input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: DieselScripts jokes - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CutePHP CuteNews 1.4.1 Editnews Module - Cross-Site Scripting | This is a webapps exploit for php platform. Description: CutePHP CuteNews 1.4.1 Editnews Module - Cross-Site Scripting. Author: LoK-Crew |
Analyze the security implications of: CutePHP CuteNews 1.4.1 Editnews Module - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Respondus for WebCT 1.1.2 - Weak Password Encryption | This is a local exploit for multiple platform. Description: Respondus for WebCT 1.1.2 - Weak Password Encryption. Author: Desmond Irvine |
Analyze the security implications of: Respondus for WebCT 1.1.2 - Weak Password Encryption | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Microsoft ASP.NET 1.0/1.1 - Unicode Character Conversion Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: Microsoft ASP.NET 1.0/1.1 - Unicode Character Conversion Multiple Cross-Site Scripting Vulnerabilities. Author: Andrey Rusyaev |
Analyze the security implications of: Microsoft ASP.NET 1.0/1.1 - Unicode Character Conversion Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apache OFBiz - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Apache OFBiz - Multiple Cross-Site Scripting Vulnerabilities. Author: Lucas Apa |
Analyze the security implications of: Apache OFBiz - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Phoenix Exploit Kit - Remote Code Execution (Metasploit) | This is a remote exploit for php platform. Description: Phoenix Exploit Kit - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Phoenix Exploit Kit - Remote Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WapServ 1.0 - Denial of Service | This is a dos exploit for multiple platform. Description: WapServ 1.0 - Denial of Service. Author: Blue eyeguy4u |
Analyze the security implications of: WapServ 1.0 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Alguest 1.1 - 'start' SQL Injection | This is a webapps exploit for php platform. Description: Alguest 1.1 - 'start' SQL Injection. Author: Aliaksandr Hartsuyeu |
Analyze the security implications of: Alguest 1.1 - 'start' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash - Out-of-Bounds Write in MP4 Edge Processing | This is a dos exploit for multiple platform. Description: Adobe Flash - Out-of-Bounds Write in MP4 Edge Processing. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Out-of-Bounds Write in MP4 Edge Processing | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: EasyPage - SQL Injection | This is a webapps exploit for asp platform. Description: EasyPage - SQL Injection. Author: Red Security TEAM |
Analyze the security implications of: EasyPage - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: MySQL 3.23.x/4.0.x - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: MySQL 3.23.x/4.0.x - Remote Buffer Overflow. Author: bkbll |
Analyze the security implications of: MySQL 3.23.x/4.0.x - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: NeoSys Neon Webmail for Java 5.06/5.07 - 'updateuser?in_name' Servlet Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: NeoSys Neon Webmail for Java 5.06/5.07 - 'updateuser?in_name' Servlet Cross-Site Scripting. Author: Tan Chew Keong |
Analyze the security implications of: NeoSys Neon Webmail for Java 5.06/5.07 - 'updateuser?in_name' Servlet Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: M/Monit 3.7.2 - Privilege Escalation | This is a webapps exploit for multiple platform. Description: M/Monit 3.7.2 - Privilege Escalation. Author: Dolev Farhi |
Analyze the security implications of: M/Monit 3.7.2 - Privilege Escalation | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PHP DateTime - Use-After-Free | This is a dos exploit for php platform. Description: PHP DateTime - Use-After-Free. Author: Taoguang Chen |
Analyze the security implications of: PHP DateTime - Use-After-Free | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: e107 Website System 0.555 - 'db.php' Information Disclosure | This is a webapps exploit for php platform. Description: e107 Website System 0.555 - 'db.php' Information Disclosure. Author: Artoor Petrovich |
Analyze the security implications of: e107 Website System 0.555 - 'db.php' Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Claroline 1.8 - 'learnPath/calendar/myagenda.php' Query String Cross-Site Scripting | This is a webapps exploit for php platform. Description: Claroline 1.8 - 'learnPath/calendar/myagenda.php' Query String Cross-Site Scripting. Author: DSecRG |
Analyze the security implications of: Claroline 1.8 - 'learnPath/calendar/myagenda.php' Query String Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Micro Focus (HPE) Data Protector - SUID Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: Micro Focus (HPE) Data Protector - SUID Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Micro Focus (HPE) Data Protector - SUID Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Attendance and Payroll System v1.0 - Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: Attendance and Payroll System v1.0 - Remote Code Execution (RCE). Author: pr0z |
Analyze the security implications of: Attendance and Payroll System v1.0 - Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KAME Racoon - 'Initial Contact' SA Deletion | This is a dos exploit for freebsd platform. Description: KAME Racoon - 'Initial Contact' SA Deletion. Author: Thomas Walpuski |
Analyze the security implications of: KAME Racoon - 'Initial Contact' SA Deletion | This exploit targets freebsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: IBM AIX 5.3 SP6 - 'pioout' Arbitrary Library Loading Privilege Escalation | This is a local exploit for aix platform. Description: IBM AIX 5.3 SP6 - 'pioout' Arbitrary Library Loading Privilege Escalation. Author: qaaz |
Analyze the security implications of: IBM AIX 5.3 SP6 - 'pioout' Arbitrary Library Loading Privilege Escalation | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Jax PHP Scripts 1.0/1.34/2.14/3.31 - Guestbook File Client IP Disclosure | This is a webapps exploit for php platform. Description: Jax PHP Scripts 1.0/1.34/2.14/3.31 - Guestbook File Client IP Disclosure. Author: Lostmon |
Analyze the security implications of: Jax PHP Scripts 1.0/1.34/2.14/3.31 - Guestbook File Client IP Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PuterJam's Blog PJBlog3 3.0.6 - 'action.asp' SQL Injection | This is a webapps exploit for asp platform. Description: PuterJam's Blog PJBlog3 3.0.6 - 'action.asp' SQL Injection. Author: anonymous |
Analyze the security implications of: PuterJam's Blog PJBlog3 3.0.6 - 'action.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: WRT120N 1.0.0.7 - Remote Stack Overflow | This is a remote exploit for hardware platform. Description: WRT120N 1.0.0.7 - Remote Stack Overflow. Author: Craig Heffner |
Analyze the security implications of: WRT120N 1.0.0.7 - Remote Stack Overflow | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Oracle Reports Server 6.0.8/9.0.x - Unauthorized Report Execution | This is a remote exploit for multiple platform. Description: Oracle Reports Server 6.0.8/9.0.x - Unauthorized Report Execution. Author: Alexander Kornbrust |
Analyze the security implications of: Oracle Reports Server 6.0.8/9.0.x - Unauthorized Report Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Nginx 0.6.x - Arbitrary Code Execution NullByte Injection | This is a webapps exploit for multiple platform. Description: Nginx 0.6.x - Arbitrary Code Execution NullByte Injection. Author: Neal Poole |
Analyze the security implications of: Nginx 0.6.x - Arbitrary Code Execution NullByte Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: eNdonesia 8.4 - 'banners.php?click Action bid' SQL Injection | This is a webapps exploit for php platform. Description: eNdonesia 8.4 - 'banners.php?click Action bid' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: eNdonesia 8.4 - 'banners.php?click Action bid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: etomite 1.1 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: etomite 1.1 - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: etomite 1.1 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: e107 < 0.6172 - 'resetcore.php' SQL Injection | This is a remote exploit for linux platform. Description: e107 < 0.6172 - 'resetcore.php' SQL Injection. Author: rgod |
Analyze the security implications of: e107 < 0.6172 - 'resetcore.php' SQL Injection | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Gazelle CMS 1.0 - 'template' Local File Inclusion | This is a webapps exploit for php platform. Description: Gazelle CMS 1.0 - 'template' Local File Inclusion. Author: fuzion |
Analyze the security implications of: Gazelle CMS 1.0 - 'template' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Module CBSms 1.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Module CBSms 1.0 - Remote File Inclusion. Author: Kw3[R]Ln |
Analyze the security implications of: Mambo Module CBSms 1.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Exhibit Engine 1.22 - 'fetchsettings.php?toroot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Exhibit Engine 1.22 - 'fetchsettings.php?toroot' Remote File Inclusion. Author: Cyber Security |
Analyze the security implications of: Exhibit Engine 1.22 - 'fetchsettings.php?toroot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Code::Blocks - Denial of Service | This is a dos exploit for multiple platform. Description: Code::Blocks - Denial of Service. Author: ariarat |
Analyze the security implications of: Code::Blocks - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GLIBC locale - Format Strings | This is a local exploit for linux platform. Description: GLIBC locale - Format Strings. Author: logikal |
Analyze the security implications of: GLIBC locale - Format Strings | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Adobe Flash - Overflow in Slab Rendering | This is a dos exploit for multiple platform. Description: Adobe Flash - Overflow in Slab Rendering. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Overflow in Slab Rendering | This exploit targets multiple systems. Type: dos. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.