input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: DynamicPAD 1.02.18 - 'HomeDir' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle VM VirtualBox - 'virtio-net' Guest-to-Host Out-of-Bounds Write | This is a dos exploit for multiple platform. Description: Oracle VM VirtualBox - 'virtio-net' Guest-to-Host Out-of-Bounds Write. Author: Google Security Research |
Analyze the security implications of: Oracle VM VirtualBox - 'virtio-net' Guest-to-Host Out-of-Bounds Write | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Charles Proxy 4.2 - Local Privilege Escalation | This is a local exploit for macos platform. Description: Charles Proxy 4.2 - Local Privilege Escalation. Author: Mark Wadham |
Analyze the security implications of: Charles Proxy 4.2 - Local Privilege Escalation | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: ManageEngine OpManager 11.5 - Multiple Vulnerabilities | This is a webapps exploit for multiple platform. Description: ManageEngine OpManager 11.5 - Multiple Vulnerabilities. Author: xistence |
Analyze the security implications of: ManageEngine OpManager 11.5 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: EditTag 1.2 - 'mkpw.pl?plain' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: EditTag 1.2 - 'mkpw.pl?plain' Cross-Site Scripting. Author: NetJackal |
Analyze the security implications of: EditTag 1.2 - 'mkpw.pl?plain' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: com_webcamxp - Cross-Site Scripting | This is a webapps exploit for php platform. Description: com_webcamxp - Cross-Site Scripting. Author: Pyske |
Analyze the security implications of: com_webcamxp - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 3Com DSL Router 812 1.1.7/1.1.9/2.0 - Administrative Interface Long Request Denial of Service | This is a dos exploit for hardware platform. Description: 3Com DSL Router 812 1.1.7/1.1.9/2.0 - Administrative Interface Long Request Denial of Service. Author: David F.Madrid |
Analyze the security implications of: 3Com DSL Router 812 1.1.7/1.1.9/2.0 - Administrative Interface Long Request Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Gnew 2013.1 - Multiple Vulnerabilities (2) | This is a webapps exploit for php platform. Description: Gnew 2013.1 - Multiple Vulnerabilities (2). Author: High-Tech Bridge SA |
Analyze the security implications of: Gnew 2013.1 - Multiple Vulnerabilities (2) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Safari 3.2.x - XML External Entity Local File Theft | This is a remote exploit for multiple platform. Description: Apple Safari 3.2.x - XML External Entity Local File Theft. Author: Chris Evans |
Analyze the security implications of: Apple Safari 3.2.x - XML External Entity Local File Theft | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_casino - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_casino - SQL Injection. Author: B-HUNT3|2 |
Analyze the security implications of: Joomla! Component com_casino - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Feindura File Manager 1.0(rc) - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Feindura File Manager 1.0(rc) - Arbitrary File Upload. Author: KnocKout |
Analyze the security implications of: Feindura File Manager 1.0(rc) - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ElasticSearch 1.6.0 - Arbitrary File Download | This is a webapps exploit for linux platform. Description: ElasticSearch 1.6.0 - Arbitrary File Download. Author: Pedro Andujar |
Analyze the security implications of: ElasticSearch 1.6.0 - Arbitrary File Download | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: EnterpriseDB Advanced Server 8.2 - Uninitialized Pointer | This is a dos exploit for linux platform. Description: EnterpriseDB Advanced Server 8.2 - Uninitialized Pointer. Author: Joxean Koret |
Analyze the security implications of: EnterpriseDB Advanced Server 8.2 - Uninitialized Pointer | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Vanderbilt IP-Camera CCPW3025-IR / CVMW3025-IR - Local File Disclosure | This is a webapps exploit for cgi platform. Description: Vanderbilt IP-Camera CCPW3025-IR / CVMW3025-IR - Local File Disclosure. Author: Yakir Wizman |
Analyze the security implications of: Vanderbilt IP-Camera CCPW3025-IR / CVMW3025-IR - Local File Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Xerox 4595 - Denial of Service | This is a dos exploit for hardware platform. Description: Xerox 4595 - Denial of Service. Author: chap0 |
Analyze the security implications of: Xerox 4595 - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Horde Help Viewer 3.1 - Remote Command Execution | This is a webapps exploit for php platform. Description: Horde Help Viewer 3.1 - Remote Command Execution. Author: deese |
Analyze the security implications of: Horde Help Viewer 3.1 - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Horde Groupware Webmail Edition 5.2.22 - Remote Code Execution | This is a webapps exploit for php platform. Description: Horde Groupware Webmail Edition 5.2.22 - Remote Code Execution. Author: Andrea Cardaci |
Analyze the security implications of: Horde Groupware Webmail Edition 5.2.22 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Belkin F9K1122v1 1.00.30 - Buffer Overflow (via Cross-Site Request Forgery) | This is a webapps exploit for hardware platform. Description: Belkin F9K1122v1 1.00.30 - Buffer Overflow (via Cross-Site Request Forgery). Author: b1ack0wl |
Analyze the security implications of: Belkin F9K1122v1 1.00.30 - Buffer Overflow (via Cross-Site Request Forgery) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DNET Live-Stats 0.8 - Local File Inclusion | This is a webapps exploit for php platform. Description: DNET Live-Stats 0.8 - Local File Inclusion. Author: blake |
Analyze the security implications of: DNET Live-Stats 0.8 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Chucky A. Ivey N.T. 1.1 - 'index.php' Multiple HTML Injection Vulnerabilities | This is a webapps exploit for php platform. Description: Chucky A. Ivey N.T. 1.1 - 'index.php' Multiple HTML Injection Vulnerabilities. Author: Aliaksandr Hartsuyeu |
Analyze the security implications of: Chucky A. Ivey N.T. 1.1 - 'index.php' Multiple HTML Injection Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AWStats 6.4 - Denial of Service | This is a dos exploit for cgi platform. Description: AWStats 6.4 - Denial of Service. Author: GHC |
Analyze the security implications of: AWStats 6.4 - Denial of Service | This exploit targets cgi systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: GNU Barcode 0.99 - Memory Leak | This is a local exploit for linux platform. Description: GNU Barcode 0.99 - Memory Leak. Author: LiquidWorm |
Analyze the security implications of: GNU Barcode 0.99 - Memory Leak | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Conectiva 4.x/5.x / Debian 2.x / RedHat 6.x / S.u.S.E 6.x/7.0 / Trustix 1.x - rpc.statd Remote Format String (1) | This is a remote exploit for linux platform. Description: Conectiva 4.x/5.x / Debian 2.x / RedHat 6.x / S.u.S.E 6.x/7.0 / Trustix 1.x - rpc.statd Remote Format String (1). Author: drow |
Analyze the security implications of: Conectiva 4.x/5.x / Debian 2.x / RedHat 6.x / S.u.S.E 6.x/7.0 / Trustix 1.x - rpc.statd Remote Format String (1) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: IBM Tivoli Business Systems Manager 3.1 - APWC_Win_Main.jsp Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: IBM Tivoli Business Systems Manager 3.1 - APWC_Win_Main.jsp Cross-Site Scripting. Author: anonymous |
Analyze the security implications of: IBM Tivoli Business Systems Manager 3.1 - APWC_Win_Main.jsp Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Linux Kernel 3.7.10 (Ubuntu 12.10 x64) - 'sock_diag_handlers' Local Privilege Escalation (2) | This is a local exploit for linux_x86-64 platform. Description: Linux Kernel 3.7.10 (Ubuntu 12.10 x64) - 'sock_diag_handlers' Local Privilege Escalation (2). Author: Kacper Szczesniak |
Analyze the security implications of: Linux Kernel 3.7.10 (Ubuntu 12.10 x64) - 'sock_diag_handlers' Local Privilege Escalation (2) | This exploit targets linux_x86-64 systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux_x86-64 platform |
What is this exploit about: Image Gallery with Access Database - 'default.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Image Gallery with Access Database - 'default.asp' Multiple SQL Injections. Author: Aria-Security Team |
Analyze the security implications of: Image Gallery with Access Database - 'default.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ImageVue 1.7 - 'popup.php?path' Cross-Site Scripting | This is a webapps exploit for php platform. Description: ImageVue 1.7 - 'popup.php?path' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: ImageVue 1.7 - 'popup.php?path' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Advanced Page Visit Counter 1.0 - Admin+ Stored Cross-Site Scripting (XSS) (Authenticated) | This is a webapps exploit for php platform. Description: Advanced Page Visit Counter 1.0 - Admin+ Stored Cross-Site Scripting (XSS) (Authenticated). Author: Furkan ÖZER |
Analyze the security implications of: Advanced Page Visit Counter 1.0 - Admin+ Stored Cross-Site Scripting (XSS) (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: VIMESA VHF/FM Transmitter Blue Plus 9.7.1 (doreboot) - Remote Denial Of Service | This is a dos exploit for hardware platform. Description: VIMESA VHF/FM Transmitter Blue Plus 9.7.1 (doreboot) - Remote Denial Of Service. Author: LiquidWorm |
Analyze the security implications of: VIMESA VHF/FM Transmitter Blue Plus 9.7.1 (doreboot) - Remote Denial Of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Dokeos E-Learning System 1.8.5 - Local File Inclusion | This is a webapps exploit for php platform. Description: Dokeos E-Learning System 1.8.5 - Local File Inclusion. Author: DSecRG |
Analyze the security implications of: Dokeos E-Learning System 1.8.5 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lokboard - 'index_4.php' PHP Code Injection | This is a webapps exploit for php platform. Description: Lokboard - 'index_4.php' PHP Code Injection. Author: CWH Underground |
Analyze the security implications of: Lokboard - 'index_4.php' PHP Code Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple iPhone / Apple iPod Touch < 2.0 - Multiple Remote Vulnerabilities | This is a remote exploit for osx platform. Description: Apple iPhone / Apple iPod Touch < 2.0 - Multiple Remote Vulnerabilities. Author: Hiromitsu Takagi |
Analyze the security implications of: Apple iPhone / Apple iPod Touch < 2.0 - Multiple Remote Vulnerabilities | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Linux Kernel 2.6.20 with DCCP Support - Memory Disclosure (1) | This is a local exploit for linux platform. Description: Linux Kernel 2.6.20 with DCCP Support - Memory Disclosure (1). Author: Robert Swiecki |
Analyze the security implications of: Linux Kernel 2.6.20 with DCCP Support - Memory Disclosure (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Family Connections CMS 2.7.1 - 'less.php' Remote Command Execution (Metasploit) | This is a webapps exploit for php platform. Description: Family Connections CMS 2.7.1 - 'less.php' Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Family Connections CMS 2.7.1 - 'less.php' Remote Command Execution (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.