input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: ImpressCMS 1.3.11 - 'bid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RedHat Linux 4.2/5.2/6.0 / S.u.S.E Linux 6.0/6.1 - Cron Buffer Overflow (1) | This is a local exploit for linux platform. Description: RedHat Linux 4.2/5.2/6.0 / S.u.S.E Linux 6.0/6.1 - Cron Buffer Overflow (1). Author: Akke |
Analyze the security implications of: RedHat Linux 4.2/5.2/6.0 / S.u.S.E Linux 6.0/6.1 - Cron Buffer Overflow (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Daily Habit Tracker 1.0 - Stored Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Daily Habit Tracker 1.0 - Stored Cross-Site Scripting (XSS). Author: Yevhenii Butenko |
Analyze the security implications of: Daily Habit Tracker 1.0 - Stored Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: C.P.Sub 4.5 - Authentication Bypass | This is a webapps exploit for php platform. Description: C.P.Sub 4.5 - Authentication Bypass. Author: Chako |
Analyze the security implications of: C.P.Sub 4.5 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GOautodial 4.0 - 'CreateEvent' Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: GOautodial 4.0 - 'CreateEvent' Persistent Cross-Site Scripting. Author: cakes |
Analyze the security implications of: GOautodial 4.0 - 'CreateEvent' Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IceWarp Mail Server < 11.1.1 - Directory Traversal | This is a webapps exploit for php platform. Description: IceWarp Mail Server < 11.1.1 - Directory Traversal. Author: Trustwave's SpiderLabs |
Analyze the security implications of: IceWarp Mail Server < 11.1.1 - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Iatek Knowledge Base - 'content_by_cat.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Iatek Knowledge Base - 'content_by_cat.asp' SQL Injection. Author: xcorpitx |
Analyze the security implications of: Iatek Knowledge Base - 'content_by_cat.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Full - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Full - 'id' SQL Injection. Author: the_cyber_nuxbie |
Analyze the security implications of: Joomla! Component Full - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10.11 - FTS Deep Structure of the FileSystem Buffer Overflow | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.11 - FTS Deep Structure of the FileSystem Buffer Overflow. Author: Maksymilian Arciemowicz |
Analyze the security implications of: Apple Mac OSX 10.11 - FTS Deep Structure of the FileSystem Buffer Overflow | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: WSO2 Identity Server 5.1.0 - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: WSO2 Identity Server 5.1.0 - Multiple Vulnerabilities. Author: hyp3rlinx |
Analyze the security implications of: WSO2 Identity Server 5.1.0 - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Arab Portal 2.0 - 'online.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Arab Portal 2.0 - 'online.php' Cross-Site Scripting. Author: o.y.6 |
Analyze the security implications of: Arab Portal 2.0 - 'online.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_discussions - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_discussions - SQL Injection. Author: Red Security TEAM |
Analyze the security implications of: Joomla! Component com_discussions - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Drupal < 5.1 - Post Comments Remote Command Execution | This is a webapps exploit for php platform. Description: Drupal < 5.1 - Post Comments Remote Command Execution. Author: str0ke |
Analyze the security implications of: Drupal < 5.1 - Post Comments Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bookmark4U 2.0 - '/inc/dbase.php?env[include_prefix]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Bookmark4U 2.0 - '/inc/dbase.php?env[include_prefix]' Remote File Inclusion. Author: SnIpEr_SA |
Analyze the security implications of: Bookmark4U 2.0 - '/inc/dbase.php?env[include_prefix]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Power Board Army System Mod 2.1 - SQL Injection | This is a webapps exploit for php platform. Description: Invision Power Board Army System Mod 2.1 - SQL Injection. Author: fRoGGz |
Analyze the security implications of: Invision Power Board Army System Mod 2.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ektron CMS 8.5.0 - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: Ektron CMS 8.5.0 - Multiple Vulnerabilities. Author: Sense of Security |
Analyze the security implications of: Ektron CMS 8.5.0 - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linux chfn (SuSE 9.3/10) - Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux chfn (SuSE 9.3/10) - Local Privilege Escalation. Author: Hunger |
Analyze the security implications of: Linux chfn (SuSE 9.3/10) - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: portmap 5 Beta - 'Set/Dump' Local Denial of Service | This is a dos exploit for linux platform. Description: portmap 5 Beta - 'Set/Dump' Local Denial of Service. Author: Federico L. Bossi Bonin |
Analyze the security implications of: portmap 5 Beta - 'Set/Dump' Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Netperf 2.6.0 - Stack-Based Buffer Overflow | This is a dos exploit for linux platform. Description: Netperf 2.6.0 - Stack-Based Buffer Overflow. Author: Juan Sacco |
Analyze the security implications of: Netperf 2.6.0 - Stack-Based Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Elastic Path 4.1 - '/manager/getImportFileRedirect.jsp?file' Traversal Arbitrary File Access | This is a webapps exploit for jsp platform. Description: Elastic Path 4.1 - '/manager/getImportFileRedirect.jsp?file' Traversal Arbitrary File Access. Author: Daniel Martin Gomez |
Analyze the security implications of: Elastic Path 4.1 - '/manager/getImportFileRedirect.jsp?file' Traversal Arbitrary File Access | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Kmita FAQ 1.0 - 'search.php?q' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Kmita FAQ 1.0 - 'search.php?q' Cross-Site Scripting. Author: Luny |
Analyze the security implications of: Kmita FAQ 1.0 - 'search.php?q' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BlankOL 1.0 - 'Bol.cgi' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cgi platform. Description: BlankOL 1.0 - 'Bol.cgi' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t |
Analyze the security implications of: BlankOL 1.0 - 'Bol.cgi' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Madwifi - SIOCGIWSCAN Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: Madwifi - SIOCGIWSCAN Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Madwifi - SIOCGIWSCAN Buffer Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_Joomlaub - 'aid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_Joomlaub - 'aid' SQL Injection. Author: 599eme Man |
Analyze the security implications of: Joomla! Component com_Joomlaub - 'aid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Liferay CE < 6.2 CE GA6 - Persistent Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Liferay CE < 6.2 CE GA6 - Persistent Cross-Site Scripting. Author: Fernando Câmara |
Analyze the security implications of: Liferay CE < 6.2 CE GA6 - Persistent Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: EasyPHPCalendar 6.1.5/6.2.x - 'setupSQL.php?serverPath' Remote File Inclusion | This is a webapps exploit for php platform. Description: EasyPHPCalendar 6.1.5/6.2.x - 'setupSQL.php?serverPath' Remote File Inclusion. Author: Albania Security Clan |
Analyze the security implications of: EasyPHPCalendar 6.1.5/6.2.x - 'setupSQL.php?serverPath' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NetBSD 5.1 - 'libc/net' Multiple Stack Buffer Overflows | This is a remote exploit for bsd platform. Description: NetBSD 5.1 - 'libc/net' Multiple Stack Buffer Overflows. Author: Maksymilian Arciemowicz |
Analyze the security implications of: NetBSD 5.1 - 'libc/net' Multiple Stack Buffer Overflows | This exploit targets bsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Copy to WebDAV 1.1 iOS - Multiple Vulnerabilities | This is a webapps exploit for ios platform. Description: Copy to WebDAV 1.1 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Copy to WebDAV 1.1 iOS - Multiple Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Lepide Auditor Suite - 'createdb()' Web Console Database Injection / Remote Code Execution | This is a remote exploit for php platform. Description: Lepide Auditor Suite - 'createdb()' Web Console Database Injection / Remote Code Execution. Author: mr_me |
Analyze the security implications of: Lepide Auditor Suite - 'createdb()' Web Console Database Injection / Remote Code Execution | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Dada Mail Manager 2.6 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Dada Mail Manager 2.6 - Remote File Inclusion. Author: NoGe |
Analyze the security implications of: Joomla! Component Dada Mail Manager 2.6 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eMerge E3 1.00-06 - Unauthenticated Directory Traversal | This is a webapps exploit for hardware platform. Description: eMerge E3 1.00-06 - Unauthenticated Directory Traversal. Author: LiquidWorm |
Analyze the security implications of: eMerge E3 1.00-06 - Unauthenticated Directory Traversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CyberBuild - 'login.asp?sessionid' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: CyberBuild - 'login.asp?sessionid' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: CyberBuild - 'login.asp?sessionid' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: BizDir 05.10 - 'f_srch' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: BizDir 05.10 - 'f_srch' Cross-Site Scripting. Author: Aliaksandr Hartsuyeu |
Analyze the security implications of: BizDir 05.10 - 'f_srch' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Exim 4.43 - 'auth_spa_server()' Remote | This is a remote exploit for linux platform. Description: Exim 4.43 - 'auth_spa_server()' Remote. Author: Yuri Gushin |
Analyze the security implications of: Exim 4.43 - 'auth_spa_server()' Remote | This exploit targets linux systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.