input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: ImpressCMS 1.3.11 - 'bid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: RedHat Linux 4.2/5.2/6.0 / S.u.S.E Linux 6.0/6.1 - Cron Buffer Overflow (1)
|
This is a local exploit for linux platform. Description: RedHat Linux 4.2/5.2/6.0 / S.u.S.E Linux 6.0/6.1 - Cron Buffer Overflow (1). Author: Akke
|
Analyze the security implications of: RedHat Linux 4.2/5.2/6.0 / S.u.S.E Linux 6.0/6.1 - Cron Buffer Overflow (1)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Daily Habit Tracker 1.0 - Stored Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Daily Habit Tracker 1.0 - Stored Cross-Site Scripting (XSS). Author: Yevhenii Butenko
|
Analyze the security implications of: Daily Habit Tracker 1.0 - Stored Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: C.P.Sub 4.5 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: C.P.Sub 4.5 - Authentication Bypass. Author: Chako
|
Analyze the security implications of: C.P.Sub 4.5 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GOautodial 4.0 - 'CreateEvent' Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: GOautodial 4.0 - 'CreateEvent' Persistent Cross-Site Scripting. Author: cakes
|
Analyze the security implications of: GOautodial 4.0 - 'CreateEvent' Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IceWarp Mail Server < 11.1.1 - Directory Traversal
|
This is a webapps exploit for php platform. Description: IceWarp Mail Server < 11.1.1 - Directory Traversal. Author: Trustwave's SpiderLabs
|
Analyze the security implications of: IceWarp Mail Server < 11.1.1 - Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Iatek Knowledge Base - 'content_by_cat.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: Iatek Knowledge Base - 'content_by_cat.asp' SQL Injection. Author: xcorpitx
|
Analyze the security implications of: Iatek Knowledge Base - 'content_by_cat.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component Full - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Full - 'id' SQL Injection. Author: the_cyber_nuxbie
|
Analyze the security implications of: Joomla! Component Full - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Mac OSX 10.11 - FTS Deep Structure of the FileSystem Buffer Overflow
|
This is a dos exploit for osx platform. Description: Apple Mac OSX 10.11 - FTS Deep Structure of the FileSystem Buffer Overflow. Author: Maksymilian Arciemowicz
|
Analyze the security implications of: Apple Mac OSX 10.11 - FTS Deep Structure of the FileSystem Buffer Overflow
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: WSO2 Identity Server 5.1.0 - Multiple Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: WSO2 Identity Server 5.1.0 - Multiple Vulnerabilities. Author: hyp3rlinx
|
Analyze the security implications of: WSO2 Identity Server 5.1.0 - Multiple Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Arab Portal 2.0 - 'online.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Arab Portal 2.0 - 'online.php' Cross-Site Scripting. Author: o.y.6
|
Analyze the security implications of: Arab Portal 2.0 - 'online.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_discussions - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_discussions - SQL Injection. Author: Red Security TEAM
|
Analyze the security implications of: Joomla! Component com_discussions - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Drupal < 5.1 - Post Comments Remote Command Execution
|
This is a webapps exploit for php platform. Description: Drupal < 5.1 - Post Comments Remote Command Execution. Author: str0ke
|
Analyze the security implications of: Drupal < 5.1 - Post Comments Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bookmark4U 2.0 - '/inc/dbase.php?env[include_prefix]' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Bookmark4U 2.0 - '/inc/dbase.php?env[include_prefix]' Remote File Inclusion. Author: SnIpEr_SA
|
Analyze the security implications of: Bookmark4U 2.0 - '/inc/dbase.php?env[include_prefix]' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Invision Power Board Army System Mod 2.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: Invision Power Board Army System Mod 2.1 - SQL Injection. Author: fRoGGz
|
Analyze the security implications of: Invision Power Board Army System Mod 2.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ektron CMS 8.5.0 - Multiple Vulnerabilities
|
This is a webapps exploit for asp platform. Description: Ektron CMS 8.5.0 - Multiple Vulnerabilities. Author: Sense of Security
|
Analyze the security implications of: Ektron CMS 8.5.0 - Multiple Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Linux chfn (SuSE 9.3/10) - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Linux chfn (SuSE 9.3/10) - Local Privilege Escalation. Author: Hunger
|
Analyze the security implications of: Linux chfn (SuSE 9.3/10) - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: portmap 5 Beta - 'Set/Dump' Local Denial of Service
|
This is a dos exploit for linux platform. Description: portmap 5 Beta - 'Set/Dump' Local Denial of Service. Author: Federico L. Bossi Bonin
|
Analyze the security implications of: portmap 5 Beta - 'Set/Dump' Local Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Netperf 2.6.0 - Stack-Based Buffer Overflow
|
This is a dos exploit for linux platform. Description: Netperf 2.6.0 - Stack-Based Buffer Overflow. Author: Juan Sacco
|
Analyze the security implications of: Netperf 2.6.0 - Stack-Based Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Elastic Path 4.1 - '/manager/getImportFileRedirect.jsp?file' Traversal Arbitrary File Access
|
This is a webapps exploit for jsp platform. Description: Elastic Path 4.1 - '/manager/getImportFileRedirect.jsp?file' Traversal Arbitrary File Access. Author: Daniel Martin Gomez
|
Analyze the security implications of: Elastic Path 4.1 - '/manager/getImportFileRedirect.jsp?file' Traversal Arbitrary File Access
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Kmita FAQ 1.0 - 'search.php?q' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Kmita FAQ 1.0 - 'search.php?q' Cross-Site Scripting. Author: Luny
|
Analyze the security implications of: Kmita FAQ 1.0 - 'search.php?q' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BlankOL 1.0 - 'Bol.cgi' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for cgi platform. Description: BlankOL 1.0 - 'Bol.cgi' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t
|
Analyze the security implications of: BlankOL 1.0 - 'Bol.cgi' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Madwifi - SIOCGIWSCAN Buffer Overflow (Metasploit)
|
This is a remote exploit for linux platform. Description: Madwifi - SIOCGIWSCAN Buffer Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: Madwifi - SIOCGIWSCAN Buffer Overflow (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_Joomlaub - 'aid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_Joomlaub - 'aid' SQL Injection. Author: 599eme Man
|
Analyze the security implications of: Joomla! Component com_Joomlaub - 'aid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Liferay CE < 6.2 CE GA6 - Persistent Cross-Site Scripting
|
This is a webapps exploit for jsp platform. Description: Liferay CE < 6.2 CE GA6 - Persistent Cross-Site Scripting. Author: Fernando Câmara
|
Analyze the security implications of: Liferay CE < 6.2 CE GA6 - Persistent Cross-Site Scripting
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: EasyPHPCalendar 6.1.5/6.2.x - 'setupSQL.php?serverPath' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: EasyPHPCalendar 6.1.5/6.2.x - 'setupSQL.php?serverPath' Remote File Inclusion. Author: Albania Security Clan
|
Analyze the security implications of: EasyPHPCalendar 6.1.5/6.2.x - 'setupSQL.php?serverPath' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: NetBSD 5.1 - 'libc/net' Multiple Stack Buffer Overflows
|
This is a remote exploit for bsd platform. Description: NetBSD 5.1 - 'libc/net' Multiple Stack Buffer Overflows. Author: Maksymilian Arciemowicz
|
Analyze the security implications of: NetBSD 5.1 - 'libc/net' Multiple Stack Buffer Overflows
|
This exploit targets bsd systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets bsd platform
|
What is this exploit about: Copy to WebDAV 1.1 iOS - Multiple Vulnerabilities
|
This is a webapps exploit for ios platform. Description: Copy to WebDAV 1.1 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: Copy to WebDAV 1.1 iOS - Multiple Vulnerabilities
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Lepide Auditor Suite - 'createdb()' Web Console Database Injection / Remote Code Execution
|
This is a remote exploit for php platform. Description: Lepide Auditor Suite - 'createdb()' Web Console Database Injection / Remote Code Execution. Author: mr_me
|
Analyze the security implications of: Lepide Auditor Suite - 'createdb()' Web Console Database Injection / Remote Code Execution
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Dada Mail Manager 2.6 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Dada Mail Manager 2.6 - Remote File Inclusion. Author: NoGe
|
Analyze the security implications of: Joomla! Component Dada Mail Manager 2.6 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eMerge E3 1.00-06 - Unauthenticated Directory Traversal
|
This is a webapps exploit for hardware platform. Description: eMerge E3 1.00-06 - Unauthenticated Directory Traversal. Author: LiquidWorm
|
Analyze the security implications of: eMerge E3 1.00-06 - Unauthenticated Directory Traversal
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CyberBuild - 'login.asp?sessionid' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: CyberBuild - 'login.asp?sessionid' Cross-Site Scripting. Author: r0t
|
Analyze the security implications of: CyberBuild - 'login.asp?sessionid' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: BizDir 05.10 - 'f_srch' Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: BizDir 05.10 - 'f_srch' Cross-Site Scripting. Author: Aliaksandr Hartsuyeu
|
Analyze the security implications of: BizDir 05.10 - 'f_srch' Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Exim 4.43 - 'auth_spa_server()' Remote
|
This is a remote exploit for linux platform. Description: Exim 4.43 - 'auth_spa_server()' Remote. Author: Yuri Gushin
|
Analyze the security implications of: Exim 4.43 - 'auth_spa_server()' Remote
|
This exploit targets linux systems. Type: remote. Risk level: High
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.