input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Campsite 2.6.1 - 'Section.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component J-HotelPortal 6.0.2 - 'review_id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component J-HotelPortal 6.0.2 - 'review_id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component J-HotelPortal 6.0.2 - 'review_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_Eventing 1.6.x - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_Eventing 1.6.x - Blind SQL Injection. Author: InjEctOr5 |
Analyze the security implications of: Joomla! Component com_Eventing 1.6.x - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LibTIFF pal2rgb 4.0.9 - Heap Buffer Overflow | This is a dos exploit for linux platform. Description: LibTIFF pal2rgb 4.0.9 - Heap Buffer Overflow. Author: Jungun Baek |
Analyze the security implications of: LibTIFF pal2rgb 4.0.9 - Heap Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component jeeventcalendar - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component jeeventcalendar - Local File Inclusion. Author: Sid3^effects |
Analyze the security implications of: Joomla! Component jeeventcalendar - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Symantec SiteMinder WebAgent v12.52 - Cross-site scripting (XSS) | This is a webapps exploit for hardware platform. Description: Symantec SiteMinder WebAgent v12.52 - Cross-site scripting (XSS). Author: Harshit Joshi |
Analyze the security implications of: Symantec SiteMinder WebAgent v12.52 - Cross-site scripting (XSS) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: D-Link DWR-932 Firmware 4.00 - Authentication Bypass | This is a webapps exploit for hardware platform. Description: D-Link DWR-932 Firmware 4.00 - Authentication Bypass. Author: Saeed reza Zamanian |
Analyze the security implications of: D-Link DWR-932 Firmware 4.00 - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: LaTeX2rtf 1.9.15 - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: LaTeX2rtf 1.9.15 - Remote Buffer Overflow. Author: D. J. Bernstein |
Analyze the security implications of: LaTeX2rtf 1.9.15 - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: IGSuite 3.2.4 - Reverse Shell / Blind SQL Injection | This is a webapps exploit for php platform. Description: IGSuite 3.2.4 - Reverse Shell / Blind SQL Injection. Author: Guido Landi |
Analyze the security implications of: IGSuite 3.2.4 - Reverse Shell / Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AdMan 1.1.20070907 - 'campaignId' SQL Injection | This is a webapps exploit for php platform. Description: AdMan 1.1.20070907 - 'campaignId' SQL Injection. Author: SuB-ZeRo |
Analyze the security implications of: AdMan 1.1.20070907 - 'campaignId' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Novell eDirectory 8.x - iMonitor HTTPSTK Buffer Overflow (1) | This is a remote exploit for novell platform. Description: Novell eDirectory 8.x - iMonitor HTTPSTK Buffer Overflow (1). Author: Manuel Santamarina Suarez |
Analyze the security implications of: Novell eDirectory 8.x - iMonitor HTTPSTK Buffer Overflow (1) | This exploit targets novell systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: DesktopOnNet 3 Beta9 - Local File Inclusion | This is a webapps exploit for php platform. Description: DesktopOnNet 3 Beta9 - Local File Inclusion. Author: cr4wl3r |
Analyze the security implications of: DesktopOnNet 3 Beta9 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hexjector 1.0.7.2 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Hexjector 1.0.7.2 - Persistent Cross-Site Scripting. Author: hexon |
Analyze the security implications of: Hexjector 1.0.7.2 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sun Java System Calendar Server 6.3 - Duplicate URI Request Denial of Service | This is a dos exploit for java platform. Description: Sun Java System Calendar Server 6.3 - Duplicate URI Request Denial of Service. Author: SCS team |
Analyze the security implications of: Sun Java System Calendar Server 6.3 - Duplicate URI Request Denial of Service | This exploit targets java systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Splunk < 7.0.1 - Information Disclosure | This is a webapps exploit for linux platform. Description: Splunk < 7.0.1 - Information Disclosure. Author: KoF2002 |
Analyze the security implications of: Splunk < 7.0.1 - Information Disclosure | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Zemra Botnet (C2 Web Panel) - Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Zemra Botnet (C2 Web Panel) - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Zemra Botnet (C2 Web Panel) - Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Family Connections CMS 2.5.0/2.7.1 - 'less.php' Remote Command Execution | This is a webapps exploit for php platform. Description: Family Connections CMS 2.5.0/2.7.1 - 'less.php' Remote Command Execution. Author: mr_me |
Analyze the security implications of: Family Connections CMS 2.5.0/2.7.1 - 'less.php' Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wireless Repeater BE126 - Local File Inclusion | This is a webapps exploit for hardware platform. Description: Wireless Repeater BE126 - Local File Inclusion. Author: Hay Mizrachi |
Analyze the security implications of: Wireless Repeater BE126 - Local File Inclusion | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: EmuMail 5.0 Email Form - Script Injection | This is a webapps exploit for cgi platform. Description: EmuMail 5.0 Email Form - Script Injection. Author: FVS |
Analyze the security implications of: EmuMail 5.0 Email Form - Script Injection | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Back-End CMS 0.4.5 - 'search.php?includes_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Back-End CMS 0.4.5 - 'search.php?includes_path' Remote File Inclusion. Author: Root3r_H3ll |
Analyze the security implications of: Back-End CMS 0.4.5 - 'search.php?includes_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CityPost Simple PHP Upload - 'Simple-upload-53.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CityPost Simple PHP Upload - 'Simple-upload-53.php' Cross-Site Scripting. Author: Thom |
Analyze the security implications of: CityPost Simple PHP Upload - 'Simple-upload-53.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Actiontec C1000A Modem - Backdoor Account | This is a remote exploit for hardware platform. Description: Actiontec C1000A Modem - Backdoor Account. Author: Joseph McDonagh |
Analyze the security implications of: Actiontec C1000A Modem - Backdoor Account | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: INFINICART - 'browsesubcat.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: INFINICART - 'browsesubcat.asp' Multiple SQL Injections. Author: laurent gaffie |
Analyze the security implications of: INFINICART - 'browsesubcat.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: MIT Kerberos 5 - kadmind Change Password Feature Remote Code Execution | This is a remote exploit for linux platform. Description: MIT Kerberos 5 - kadmind Change Password Feature Remote Code Execution. Author: Felipe Ortega |
Analyze the security implications of: MIT Kerberos 5 - kadmind Change Password Feature Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Oracle Automated Service Manager 1.3 - Installation Privilege Escalation | This is a local exploit for linux platform. Description: Oracle Automated Service Manager 1.3 - Installation Privilege Escalation. Author: Larry W. Cashdollar |
Analyze the security implications of: Oracle Automated Service Manager 1.3 - Installation Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple OS X/iOS Kernel - IOSurface Use-After-Free | This is a local exploit for osx platform. Description: Apple OS X/iOS Kernel - IOSurface Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Apple OS X/iOS Kernel - IOSurface Use-After-Free | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: DropAFew 0.2 - 'editlogcal.php?save Action calories' SQL Injection | This is a webapps exploit for php platform. Description: DropAFew 0.2 - 'editlogcal.php?save Action calories' SQL Injection. Author: Alexander Klink |
Analyze the security implications of: DropAFew 0.2 - 'editlogcal.php?save Action calories' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LimeSurvey 4.1.11 - 'Permission Roles' Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: LimeSurvey 4.1.11 - 'Permission Roles' Persistent Cross-Site Scripting. Author: Matthew Aberegg |
Analyze the security implications of: LimeSurvey 4.1.11 - 'Permission Roles' Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ethercreative Logs 3.0.3 - Path Traversal | This is a webapps exploit for multiple platform. Description: Ethercreative Logs 3.0.3 - Path Traversal. Author: ub3rsick |
Analyze the security implications of: Ethercreative Logs 3.0.3 - Path Traversal | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Imagevue r16 - 'amount' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Imagevue r16 - 'amount' Cross-Site Scripting. Author: indoushka |
Analyze the security implications of: Imagevue r16 - 'amount' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LightBlog 9.9.2 - 'register.php' Remote Code Execution | This is a webapps exploit for php platform. Description: LightBlog 9.9.2 - 'register.php' Remote Code Execution. Author: EgiX |
Analyze the security implications of: LightBlog 9.9.2 - 'register.php' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Online News Paper Manager 1.0 - 'cid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Online News Paper Manager 1.0 - 'cid' SQL Injection. Author: Don Tukulesto |
Analyze the security implications of: Joomla! Component Online News Paper Manager 1.0 - 'cid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ipswitch WhatsUp Professional 2006 - Authentication Bypass | This is a remote exploit for hardware platform. Description: Ipswitch WhatsUp Professional 2006 - Authentication Bypass. Author: Kenneth F. Belva |
Analyze the security implications of: Ipswitch WhatsUp Professional 2006 - Authentication Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Datenbank Module For phpBB - 'Remote mod.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Datenbank Module For phpBB - 'Remote mod.php' Cross-Site Scripting. Author: tom cruise |
Analyze the security implications of: Datenbank Module For phpBB - 'Remote mod.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.