input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Wireless Transfer App 3.7 iOS - Multiple Web Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: FuseTalk 3.2/4.0 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: FuseTalk 3.2/4.0 - Multiple Cross-Site Scripting Vulnerabilities. Author: Juan Manuel Garcia |
Analyze the security implications of: FuseTalk 3.2/4.0 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gnews Publisher - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Gnews Publisher - Multiple SQL Injections. Author: Aria-Security Team |
Analyze the security implications of: Gnews Publisher - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Facil-CMS 0.1RC - Multiple Local File Inclusions | This is a webapps exploit for php platform. Description: Facil-CMS 0.1RC - Multiple Local File Inclusions. Author: CWH Underground |
Analyze the security implications of: Facil-CMS 0.1RC - Multiple Local File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: tar-fs 3.0.0 - Arbitrary File Write/Overwrite | This is a local exploit for linux platform. Description: tar-fs 3.0.0 - Arbitrary File Write/Overwrite. Author: cybersploit |
Analyze the security implications of: tar-fs 3.0.0 - Arbitrary File Write/Overwrite | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Rowhammer - NaCl Sandbox Escape | This is a local exploit for linux_x86-64 platform. Description: Rowhammer - NaCl Sandbox Escape. Author: Google Security Research |
Analyze the security implications of: Rowhammer - NaCl Sandbox Escape | This exploit targets linux_x86-64 systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux_x86-64 platform |
What is this exploit about: Blog:CMS 4.1.3 - 'list.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Blog:CMS 4.1.3 - 'list.php' Cross-Site Scripting. Author: Katatafish |
Analyze the security implications of: Blog:CMS 4.1.3 - 'list.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Liferay XSL - Command Execution (Metasploit) | This is a webapps exploit for multiple platform. Description: Liferay XSL - Command Execution (Metasploit). Author: Spencer McIntyre |
Analyze the security implications of: Liferay XSL - Command Execution (Metasploit) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Box UK Amaxus CMS 3.0 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Box UK Amaxus CMS 3.0 - Cross-Site Scripting. Author: r0t3d3Vil |
Analyze the security implications of: Box UK Amaxus CMS 3.0 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link Devices - Unauthenticated Remote Command Execution in ssdpcgi (Metasploit) | This is a remote exploit for linux_mips platform. Description: D-Link Devices - Unauthenticated Remote Command Execution in ssdpcgi (Metasploit). Author: Metasploit |
Analyze the security implications of: D-Link Devices - Unauthenticated Remote Command Execution in ssdpcgi (Metasploit) | This exploit targets linux_mips systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux_mips platform |
What is this exploit about: IBM Aspera Faspex 4.4.1 - YAML deserialization (RCE) | This is a remote exploit for multiple platform. Description: IBM Aspera Faspex 4.4.1 - YAML deserialization (RCE). Author: Maurice Lambert |
Analyze the security implications of: IBM Aspera Faspex 4.4.1 - YAML deserialization (RCE) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PortalApp 3.3/4.0 - 'login.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: PortalApp 3.3/4.0 - 'login.asp' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: PortalApp 3.3/4.0 - 'login.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: IT!CMS 0.2 - 'lang-en.php?wndtitle' Cross-Site Scripting | This is a webapps exploit for php platform. Description: IT!CMS 0.2 - 'lang-en.php?wndtitle' Cross-Site Scripting. Author: Aria-Security Team |
Analyze the security implications of: IT!CMS 0.2 - 'lang-en.php?wndtitle' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CubeCart 5.2.0 - 'cubecart.class.php' PHP Object Injection | This is a webapps exploit for php platform. Description: CubeCart 5.2.0 - 'cubecart.class.php' PHP Object Injection. Author: EgiX |
Analyze the security implications of: CubeCart 5.2.0 - 'cubecart.class.php' PHP Object Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_clan_members - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_clan_members - 'id' SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_clan_members - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CuteNews 1.1.1 - 'html.php' Remote Code Execution | This is a webapps exploit for php platform. Description: CuteNews 1.1.1 - 'html.php' Remote Code Execution. Author: Eugene Minaev |
Analyze the security implications of: CuteNews 1.1.1 - 'html.php' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Asterisk 1.4.x - RTP Codec Payload Handling Multiple Buffer Overflow Vulnerabilities | This is a dos exploit for linux platform. Description: Asterisk 1.4.x - RTP Codec Payload Handling Multiple Buffer Overflow Vulnerabilities. Author: Mu Security research |
Analyze the security implications of: Asterisk 1.4.x - RTP Codec Payload Handling Multiple Buffer Overflow Vulnerabilities | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Netgear DGN2200v1/v2/v3/v4 - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Netgear DGN2200v1/v2/v3/v4 - Cross-Site Request Forgery. Author: SivertPL |
Analyze the security implications of: Netgear DGN2200v1/v2/v3/v4 - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: B2B Classic Trading Script - 'offers.php' SQL Injection | This is a webapps exploit for php platform. Description: B2B Classic Trading Script - 'offers.php' SQL Injection. Author: v3n0m |
Analyze the security implications of: B2B Classic Trading Script - 'offers.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wireshark - dissect_diameter_base_framed_ipv6_prefix Stack Buffer Overflow | This is a dos exploit for multiple platform. Description: Wireshark - dissect_diameter_base_framed_ipv6_prefix Stack Buffer Overflow. Author: Google Security Research |
Analyze the security implications of: Wireshark - dissect_diameter_base_framed_ipv6_prefix Stack Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Firepack - '/admin/ref.php' Remote Code Execution | This is a webapps exploit for php platform. Description: Firepack - '/admin/ref.php' Remote Code Execution. Author: Lidloses_Auge |
Analyze the security implications of: Firepack - '/admin/ref.php' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Infor Storefront B2B 1.0 - 'usr_name' SQL Injection | This is a webapps exploit for php platform. Description: Infor Storefront B2B 1.0 - 'usr_name' SQL Injection. Author: ratboy |
Analyze the security implications of: Infor Storefront B2B 1.0 - 'usr_name' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AdaptCMS 2.0.1 - Cross-Site Scripting / Information Disclosure | This is a webapps exploit for php platform. Description: AdaptCMS 2.0.1 - Cross-Site Scripting / Information Disclosure. Author: Stefan Schurtz |
Analyze the security implications of: AdaptCMS 2.0.1 - Cross-Site Scripting / Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zenoss Monitoring System 4.2.5-2108 (x64) - Persistent Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Zenoss Monitoring System 4.2.5-2108 (x64) - Persistent Cross-Site Scripting. Author: Dolev Farhi |
Analyze the security implications of: Zenoss Monitoring System 4.2.5-2108 (x64) - Persistent Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component mod_simpleFileLister 1.0 - Directory Traversal | This is a webapps exploit for php platform. Description: Joomla! Component mod_simpleFileLister 1.0 - Directory Traversal. Author: evilsocket |
Analyze the security implications of: Joomla! Component mod_simpleFileLister 1.0 - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JiRo's FAQ Manager eXperience 1.0 - 'fID' SQL Injection | This is a webapps exploit for asp platform. Description: JiRo's FAQ Manager eXperience 1.0 - 'fID' SQL Injection. Author: Zigma |
Analyze the security implications of: JiRo's FAQ Manager eXperience 1.0 - 'fID' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ezUpload 2.2 - 'initialize.php?path' Remote File Inclusion | This is a webapps exploit for php platform. Description: ezUpload 2.2 - 'initialize.php?path' Remote File Inclusion. Author: Johnnie Walker |
Analyze the security implications of: ezUpload 2.2 - 'initialize.php?path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zend Platform 2.2.1 - 'PHP.INI' File Modification | This is a local exploit for php platform. Description: Zend Platform 2.2.1 - 'PHP.INI' File Modification. Author: Stefan Esser |
Analyze the security implications of: Zend Platform 2.2.1 - 'PHP.INI' File Modification | This exploit targets php systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality | This is a webapps exploit for php platform. Description: Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality. Author: Mufaddal Masalawala |
Analyze the security implications of: Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Foxit PDF Reader 1.0.1.0925 - CPDF_DIBSource::TranslateScanline24bpp Out-of-Bounds Read | This is a dos exploit for linux platform. Description: Foxit PDF Reader 1.0.1.0925 - CPDF_DIBSource::TranslateScanline24bpp Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: Foxit PDF Reader 1.0.1.0925 - CPDF_DIBSource::TranslateScanline24bpp Out-of-Bounds Read | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: op5 7.1.9 - Configuration Command Execution (Metasploit) | This is a remote exploit for linux platform. Description: op5 7.1.9 - Configuration Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: op5 7.1.9 - Configuration Command Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_rand - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_rand - SQL Injection. Author: Jagriti Sahu |
Analyze the security implications of: Joomla! Component com_rand - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_br - 'Controller' Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_br - 'Controller' Local File Inclusion. Author: the_cyber_nuxbie |
Analyze the security implications of: Joomla! Component com_br - 'Controller' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeBSD 7.2 - VFS/devfs Race Condition | This is a local exploit for freebsd platform. Description: FreeBSD 7.2 - VFS/devfs Race Condition. Author: Przemyslaw Frasunek |
Analyze the security implications of: FreeBSD 7.2 - VFS/devfs Race Condition | This exploit targets freebsd systems. Type: local. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.