input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Clickcess ChitChat.NET - topic title Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: MICROSENS Profi Line Switch 10.3.1 - Privilege Escalation
|
This is a webapps exploit for hardware platform. Description: MICROSENS Profi Line Switch 10.3.1 - Privilege Escalation. Author: SEC Consult
|
Analyze the security implications of: MICROSENS Profi Line Switch 10.3.1 - Privilege Escalation
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Ciamos CMS 0.9.6b - 'config.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Ciamos CMS 0.9.6b - 'config.php' Remote File Inclusion. Author: Kacper
|
Analyze the security implications of: Ciamos CMS 0.9.6b - 'config.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Honeywell Scada System - Information Disclosure
|
This is a webapps exploit for linux platform. Description: Honeywell Scada System - Information Disclosure. Author: t4rkd3vilz
|
Analyze the security implications of: Honeywell Scada System - Information Disclosure
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: libbabl 0.1.62 - Broken Double Free Detection (PoC)
|
This is a local exploit for linux platform. Description: libbabl 0.1.62 - Broken Double Free Detection (PoC). Author: Carter Yagemann
|
Analyze the security implications of: libbabl 0.1.62 - Broken Double Free Detection (PoC)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: alt-n WebAdmin 3.0.2 - Multiple Vulnerabilities
|
This is a webapps exploit for cgi platform. Description: alt-n WebAdmin 3.0.2 - Multiple Vulnerabilities. Author: David A. P?rez
|
Analyze the security implications of: alt-n WebAdmin 3.0.2 - Multiple Vulnerabilities
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Eskolar CMS 0.9.0.0 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Eskolar CMS 0.9.0.0 - Blind SQL Injection. Author: Jacek Wlodarczyk
|
Analyze the security implications of: Eskolar CMS 0.9.0.0 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component ionFiles 4.4.2 - File Disclosure
|
This is a webapps exploit for php platform. Description: Joomla! Component ionFiles 4.4.2 - File Disclosure. Author: Vrs-hCk
|
Analyze the security implications of: Joomla! Component ionFiles 4.4.2 - File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DeDeCMS 5.5 - '_SESSION[dede_admin_id]' Authentication Bypass
|
This is a webapps exploit for php platform. Description: DeDeCMS 5.5 - '_SESSION[dede_admin_id]' Authentication Bypass. Author: Wolves Security Team
|
Analyze the security implications of: DeDeCMS 5.5 - '_SESSION[dede_admin_id]' Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SuperBackup 2.0.5 for iOS - Persistent Cross-Site Scripting
|
This is a webapps exploit for ios platform. Description: SuperBackup 2.0.5 for iOS - Persistent Cross-Site Scripting. Author: Vulnerability-Lab
|
Analyze the security implications of: SuperBackup 2.0.5 for iOS - Persistent Cross-Site Scripting
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Mozilla Firefox 1.5.0.6 - FTP Request Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Mozilla Firefox 1.5.0.6 - FTP Request Remote Denial of Service. Author: Tomas Kempinsky
|
Analyze the security implications of: Mozilla Firefox 1.5.0.6 - FTP Request Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Genexis Platinum-4410 2.1 - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Genexis Platinum-4410 2.1 - Authentication Bypass. Author: Husinul Sanub
|
Analyze the security implications of: Genexis Platinum-4410 2.1 - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: KDE 4.4.1 - Ksysguard Remote Code Execution (via Cross Application Scripting)
|
This is a remote exploit for multiple platform. Description: KDE 4.4.1 - Ksysguard Remote Code Execution (via Cross Application Scripting). Author: emgent
|
Analyze the security implications of: KDE 4.4.1 - Ksysguard Remote Code Execution (via Cross Application Scripting)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: FCKEditor Core - 'Editor 'spellchecker.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: FCKEditor Core - 'Editor 'spellchecker.php' Cross-Site Scripting. Author: Emilio Pinna
|
Analyze the security implications of: FCKEditor Core - 'Editor 'spellchecker.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Drunken:Golem Portal 0.5.1 Alpha 2 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Drunken:Golem Portal 0.5.1 Alpha 2 - Remote File Inclusion. Author: MackRulZ
|
Analyze the security implications of: Drunken:Golem Portal 0.5.1 Alpha 2 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Censtore 7.3.x - 'censtore.cgi' Remote Command Execution
|
This is a webapps exploit for cgi platform. Description: Censtore 7.3.x - 'censtore.cgi' Remote Command Execution. Author: FOX_MULDER
|
Analyze the security implications of: Censtore 7.3.x - 'censtore.cgi' Remote Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Linksys WAG54G2 - Web Management Console Arbitrary Command Execution
|
This is a local exploit for hardware platform. Description: Linksys WAG54G2 - Web Management Console Arbitrary Command Execution. Author: Securitum
|
Analyze the security implications of: Linksys WAG54G2 - Web Management Console Arbitrary Command Execution
|
This exploit targets hardware systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Musicqueue 0.9/1.0/1.1 - Multiple Buffer Overrun Vulnerabilities
|
This is a local exploit for linux platform. Description: Musicqueue 0.9/1.0/1.1 - Multiple Buffer Overrun Vulnerabilities. Author: dong-h0un U
|
Analyze the security implications of: Musicqueue 0.9/1.0/1.1 - Multiple Buffer Overrun Vulnerabilities
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Mambo Component com_sim 0.8 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Mambo Component com_sim 0.8 - Blind SQL Injection. Author: Mehmet Ince
|
Analyze the security implications of: Mambo Component com_sim 0.8 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PlaySMS 1.4 - 'sendfromfile.php?Filename' (Authenticated) 'Code Execution (Metasploit)
|
This is a remote exploit for php platform. Description: PlaySMS 1.4 - 'sendfromfile.php?Filename' (Authenticated) 'Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: PlaySMS 1.4 - 'sendfromfile.php?Filename' (Authenticated) 'Code Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ListMail 112 - Command Execution
|
This is a webapps exploit for cgi platform. Description: ListMail 112 - Command Execution. Author: teleh0r
|
Analyze the security implications of: ListMail 112 - Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: PHP 5.2.0/5.2.1 - Rejected Session ID Double-Free
|
This is a local exploit for linux platform. Description: PHP 5.2.0/5.2.1 - Rejected Session ID Double-Free. Author: Stefan Esser
|
Analyze the security implications of: PHP 5.2.0/5.2.1 - Rejected Session ID Double-Free
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Active Trade 2 - Authentication Bypass
|
This is a webapps exploit for asp platform. Description: Active Trade 2 - Authentication Bypass. Author: R3d-D3V!L
|
Analyze the security implications of: Active Trade 2 - Authentication Bypass
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Mambo Open Source 4.6 - 'Itemid' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Mambo Open Source 4.6 - 'Itemid' Cross-Site Scripting. Author: David Sopas Ferreira
|
Analyze the security implications of: Mambo Open Source 4.6 - 'Itemid' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WebKit JSC - Incorrect Check in emitPutDerivedConstructorToArrowFunctionContextScope
|
This is a dos exploit for multiple platform. Description: WebKit JSC - Incorrect Check in emitPutDerivedConstructorToArrowFunctionContextScope. Author: Google Security Research
|
Analyze the security implications of: WebKit JSC - Incorrect Check in emitPutDerivedConstructorToArrowFunctionContextScope
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: systemd - 'reexec' State Injection
|
This is a dos exploit for linux platform. Description: systemd - 'reexec' State Injection. Author: Google Security Research
|
Analyze the security implications of: systemd - 'reexec' State Injection
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: BosClassifieds 1.20 - 'recent.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: BosClassifieds 1.20 - 'recent.php' Cross-Site Scripting. Author: indoushka
|
Analyze the security implications of: BosClassifieds 1.20 - 'recent.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Geotarget - 'script.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Geotarget - 'script.php' Remote File Inclusion. Author: RaVeR shi mozi
|
Analyze the security implications of: Geotarget - 'script.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Teracom Modem T2-B-Gawv1.4U10Y-BI - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: Teracom Modem T2-B-Gawv1.4U10Y-BI - Cross-Site Request Forgery. Author: Rakesh S
|
Analyze the security implications of: Teracom Modem T2-B-Gawv1.4U10Y-BI - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: AV Arcade 2.1b - 'index.php?id' SQL Injection
|
This is a webapps exploit for php platform. Description: AV Arcade 2.1b - 'index.php?id' SQL Injection. Author: Kw3[R]Ln
|
Analyze the security implications of: AV Arcade 2.1b - 'index.php?id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ATFTP 0.7 - Timeout Command Line Argument Local Buffer Overflow
|
This is a local exploit for linux platform. Description: ATFTP 0.7 - Timeout Command Line Argument Local Buffer Overflow. Author: Julien LANTHEA
|
Analyze the security implications of: ATFTP 0.7 - Timeout Command Line Argument Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apple Mac OSX / iOS - Unsandboxable Kernel Code Exection Due to iokit Double Release in IOKit
|
This is a dos exploit for osx platform. Description: Apple Mac OSX / iOS - Unsandboxable Kernel Code Exection Due to iokit Double Release in IOKit. Author: Google Security Research
|
Analyze the security implications of: Apple Mac OSX / iOS - Unsandboxable Kernel Code Exection Due to iokit Double Release in IOKit
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Color Notes 1.4 - Denial of Service (PoC)
|
This is a dos exploit for ios platform. Description: Color Notes 1.4 - Denial of Service (PoC). Author: Geovanni Ruiz
|
Analyze the security implications of: Color Notes 1.4 - Denial of Service (PoC)
|
This exploit targets ios systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: DB4Web 3.4/3.6 - Connection Proxy
|
This is a remote exploit for multiple platform. Description: DB4Web 3.4/3.6 - Connection Proxy. Author: Stefan Bagdohn
|
Analyze the security implications of: DB4Web 3.4/3.6 - Connection Proxy
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.