input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: IBM Rational ClearQuest 8.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: IBM Rational ClearQuest 8.0 - Multiple Vulnerabilities. Author: anonymous |
Analyze the security implications of: IBM Rational ClearQuest 8.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Touchbase.io 1.10 - Stored Cross Site Scripting | This is a webapps exploit for multiple platform. Description: Touchbase.io 1.10 - Stored Cross Site Scripting. Author: Simran Sankhala |
Analyze the security implications of: Touchbase.io 1.10 - Stored Cross Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Fortinet FortiWeb (Multiple Appliances) - Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for hardware platform. Description: Fortinet FortiWeb (Multiple Appliances) - Multiple Cross-Site Scripting Vulnerabilities. Author: Benjamin Kunz Mejri |
Analyze the security implications of: Fortinet FortiWeb (Multiple Appliances) - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Tenda ADSL2/2+ Modem D840R - DNS Change | This is a webapps exploit for hardware platform. Description: Tenda ADSL2/2+ Modem D840R - DNS Change. Author: Todor Donev |
Analyze the security implications of: Tenda ADSL2/2+ Modem D840R - DNS Change | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: eBay Magento CE 1.9.2.1 - Unrestricted Cron Script (Code Execution / Denial of Service) | This is a webapps exploit for php platform. Description: eBay Magento CE 1.9.2.1 - Unrestricted Cron Script (Code Execution / Denial of Service). Author: Dawid Golunski |
Analyze the security implications of: eBay Magento CE 1.9.2.1 - Unrestricted Cron Script (Code Execution / Denial of Service) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_include.inc.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_include.inc.php?base_path' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_include.inc.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PLC Wireless Router GPN2.4P21-C-CN - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: PLC Wireless Router GPN2.4P21-C-CN - Cross-Site Request Forgery. Author: Kumar Saurav |
Analyze the security implications of: PLC Wireless Router GPN2.4P21-C-CN - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Barracuda CudaTel 2.6.02.040 - SQL Injection | This is a webapps exploit for hardware platform. Description: Barracuda CudaTel 2.6.02.040 - SQL Injection. Author: Vulnerability-Lab |
Analyze the security implications of: Barracuda CudaTel 2.6.02.040 - SQL Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: htpasswd Apache 1.3.31 - Local Overflow | This is a local exploit for linux platform. Description: htpasswd Apache 1.3.31 - Local Overflow. Author: Luiz Fernando Camargo |
Analyze the security implications of: htpasswd Apache 1.3.31 - Local Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Kerio MailServer 5.0/5.1 Web Mail - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cgi platform. Description: Kerio MailServer 5.0/5.1 Web Mail - Multiple Cross-Site Scripting Vulnerabilities. Author: Abraham Lincoln |
Analyze the security implications of: Kerio MailServer 5.0/5.1 Web Mail - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: FreePBX 2.5.2 - Zap Channel Addition Description Parameter Cross-Site Scripting | This is a webapps exploit for php platform. Description: FreePBX 2.5.2 - Zap Channel Addition Description Parameter Cross-Site Scripting. Author: Global-Evolution |
Analyze the security implications of: FreePBX 2.5.2 - Zap Channel Addition Description Parameter Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SGI IRIX 6.2 - 'fsdump' Local Privilege Escalation | This is a local exploit for irix platform. Description: SGI IRIX 6.2 - 'fsdump' Local Privilege Escalation. Author: Jaechul Choe |
Analyze the security implications of: SGI IRIX 6.2 - 'fsdump' Local Privilege Escalation | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: RPCBind / libtirpc - Denial of Service | This is a dos exploit for linux platform. Description: RPCBind / libtirpc - Denial of Service. Author: Guido Vranken |
Analyze the security implications of: RPCBind / libtirpc - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: jgbbs-3.0beta1 - Database Disclosure | This is a webapps exploit for asp platform. Description: jgbbs-3.0beta1 - Database Disclosure. Author: indoushka |
Analyze the security implications of: jgbbs-3.0beta1 - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apple Safari 1.2 Web Browser - TABLE Status Bar URI Obfuscation | This is a remote exploit for osx platform. Description: Apple Safari 1.2 Web Browser - TABLE Status Bar URI Obfuscation. Author: Gilbert Verdian |
Analyze the security implications of: Apple Safari 1.2 Web Browser - TABLE Status Bar URI Obfuscation | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: 2DayBiz Job Site Script - SQL Injection | This is a webapps exploit for php platform. Description: 2DayBiz Job Site Script - SQL Injection. Author: Sangteamtham |
Analyze the security implications of: 2DayBiz Job Site Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cPanel 11.18.3 - List Directories and Folders Information Disclosure | This is a webapps exploit for php platform. Description: cPanel 11.18.3 - List Directories and Folders Information Disclosure. Author: Linux_Drox |
Analyze the security implications of: cPanel 11.18.3 - List Directories and Folders Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle - SYS.LT.COMPRESSWORKSPACETREE Evil Cursor | This is a local exploit for multiple platform. Description: Oracle - SYS.LT.COMPRESSWORKSPACETREE Evil Cursor. Author: Andrea Purificato |
Analyze the security implications of: Oracle - SYS.LT.COMPRESSWORKSPACETREE Evil Cursor | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FLIR Brickstream 3D+ - RTSP Stream Disclosure | This is a webapps exploit for hardware platform. Description: FLIR Brickstream 3D+ - RTSP Stream Disclosure. Author: LiquidWorm |
Analyze the security implications of: FLIR Brickstream 3D+ - RTSP Stream Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: F-PROT AntiVirus 6.2.1.4252 - Malformed Archive Infinite Loop Denial of Service | This is a dos exploit for multiple platform. Description: F-PROT AntiVirus 6.2.1.4252 - Malformed Archive Infinite Loop Denial of Service. Author: kokanin |
Analyze the security implications of: F-PROT AntiVirus 6.2.1.4252 - Malformed Archive Infinite Loop Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux Kernel 2.6.17 < 2.6.24.1 - 'vmsplice' Local Privilege Escalation (2) | This is a local exploit for linux platform. Description: Linux Kernel 2.6.17 < 2.6.24.1 - 'vmsplice' Local Privilege Escalation (2). Author: qaaz |
Analyze the security implications of: Linux Kernel 2.6.17 < 2.6.24.1 - 'vmsplice' Local Privilege Escalation (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: XFree86 4.2 - 'XLOCALEDIR' Local Buffer Overflow (1) | This is a local exploit for linux platform. Description: XFree86 4.2 - 'XLOCALEDIR' Local Buffer Overflow (1). Author: dcryptr && tarranta |
Analyze the security implications of: XFree86 4.2 - 'XLOCALEDIR' Local Buffer Overflow (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Novell Groupwise 8.0 - Multiple Remote Vulnerabilities | This is a dos exploit for novell platform. Description: Novell Groupwise 8.0 - Multiple Remote Vulnerabilities. Author: Francis Provencher |
Analyze the security implications of: Novell Groupwise 8.0 - Multiple Remote Vulnerabilities | This exploit targets novell systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: Bedder CMS - Blind SQL Injection | This is a webapps exploit for php platform. Description: Bedder CMS - Blind SQL Injection. Author: ^Xecuti0N3r |
Analyze the security implications of: Bedder CMS - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: STUNSHELL (Web Shell) - PHP Remote Code Execution (Metasploit) | This is a remote exploit for php platform. Description: STUNSHELL (Web Shell) - PHP Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: STUNSHELL (Web Shell) - PHP Remote Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ApPHP MicroBlog 1.0.1 - Remote Command Execution | This is a webapps exploit for php platform. Description: ApPHP MicroBlog 1.0.1 - Remote Command Execution. Author: LOTFREE |
Analyze the security implications of: ApPHP MicroBlog 1.0.1 - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_jigsaw - 'Controller' Directory Traversal | This is a webapps exploit for php platform. Description: Joomla! Component com_jigsaw - 'Controller' Directory Traversal. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_jigsaw - 'Controller' Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ultra Electronics 7.2.0.19/7.4.0.7 - Multiple Vulnerabilities | This is a webapps exploit for cgi platform. Description: Ultra Electronics 7.2.0.19/7.4.0.7 - Multiple Vulnerabilities. Author: OSI Security |
Analyze the security implications of: Ultra Electronics 7.2.0.19/7.4.0.7 - Multiple Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Netgear Devices - (Unauthenticated) Remote Command Execution (Metasploit) | This is a remote exploit for hardware platform. Description: Netgear Devices - (Unauthenticated) Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Netgear Devices - (Unauthenticated) Remote Command Execution (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Affiliate Directory - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Affiliate Directory - 'id' SQL Injection. Author: Hussin X |
Analyze the security implications of: Affiliate Directory - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Yaws-Wiki 1.88-1 (Erlang) - Persistent / Reflective Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Yaws-Wiki 1.88-1 (Erlang) - Persistent / Reflective Cross-Site Scripting. Author: Michael Brooks |
Analyze the security implications of: Yaws-Wiki 1.88-1 (Erlang) - Persistent / Reflective Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Halloween Linux 4.0 / RedHat Linux 6.1/6.2 - 'imwheel' (1) | This is a local exploit for linux platform. Description: Halloween Linux 4.0 / RedHat Linux 6.1/6.2 - 'imwheel' (1). Author: funkysh |
Analyze the security implications of: Halloween Linux 4.0 / RedHat Linux 6.1/6.2 - 'imwheel' (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ManageEngine Desktop Central 8.0.0 build < 80293 - Arbitrary File Upload | This is a webapps exploit for jsp platform. Description: ManageEngine Desktop Central 8.0.0 build < 80293 - Arbitrary File Upload. Author: Security-Assessment.com |
Analyze the security implications of: ManageEngine Desktop Central 8.0.0 build < 80293 - Arbitrary File Upload | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Redmine SCM Repository 0.9.x/1.0.x - Arbitrary Command Execution (Metasploit) | This is a webapps exploit for linux platform. Description: Redmine SCM Repository 0.9.x/1.0.x - Arbitrary Command Execution (Metasploit). Author: Metasploit |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.