input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: RedHat Linux - Stickiness of /tmp | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Komodo CMS 2.1 - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: Komodo CMS 2.1 - Multiple Input Validation Vulnerabilities. Author: r0t3d3Vil |
Analyze the security implications of: Komodo CMS 2.1 - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mura CMS - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cfm platform. Description: Mura CMS - Multiple Cross-Site Scripting Vulnerabilities. Author: Richard Brain |
Analyze the security implications of: Mura CMS - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: AmpJuke 0.7.5 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: AmpJuke 0.7.5 - 'index.php' SQL Injection. Author: S_DLA_S |
Analyze the security implications of: AmpJuke 0.7.5 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alcatel-Lucent OmniPCX Enterprise Communication Server 7.1 - masterCGI Command Injection (Metasploit) | This is a webapps exploit for cgi platform. Description: Alcatel-Lucent OmniPCX Enterprise Communication Server 7.1 - masterCGI Command Injection (Metasploit). Author: patrick |
Analyze the security implications of: Alcatel-Lucent OmniPCX Enterprise Communication Server 7.1 - masterCGI Command Injection (Metasploit) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: 2WIRE Routers - 'H04_POST' Access Validation | This is a remote exploit for hardware platform. Description: 2WIRE Routers - 'H04_POST' Access Validation. Author: Oligarchy Oligarchy |
Analyze the security implications of: 2WIRE Routers - 'H04_POST' Access Validation | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: LoveCMS 1.6.2 Final - Multiple Local File Inclusions | This is a webapps exploit for php platform. Description: LoveCMS 1.6.2 Final - Multiple Local File Inclusions. Author: cOndemned |
Analyze the security implications of: LoveCMS 1.6.2 Final - Multiple Local File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: McAfee E-Business Server 8.5.2 - Remote Code Execution / Denial of Service (PoC) | This is a dos exploit for multiple platform. Description: McAfee E-Business Server 8.5.2 - Remote Code Execution / Denial of Service (PoC). Author: Leon Juranic |
Analyze the security implications of: McAfee E-Business Server 8.5.2 - Remote Code Execution / Denial of Service (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Power Up HTML 0.8033 Beta - Directory Traversal Arbitrary File Disclosure | This is a remote exploit for cgi platform. Description: Power Up HTML 0.8033 Beta - Directory Traversal Arbitrary File Disclosure. Author: Steve Shepherd |
Analyze the security implications of: Power Up HTML 0.8033 Beta - Directory Traversal Arbitrary File Disclosure | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Adobe Flash - ATF Image Packing Overflow | This is a dos exploit for multiple platform. Description: Adobe Flash - ATF Image Packing Overflow. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - ATF Image Packing Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Foscam IP (Multiple Cameras) - Multiple Cross-Site Request Forgery Vulnerabilities | This is a remote exploit for hardware platform. Description: Foscam IP (Multiple Cameras) - Multiple Cross-Site Request Forgery Vulnerabilities. Author: shekyan |
Analyze the security implications of: Foscam IP (Multiple Cameras) - Multiple Cross-Site Request Forgery Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Fast Click SQL 1.1.7 Lite - 'init.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Fast Click SQL 1.1.7 Lite - 'init.php' Remote File Inclusion. Author: NoGe |
Analyze the security implications of: Fast Click SQL 1.1.7 Lite - 'init.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_db_setup.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_db_setup.php?base_path' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_db_setup.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 68 Classifieds 4.1 - 'viewlisting.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: 68 Classifieds 4.1 - 'viewlisting.php' Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: 68 Classifieds 4.1 - 'viewlisting.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SAP Business Connector 4.6/4.7 - 'deleteSingle?fullName' Arbitrary File Deletion | This is a remote exploit for linux platform. Description: SAP Business Connector 4.6/4.7 - 'deleteSingle?fullName' Arbitrary File Deletion. Author: Leandro Meiners |
Analyze the security implications of: SAP Business Connector 4.6/4.7 - 'deleteSingle?fullName' Arbitrary File Deletion | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: addalink 4 Beta - Write Approved Links | This is a webapps exploit for php platform. Description: addalink 4 Beta - Write Approved Links. Author: Pepelux |
Analyze the security implications of: addalink 4 Beta - Write Approved Links | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JBC Explorer 7.20 RC 1 - Remote Code Execution | This is a webapps exploit for php platform. Description: JBC Explorer 7.20 RC 1 - Remote Code Execution. Author: DarkFig |
Analyze the security implications of: JBC Explorer 7.20 RC 1 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LG SuperSign EZ CMS 2.5 - Remote Code Execution | This is a webapps exploit for hardware platform. Description: LG SuperSign EZ CMS 2.5 - Remote Code Execution. Author: Alejandro Fanjul |
Analyze the security implications of: LG SuperSign EZ CMS 2.5 - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CacheGuard-OS 5.7.7 - Cross-Site Request Forgery | This is a webapps exploit for linux platform. Description: CacheGuard-OS 5.7.7 - Cross-Site Request Forgery. Author: William Costa |
Analyze the security implications of: CacheGuard-OS 5.7.7 - Cross-Site Request Forgery | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Jupiter CMS 1.1.5 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Jupiter CMS 1.1.5 - Arbitrary File Upload. Author: DarkFig |
Analyze the security implications of: Jupiter CMS 1.1.5 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LxBlog - Multiple Cross-Site Scripting / SQL Injections | This is a webapps exploit for php platform. Description: LxBlog - Multiple Cross-Site Scripting / SQL Injections. Author: Securitylab.ir |
Analyze the security implications of: LxBlog - Multiple Cross-Site Scripting / SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.1.6 - 'Msg_Receive()' Memory Allocation Integer Overflow | This is a remote exploit for php platform. Description: PHP 5.1.6 - 'Msg_Receive()' Memory Allocation Integer Overflow. Author: Stefan Esser |
Analyze the security implications of: PHP 5.1.6 - 'Msg_Receive()' Memory Allocation Integer Overflow | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Code Widgets Multiple Question - Multiple Choice Online Questionnaire SQL Injections | This is a webapps exploit for asp platform. Description: Code Widgets Multiple Question - Multiple Choice Online Questionnaire SQL Injections. Author: L0rd CrusAd3r |
Analyze the security implications of: Code Widgets Multiple Question - Multiple Choice Online Questionnaire SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: BRS Webweaver 1.0 1 - MKDir Directory Traversal | This is a remote exploit for linux platform. Description: BRS Webweaver 1.0 1 - MKDir Directory Traversal. Author: euronymous |
Analyze the security implications of: BRS Webweaver 1.0 1 - MKDir Directory Traversal | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: e107 1.0.1 - Arbitrary JavaScript Execution (via Cross-Site Request Forgery) | This is a webapps exploit for php platform. Description: e107 1.0.1 - Arbitrary JavaScript Execution (via Cross-Site Request Forgery). Author: Joshua Reynolds |
Analyze the security implications of: e107 1.0.1 - Arbitrary JavaScript Execution (via Cross-Site Request Forgery) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: pam-krb5 < 3.13 - Local Privilege Escalation | This is a local exploit for linux platform. Description: pam-krb5 < 3.13 - Local Privilege Escalation. Author: Jon Oberheide |
Analyze the security implications of: pam-krb5 < 3.13 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WePresent WiPG-1500 - Backdoor Account | This is a remote exploit for hardware platform. Description: WePresent WiPG-1500 - Backdoor Account. Author: Quentin Olagne |
Analyze the security implications of: WePresent WiPG-1500 - Backdoor Account | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: OpenBSD 2.x - Pending ARP Request Remote Denial of Service | This is a dos exploit for openbsd platform. Description: OpenBSD 2.x - Pending ARP Request Remote Denial of Service. Author: skyper |
Analyze the security implications of: OpenBSD 2.x - Pending ARP Request Remote Denial of Service | This exploit targets openbsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets openbsd platform |
What is this exploit about: ElkarBackup 1.3.3 - 'Policy[name]' and 'Policy[Description]' Stored Cross-site Scripting | This is a webapps exploit for php platform. Description: ElkarBackup 1.3.3 - 'Policy[name]' and 'Policy[Description]' Stored Cross-site Scripting. Author: Vyshnav nk |
Analyze the security implications of: ElkarBackup 1.3.3 - 'Policy[name]' and 'Policy[Description]' Stored Cross-site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco node-jos < 0.11.0 - Re-sign Tokens | This is a webapps exploit for multiple platform. Description: Cisco node-jos < 0.11.0 - Re-sign Tokens. Author: zioBlack |
Analyze the security implications of: Cisco node-jos < 0.11.0 - Re-sign Tokens | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Church Management System 1.0 - 'search' SQL Injection (Unauthenticated) | This is a webapps exploit for php platform. Description: Church Management System 1.0 - 'search' SQL Injection (Unauthenticated). Author: Erwin Krazek |
Analyze the security implications of: Church Management System 1.0 - 'search' SQL Injection (Unauthenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: QNX RTOS 4.25/6.1 - 'phgrafx' Local Privilege Escalation | This is a local exploit for linux platform. Description: QNX RTOS 4.25/6.1 - 'phgrafx' Local Privilege Escalation. Author: badc0ded |
Analyze the security implications of: QNX RTOS 4.25/6.1 - 'phgrafx' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Berylium2 2003-08-18 - 'beryliumroot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Berylium2 2003-08-18 - 'beryliumroot' Remote File Inclusion. Author: ThE TiGeR |
Analyze the security implications of: Berylium2 2003-08-18 - 'beryliumroot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component jGive 2.0.9 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component jGive 2.0.9 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component jGive 2.0.9 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.