input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: APC ActionApps CMS 2.8.1 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 11in1 CMS 1.2.1 - Cross-Site Request Forgery (Admin Password) | This is a webapps exploit for php platform. Description: 11in1 CMS 1.2.1 - Cross-Site Request Forgery (Admin Password). Author: High-Tech Bridge SA |
Analyze the security implications of: 11in1 CMS 1.2.1 - Cross-Site Request Forgery (Admin Password) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Forma LMS 2.3 - 'First & Last Name' Stored Cross-Site Scripting | This is a webapps exploit for php platform. Description: Forma LMS 2.3 - 'First & Last Name' Stored Cross-Site Scripting. Author: Hemant Patidar |
Analyze the security implications of: Forma LMS 2.3 - 'First & Last Name' Stored Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Integria IMS 5.0.83 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Integria IMS 5.0.83 - Cross-Site Request Forgery. Author: Javier Olmedo |
Analyze the security implications of: Integria IMS 5.0.83 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_oziogallery2 / IMAGIN - Arbitrary File Write | This is a webapps exploit for php platform. Description: Joomla! Component com_oziogallery2 / IMAGIN - Arbitrary File Write. Author: Ubik & er |
Analyze the security implications of: Joomla! Component com_oziogallery2 / IMAGIN - Arbitrary File Write | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SpeedStream 5200 - Authentication Bypass Configuration Download | This is a remote exploit for hardware platform. Description: SpeedStream 5200 - Authentication Bypass Configuration Download. Author: hkm |
Analyze the security implications of: SpeedStream 5200 - Authentication Bypass Configuration Download | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Alienvault Open Source SIEM (OSSIM) 4.6.1 - (Authenticated) SQL Injection (Metasploit) | This is a webapps exploit for php platform. Description: Alienvault Open Source SIEM (OSSIM) 4.6.1 - (Authenticated) SQL Injection (Metasploit). Author: Chris Hebert |
Analyze the security implications of: Alienvault Open Source SIEM (OSSIM) 4.6.1 - (Authenticated) SQL Injection (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DVBBS 7.1 - 'ShowErr.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: DVBBS 7.1 - 'ShowErr.asp' Cross-Site Scripting. Author: rUnViRuS |
Analyze the security implications of: DVBBS 7.1 - 'ShowErr.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Woodstock 4.2 404 - Error Page Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Woodstock 4.2 404 - Error Page Cross-Site Scripting. Author: DSecRG |
Analyze the security implications of: Woodstock 4.2 404 - Error Page Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple Mac OSX - Panther Internet Connect Privilege Escalation | This is a local exploit for osx platform. Description: Apple Mac OSX - Panther Internet Connect Privilege Escalation. Author: B-r00t |
Analyze the security implications of: Apple Mac OSX - Panther Internet Connect Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: E-Gold Game Series: Pirates of The Caribbean - Multiple SQL Injections | This is a webapps exploit for php platform. Description: E-Gold Game Series: Pirates of The Caribbean - Multiple SQL Injections. Author: Moudi |
Analyze the security implications of: E-Gold Game Series: Pirates of The Caribbean - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NUUO NVRMini 2 3.9.1 - 'sscanf' Stack Overflow | This is a remote exploit for hardware platform. Description: NUUO NVRMini 2 3.9.1 - 'sscanf' Stack Overflow. Author: @0x00string |
Analyze the security implications of: NUUO NVRMini 2 3.9.1 - 'sscanf' Stack Overflow | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CoreHTTP 0.5.3.1 - 'CGI' Arbitrary Command Execution | This is a remote exploit for linux platform. Description: CoreHTTP 0.5.3.1 - 'CGI' Arbitrary Command Execution. Author: Aaron Conole |
Analyze the security implications of: CoreHTTP 0.5.3.1 - 'CGI' Arbitrary Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AWStats 6.5 - 'migrate' Remote Shell Command Injection | This is a webapps exploit for cgi platform. Description: AWStats 6.5 - 'migrate' Remote Shell Command Injection. Author: redsand |
Analyze the security implications of: AWStats 6.5 - 'migrate' Remote Shell Command Injection | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: 2WIRE DSL Router - 'xslt' Denial of Service | This is a dos exploit for hardware platform. Description: 2WIRE DSL Router - 'xslt' Denial of Service. Author: hkm |
Analyze the security implications of: 2WIRE DSL Router - 'xslt' Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DCP-Portal 6.1.x - 'root' Remote File Inclusion | This is a webapps exploit for php platform. Description: DCP-Portal 6.1.x - 'root' Remote File Inclusion. Author: Federico Fazzi |
Analyze the security implications of: DCP-Portal 6.1.x - 'root' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link - Captcha Bypass | This is a remote exploit for hardware platform. Description: D-Link - Captcha Bypass. Author: SourceSec Dev Team |
Analyze the security implications of: D-Link - Captcha Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linux Kernel 2.6.22 < 3.9 - 'Dirty COW /proc/self/mem' Race Condition Privilege Escalation (/etc/passwd Method) | This is a local exploit for linux platform. Description: Linux Kernel 2.6.22 < 3.9 - 'Dirty COW /proc/self/mem' Race Condition Privilege Escalation (/etc/passwd Method). Author: Gabriele Bonacini |
Analyze the security implications of: Linux Kernel 2.6.22 < 3.9 - 'Dirty COW /proc/self/mem' Race Condition Privilege Escalation (/etc/passwd Method) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Ocean12 (Multiple Products) - 'Admin_ID' SQL Injection | This is a webapps exploit for asp platform. Description: Ocean12 (Multiple Products) - 'Admin_ID' SQL Injection. Author: Charalambous Glafkos |
Analyze the security implications of: Ocean12 (Multiple Products) - 'Admin_ID' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Xplico - Remote Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: Xplico - Remote Code Execution (Metasploit). Author: Mehmet Ince |
Analyze the security implications of: Xplico - Remote Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WebKit JSC - 'JSObject::ensureLength' ensureLengthSlow Check Failure | This is a dos exploit for linux platform. Description: WebKit JSC - 'JSObject::ensureLength' ensureLengthSlow Check Failure. Author: Google Security Research |
Analyze the security implications of: WebKit JSC - 'JSObject::ensureLength' ensureLengthSlow Check Failure | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cisco RV110W/RV130(W)/RV215W Routers Management Interface - Remote Command Execution (Metasploit) | This is a remote exploit for hardware platform. Description: Cisco RV110W/RV130(W)/RV215W Routers Management Interface - Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Cisco RV110W/RV130(W)/RV215W Routers Management Interface - Remote Command Execution (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: IPUX Cube Type CS303C IP Camera - 'UltraMJCamX.ocx' ActiveX Stack Buffer Overflow | This is a remote exploit for hardware platform. Description: IPUX Cube Type CS303C IP Camera - 'UltraMJCamX.ocx' ActiveX Stack Buffer Overflow. Author: LiquidWorm |
Analyze the security implications of: IPUX Cube Type CS303C IP Camera - 'UltraMJCamX.ocx' ActiveX Stack Buffer Overflow | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Bonza Digital Cart Script - SQL Injection | This is a webapps exploit for php platform. Description: Bonza Digital Cart Script - SQL Injection. Author: Eyup CELIK |
Analyze the security implications of: Bonza Digital Cart Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MikroTik RouterOS - sshd (ROSSSH) Remote Heap Corruption | This is a remote exploit for hardware platform. Description: MikroTik RouterOS - sshd (ROSSSH) Remote Heap Corruption. Author: kingcope |
Analyze the security implications of: MikroTik RouterOS - sshd (ROSSSH) Remote Heap Corruption | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: D-Link DAP-1150 1.2.94 - Cross-Site Request Forgery | This is a remote exploit for hardware platform. Description: D-Link DAP-1150 1.2.94 - Cross-Site Request Forgery. Author: MustLive |
Analyze the security implications of: D-Link DAP-1150 1.2.94 - Cross-Site Request Forgery | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: libcdio 0.7x - GNU Compact Disc Input and Control Library Buffer Overflow | This is a dos exploit for linux platform. Description: libcdio 0.7x - GNU Compact Disc Input and Control Library Buffer Overflow. Author: Devon Miller |
Analyze the security implications of: libcdio 0.7x - GNU Compact Disc Input and Control Library Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Aurora CMS - SQL Injection | This is a webapps exploit for php platform. Description: Aurora CMS - SQL Injection. Author: Sora |
Analyze the security implications of: Aurora CMS - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla Bugzilla 2.4/2.6/2.8/2.10 - Arbitrary Command Execution | This is a remote exploit for cgi platform. Description: Mozilla Bugzilla 2.4/2.6/2.8/2.10 - Arbitrary Command Execution. Author: Frank van Vliet karin |
Analyze the security implications of: Mozilla Bugzilla 2.4/2.6/2.8/2.10 - Arbitrary Command Execution | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! Component Sponsor Wall 8.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Sponsor Wall 8.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Sponsor Wall 8.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kasseler CMS 1.1.0/1.2.0 Lite - SQL Injection | This is a webapps exploit for php platform. Description: Kasseler CMS 1.1.0/1.2.0 Lite - SQL Injection. Author: ~!Dok_tOR!~ |
Analyze the security implications of: Kasseler CMS 1.1.0/1.2.0 Lite - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LiveStreet 0.2 - Comment Topic Header Cross-Site Scripting | This is a webapps exploit for php platform. Description: LiveStreet 0.2 - Comment Topic Header Cross-Site Scripting. Author: Inj3ct0r |
Analyze the security implications of: LiveStreet 0.2 - Comment Topic Header Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco ASA Software 8.x/9.x - IKEv1 / IKEv2 Buffer Overflow | This is a remote exploit for hardware platform. Description: Cisco ASA Software 8.x/9.x - IKEv1 / IKEv2 Buffer Overflow. Author: Exodus Intelligence |
Analyze the security implications of: Cisco ASA Software 8.x/9.x - IKEv1 / IKEv2 Buffer Overflow | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Flexphplink Pro - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Flexphplink Pro - Arbitrary File Upload. Author: Osirys |
Analyze the security implications of: Flexphplink Pro - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.