input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: LiveZilla 3.1.8.3 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nagios XI 5.2.6-5.4.12 - Chained Remote Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: Nagios XI 5.2.6-5.4.12 - Chained Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Nagios XI 5.2.6-5.4.12 - Chained Remote Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple Mac OSX 10.3.7 - Input Validation Flaw 'parse_machfile()' Denial of Service | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.3.7 - Input Validation Flaw 'parse_machfile()' Denial of Service. Author: nemo |
Analyze the security implications of: Apple Mac OSX 10.3.7 - Input Validation Flaw 'parse_machfile()' Denial of Service | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Booking System Pro - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Booking System Pro - Cross-Site Request Forgery. Author: DaOne |
Analyze the security implications of: Booking System Pro - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Mini Search Appliance 3.4.14 - 'IE' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Google Mini Search Appliance 3.4.14 - 'IE' Cross-Site Scripting. Author: Websecurity |
Analyze the security implications of: Google Mini Search Appliance 3.4.14 - 'IE' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DBSite - SQL Injection | This is a webapps exploit for php platform. Description: DBSite - SQL Injection. Author: God_Of_Pain |
Analyze the security implications of: DBSite - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bs Auction Script - SQL Injection | This is a webapps exploit for php platform. Description: Bs Auction Script - SQL Injection. Author: Sid3^effects |
Analyze the security implications of: Bs Auction Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Deepin Linux 15 - 'lastore-daemon' Local Privilege Escalation | This is a local exploit for multiple platform. Description: Deepin Linux 15 - 'lastore-daemon' Local Privilege Escalation. Author: bcoles |
Analyze the security implications of: Deepin Linux 15 - 'lastore-daemon' Local Privilege Escalation | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: TipxD 1.1.1 - Not SETUID Local Format String | This is a local exploit for linux platform. Description: TipxD 1.1.1 - Not SETUID Local Format String. Author: CoKi |
Analyze the security implications of: TipxD 1.1.1 - Not SETUID Local Format String | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FreeBSD 6.1-RELEASE-p10 - 'ftruncate' Local Denial of Service | This is a dos exploit for bsd platform. Description: FreeBSD 6.1-RELEASE-p10 - 'ftruncate' Local Denial of Service. Author: kokanin |
Analyze the security implications of: FreeBSD 6.1-RELEASE-p10 - 'ftruncate' Local Denial of Service | This exploit targets bsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Wyse - Machine Remote Power Off (Denial of Service) (Metasploit) | This is a dos exploit for hardware platform. Description: Wyse - Machine Remote Power Off (Denial of Service) (Metasploit). Author: it.solunium |
Analyze the security implications of: Wyse - Machine Remote Power Off (Denial of Service) (Metasploit) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: SGI IRIX 5.3 - 'pkgadjust' Local Privilege Escalation | This is a local exploit for irix platform. Description: SGI IRIX 5.3 - 'pkgadjust' Local Privilege Escalation. Author: Hui-Hui Hu |
Analyze the security implications of: SGI IRIX 5.3 - 'pkgadjust' Local Privilege Escalation | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: WebKit JavaScriptCore - 'createRegExpMatchesArray' Type Confusion | This is a dos exploit for multiple platform. Description: WebKit JavaScriptCore - 'createRegExpMatchesArray' Type Confusion. Author: Google Security Research |
Analyze the security implications of: WebKit JavaScriptCore - 'createRegExpMatchesArray' Type Confusion | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Posnic Stock Management System 1.02 - Multiple Vulnerabilities | This is a webapps exploit for multiple platform. Description: Posnic Stock Management System 1.02 - Multiple Vulnerabilities. Author: Sarahma Security |
Analyze the security implications of: Posnic Stock Management System 1.02 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PHP 5.4.3 - 'com_event_sink' Denial of Service | This is a dos exploit for php platform. Description: PHP 5.4.3 - 'com_event_sink' Denial of Service. Author: condis |
Analyze the security implications of: PHP 5.4.3 - 'com_event_sink' Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Amateur Photographer's Image Gallery - 'plist.php?albumid' SQL Injection | This is a webapps exploit for php platform. Description: Amateur Photographer's Image Gallery - 'plist.php?albumid' SQL Injection. Author: cr4wl3r |
Analyze the security implications of: Amateur Photographer's Image Gallery - 'plist.php?albumid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenSource ERP 6.3.1. - SQL Injection | This is a webapps exploit for multiple platform. Description: OpenSource ERP 6.3.1. - SQL Injection. Author: Emre ÖVÜNÇ |
Analyze the security implications of: OpenSource ERP 6.3.1. - SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: e107 Plugin My_Gallery 2.3 - Arbitrary File Download | This is a webapps exploit for php platform. Description: e107 Plugin My_Gallery 2.3 - Arbitrary File Download. Author: Jerome Athias |
Analyze the security implications of: e107 Plugin My_Gallery 2.3 - Arbitrary File Download | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NSTX 1.0/1.1 - Remote Denial of Service | This is a dos exploit for linux platform. Description: NSTX 1.0/1.1 - Remote Denial of Service. Author: laurent oudot |
Analyze the security implications of: NSTX 1.0/1.1 - Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ASPNuke 0.80 - 'article.asp' SQL Injection | This is a webapps exploit for asp platform. Description: ASPNuke 0.80 - 'article.asp' SQL Injection. Author: mh_p0rtal |
Analyze the security implications of: ASPNuke 0.80 - 'article.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Explay CMS 2.1 - Persistent Cross-Site Scripting / Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Explay CMS 2.1 - Persistent Cross-Site Scripting / Cross-Site Request Forgery. Author: hodik |
Analyze the security implications of: Explay CMS 2.1 - Persistent Cross-Site Scripting / Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Huawei Flybox B660 - Cross-Site Request Forgery (1) | This is a webapps exploit for hardware platform. Description: Huawei Flybox B660 - Cross-Site Request Forgery (1). Author: Vulnerability-Lab |
Analyze the security implications of: Huawei Flybox B660 - Cross-Site Request Forgery (1) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Genexis Platinum-4410 P4410-V2-1.28 - Cross Site Request Forgery to Reboot | This is a webapps exploit for hardware platform. Description: Genexis Platinum-4410 P4410-V2-1.28 - Cross Site Request Forgery to Reboot. Author: Mohammed Farhan |
Analyze the security implications of: Genexis Platinum-4410 P4410-V2-1.28 - Cross Site Request Forgery to Reboot | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: WebKit JSC - 'BytecodeGenerator::emitGetByVal' Incorrect Optimization (2) | This is a dos exploit for multiple platform. Description: WebKit JSC - 'BytecodeGenerator::emitGetByVal' Incorrect Optimization (2). Author: Google Security Research |
Analyze the security implications of: WebKit JSC - 'BytecodeGenerator::emitGetByVal' Incorrect Optimization (2) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ericsson Network Location MPS GMPC21 - Remote Code Execution (RCE) (Metasploit) | This is a webapps exploit for multiple platform. Description: Ericsson Network Location MPS GMPC21 - Remote Code Execution (RCE) (Metasploit). Author: AkkuS |
Analyze the security implications of: Ericsson Network Location MPS GMPC21 - Remote Code Execution (RCE) (Metasploit) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Netgear WNR1000 - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Netgear WNR1000 - Authentication Bypass. Author: Roberto Paleari |
Analyze the security implications of: Netgear WNR1000 - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Google Chrome 26.0.1410.43 (Webkit) - OBJECT Element Use-After-Free (PoC) | This is a dos exploit for osx platform. Description: Google Chrome 26.0.1410.43 (Webkit) - OBJECT Element Use-After-Free (PoC). Author: Google Security Research |
Analyze the security implications of: Google Chrome 26.0.1410.43 (Webkit) - OBJECT Element Use-After-Free (PoC) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Oracle Internet Directory 2.0.6 - oidldap | This is a local exploit for linux platform. Description: Oracle Internet Directory 2.0.6 - oidldap. Author: Juan Manuel Pascual Escribá |
Analyze the security implications of: Oracle Internet Directory 2.0.6 - oidldap | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple Mac OSX 10.2.2 - Directory Kernel Panic (Denial of Service) | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.2.2 - Directory Kernel Panic (Denial of Service). Author: shibby |
Analyze the security implications of: Apple Mac OSX 10.2.2 - Directory Kernel Panic (Denial of Service) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Joomla! Component Multi-Venue Restaurant Menu Manager 1.5.2 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Multi-Venue Restaurant Menu Manager 1.5.2 - SQL Injection. Author: Valentin |
Analyze the security implications of: Joomla! Component Multi-Venue Restaurant Menu Manager 1.5.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ipswitch IMail 5.0 - Imapd Buffer Overflow (Denial of Service) (PoC) | This is a dos exploit for multiple platform. Description: Ipswitch IMail 5.0 - Imapd Buffer Overflow (Denial of Service) (PoC). Author: Marc of eEye |
Analyze the security implications of: Ipswitch IMail 5.0 - Imapd Buffer Overflow (Denial of Service) (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FreeNAC 3.02 - SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: FreeNAC 3.02 - SQL Injection / Cross-Site Scripting. Author: blake |
Analyze the security implications of: FreeNAC 3.02 - SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: darryl burgdorf weblibs 1.0 - Directory Traversal | This is a webapps exploit for php platform. Description: darryl burgdorf weblibs 1.0 - Directory Traversal. Author: John Bissell |
Analyze the security implications of: darryl burgdorf weblibs 1.0 - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.0.0 - 'imap_mail()' Local Denial of Service | This is a dos exploit for php platform. Description: PHP 5.0.0 - 'imap_mail()' Local Denial of Service. Author: Yakir Wizman |
Analyze the security implications of: PHP 5.0.0 - 'imap_mail()' Local Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.