input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Iatek PortalApp 3.3/4.0 - 'login.asp' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Wireshark 1.12.0 < 1.12.12 / 2.0.0 < 2.0.4 - WSP Dissector Denial of Service
|
This is a dos exploit for multiple platform. Description: Wireshark 1.12.0 < 1.12.12 / 2.0.0 < 2.0.4 - WSP Dissector Denial of Service. Author: Chris Benedict
|
Analyze the security implications of: Wireshark 1.12.0 < 1.12.12 / 2.0.0 < 2.0.4 - WSP Dissector Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: IBM AIX 4.2 - '/usr/sbin/lchangelv' Local Buffer Overflow
|
This is a local exploit for aix platform. Description: IBM AIX 4.2 - '/usr/sbin/lchangelv' Local Buffer Overflow. Author: Bryan P. Self
|
Analyze the security implications of: IBM AIX 4.2 - '/usr/sbin/lchangelv' Local Buffer Overflow
|
This exploit targets aix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: vBulletin (Cyb - Advanced Forum Statistics) - 'misc.php' Denial of Service
|
This is a dos exploit for php platform. Description: vBulletin (Cyb - Advanced Forum Statistics) - 'misc.php' Denial of Service. Author: Andhra Hackers
|
Analyze the security implications of: vBulletin (Cyb - Advanced Forum Statistics) - 'misc.php' Denial of Service
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Greasemonkey 0.3.3 - Multiple Remote Information Disclosure Vulnerabilities
|
This is a webapps exploit for cgi platform. Description: Greasemonkey 0.3.3 - Multiple Remote Information Disclosure Vulnerabilities. Author: Mark Pilgrim
|
Analyze the security implications of: Greasemonkey 0.3.3 - Multiple Remote Information Disclosure Vulnerabilities
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: MagNet BeeHive CMS (header) - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: MagNet BeeHive CMS (header) - Remote File Inclusion. Author: Kw3[R]Ln
|
Analyze the security implications of: MagNet BeeHive CMS (header) - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Enigma NMS 65.0.0 - Cross-Site Request Forgery
|
This is a webapps exploit for multiple platform. Description: Enigma NMS 65.0.0 - Cross-Site Request Forgery. Author: xerubus
|
Analyze the security implications of: Enigma NMS 65.0.0 - Cross-Site Request Forgery
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Sudo 1.6.x - Environment Variable Handling Security Bypass (1)
|
This is a local exploit for linux platform. Description: Sudo 1.6.x - Environment Variable Handling Security Bypass (1). Author: Breno Silva Pinto
|
Analyze the security implications of: Sudo 1.6.x - Environment Variable Handling Security Bypass (1)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Cerulean Portal System 0.7b - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Cerulean Portal System 0.7b - Remote File Inclusion. Author: Mehmet Ince
|
Analyze the security implications of: Cerulean Portal System 0.7b - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sun Java System Identity Manager 6.0/7.0/7.1 - '/idm/account/findForSelect.jsp?resultsForm' Cross-Site Scripting
|
This is a webapps exploit for jsp platform. Description: Sun Java System Identity Manager 6.0/7.0/7.1 - '/idm/account/findForSelect.jsp?resultsForm' Cross-Site Scripting. Author: Jan Fry & Adrian Pastor
|
Analyze the security implications of: Sun Java System Identity Manager 6.0/7.0/7.1 - '/idm/account/findForSelect.jsp?resultsForm' Cross-Site Scripting
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: VMware Workstation/Player < 12.5.5 - Local Privilege Escalation
|
This is a local exploit for multiple platform. Description: VMware Workstation/Player < 12.5.5 - Local Privilege Escalation. Author: bcoles
|
Analyze the security implications of: VMware Workstation/Player < 12.5.5 - Local Privilege Escalation
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: TrouSerS - Denial of Service
|
This is a dos exploit for linux platform. Description: TrouSerS - Denial of Service. Author: Andy Lutomirski
|
Analyze the security implications of: TrouSerS - Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apache James Server 2.3.2 - Insecure User Creation Arbitrary File Write (Metasploit)
|
This is a remote exploit for linux platform. Description: Apache James Server 2.3.2 - Insecure User Creation Arbitrary File Write (Metasploit). Author: Metasploit
|
Analyze the security implications of: Apache James Server 2.3.2 - Insecure User Creation Arbitrary File Write (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component MS Comment 0.8.0b - Security Bypass / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Joomla! Component MS Comment 0.8.0b - Security Bypass / Cross-Site Scripting. Author: Jeff Channell
|
Analyze the security implications of: Joomla! Component MS Comment 0.8.0b - Security Bypass / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CuteNews 1.4.1 - Shell Injection / Remote Command Execution
|
This is a webapps exploit for php platform. Description: CuteNews 1.4.1 - Shell Injection / Remote Command Execution. Author: rgod
|
Analyze the security implications of: CuteNews 1.4.1 - Shell Injection / Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gnome Web (Epiphany) < 3.28.2.1 - Denial of Service
|
This is a dos exploit for linux platform. Description: Gnome Web (Epiphany) < 3.28.2.1 - Denial of Service. Author: rop
|
Analyze the security implications of: Gnome Web (Epiphany) < 3.28.2.1 - Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Company WebSite Builder PRO 1.9.8 - 'INCLUDE_PATH' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Company WebSite Builder PRO 1.9.8 - 'INCLUDE_PATH' Remote File Inclusion. Author: the_day
|
Analyze the security implications of: Company WebSite Builder PRO 1.9.8 - 'INCLUDE_PATH' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_jbudgetsmagic 0.3.2 < 0.4.0 - 'bid' SQL Injection
|
This is a webapps exploit for multiple platform. Description: Joomla! Component com_jbudgetsmagic 0.3.2 < 0.4.0 - 'bid' SQL Injection. Author: kaMtiEz
|
Analyze the security implications of: Joomla! Component com_jbudgetsmagic 0.3.2 < 0.4.0 - 'bid' SQL Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Goople CMS 1.7 - Arbitrary Code Execution
|
This is a webapps exploit for php platform. Description: Goople CMS 1.7 - Arbitrary Code Execution. Author: x0r
|
Analyze the security implications of: Goople CMS 1.7 - Arbitrary Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apache SpamAssassin Milter Plugin 0.3.1 - Remote Command Execution
|
This is a remote exploit for multiple platform. Description: Apache SpamAssassin Milter Plugin 0.3.1 - Remote Command Execution. Author: kingcope
|
Analyze the security implications of: Apache SpamAssassin Milter Plugin 0.3.1 - Remote Command Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: OWASP Stinger - Filter Bypass
|
This is a remote exploit for multiple platform. Description: OWASP Stinger - Filter Bypass. Author: Meder Kydyraliev
|
Analyze the security implications of: OWASP Stinger - Filter Bypass
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apple iOS Kernel - Use-After-Free due to bad Error Handling in Personas
|
This is a dos exploit for ios platform. Description: Apple iOS Kernel - Use-After-Free due to bad Error Handling in Personas. Author: Google Security Research
|
Analyze the security implications of: Apple iOS Kernel - Use-After-Free due to bad Error Handling in Personas
|
This exploit targets ios systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: ClanSphere 2010.0 Final - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: ClanSphere 2010.0 Final - Multiple Vulnerabilities. Author: High-Tech Bridge SA
|
Analyze the security implications of: ClanSphere 2010.0 Final - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Takeover
|
This is a webapps exploit for php platform. Description: ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Takeover. Author: Devansh Bordia
|
Analyze the security implications of: ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Takeover
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Five Star Review Script - 'index2.php?sort' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Five Star Review Script - 'index2.php?sort' Cross-Site Scripting. Author: Luny
|
Analyze the security implications of: Five Star Review Script - 'index2.php?sort' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DB Top Sites 1.0 - 'index.php?u' Local File Inclusion
|
This is a webapps exploit for php platform. Description: DB Top Sites 1.0 - 'index.php?u' Local File Inclusion. Author: SirGod
|
Analyze the security implications of: DB Top Sites 1.0 - 'index.php?u' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Network Management/Inventory System - 'header.php' Remote File Inclusion
|
This is a webapps exploit for multiple platform. Description: Network Management/Inventory System - 'header.php' Remote File Inclusion. Author: EA Ngel
|
Analyze the security implications of: Network Management/Inventory System - 'header.php' Remote File Inclusion
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: InstantSoftwares Dating Site - Login SQL Injection
|
This is a webapps exploit for asp platform. Description: InstantSoftwares Dating Site - Login SQL Injection. Author: Aria-Security Team
|
Analyze the security implications of: InstantSoftwares Dating Site - Login SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Nordex N149/4.0-4.5 - SQL Injection
|
This is a webapps exploit for hardware platform. Description: Nordex N149/4.0-4.5 - SQL Injection. Author: t4rkd3vilz
|
Analyze the security implications of: Nordex N149/4.0-4.5 - SQL Injection
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Employee Record Management System 1.1 - Login Bypass SQL Injection
|
This is a webapps exploit for multiple platform. Description: Employee Record Management System 1.1 - Login Bypass SQL Injection. Author: Anurag Kumar
|
Analyze the security implications of: Employee Record Management System 1.1 - Login Bypass SQL Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Netgear DGN1000B - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Netgear DGN1000B - Multiple Vulnerabilities. Author: m-1-k-3
|
Analyze the security implications of: Netgear DGN1000B - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: LiveAlbum 0.9.0 - 'common.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: LiveAlbum 0.9.0 - 'common.php' Remote File Inclusion. Author: S.W.A.T.
|
Analyze the security implications of: LiveAlbum 0.9.0 - 'common.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MetaCart2 - 'strSubCatalog_NAME' SQL Injection
|
This is a webapps exploit for asp platform. Description: MetaCart2 - 'strSubCatalog_NAME' SQL Injection. Author: Dcrab
|
Analyze the security implications of: MetaCart2 - 'strSubCatalog_NAME' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Maian Links 3.1 - Insecure Cookie Handling
|
This is a webapps exploit for php platform. Description: Maian Links 3.1 - Insecure Cookie Handling. Author: S.W.A.T.
|
Analyze the security implications of: Maian Links 3.1 - Insecure Cookie Handling
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.