input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: e-topbiz Slide Popups 1 PHP - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Composr CMS 10.0.34 - 'banners' Persistent Cross Site Scripting | This is a webapps exploit for php platform. Description: Composr CMS 10.0.34 - 'banners' Persistent Cross Site Scripting. Author: Parshwa Bhavsar |
Analyze the security implications of: Composr CMS 10.0.34 - 'banners' Persistent Cross Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Chipmunk Blog - 'cat.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Chipmunk Blog - 'cat.php' Cross-Site Scripting. Author: sl4xUz |
Analyze the security implications of: Chipmunk Blog - 'cat.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MayGion IP Cameras Firmware 09.27 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: MayGion IP Cameras Firmware 09.27 - Multiple Vulnerabilities. Author: Core Security |
Analyze the security implications of: MayGion IP Cameras Firmware 09.27 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Cscope 15.5 - Symlink | This is a local exploit for linux platform. Description: Cscope 15.5 - Symlink. Author: Gangstuck |
Analyze the security implications of: Cscope 15.5 - Symlink | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FreeBSD 8.0 - 'ftpd' (FreeBSD-SA-10:05) Off-By-One (PoC) | This is a dos exploit for freebsd platform. Description: FreeBSD 8.0 - 'ftpd' (FreeBSD-SA-10:05) Off-By-One (PoC). Author: Maksymilian Arciemowicz |
Analyze the security implications of: FreeBSD 8.0 - 'ftpd' (FreeBSD-SA-10:05) Off-By-One (PoC) | This exploit targets freebsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: CJ Ultra Plus 1.0.3/1.0.4 - 'OUT.php' SQL Injection | This is a webapps exploit for php platform. Description: CJ Ultra Plus 1.0.3/1.0.4 - 'OUT.php' SQL Injection. Author: Kold |
Analyze the security implications of: CJ Ultra Plus 1.0.3/1.0.4 - 'OUT.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Verax NMS - Multiple Method Authentication Bypass | This is a webapps exploit for multiple platform. Description: Verax NMS - Multiple Method Authentication Bypass. Author: Andrew Brooks |
Analyze the security implications of: Verax NMS - Multiple Method Authentication Bypass | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GNU glibc < 2.12.2 - 'fnmatch()' Stack Corruption | This is a dos exploit for multiple platform. Description: GNU glibc < 2.12.2 - 'fnmatch()' Stack Corruption. Author: Simon Berry-Byrne |
Analyze the security implications of: GNU glibc < 2.12.2 - 'fnmatch()' Stack Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CmsMadeSimple v2.2.17 - Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: CmsMadeSimple v2.2.17 - Remote Code Execution (RCE). Author: Mirabbas Ağalarov |
Analyze the security implications of: CmsMadeSimple v2.2.17 - Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NovaSTOR NovaNET/NovaBACKUP 13.0 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: NovaSTOR NovaNET/NovaBACKUP 13.0 - Remote Denial of Service. Author: mu-b |
Analyze the security implications of: NovaSTOR NovaNET/NovaBACKUP 13.0 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Absolute News Manager .NET 5.1 - 'xlaabsolutenm.aspx' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Absolute News Manager .NET 5.1 - 'xlaabsolutenm.aspx' Multiple SQL Injections. Author: Adrian Pastor |
Analyze the security implications of: Absolute News Manager .NET 5.1 - 'xlaabsolutenm.aspx' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: VP-ASP Shopping Cart 6.50 - 'ShopContent.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: VP-ASP Shopping Cart 6.50 - 'ShopContent.asp' Cross-Site Scripting. Author: John Martinelli |
Analyze the security implications of: VP-ASP Shopping Cart 6.50 - 'ShopContent.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Contact Manager 1.0 - 'femail' SQL Injection | This is a webapps exploit for php platform. Description: Contact Manager 1.0 - 'femail' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Contact Manager 1.0 - 'femail' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component FDione Form Wizard 1.0.2 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component FDione Form Wizard 1.0.2 - Local File Inclusion. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component FDione Form Wizard 1.0.2 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Caudium 1.x - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Caudium 1.x - Remote Denial of Service. Author: David Gourdelier |
Analyze the security implications of: Caudium 1.x - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: HauntmAx CMS Haunted House - Directory Listing / SQL Injection | This is a webapps exploit for php platform. Description: HauntmAx CMS Haunted House - Directory Listing / SQL Injection. Author: Sid3^effects |
Analyze the security implications of: HauntmAx CMS Haunted House - Directory Listing / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Android Bluetooth - 'Blueborne' Information Leak (1) | This is a remote exploit for android platform. Description: Android Bluetooth - 'Blueborne' Information Leak (1). Author: Kert Ojasoo |
Analyze the security implications of: Android Bluetooth - 'Blueborne' Information Leak (1) | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Siaberry 1.2.2 - Command Injection | This is a webapps exploit for hardware platform. Description: Siaberry 1.2.2 - Command Injection. Author: Space Duck |
Analyze the security implications of: Siaberry 1.2.2 - Command Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Mozilla Firefox 1.04 - 'compareTo()' Remote Code Execution | This is a remote exploit for multiple platform. Description: Mozilla Firefox 1.04 - 'compareTo()' Remote Code Execution. Author: Aviv Raff |
Analyze the security implications of: Mozilla Firefox 1.04 - 'compareTo()' Remote Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Tuleap 9.6 - Second-Order PHP Object Injection (Metasploit) | This is a remote exploit for php platform. Description: Tuleap 9.6 - Second-Order PHP Object Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Tuleap 9.6 - Second-Order PHP Object Injection (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BEA Tuxedo 6/7/8 and WebLogic Enterprise 4/5 - Input Validation | This is a remote exploit for cgi platform. Description: BEA Tuxedo 6/7/8 and WebLogic Enterprise 4/5 - Input Validation. Author: Corsaire Limited |
Analyze the security implications of: BEA Tuxedo 6/7/8 and WebLogic Enterprise 4/5 - Input Validation | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Lightweight news portal (LNP) 1.0b - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Lightweight news portal (LNP) 1.0b - Multiple Vulnerabilities. Author: storm |
Analyze the security implications of: Lightweight news portal (LNP) 1.0b - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Eclime 1.1.2b - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Eclime 1.1.2b - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: Eclime 1.1.2b - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component MT Fire Eagle 1.2 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component MT Fire Eagle 1.2 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component MT Fire Eagle 1.2 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Endian Firewall 2.4 - 'dnat.cgi?createrule' Cross-Site Scripting | This is a remote exploit for hardware platform. Description: Endian Firewall 2.4 - 'dnat.cgi?createrule' Cross-Site Scripting. Author: Vulnerability Research Laboratory |
Analyze the security implications of: Endian Firewall 2.4 - 'dnat.cgi?createrule' Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Exim4 < 4.69 - string_format Function Heap Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: Exim4 < 4.69 - string_format Function Heap Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Exim4 < 4.69 - string_format Function Heap Buffer Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Easynet4u faq Host - 'faq.php' SQL Injection | This is a webapps exploit for php platform. Description: Easynet4u faq Host - 'faq.php' SQL Injection. Author: SuB-ZeRo |
Analyze the security implications of: Easynet4u faq Host - 'faq.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iWare CMS 5.0.4 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: iWare CMS 5.0.4 - Multiple SQL Injections. Author: boom3rang |
Analyze the security implications of: iWare CMS 5.0.4 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NetFlow Analyzer 4 - Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: NetFlow Analyzer 4 - Cross-Site Scripting. Author: why@nsfocus.com |
Analyze the security implications of: NetFlow Analyzer 4 - Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: ManageEngine (Multiple Products) - (Authenticated) Arbitrary File Upload (Metasploit) | This is a remote exploit for java platform. Description: ManageEngine (Multiple Products) - (Authenticated) Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: ManageEngine (Multiple Products) - (Authenticated) Arbitrary File Upload (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: StarVedia IPCamera IC502w IC502w+ v020313 - 'Username'/Password Disclosure | This is a webapps exploit for hardware platform. Description: StarVedia IPCamera IC502w IC502w+ v020313 - 'Username'/Password Disclosure. Author: Todor Donev |
Analyze the security implications of: StarVedia IPCamera IC502w IC502w+ v020313 - 'Username'/Password Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Opera 9.2 - '.torrent' Remote Denial of Service | This is a dos exploit for multiple platform. Description: Opera 9.2 - '.torrent' Remote Denial of Service. Author: n00b |
Analyze the security implications of: Opera 9.2 - '.torrent' Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SoftArtisans SAFileUp 5.0.14 - 'viewsrc.asp' Script Source Disclosure | This is a webapps exploit for asp platform. Description: SoftArtisans SAFileUp 5.0.14 - 'viewsrc.asp' Script Source Disclosure. Author: Inge Henriksen |
Analyze the security implications of: SoftArtisans SAFileUp 5.0.14 - 'viewsrc.asp' Script Source Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.