input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Vivisimo Clustering Engine - Search Script Cross-Site Scripting | This is a webapps exploit for java platform. Description: Vivisimo Clustering Engine - Search Script Cross-Site Scripting. Author: ComSec |
Analyze the security implications of: Vivisimo Clustering Engine - Search Script Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: OneWorldStore - 'DisplayResults.asp' SQL Injection | This is a webapps exploit for asp platform. Description: OneWorldStore - 'DisplayResults.asp' SQL Injection. Author: Lostmon |
Analyze the security implications of: OneWorldStore - 'DisplayResults.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Flatnuke 3 - Remote Command Execution / Privilege Escalation | This is a webapps exploit for php platform. Description: Flatnuke 3 - Remote Command Execution / Privilege Escalation. Author: KiNgOfThEwOrLd |
Analyze the security implications of: Flatnuke 3 - Remote Command Execution / Privilege Escalation | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zope 2.x - Incorrect XML-RPC Request Information Disclosure | This is a remote exploit for linux platform. Description: Zope 2.x - Incorrect XML-RPC Request Information Disclosure. Author: Rossen Raykov |
Analyze the security implications of: Zope 2.x - Incorrect XML-RPC Request Information Disclosure | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: S.u.S.E Linux 4.x/5.x/6.x/7.0 / Slackware 3.x/4.0 / Turbolinux 6 / OpenLinux 7.0 - 'fdmount' Local Buffer Overflow (1) | This is a local exploit for linux platform. Description: S.u.S.E Linux 4.x/5.x/6.x/7.0 / Slackware 3.x/4.0 / Turbolinux 6 / OpenLinux 7.0 - 'fdmount' Local Buffer Overflow (1). Author: Paulo Ribeiro |
Analyze the security implications of: S.u.S.E Linux 4.x/5.x/6.x/7.0 / Slackware 3.x/4.0 / Turbolinux 6 / OpenLinux 7.0 - 'fdmount' Local Buffer Overflow (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BGSvetionik BGS CMS - 'search' Cross-Site Scripting | This is a webapps exploit for php platform. Description: BGSvetionik BGS CMS - 'search' Cross-Site Scripting. Author: hacker@sr.gov.yu |
Analyze the security implications of: BGSvetionik BGS CMS - 'search' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ClamAV Milter - Blackhole-Mode Remote Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: ClamAV Milter - Blackhole-Mode Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: ClamAV Milter - Blackhole-Mode Remote Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BOA Web Server 0.94.8.2 - Arbitrary File Access | This is a webapps exploit for linux platform. Description: BOA Web Server 0.94.8.2 - Arbitrary File Access. Author: llmora |
Analyze the security implications of: BOA Web Server 0.94.8.2 - Arbitrary File Access | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: File ELF 4.x - Header Buffer Overflow | This is a remote exploit for linux platform. Description: File ELF 4.x - Header Buffer Overflow. Author: anonymous |
Analyze the security implications of: File ELF 4.x - Header Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: LIOOSYS CMS - 'news.php' SQL Injection | This is a webapps exploit for multiple platform. Description: LIOOSYS CMS - 'news.php' SQL Injection. Author: GlaDiaT0R |
Analyze the security implications of: LIOOSYS CMS - 'news.php' SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Warrior Kings 1.3 And Warrior Kings: Battles 1.23 - Remote Format String | This is a remote exploit for multiple platform. Description: Warrior Kings 1.3 And Warrior Kings: Battles 1.23 - Remote Format String. Author: Luigi Auriemma |
Analyze the security implications of: Warrior Kings 1.3 And Warrior Kings: Battles 1.23 - Remote Format String | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mura CMS < 6.2 - Server-Side Request Forgery / XML External Entity Injection | This is a webapps exploit for cfm platform. Description: Mura CMS < 6.2 - Server-Side Request Forgery / XML External Entity Injection. Author: Anthony Cole |
Analyze the security implications of: Mura CMS < 6.2 - Server-Side Request Forgery / XML External Entity Injection | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: DALIM SOFTWARE ES Core 5.0 build 7184.1 - Directory Traversal | This is a webapps exploit for jsp platform. Description: DALIM SOFTWARE ES Core 5.0 build 7184.1 - Directory Traversal. Author: LiquidWorm |
Analyze the security implications of: DALIM SOFTWARE ES Core 5.0 build 7184.1 - Directory Traversal | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Alibaba Clone 3.0 (Special) - SQL Injection | This is a webapps exploit for php platform. Description: Alibaba Clone 3.0 (Special) - SQL Injection. Author: Easy Laster |
Analyze the security implications of: Alibaba Clone 3.0 (Special) - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cacti 1.2.8 - Authenticated Remote Code Execution | This is a webapps exploit for multiple platform. Description: Cacti 1.2.8 - Authenticated Remote Code Execution. Author: Askar |
Analyze the security implications of: Cacti 1.2.8 - Authenticated Remote Code Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Flatnux 2009-03-27 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Flatnux 2009-03-27 - Multiple Cross-Site Scripting Vulnerabilities. Author: intern0t |
Analyze the security implications of: Flatnux 2009-03-27 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CuteEditor for PHP 6.6 - Directory Traversal | This is a webapps exploit for php platform. Description: CuteEditor for PHP 6.6 - Directory Traversal. Author: Stefan Hesselman |
Analyze the security implications of: CuteEditor for PHP 6.6 - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle 10g - SYS.DBMS_CDC_IMPDP.BUMP_SEQUENCE PL / SQL Injection | This is a local exploit for multiple platform. Description: Oracle 10g - SYS.DBMS_CDC_IMPDP.BUMP_SEQUENCE PL / SQL Injection. Author: Joxean Koret |
Analyze the security implications of: Oracle 10g - SYS.DBMS_CDC_IMPDP.BUMP_SEQUENCE PL / SQL Injection | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Paramiko 2.4.1 - Authentication Bypass | This is a remote exploit for linux platform. Description: Paramiko 2.4.1 - Authentication Bypass. Author: Adam Brown |
Analyze the security implications of: Paramiko 2.4.1 - Authentication Bypass | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache Struts 2.2.1.1 - Remote Command Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Apache Struts 2.2.1.1 - Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Apache Struts 2.2.1.1 - Remote Command Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Secure Web Gateway 10.2.11 - Cross-Site Scripting (XSS) | This is a webapps exploit for multiple platform. Description: Secure Web Gateway 10.2.11 - Cross-Site Scripting (XSS). Author: RedTeam Pentesting GmbH |
Analyze the security implications of: Secure Web Gateway 10.2.11 - Cross-Site Scripting (XSS) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CMSimple_XH 1.7.4 - Remote Code Execution (RCE) (Authenticated) | This is a webapps exploit for php platform. Description: CMSimple_XH 1.7.4 - Remote Code Execution (RCE) (Authenticated). Author: Halit AKAYDIN |
Analyze the security implications of: CMSimple_XH 1.7.4 - Remote Code Execution (RCE) (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flexmonster Pivot Table & Charts 2.7.17 - 'To OLAP' Reflected XSS | This is a webapps exploit for multiple platform. Description: Flexmonster Pivot Table & Charts 2.7.17 - 'To OLAP' Reflected XSS. Author: Marco Nappi |
Analyze the security implications of: Flexmonster Pivot Table & Charts 2.7.17 - 'To OLAP' Reflected XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CARE2X 1.1 - 'ROOT_PATH' Remote File Inclusion | This is a webapps exploit for php platform. Description: CARE2X 1.1 - 'ROOT_PATH' Remote File Inclusion. Author: the_day |
Analyze the security implications of: CARE2X 1.1 - 'ROOT_PATH' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cPanel WebHost Manager (WHM) - '/webmail/x3/mail/clientconf.html?acct' Cross-Site Scripting | This is a webapps exploit for php platform. Description: cPanel WebHost Manager (WHM) - '/webmail/x3/mail/clientconf.html?acct' Cross-Site Scripting. Author: Christy Philip Mathew |
Analyze the security implications of: cPanel WebHost Manager (WHM) - '/webmail/x3/mail/clientconf.html?acct' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Command School Student Management System - '/sw/admin_subjects.php?id' SQL Injection | This is a webapps exploit for php platform. Description: Command School Student Management System - '/sw/admin_subjects.php?id' SQL Injection. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Command School Student Management System - '/sw/admin_subjects.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cPanel - 'dir' Cross-Site Scripting | This is a webapps exploit for php platform. Description: cPanel - 'dir' Cross-Site Scripting. Author: Rafay Baloch |
Analyze the security implications of: cPanel - 'dir' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ELOG 2.5.6 - Remote Shell | This is a remote exploit for multiple platform. Description: ELOG 2.5.6 - Remote Shell. Author: n4rk0tix |
Analyze the security implications of: ELOG 2.5.6 - Remote Shell | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Adobe Flash - Sound.loadPCMFromByteArray Dangling Pointer | This is a dos exploit for multiple platform. Description: Adobe Flash - Sound.loadPCMFromByteArray Dangling Pointer. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Sound.loadPCMFromByteArray Dangling Pointer | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: C.J. Steele Tattle - Remote Command Execution | This is a remote exploit for linux platform. Description: C.J. Steele Tattle - Remote Command Execution. Author: b0iler |
Analyze the security implications of: C.J. Steele Tattle - Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CartWIZ 1.10/1.20 - 'viewcart.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: CartWIZ 1.10/1.20 - 'viewcart.asp' Cross-Site Scripting. Author: Zinho |
Analyze the security implications of: CartWIZ 1.10/1.20 - 'viewcart.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: GetSimple CMS 3.3.1 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: GetSimple CMS 3.3.1 - Cross-Site Scripting. Author: Pedro Ribeiro |
Analyze the security implications of: GetSimple CMS 3.3.1 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KGB 1.87 - Local File Inclusion / Remote Code Execution | This is a webapps exploit for php platform. Description: KGB 1.87 - Local File Inclusion / Remote Code Execution. Author: Kacper |
Analyze the security implications of: KGB 1.87 - Local File Inclusion / Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Splunk 4.1.6 Web Component - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Splunk 4.1.6 Web Component - Remote Denial of Service. Author: Filip Palian |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.