input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Budget Management System 1.0 - 'Budget title' Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Getsimple CMS 2.03 - 'upload-ajax.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: Getsimple CMS 2.03 - 'upload-ajax.php' Arbitrary File Upload. Author: s3rg3770 & Chuzz |
Analyze the security implications of: Getsimple CMS 2.03 - 'upload-ajax.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Exponent CMS 2.0 - 'src' SQL Injection | This is a webapps exploit for php platform. Description: Exponent CMS 2.0 - 'src' SQL Injection. Author: Rob Miller |
Analyze the security implications of: Exponent CMS 2.0 - 'src' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EntryPass N5200 - Credentials Exposure | This is a webapps exploit for hardware platform. Description: EntryPass N5200 - Credentials Exposure. Author: RedTeam Pentesting |
Analyze the security implications of: EntryPass N5200 - Credentials Exposure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apple Mac OSX 10.x - KExtLoad Buffer Overflow | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.x - KExtLoad Buffer Overflow. Author: Adriel T. Desautels |
Analyze the security implications of: Apple Mac OSX 10.x - KExtLoad Buffer Overflow | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Monica 2.19.1 - 'last_name' Stored XSS | This is a webapps exploit for multiple platform. Description: Monica 2.19.1 - 'last_name' Stored XSS. Author: BouSalman |
Analyze the security implications of: Monica 2.19.1 - 'last_name' Stored XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_collector - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component com_collector - Arbitrary File Upload. Author: Red Dragon_al |
Analyze the security implications of: Joomla! Component com_collector - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_local_rules.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_local_rules.php?base_path' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_local_rules.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Command School Student Management System - '/sw/admin_sgrades.php?id' SQL Injection | This is a webapps exploit for php platform. Description: Command School Student Management System - '/sw/admin_sgrades.php?id' SQL Injection. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Command School Student Management System - '/sw/admin_sgrades.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Xerox WorkCentre (Multiple Models) - Denial of Service | This is a dos exploit for hardware platform. Description: Xerox WorkCentre (Multiple Models) - Denial of Service. Author: Henri Lindberg |
Analyze the security implications of: Xerox WorkCentre (Multiple Models) - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apache ActiveMQ 6.1.6 - Denial of Service (DOS) | This is a remote exploit for multiple platform. Description: Apache ActiveMQ 6.1.6 - Denial of Service (DOS). Author: Abdualhadi khalifa |
Analyze the security implications of: Apache ActiveMQ 6.1.6 - Denial of Service (DOS) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Xine-Lib 0.99 - Remote Buffer Overflow | This is a dos exploit for linux platform. Description: Xine-Lib 0.99 - Remote Buffer Overflow. Author: c0ntex |
Analyze the security implications of: Xine-Lib 0.99 - Remote Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Malleo 1.2.3 - 'admin.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Malleo 1.2.3 - 'admin.php' Local File Inclusion. Author: Drosophila |
Analyze the security implications of: Malleo 1.2.3 - 'admin.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alienvault Open Source SIEM (OSSIM) 3.1 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Alienvault Open Source SIEM (OSSIM) 3.1 - Multiple Vulnerabilities. Author: Stefan Schurtz |
Analyze the security implications of: Alienvault Open Source SIEM (OSSIM) 3.1 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eNdonesia 8.3 - Search Form Cross-Site Scripting | This is a webapps exploit for php platform. Description: eNdonesia 8.3 - Search Form Cross-Site Scripting. Author: Ahmad Muammar |
Analyze the security implications of: eNdonesia 8.3 - Search Form Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_jeemasms 3.2 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component com_jeemasms 3.2 - Multiple Vulnerabilities. Author: Chris Russell |
Analyze the security implications of: Joomla! Component com_jeemasms 3.2 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10.x - KExtLoad Format String | This is a local exploit for osx platform. Description: Apple Mac OSX 10.x - KExtLoad Format String. Author: Adriel T. Desautels |
Analyze the security implications of: Apple Mac OSX 10.x - KExtLoad Format String | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Joomla! Component JVideoClip 1.5.1 - 'uid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JVideoClip 1.5.1 - 'uid' SQL Injection. Author: SixP4ck3r |
Analyze the security implications of: Joomla! Component JVideoClip 1.5.1 - 'uid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10.4.8 - ImageIO GIF Image Integer Overflow | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.4.8 - ImageIO GIF Image Integer Overflow. Author: Tom Ferris |
Analyze the security implications of: Apple Mac OSX 10.4.8 - ImageIO GIF Image Integer Overflow | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Broadcom Wi-Fi SoC - TDLS Teardown Request Remote Heap Overflow | This is a remote exploit for hardware platform. Description: Broadcom Wi-Fi SoC - TDLS Teardown Request Remote Heap Overflow. Author: Google Security Research |
Analyze the security implications of: Broadcom Wi-Fi SoC - TDLS Teardown Request Remote Heap Overflow | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DodosMail 2.0.1 - 'dodosmail.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: DodosMail 2.0.1 - 'dodosmail.php' Remote File Inclusion. Author: Cold Zero |
Analyze the security implications of: DodosMail 2.0.1 - 'dodosmail.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Interscan Web Security 5.0 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Interscan Web Security 5.0 - Persistent Cross-Site Scripting. Author: Ivan Huertas |
Analyze the security implications of: Interscan Web Security 5.0 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Inter7 vpopmail (vchkpw) 3.4.11 - Local Buffer Overflow | This is a local exploit for linux platform. Description: Inter7 vpopmail (vchkpw) 3.4.11 - Local Buffer Overflow. Author: K2 |
Analyze the security implications of: Inter7 vpopmail (vchkpw) 3.4.11 - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Unrar 3.9.3 - Local Stack Overflow | This is a local exploit for linux platform. Description: Unrar 3.9.3 - Local Stack Overflow. Author: ZadYree |
Analyze the security implications of: Unrar 3.9.3 - Local Stack Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Horde IMP Webmail 4.0.4 Client - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: Horde IMP Webmail 4.0.4 Client - Multiple Input Validation Vulnerabilities. Author: Immerda Project Group |
Analyze the security implications of: Horde IMP Webmail 4.0.4 Client - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Expat 2.0.1 - UTF-8 Character XML Parsing Remote Denial of Service | This is a dos exploit for linux platform. Description: Expat 2.0.1 - UTF-8 Character XML Parsing Remote Denial of Service. Author: Peter Valchev |
Analyze the security implications of: Expat 2.0.1 - UTF-8 Character XML Parsing Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Nessus 2.0.x - LibNASL Arbitrary Code Execution | This is a dos exploit for multiple platform. Description: Nessus 2.0.x - LibNASL Arbitrary Code Execution. Author: Sir Mordred |
Analyze the security implications of: Nessus 2.0.x - LibNASL Arbitrary Code Execution | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: WSMP3 0.0.1/0.0.2 - Remote Heap Corruption (2) | This is a remote exploit for linux platform. Description: WSMP3 0.0.1/0.0.2 - Remote Heap Corruption (2). Author: Xpl017Elz |
Analyze the security implications of: WSMP3 0.0.1/0.0.2 - Remote Heap Corruption (2) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SOYAL Biometric Access Control System 5.0 - Master Code Disclosure | This is a webapps exploit for hardware platform. Description: SOYAL Biometric Access Control System 5.0 - Master Code Disclosure. Author: LiquidWorm |
Analyze the security implications of: SOYAL Biometric Access Control System 5.0 - Master Code Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: TP-Link WR740N/WR740ND - Multiple Cross-Site Request Forgery Vulnerabilities | This is a webapps exploit for hardware platform. Description: TP-Link WR740N/WR740ND - Multiple Cross-Site Request Forgery Vulnerabilities. Author: Samandeep Singh |
Analyze the security implications of: TP-Link WR740N/WR740ND - Multiple Cross-Site Request Forgery Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FiberHome VDSL2 Modem HG 150-UB - Authentication Bypass | This is a webapps exploit for hardware platform. Description: FiberHome VDSL2 Modem HG 150-UB - Authentication Bypass. Author: Noman Riffat |
Analyze the security implications of: FiberHome VDSL2 Modem HG 150-UB - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: IceWarp Web Mail 5.5.1 - 'calendar_d.html?createdataCX' Cross-Site Scripting | This is a webapps exploit for php platform. Description: IceWarp Web Mail 5.5.1 - 'calendar_d.html?createdataCX' Cross-Site Scripting. Author: ss_contacts |
Analyze the security implications of: IceWarp Web Mail 5.5.1 - 'calendar_d.html?createdataCX' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Private Photo+Video 1.1 Pro iOS - Persistent | This is a webapps exploit for ios platform. Description: Private Photo+Video 1.1 Pro iOS - Persistent. Author: Vulnerability-Lab |
Analyze the security implications of: Private Photo+Video 1.1 Pro iOS - Persistent | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Chris LaPointe Download Center 1.2 - 'search' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Chris LaPointe Download Center 1.2 - 'search' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: Chris LaPointe Download Center 1.2 - 'search' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.