input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Netscape Navigator 7.1 - Embedded Image URI Obfuscation | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Opera Web browser 7.54 java implementation - Multiple Vulnerabilities (2) | This is a dos exploit for linux platform. Description: Opera Web browser 7.54 java implementation - Multiple Vulnerabilities (2). Author: Marc Schoenefeld |
Analyze the security implications of: Opera Web browser 7.54 java implementation - Multiple Vulnerabilities (2) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CMScout IBrowser TinyMCE Plugin 2.3.4.3 - Local File Inclusion | This is a webapps exploit for php platform. Description: CMScout IBrowser TinyMCE Plugin 2.3.4.3 - Local File Inclusion. Author: John Leitch |
Analyze the security implications of: CMScout IBrowser TinyMCE Plugin 2.3.4.3 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ProductCart 1.5/1.6/2.0 - 'MSG.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: ProductCart 1.5/1.6/2.0 - 'MSG.asp' Cross-Site Scripting. Author: atomix |
Analyze the security implications of: ProductCart 1.5/1.6/2.0 - 'MSG.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: WebCom datakommunikation Guestbook 0.1 - 'rguest.exe' Arbitrary File Access | This is a remote exploit for cgi platform. Description: WebCom datakommunikation Guestbook 0.1 - 'rguest.exe' Arbitrary File Access. Author: Mnemonix |
Analyze the security implications of: WebCom datakommunikation Guestbook 0.1 - 'rguest.exe' Arbitrary File Access | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Baran CMS 1.0 - 'Arbitrary '.ASP' File Upload / File Disclosure / SQL Injection / Cross-Site Scripting / Cookie Manipulation | This is a webapps exploit for asp platform. Description: Baran CMS 1.0 - 'Arbitrary '.ASP' File Upload / File Disclosure / SQL Injection / Cross-Site Scripting / Cookie Manipulation. Author: Aria-Security Team |
Analyze the security implications of: Baran CMS 1.0 - 'Arbitrary '.ASP' File Upload / File Disclosure / SQL Injection / Cross-Site Scripting / Cookie Manipulation | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: zgv - '$HOME' Local Buffer Overflow | This is a local exploit for linux platform. Description: zgv - '$HOME' Local Buffer Overflow. Author: BeastMaster V |
Analyze the security implications of: zgv - '$HOME' Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple Mac OSX 10.10 - BlueTooth BlueToothHCIChangeLocalName Crash (PoC) | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.10 - BlueTooth BlueToothHCIChangeLocalName Crash (PoC). Author: rpaleari & joystick |
Analyze the security implications of: Apple Mac OSX 10.10 - BlueTooth BlueToothHCIChangeLocalName Crash (PoC) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Artica Web Proxy 3.06 - Remote Code Execution | This is a webapps exploit for php platform. Description: Artica Web Proxy 3.06 - Remote Code Execution. Author: hyp3rlinx |
Analyze the security implications of: Artica Web Proxy 3.06 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.x - File Lock Lease Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - File Lock Lease Local Denial of Service. Author: J. Bruce Fields |
Analyze the security implications of: Linux Kernel 2.6.x - File Lock Lease Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: iboss Secure Web Gateway - Stored Cross-Site Scripting (XSS) | This is a webapps exploit for multiple platform. Description: iboss Secure Web Gateway - Stored Cross-Site Scripting (XSS). Author: modrnProph3t |
Analyze the security implications of: iboss Secure Web Gateway - Stored Cross-Site Scripting (XSS) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Aircrack-NG Tools svn r1675 - Remote Heap Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: Aircrack-NG Tools svn r1675 - Remote Heap Buffer Overflow (PoC). Author: Lukas Lueg |
Analyze the security implications of: Aircrack-NG Tools svn r1675 - Remote Heap Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Forma LMS 1.3 - Multiple PHP Object Injection Vulnerabilities | This is a webapps exploit for php platform. Description: Forma LMS 1.3 - Multiple PHP Object Injection Vulnerabilities. Author: Filippo Roncari |
Analyze the security implications of: Forma LMS 1.3 - Multiple PHP Object Injection Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Poll 1.0.10 - Arbitrary Add Votes | This is a webapps exploit for php platform. Description: Joomla! Component Poll 1.0.10 - Arbitrary Add Votes. Author: trueend5 |
Analyze the security implications of: Joomla! Component Poll 1.0.10 - Arbitrary Add Votes | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dokeos 1.x - '/forum/viewforum.php?forum' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Dokeos 1.x - '/forum/viewforum.php?forum' Cross-Site Scripting. Author: Doz |
Analyze the security implications of: Dokeos 1.x - '/forum/viewforum.php?forum' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eLms Pro - SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: eLms Pro - SQL Injection / Cross-Site Scripting. Author: Sid3^effects |
Analyze the security implications of: eLms Pro - SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNU Info 4.7 - Follow XRef Buffer Overrun | This is a dos exploit for linux platform. Description: GNU Info 4.7 - Follow XRef Buffer Overrun. Author: Josh Martin |
Analyze the security implications of: GNU Info 4.7 - Follow XRef Buffer Overrun | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SuSE 7.0 - KFM Insecure '.TMP' File Creation | This is a local exploit for linux platform. Description: SuSE 7.0 - KFM Insecure '.TMP' File Creation. Author: Paul Starzetz |
Analyze the security implications of: SuSE 7.0 - KFM Insecure '.TMP' File Creation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Bakeshop Online Ordering System 1.0 - 'Owner' Persistent Cross-site scripting | This is a webapps exploit for multiple platform. Description: Bakeshop Online Ordering System 1.0 - 'Owner' Persistent Cross-site scripting. Author: Parshwa Bhavsar |
Analyze the security implications of: Bakeshop Online Ordering System 1.0 - 'Owner' Persistent Cross-site scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple Mac OSX 10.4.x - 'Shared_Region_Make_Private_Np' Kernel Function Local Memory Corruption | This is a local exploit for osx platform. Description: Apple Mac OSX 10.4.x - 'Shared_Region_Make_Private_Np' Kernel Function Local Memory Corruption. Author: LMH |
Analyze the security implications of: Apple Mac OSX 10.4.x - 'Shared_Region_Make_Private_Np' Kernel Function Local Memory Corruption | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Geeklog 1.3.7 - 'Homepage User' HTML Injection | This is a webapps exploit for php platform. Description: Geeklog 1.3.7 - 'Homepage User' HTML Injection. Author: snooq |
Analyze the security implications of: Geeklog 1.3.7 - 'Homepage User' HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Borland Interbase - 'PWD_db_aliased()' Remote Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: Borland Interbase - 'PWD_db_aliased()' Remote Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Borland Interbase - 'PWD_db_aliased()' Remote Buffer Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DA Mailing List System 2 - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: DA Mailing List System 2 - Multiple Vulnerabilities. Author: Phenom |
Analyze the security implications of: DA Mailing List System 2 - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Longshine Multiple Print Servers - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Longshine Multiple Print Servers - Cross-Site Scripting. Author: b0telh0 |
Analyze the security implications of: Longshine Multiple Print Servers - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Ledscripts LedForums - Multiple HTML Injections | This is a webapps exploit for php platform. Description: Ledscripts LedForums - Multiple HTML Injections. Author: ProXy |
Analyze the security implications of: Ledscripts LedForums - Multiple HTML Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: W3C Amaya 9.4 - legend color Attribute Value Overflow | This is a dos exploit for multiple platform. Description: W3C Amaya 9.4 - legend color Attribute Value Overflow. Author: Thomas Waldegger |
Analyze the security implications of: W3C Amaya 9.4 - legend color Attribute Value Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BeyondTrust Remote Support 6.0 - Reflected Cross-Site Scripting (XSS) (Unauthenticated) | This is a webapps exploit for multiple platform. Description: BeyondTrust Remote Support 6.0 - Reflected Cross-Site Scripting (XSS) (Unauthenticated). Author: Malcrove |
Analyze the security implications of: BeyondTrust Remote Support 6.0 - Reflected Cross-Site Scripting (XSS) (Unauthenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CCMS 3.1 - 'skin' Local File Inclusion | This is a webapps exploit for php platform. Description: CCMS 3.1 - 'skin' Local File Inclusion. Author: SirGod |
Analyze the security implications of: CCMS 3.1 - 'skin' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IceWarp Web Mail 5.5.1 - 'blank.html?id' Cross-Site Scripting | This is a webapps exploit for php platform. Description: IceWarp Web Mail 5.5.1 - 'blank.html?id' Cross-Site Scripting. Author: ss_contacts |
Analyze the security implications of: IceWarp Web Mail 5.5.1 - 'blank.html?id' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CaupoShop Pro (2.x < 3.70) Classic 3.01 - Local File Inclusion | This is a webapps exploit for php platform. Description: CaupoShop Pro (2.x < 3.70) Classic 3.01 - Local File Inclusion. Author: Rami Salama |
Analyze the security implications of: CaupoShop Pro (2.x < 3.70) Classic 3.01 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP Client 9.1/9.0/8.1/7.9 - Command Injection | This is a remote exploit for multiple platform. Description: HP Client 9.1/9.0/8.1/7.9 - Command Injection. Author: SlidingWindow |
Analyze the security implications of: HP Client 9.1/9.0/8.1/7.9 - Command Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: T1lib - 'intT1_Env_GetCompletePath' Buffer Overflow (PoC) | This is a dos exploit for php platform. Description: T1lib - 'intT1_Env_GetCompletePath' Buffer Overflow (PoC). Author: r0ut3r |
Analyze the security implications of: T1lib - 'intT1_Env_GetCompletePath' Buffer Overflow (PoC) | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flash Poker 2.0 - 'game' SQL Injection | This is a webapps exploit for php platform. Description: Flash Poker 2.0 - 'game' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Flash Poker 2.0 - 'game' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Huawei EchoLife HG520 - Remote Information Disclosure | This is a remote exploit for hardware platform. Description: Huawei EchoLife HG520 - Remote Information Disclosure. Author: hkm |
Analyze the security implications of: Huawei EchoLife HG520 - Remote Information Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.