input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Gattaca Server 2003 - Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Gattaca Server 2003 - Cross-Site Scripting. Author: dr_insane |
Analyze the security implications of: Gattaca Server 2003 - Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Guestbook 4.0 - Sensitive Information Disclosure | This is a webapps exploit for cgi platform. Description: Guestbook 4.0 - Sensitive Information Disclosure. Author: Over_G |
Analyze the security implications of: Guestbook 4.0 - Sensitive Information Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! / Mambo Component com_guide - 'category' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_guide - 'category' SQL Injection. Author: The-0utl4w |
Analyze the security implications of: Joomla! / Mambo Component com_guide - 'category' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KubeBlog - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: KubeBlog - Cross-Site Request Forgery. Author: The.Morpheus |
Analyze the security implications of: KubeBlog - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Music Collection 3.0.3 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Music Collection 3.0.3 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Music Collection 3.0.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JBuildozer 1.4.1 - 'appid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JBuildozer 1.4.1 - 'appid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JBuildozer 1.4.1 - 'appid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 4.4.3/5.1.4 - 'sscanf' Local Buffer Overflow | This is a local exploit for linux platform. Description: PHP 4.4.3/5.1.4 - 'sscanf' Local Buffer Overflow. Author: Andi |
Analyze the security implications of: PHP 4.4.3/5.1.4 - 'sscanf' Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: faust Informatics FreeStyle chat 4.1 sr2 - Directory Traversal | This is a remote exploit for multiple platform. Description: faust Informatics FreeStyle chat 4.1 sr2 - Directory Traversal. Author: nemesystm |
Analyze the security implications of: faust Informatics FreeStyle chat 4.1 sr2 - Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: WebKit JSC - 'Intl.getCanonicalLocales' Heap Buffer Overflow | This is a dos exploit for multiple platform. Description: WebKit JSC - 'Intl.getCanonicalLocales' Heap Buffer Overflow. Author: Google Security Research |
Analyze the security implications of: WebKit JSC - 'Intl.getCanonicalLocales' Heap Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Simple Membership 3.3.3 - 'userId' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Simple Membership 3.3.3 - 'userId' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Simple Membership 3.3.3 - 'userId' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LogicBill 1.0 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: LogicBill 1.0 - Multiple SQL Injections. Author: r0t3d3Vil |
Analyze the security implications of: LogicBill 1.0 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla Products - 'Host:' Buffer Overflow (Denial of Service) (PoC) String | This is a dos exploit for multiple platform. Description: Mozilla Products - 'Host:' Buffer Overflow (Denial of Service) (PoC) String. Author: Tom Ferris |
Analyze the security implications of: Mozilla Products - 'Host:' Buffer Overflow (Denial of Service) (PoC) String | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DomainMOD 4.11.01 - Custom Domain Fields Cross-Site Scripting | This is a webapps exploit for php platform. Description: DomainMOD 4.11.01 - Custom Domain Fields Cross-Site Scripting. Author: Mohammed Abdul Raheem |
Analyze the security implications of: DomainMOD 4.11.01 - Custom Domain Fields Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNU Bash - Environment Variable Command Injection (Metasploit) | This is a remote exploit for cgi platform. Description: GNU Bash - Environment Variable Command Injection (Metasploit). Author: Shaun Colley |
Analyze the security implications of: GNU Bash - Environment Variable Command Injection (Metasploit) | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: MidHosting FTP Daemon 1.0.1 - Shared Memory Local Denial of Service | This is a dos exploit for linux platform. Description: MidHosting FTP Daemon 1.0.1 - Shared Memory Local Denial of Service. Author: Frank DENIS |
Analyze the security implications of: MidHosting FTP Daemon 1.0.1 - Shared Memory Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Android - 'zygote->init;' Chain from USB Privilege Escalation | This is a local exploit for android platform. Description: Android - 'zygote->init;' Chain from USB Privilege Escalation. Author: Google Security Research |
Analyze the security implications of: Android - 'zygote->init;' Chain from USB Privilege Escalation | This exploit targets android systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: SpamAssassin spamd - Remote Command Execution (Metasploit) | This is a remote exploit for linux platform. Description: SpamAssassin spamd - Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: SpamAssassin spamd - Remote Command Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Drupal Module CAPTCHA - Security Bypass | This is a webapps exploit for php platform. Description: Drupal Module CAPTCHA - Security Bypass. Author: anonymous |
Analyze the security implications of: Drupal Module CAPTCHA - Security Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ametys CMS 3.5.2 - 'lang' XPath Injection | This is a webapps exploit for java platform. Description: Ametys CMS 3.5.2 - 'lang' XPath Injection. Author: LiquidWorm |
Analyze the security implications of: Ametys CMS 3.5.2 - 'lang' XPath Injection | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Mozilla Firefox 2.0.x - Nested 'window.print()' Denial of Service | This is a dos exploit for multiple platform. Description: Mozilla Firefox 2.0.x - Nested 'window.print()' Denial of Service. Author: b3hz4d |
Analyze the security implications of: Mozilla Firefox 2.0.x - Nested 'window.print()' Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Extract Website - 'Filename' File Disclosure | This is a webapps exploit for php platform. Description: Extract Website - 'Filename' File Disclosure. Author: Cold Zero |
Analyze the security implications of: Extract Website - 'Filename' File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Keller Web Admin CMS 0.94 Pro - Local File Inclusion (1) | This is a webapps exploit for php platform. Description: Keller Web Admin CMS 0.94 Pro - Local File Inclusion (1). Author: CWH Underground |
Analyze the security implications of: Keller Web Admin CMS 0.94 Pro - Local File Inclusion (1) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Allomani Web Links 1.0 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: Allomani Web Links 1.0 - Cross-Site Request Forgery (Add Admin). Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Allomani Web Links 1.0 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo 4.6.4 - 'Output.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo 4.6.4 - 'Output.php' Remote File Inclusion. Author: irk4z |
Analyze the security implications of: Mambo 4.6.4 - 'Output.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LinksPro - 'OrderDirection' SQL Injection | This is a webapps exploit for asp platform. Description: LinksPro - 'OrderDirection' SQL Injection. Author: Pouya_Server |
Analyze the security implications of: LinksPro - 'OrderDirection' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Custom Dating Biz 1.0 - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: Custom Dating Biz 1.0 - Multiple Input Validation Vulnerabilities. Author: Luny |
Analyze the security implications of: Custom Dating Biz 1.0 - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 3CX Phone System 15.5.3554.1 - Directory Traversal | This is a webapps exploit for linux platform. Description: 3CX Phone System 15.5.3554.1 - Directory Traversal. Author: Jens Regel |
Analyze the security implications of: 3CX Phone System 15.5.3554.1 - Directory Traversal | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BigACE 1.8.2 - 'admin.cmd.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: BigACE 1.8.2 - 'admin.cmd.php' Remote File Inclusion. Author: Vampire |
Analyze the security implications of: BigACE 1.8.2 - 'admin.cmd.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_commedia - 'task' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_commedia - 'task' SQL Injection. Author: D4NB4R |
Analyze the security implications of: Joomla! Component com_commedia - 'task' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jaws 0.2/0.3 - Cookie Manipulation Authentication Bypass | This is a webapps exploit for php platform. Description: Jaws 0.2/0.3 - Cookie Manipulation Authentication Bypass. Author: Fernando Quintero |
Analyze the security implications of: Jaws 0.2/0.3 - Cookie Manipulation Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Exjune Officer Message System 1 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Exjune Officer Message System 1 - Multiple Vulnerabilities. Author: ByALBAYX |
Analyze the security implications of: Exjune Officer Message System 1 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DotNetNuke DNNArticle Module 10.0 - SQL Injection | This is a webapps exploit for php platform. Description: DotNetNuke DNNArticle Module 10.0 - SQL Injection. Author: Sajjad Pourali |
Analyze the security implications of: DotNetNuke DNNArticle Module 10.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Horde 3.3.5 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Horde 3.3.5 - Cross-Site Scripting. Author: Juan Galiana Lara |
Analyze the security implications of: Horde 3.3.5 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Citadel/UX BBS 6.07 - Remote Overflow | This is a remote exploit for linux platform. Description: Citadel/UX BBS 6.07 - Remote Overflow. Author: Carl Livitt |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.