input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Linksys WRT54G Firmware 1.00.9 - Security Bypass (2) | This is a remote exploit for hardware platform. Description: Linksys WRT54G Firmware 1.00.9 - Security Bypass (2). Author: meathive |
Analyze the security implications of: Linksys WRT54G Firmware 1.00.9 - Security Bypass (2) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Yealink VoIP Phone SIP-T38G - Local File Inclusion | This is a webapps exploit for hardware platform. Description: Yealink VoIP Phone SIP-T38G - Local File Inclusion. Author: Mr.Un1k0d3r |
Analyze the security implications of: Yealink VoIP Phone SIP-T38G - Local File Inclusion | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Innovate Portal 2.0 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Innovate Portal 2.0 - 'index.php' Cross-Site Scripting. Author: meto5757 |
Analyze the security implications of: Innovate Portal 2.0 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Component Ahsshop 1.51 - 'vara' SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component Ahsshop 1.51 - 'vara' SQL Injection. Author: S@BUN |
Analyze the security implications of: Mambo Component Ahsshop 1.51 - 'vara' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Appointment 1.5 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Appointment 1.5 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Appointment 1.5 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM AIX 5.3 - 'GetShell' / 'GetCommand' File Enumeration | This is a local exploit for aix platform. Description: IBM AIX 5.3 - 'GetShell' / 'GetCommand' File Enumeration. Author: xfocus |
Analyze the security implications of: IBM AIX 5.3 - 'GetShell' / 'GetCommand' File Enumeration | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Feindt Computerservice News 2.0 - 'newsadmin.php?action' Remote File Inclusion | This is a webapps exploit for php platform. Description: Feindt Computerservice News 2.0 - 'newsadmin.php?action' Remote File Inclusion. Author: Mogatil |
Analyze the security implications of: Feindt Computerservice News 2.0 - 'newsadmin.php?action' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ImageVue 2.0 - Remote Admin Login | This is a webapps exploit for multiple platform. Description: ImageVue 2.0 - Remote Admin Login. Author: Sora |
Analyze the security implications of: ImageVue 2.0 - Remote Admin Login | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BlackBoard Products 6 - Multiple HTML Injection Vulnerabilities | This is a webapps exploit for php platform. Description: BlackBoard Products 6 - Multiple HTML Injection Vulnerabilities. Author: proton |
Analyze the security implications of: BlackBoard Products 6 - Multiple HTML Injection Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fortinet FortiGate FortiOS < 6.0.3 - LDAP Credential Disclosure | This is a webapps exploit for hardware platform. Description: Fortinet FortiGate FortiOS < 6.0.3 - LDAP Credential Disclosure. Author: Julio Ureña |
Analyze the security implications of: Fortinet FortiGate FortiOS < 6.0.3 - LDAP Credential Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CMScontrol 7.x - Arbitrary File Upload | This is a webapps exploit for php platform. Description: CMScontrol 7.x - Arbitrary File Upload. Author: Cyber_945 |
Analyze the security implications of: CMScontrol 7.x - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Absolute News Feed 1.0 - Remote Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Absolute News Feed 1.0 - Remote Insecure Cookie Handling. Author: Hakxer |
Analyze the security implications of: Absolute News Feed 1.0 - Remote Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AzDGDatingLite 2.1.1 - 'view.php?id' Cross-Site Scripting | This is a webapps exploit for php platform. Description: AzDGDatingLite 2.1.1 - 'view.php?id' Cross-Site Scripting. Author: Janek Vind |
Analyze the security implications of: AzDGDatingLite 2.1.1 - 'view.php?id' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM AIX 4.2.1 - '/usr/bin/portmir' Local Buffer Overflow / Insecure Temporary File Creation | This is a local exploit for aix platform. Description: IBM AIX 4.2.1 - '/usr/bin/portmir' Local Buffer Overflow / Insecure Temporary File Creation. Author: BM ERS Team |
Analyze the security implications of: IBM AIX 4.2.1 - '/usr/bin/portmir' Local Buffer Overflow / Insecure Temporary File Creation | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: ac4p Mobile - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: ac4p Mobile - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: AL-garnei |
Analyze the security implications of: ac4p Mobile - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SGI IRIX 6.2 - 'midikeys'/'soundplayer' Local Privilege Escalation | This is a local exploit for irix platform. Description: SGI IRIX 6.2 - 'midikeys'/'soundplayer' Local Privilege Escalation. Author: Loneguard |
Analyze the security implications of: SGI IRIX 6.2 - 'midikeys'/'soundplayer' Local Privilege Escalation | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: LightNEasy sql/no-db 2.2.x - System Configuration Disclosure | This is a webapps exploit for php platform. Description: LightNEasy sql/no-db 2.2.x - System Configuration Disclosure. Author: StAkeR |
Analyze the security implications of: LightNEasy sql/no-db 2.2.x - System Configuration Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Witango Server 5.0.1.061 - Remote Cookie Buffer Overflow | This is a dos exploit for multiple platform. Description: Witango Server 5.0.1.061 - Remote Cookie Buffer Overflow. Author: Next Generation Software |
Analyze the security implications of: Witango Server 5.0.1.061 - Remote Cookie Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Gnome-PTY-Helper UTMP - Hostname Spoofing | This is a local exploit for linux platform. Description: Gnome-PTY-Helper UTMP - Hostname Spoofing. Author: Paul Szabo |
Analyze the security implications of: Gnome-PTY-Helper UTMP - Hostname Spoofing | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Lighthouse Development Squirrelcart 1.5.5 - SQL Injection | This is a webapps exploit for php platform. Description: Lighthouse Development Squirrelcart 1.5.5 - SQL Injection. Author: Diabolic Crab |
Analyze the security implications of: Lighthouse Development Squirrelcart 1.5.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JV2 Folder Gallery 3.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: JV2 Folder Gallery 3.0 - Remote File Inclusion. Author: ThE dE@Th |
Analyze the security implications of: JV2 Folder Gallery 3.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CuteNews 0.88 - 'shownews.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: CuteNews 0.88 - 'shownews.php' Remote File Inclusion. Author: Over_G |
Analyze the security implications of: CuteNews 0.88 - 'shownews.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DMXReady Classified Listings Manager 1.1 - SQL Injection | This is a webapps exploit for asp platform. Description: DMXReady Classified Listings Manager 1.1 - SQL Injection. Author: ajann |
Analyze the security implications of: DMXReady Classified Listings Manager 1.1 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Verilink NetEngine 6100-4 Broadband Router - TFTP Packet Remote Denial of Service | This is a dos exploit for hardware platform. Description: Verilink NetEngine 6100-4 Broadband Router - TFTP Packet Remote Denial of Service. Author: Lorenzo Cerulli & Fabio Annunziato |
Analyze the security implications of: Verilink NetEngine 6100-4 Broadband Router - TFTP Packet Remote Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PLANET VDR-300NU ADSL Router - DNS Change | This is a webapps exploit for cgi platform. Description: PLANET VDR-300NU ADSL Router - DNS Change. Author: Todor Donev |
Analyze the security implications of: PLANET VDR-300NU ADSL Router - DNS Change | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Chinput 3.0 - Environment Variable Buffer Overflow | This is a local exploit for linux platform. Description: Chinput 3.0 - Environment Variable Buffer Overflow. Author: xperc |
Analyze the security implications of: Chinput 3.0 - Environment Variable Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: 1st Class Mail Server 4.0 1 - viewmail.tagz Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: 1st Class Mail Server 4.0 1 - viewmail.tagz Cross-Site Scripting. Author: dr_insane |
Analyze the security implications of: 1st Class Mail Server 4.0 1 - viewmail.tagz Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: CampSite 2.6.1 - 'g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: CampSite 2.6.1 - 'g_documentRoot' Remote File Inclusion. Author: Kw3[R]Ln |
Analyze the security implications of: CampSite 2.6.1 - 'g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco Unified Operations Manager 8.5 - Common Services Device Center Cross-Site Scripting | This is a remote exploit for hardware platform. Description: Cisco Unified Operations Manager 8.5 - Common Services Device Center Cross-Site Scripting. Author: Sense of Security |
Analyze the security implications of: Cisco Unified Operations Manager 8.5 - Common Services Device Center Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linksys WAP54Gv3 Wireless Router - 'debug.cgi' Cross-Site Scripting | This is a remote exploit for hardware platform. Description: Linksys WAP54Gv3 Wireless Router - 'debug.cgi' Cross-Site Scripting. Author: Cristofaro Mune |
Analyze the security implications of: Linksys WAP54Gv3 Wireless Router - 'debug.cgi' Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: LG MRA58K - 'ASFParser::SetMetaData' Stack Overflow | This is a dos exploit for android platform. Description: LG MRA58K - 'ASFParser::SetMetaData' Stack Overflow. Author: Google Security Research |
Analyze the security implications of: LG MRA58K - 'ASFParser::SetMetaData' Stack Overflow | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Sitekit CMS 6.6 - 'Default.aspx' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: Sitekit CMS 6.6 - 'Default.aspx' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t3d3Vil |
Analyze the security implications of: Sitekit CMS 6.6 - 'Default.aspx' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Tecnovision DLX Spot - SSH Backdoor Access | This is a remote exploit for multiple platform. Description: Tecnovision DLX Spot - SSH Backdoor Access. Author: Simon Brannstrom |
Analyze the security implications of: Tecnovision DLX Spot - SSH Backdoor Access | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AWStats 6.4 < 6.5 - AllowToUpdateStatsFromBrowser Command Injection (Metasploit) | This is a webapps exploit for cgi platform. Description: AWStats 6.4 < 6.5 - AllowToUpdateStatsFromBrowser Command Injection (Metasploit). Author: patrick |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.