input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Novell Netware 6.0 / eDirectory 8.7 - HTTPSTK.NLM Remote Abend | This is a dos exploit for novell platform. Description: Novell Netware 6.0 / eDirectory 8.7 - HTTPSTK.NLM Remote Abend. Author: Cheese Head |
Analyze the security implications of: Novell Netware 6.0 / eDirectory 8.7 - HTTPSTK.NLM Remote Abend | This exploit targets novell systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: HTML::BBCode 1.03/1.04 - HTML Injection | This is a webapps exploit for php platform. Description: HTML::BBCode 1.03/1.04 - HTML Injection. Author: Aliaksandr Hartsuyeu |
Analyze the security implications of: HTML::BBCode 1.03/1.04 - HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Esoftpro Online Guestbook Pro - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Esoftpro Online Guestbook Pro - Multiple Vulnerabilities. Author: L0rd CrusAd3r |
Analyze the security implications of: Esoftpro Online Guestbook Pro - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sun Java System Identity Manager 6.0/7.0/7.1 - '/idm/help/index.jsp?helpUrl' Remote Frame Injection | This is a webapps exploit for jsp platform. Description: Sun Java System Identity Manager 6.0/7.0/7.1 - '/idm/help/index.jsp?helpUrl' Remote Frame Injection. Author: Jan Fry & Adrian Pastor |
Analyze the security implications of: Sun Java System Identity Manager 6.0/7.0/7.1 - '/idm/help/index.jsp?helpUrl' Remote Frame Injection | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Command School Student Management System - '/sw/add_topic.php' Cross-Site Request Forgery (Topic Creation) | This is a webapps exploit for php platform. Description: Command School Student Management System - '/sw/add_topic.php' Cross-Site Request Forgery (Topic Creation). Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Command School Student Management System - '/sw/add_topic.php' Cross-Site Request Forgery (Topic Creation) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JaWiki - 'versionNo' Cross-Site Scripting | This is a webapps exploit for java platform. Description: JaWiki - 'versionNo' Cross-Site Scripting. Author: sonyy |
Analyze the security implications of: JaWiki - 'versionNo' Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: SonicWall NSA 6600/5600/4600/3600/2600/250M - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: SonicWall NSA 6600/5600/4600/3600/2600/250M - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: SonicWall NSA 6600/5600/4600/3600/2600/250M - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AnnonceScriptHP 2.0 - 'membre.dwt.php?email' Cross-Site Scripting | This is a webapps exploit for php platform. Description: AnnonceScriptHP 2.0 - 'membre.dwt.php?email' Cross-Site Scripting. Author: Mr_KaLiMaN |
Analyze the security implications of: AnnonceScriptHP 2.0 - 'membre.dwt.php?email' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Snort 2.6.1.1/2.6.1.2/2.7.0 - 'fragementation' Remote Denial of Service | This is a dos exploit for multiple platform. Description: Snort 2.6.1.1/2.6.1.2/2.7.0 - 'fragementation' Remote Denial of Service. Author: Antimatt3r |
Analyze the security implications of: Snort 2.6.1.1/2.6.1.2/2.7.0 - 'fragementation' Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Viscosity - Local Privilege Escalation | This is a local exploit for osx platform. Description: Viscosity - Local Privilege Escalation. Author: zx2c4 |
Analyze the security implications of: Viscosity - Local Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: vm2 - sandbox escape | This is a local exploit for multiple platform. Description: vm2 - sandbox escape. Author: Calil Khalil |
Analyze the security implications of: vm2 - sandbox escape | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Rapid Classified 3.1 - 'reply.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Rapid Classified 3.1 - 'reply.asp' Cross-Site Scripting. Author: laurent gaffie |
Analyze the security implications of: Rapid Classified 3.1 - 'reply.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Navetti PricePoint 4.6.0.0 - SQL Injection / Cross-Site Scripting / Cross-Site Request Forgery | This is a webapps exploit for multiple platform. Description: Navetti PricePoint 4.6.0.0 - SQL Injection / Cross-Site Scripting / Cross-Site Request Forgery. Author: SEC Consult |
Analyze the security implications of: Navetti PricePoint 4.6.0.0 - SQL Injection / Cross-Site Scripting / Cross-Site Request Forgery | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Yasr Screen Reader 0.6.9 - Local Buffer Overflow | This is a local exploit for linux platform. Description: Yasr Screen Reader 0.6.9 - Local Buffer Overflow. Author: Juan Sacco |
Analyze the security implications of: Yasr Screen Reader 0.6.9 - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ecoCMS 18.4.2010 - 'admin.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: ecoCMS 18.4.2010 - 'admin.php' Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: ecoCMS 18.4.2010 - 'admin.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Blend Portal 1.2.0 - 'phpBB Mod' Remote File Inclusion | This is a webapps exploit for php platform. Description: Blend Portal 1.2.0 - 'phpBB Mod' Remote File Inclusion. Author: nukedx |
Analyze the security implications of: Blend Portal 1.2.0 - 'phpBB Mod' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sony Playstation 4 (PS4) < 7.02 / FreeBSD 9 / FreeBSD 12 - 'ip6_setpktopt' Kernel Local Privilege Escalation (PoC) | This is a local exploit for hardware platform. Description: Sony Playstation 4 (PS4) < 7.02 / FreeBSD 9 / FreeBSD 12 - 'ip6_setpktopt' Kernel Local Privilege Escalation (PoC). Author: TheFloW |
Analyze the security implications of: Sony Playstation 4 (PS4) < 7.02 / FreeBSD 9 / FreeBSD 12 - 'ip6_setpktopt' Kernel Local Privilege Escalation (PoC) | This exploit targets hardware systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: WhatsApp Desktop 0.3.9308 - Persistent Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: WhatsApp Desktop 0.3.9308 - Persistent Cross-Site Scripting. Author: Gal Weizman |
Analyze the security implications of: WhatsApp Desktop 0.3.9308 - Persistent Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: NTOPNG 2.4 Web Interface - Cross-Site Request Forgery | This is a webapps exploit for linux platform. Description: NTOPNG 2.4 Web Interface - Cross-Site Request Forgery. Author: hyp3rlinx |
Analyze the security implications of: NTOPNG 2.4 Web Interface - Cross-Site Request Forgery | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Wireshark 1.0.0 - Multiple Denial of Service Vulnerabilities | This is a dos exploit for multiple platform. Description: Wireshark 1.0.0 - Multiple Denial of Service Vulnerabilities. Author: Noam Rathus |
Analyze the security implications of: Wireshark 1.0.0 - Multiple Denial of Service Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Wireshark - dissect_2008_16_security_4 Stack Buffer Overflow | This is a dos exploit for multiple platform. Description: Wireshark - dissect_2008_16_security_4 Stack Buffer Overflow. Author: Google Security Research |
Analyze the security implications of: Wireshark - dissect_2008_16_security_4 Stack Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: MapInfo Discovery 1.0/1.1 - Administrative Authentication Bypass | This is a webapps exploit for asp platform. Description: MapInfo Discovery 1.0/1.1 - Administrative Authentication Bypass. Author: anonymous |
Analyze the security implications of: MapInfo Discovery 1.0/1.1 - Administrative Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Roundcube 1.6.10 - Remote Code Execution (RCE) | This is a webapps exploit for multiple platform. Description: Roundcube 1.6.10 - Remote Code Execution (RCE). Author: Maksim Rogov |
Analyze the security implications of: Roundcube 1.6.10 - Remote Code Execution (RCE) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: e107 0.7.5 - 'search.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: e107 0.7.5 - 'search.php' Cross-Site Scripting. Author: securityconnection |
Analyze the security implications of: e107 0.7.5 - 'search.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ExtCalendar2 - Cookie Authentication Bypass / Backdoor Upload | This is a webapps exploit for php platform. Description: ExtCalendar2 - Cookie Authentication Bypass / Backdoor Upload. Author: Lagripe-Dz |
Analyze the security implications of: ExtCalendar2 - Cookie Authentication Bypass / Backdoor Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BookmarkX script 2007 - 'topicid' SQL Injection | This is a webapps exploit for php platform. Description: BookmarkX script 2007 - 'topicid' SQL Injection. Author: S@BUN |
Analyze the security implications of: BookmarkX script 2007 - 'topicid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iGeneric iG Shop 1.x - Multiple SQL Injections | This is a webapps exploit for php platform. Description: iGeneric iG Shop 1.x - Multiple SQL Injections. Author: John Cobb |
Analyze the security implications of: iGeneric iG Shop 1.x - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bloggeruniverse 2.0 Beta - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Bloggeruniverse 2.0 Beta - 'id' SQL Injection. Author: Osirys |
Analyze the security implications of: Bloggeruniverse 2.0 Beta - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CPGNuke Dragonfly 9.0.6.1 - Remote Command Execution | This is a webapps exploit for php platform. Description: CPGNuke Dragonfly 9.0.6.1 - Remote Command Execution. Author: rgod |
Analyze the security implications of: CPGNuke Dragonfly 9.0.6.1 - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Omnia MPX 1.5.0+r1 - Path Traversal | This is a remote exploit for hardware platform. Description: Omnia MPX 1.5.0+r1 - Path Traversal. Author: Momen Eldawakhly |
Analyze the security implications of: Omnia MPX 1.5.0+r1 - Path Traversal | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FS Shutter Stock Clone - 'keywords' SQL Injection | This is a webapps exploit for php platform. Description: FS Shutter Stock Clone - 'keywords' SQL Injection. Author: 8bitsec |
Analyze the security implications of: FS Shutter Stock Clone - 'keywords' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wimpy MP3 Player 5 - Text File Overwrite | This is a remote exploit for linux platform. Description: Wimpy MP3 Player 5 - Text File Overwrite. Author: ReZEN |
Analyze the security implications of: Wimpy MP3 Player 5 - Text File Overwrite | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BosDates 4.0 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: BosDates 4.0 - Multiple SQL Injections. Author: r0t |
Analyze the security implications of: BosDates 4.0 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HR Assist 1.05 - 'vdateUsr.asp' Remote Authentication Bypass | This is a webapps exploit for asp platform. Description: HR Assist 1.05 - 'vdateUsr.asp' Remote Authentication Bypass. Author: ajann |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.