Inclusion. Author: Kw3[R]Ln |
Analyze the security implications of: MagNet BeeHive CMS (header) - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Enigma NMS 65.0.0 - Cross-Site Request Forgery | This is a webapps exploit for multiple platform. Description: Enigma NMS 65.0.0 - Cross-Site Request Forgery. Author: xerubus |
Analyze the security implications of: Enigma NMS 65.0.0 - Cross-Site Request Forgery | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Sudo 1.6.x - Environment Variable Handling Security Bypass (1) | This is a local exploit for linux platform. Description: Sudo 1.6.x - Environment Variable Handling Security Bypass (1). Author: Breno Silva Pinto |
Analyze the security implications of: Sudo 1.6.x - Environment Variable Handling Security Bypass (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cerulean Portal System 0.7b - Remote File Inclusion | This is a webapps exploit for php platform. Description: Cerulean Portal System 0.7b - Remote File Inclusion. Author: Mehmet Ince |
Analyze the security implications of: Cerulean Portal System 0.7b - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sun Java System Identity Manager 6.0/7.0/7.1 - '/idm/account/findForSelect.jsp?resultsForm' Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Sun Java System Identity Manager 6.0/7.0/7.1 - '/idm/account/findForSelect.jsp?resultsForm' Cross-Site Scripting. Author: Jan Fry & Adrian Pastor |
Analyze the security implications of: Sun Java System Identity Manager 6.0/7.0/7.1 - '/idm/account/findForSelect.jsp?resultsForm' Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: VMware Workstation/Player < 12.5.5 - Local Privilege Escalation | This is a local exploit for multiple platform. Description: VMware Workstation/Player < 12.5.5 - Local Privilege Escalation. Author: bcoles |
Analyze the security implications of: VMware Workstation/Player < 12.5.5 - Local Privilege Escalation | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: TrouSerS - Denial of Service | This is a dos exploit for linux platform. Description: TrouSerS - Denial of Service. Author: Andy Lutomirski |
Analyze the security implications of: TrouSerS - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache James Server 2.3.2 - Insecure User Creation Arbitrary File Write (Metasploit) | This is a remote exploit for linux platform. Description: Apache James Server 2.3.2 - Insecure User Creation Arbitrary File Write (Metasploit). Author: Metasploit |
Analyze the security implications of: Apache James Server 2.3.2 - Insecure User Creation Arbitrary File Write (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component MS Comment 0.8.0b - Security Bypass / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component MS Comment 0.8.0b - Security Bypass / Cross-Site Scripting. Author: Jeff Channell |
Analyze the security implications of: Joomla! Component MS Comment 0.8.0b - Security Bypass / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CuteNews 1.4.1 - Shell Injection / Remote Command Execution | This is a webapps exploit for php platform. Description: CuteNews 1.4.1 - Shell Injection / Remote Command Execution. Author: rgod |
Analyze the security implications of: CuteNews 1.4.1 - Shell Injection / Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gnome Web (Epiphany) < 3.28.2.1 - Denial of Service | This is a dos exploit for linux platform. Description: Gnome Web (Epiphany) < 3.28.2.1 - Denial of Service. Author: rop |
Analyze the security implications of: Gnome Web (Epiphany) < 3.28.2.1 - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Company WebSite Builder PRO 1.9.8 - 'INCLUDE_PATH' Remote File Inclusion | This is a webapps exploit for php platform. Description: Company WebSite Builder PRO 1.9.8 - 'INCLUDE_PATH' Remote File Inclusion. Author: the_day |
Analyze the security implications of: Company WebSite Builder PRO 1.9.8 - 'INCLUDE_PATH' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_jbudgetsmagic 0.3.2 < 0.4.0 - 'bid' SQL Injection | This is a webapps exploit for multiple platform. Description: Joomla! Component com_jbudgetsmagic 0.3.2 < 0.4.0 - 'bid' SQL Injection. Author: kaMtiEz |
Analyze the security implications of: Joomla! Component com_jbudgetsmagic 0.3.2 < 0.4.0 - 'bid' SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Goople CMS 1.7 - Arbitrary Code Execution | This is a webapps exploit for php platform. Description: Goople CMS 1.7 - Arbitrary Code Execution. Author: x0r |
Analyze the security implications of: Goople CMS 1.7 - Arbitrary Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache SpamAssassin Milter Plugin 0.3.1 - Remote Command Execution | This is a remote exploit for multiple platform. Description: Apache SpamAssassin Milter Plugin 0.3.1 - Remote Command Execution. Author: kingcope |
Analyze the security implications of: Apache SpamAssassin Milter Plugin 0.3.1 - Remote Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: OWASP Stinger - Filter Bypass | This is a remote exploit for multiple platform. Description: OWASP Stinger - Filter Bypass. Author: Meder Kydyraliev |
Analyze the security implications of: OWASP Stinger - Filter Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple iOS Kernel - Use-After-Free due to bad Error Handling in Personas | This is a dos exploit for ios platform. Description: Apple iOS Kernel - Use-After-Free due to bad Error Handling in Personas. Author: Google Security Research |
Analyze the security implications of: Apple iOS Kernel - Use-After-Free due to bad Error Handling in Personas | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: ClanSphere 2010.0 Final - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: ClanSphere 2010.0 Final - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: ClanSphere 2010.0 Final - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Takeover | This is a webapps exploit for php platform. Description: ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Takeover. Author: Devansh Bordia |
Analyze the security implications of: ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Takeover | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Five Star Review Script - 'index2.php?sort' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Five Star Review Script - 'index2.php?sort' Cross-Site Scripting. Author: Luny |
Analyze the security implications of: Five Star Review Script - 'index2.php?sort' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DB Top Sites 1.0 - 'index.php?u' Local File Inclusion | This is a webapps exploit for php platform. Description: DB Top Sites 1.0 - 'index.php?u' Local File Inclusion. Author: SirGod |
Analyze the security implications of: DB Top Sites 1.0 - 'index.php?u' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Network Management/Inventory System - 'header.php' Remote File Inclusion | This is a webapps exploit for multiple platform. Description: Network Management/Inventory System - 'header.php' Remote File Inclusion. Author: EA Ngel |
Analyze the security implications of: Network Management/Inventory System - 'header.php' Remote File Inclusion | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: InstantSoftwares Dating Site - Login SQL Injection | This is a webapps exploit for asp platform. Description: InstantSoftwares Dating Site - Login SQL Injection. Author: Aria-Security Team |
Analyze the security implications of: InstantSoftwares Dating Site - Login SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Nordex N149/4.0-4.5 - SQL Injection | This is a webapps exploit for hardware platform. Description: Nordex N149/4.0-4.5 - SQL Injection. Author: t4rkd3vilz |
Analyze the security implications of: Nordex N149/4.0-4.5 - SQL Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Employee Record Management System 1.1 - Login Bypass SQL Injection | This is a webapps exploit for multiple platform. Description: Employee Record Management System 1.1 - Login Bypass SQL Injection. Author: Anurag Kumar |
Analyze the security implications of: Employee Record Management System 1.1 - Login Bypass SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Netgear DGN1000B - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Netgear DGN1000B - Multiple Vulnerabilities. Author: m-1-k-3 |
Analyze the security implications of: Netgear DGN1000B - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: LiveAlbum 0.9.0 - 'common.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: LiveAlbum 0.9.0 - 'common.php' Remote File Inclusion. Author: S.W.A.T. |
Analyze the security implications of: LiveAlbum 0.9.0 - 'common.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MetaCart2 - 'strSubCatalog_NAME' SQL Injection | This is a webapps exploit for asp platform. Description: MetaCart2 - 'strSubCatalog_NAME' SQL Injection. Author: Dcrab |
Analyze the security implications of: MetaCart2 - 'strSubCatalog_NAME' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Maian Links 3.1 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Maian Links 3.1 - Insecure Cookie Handling. Author: S.W.A.T. |
Analyze the security implications of: Maian Links 3.1 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.