input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Cemetry Mapping and Information System 1.0 - Multiple Stored Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco Linksys E4200 - '/apply.cgi' Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for hardware platform. Description: Cisco Linksys E4200 - '/apply.cgi' Multiple Cross-Site Scripting Vulnerabilities. Author: Carl Benedict |
Analyze the security implications of: Cisco Linksys E4200 - '/apply.cgi' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Cisco Linksys E4200 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Cisco Linksys E4200 - Multiple Vulnerabilities. Author: sqlhacker |
Analyze the security implications of: Cisco Linksys E4200 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Elxis CMS 2009.2 - SQL Injection | This is a webapps exploit for php platform. Description: Elxis CMS 2009.2 - SQL Injection. Author: High-Tech Bridge SA |
Analyze the security implications of: Elxis CMS 2009.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Vixie Cron crontab 3.0 - Privilege Lowering Failure (1) | This is a local exploit for linux platform. Description: Vixie Cron crontab 3.0 - Privilege Lowering Failure (1). Author: Sebastian Krahmer |
Analyze the security implications of: Vixie Cron crontab 3.0 - Privilege Lowering Failure (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Civica - 'Display.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Civica - 'Display.asp' SQL Injection. Author: CodeXpLoder'tq |
Analyze the security implications of: Civica - 'Display.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: eXtremail 1.5.x (Linux) - Remote Format Strings | This is a remote exploit for linux platform. Description: eXtremail 1.5.x (Linux) - Remote Format Strings. Author: B-r00t |
Analyze the security implications of: eXtremail 1.5.x (Linux) - Remote Format Strings | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mambo Component SMF Forum 1.3.1.3 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Component SMF Forum 1.3.1.3 - Remote File Inclusion. Author: ASIANEAGLE |
Analyze the security implications of: Mambo Component SMF Forum 1.3.1.3 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gphotos 1.4/1.5 - 'index.php?rep' Traversal Arbitrary Directory Listing | This is a webapps exploit for php platform. Description: Gphotos 1.4/1.5 - 'index.php?rep' Traversal Arbitrary Directory Listing. Author: Morocco Security Team |
Analyze the security implications of: Gphotos 1.4/1.5 - 'index.php?rep' Traversal Arbitrary Directory Listing | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LibreNMS 1.46 - 'addhost' Remote Code Execution | This is a webapps exploit for php platform. Description: LibreNMS 1.46 - 'addhost' Remote Code Execution. Author: Askar |
Analyze the security implications of: LibreNMS 1.46 - 'addhost' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Zh YandexMap 6.2.1.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Zh YandexMap 6.2.1.0 - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Zh YandexMap 6.2.1.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ginkgo CMS - 'index.php?rang' SQL Injection | This is a webapps exploit for php platform. Description: Ginkgo CMS - 'index.php?rang' SQL Injection. Author: Raw-x |
Analyze the security implications of: Ginkgo CMS - 'index.php?rang' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Liman 0.7 - Cross-Site Request Forgery (Change Password) | This is a webapps exploit for multiple platform. Description: Liman 0.7 - Cross-Site Request Forgery (Change Password). Author: George Tsimpidas |
Analyze the security implications of: Liman 0.7 - Cross-Site Request Forgery (Change Password) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cisco IOS 11/12 - OSPF Neighbor Buffer Overflow | This is a remote exploit for hardware platform. Description: Cisco IOS 11/12 - OSPF Neighbor Buffer Overflow. Author: FX |
Analyze the security implications of: Cisco IOS 11/12 - OSPF Neighbor Buffer Overflow | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Clansphere CMS 2011.4 - Stored Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Clansphere CMS 2011.4 - Stored Cross-Site Scripting (XSS). Author: Sinem Şahin |
Analyze the security implications of: Clansphere CMS 2011.4 - Stored Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JoomProject 1.1.3.2 - Information Disclosure | This is a webapps exploit for php platform. Description: Joomla! Component JoomProject 1.1.3.2 - Information Disclosure. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JoomProject 1.1.3.2 - Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: InselPhoto 1.1 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: InselPhoto 1.1 - Cross-Site Scripting. Author: rAWjAW |
Analyze the security implications of: InselPhoto 1.1 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GLIBC 2.1.3 - 'LD_PRELOAD' Local Privilege Escalation | This is a local exploit for linux platform. Description: GLIBC 2.1.3 - 'LD_PRELOAD' Local Privilege Escalation. Author: Shadow |
Analyze the security implications of: GLIBC 2.1.3 - 'LD_PRELOAD' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component User Bench 1.0 - 'userid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component User Bench 1.0 - 'userid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component User Bench 1.0 - 'userid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ICTraveling 2.2 - Authentication Bypass | This is a webapps exploit for php platform. Description: ICTraveling 2.2 - Authentication Bypass. Author: Ihsan Sencan |
Analyze the security implications of: ICTraveling 2.2 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jax PHP Scripts 1.0/1.34/2.14/3.31 - 'jax_linklists.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Jax PHP Scripts 1.0/1.34/2.14/3.31 - 'jax_linklists.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Lostmon |
Analyze the security implications of: Jax PHP Scripts 1.0/1.34/2.14/3.31 - 'jax_linklists.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Boonex Dolphin 7.3.2 - Authentication Bypass | This is a webapps exploit for php platform. Description: Boonex Dolphin 7.3.2 - Authentication Bypass. Author: Saadi Siddiqui |
Analyze the security implications of: Boonex Dolphin 7.3.2 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CarLine Forum Russian Board 4.2 - 'menu_footer.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: CarLine Forum Russian Board 4.2 - 'menu_footer.php' Multiple Cross-Site Scripting Vulnerabilities. Author: 1dt.w0lf |
Analyze the security implications of: CarLine Forum Russian Board 4.2 - 'menu_footer.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla Firefox 3.6.12 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Mozilla Firefox 3.6.12 - Remote Denial of Service. Author: emgent white_sheep & scox |
Analyze the security implications of: Mozilla Firefox 3.6.12 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Advanced Comment System 1.0 - 'ACS_path' Path Traversal | This is a webapps exploit for php platform. Description: Advanced Comment System 1.0 - 'ACS_path' Path Traversal. Author: Francisco Javier Santiago Vázquez |
Analyze the security implications of: Advanced Comment System 1.0 - 'ACS_path' Path Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Werewolf Online 0.8.8 - Information Disclosure | This is a local exploit for android platform. Description: Werewolf Online 0.8.8 - Information Disclosure. Author: ManhNho |
Analyze the security implications of: Werewolf Online 0.8.8 - Information Disclosure | This exploit targets android systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Joomla! Component Youtube Gallery 4.1.7 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Youtube Gallery 4.1.7 - SQL Injection. Author: Pham Van Khanh |
Analyze the security implications of: Joomla! Component Youtube Gallery 4.1.7 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component paxxgallery 0.2 - 'iid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component paxxgallery 0.2 - 'iid' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! Component paxxgallery 0.2 - 'iid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SmoothWall Express 3.0 - Multiple Vulnerabilities | This is a webapps exploit for cgi platform. Description: SmoothWall Express 3.0 - Multiple Vulnerabilities. Author: dave b |
Analyze the security implications of: SmoothWall Express 3.0 - Multiple Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! / Mambo Component com_lexikon - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_lexikon - 'id' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! / Mambo Component com_lexikon - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 7.0.0 - Format String | This is a dos exploit for multiple platform. Description: PHP 7.0.0 - Format String. Author: Andrew Kramer |
Analyze the security implications of: PHP 7.0.0 - Format String | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: I_ Librarian 4.6/4.7 - Command Injection / Server Side Request Forgery / Directory Enumeration / Cross-Site Scripting | This is a webapps exploit for php platform. Description: I_ Librarian 4.6/4.7 - Command Injection / Server Side Request Forgery / Directory Enumeration / Cross-Site Scripting. Author: SEC Consult |
Analyze the security implications of: I_ Librarian 4.6/4.7 - Command Injection / Server Side Request Forgery / Directory Enumeration / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Inktomi Search Software 3.0 - Information Disclosure | This is a remote exploit for multiple platform. Description: Inktomi Search Software 3.0 - Information Disclosure. Author: china nsl |
Analyze the security implications of: Inktomi Search Software 3.0 - Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: MikroTik RouterOS < 6.38.4 (x86) - 'Chimay Red' Stack Clash Remote Code Execution | This is a remote exploit for hardware platform. Description: MikroTik RouterOS < 6.38.4 (x86) - 'Chimay Red' Stack Clash Remote Code Execution. Author: Lorenzo Santina |
Analyze the security implications of: MikroTik RouterOS < 6.38.4 (x86) - 'Chimay Red' Stack Clash Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.