input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Clickcess ChitChat.NET - topic title Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: MICROSENS Profi Line Switch 10.3.1 - Privilege Escalation | This is a webapps exploit for hardware platform. Description: MICROSENS Profi Line Switch 10.3.1 - Privilege Escalation. Author: SEC Consult |
Analyze the security implications of: MICROSENS Profi Line Switch 10.3.1 - Privilege Escalation | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Ciamos CMS 0.9.6b - 'config.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Ciamos CMS 0.9.6b - 'config.php' Remote File Inclusion. Author: Kacper |
Analyze the security implications of: Ciamos CMS 0.9.6b - 'config.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Honeywell Scada System - Information Disclosure | This is a webapps exploit for linux platform. Description: Honeywell Scada System - Information Disclosure. Author: t4rkd3vilz |
Analyze the security implications of: Honeywell Scada System - Information Disclosure | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: libbabl 0.1.62 - Broken Double Free Detection (PoC) | This is a local exploit for linux platform. Description: libbabl 0.1.62 - Broken Double Free Detection (PoC). Author: Carter Yagemann |
Analyze the security implications of: libbabl 0.1.62 - Broken Double Free Detection (PoC) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: alt-n WebAdmin 3.0.2 - Multiple Vulnerabilities | This is a webapps exploit for cgi platform. Description: alt-n WebAdmin 3.0.2 - Multiple Vulnerabilities. Author: David A. P?rez |
Analyze the security implications of: alt-n WebAdmin 3.0.2 - Multiple Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Eskolar CMS 0.9.0.0 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Eskolar CMS 0.9.0.0 - Blind SQL Injection. Author: Jacek Wlodarczyk |
Analyze the security implications of: Eskolar CMS 0.9.0.0 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component ionFiles 4.4.2 - File Disclosure | This is a webapps exploit for php platform. Description: Joomla! Component ionFiles 4.4.2 - File Disclosure. Author: Vrs-hCk |
Analyze the security implications of: Joomla! Component ionFiles 4.4.2 - File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DeDeCMS 5.5 - '_SESSION[dede_admin_id]' Authentication Bypass | This is a webapps exploit for php platform. Description: DeDeCMS 5.5 - '_SESSION[dede_admin_id]' Authentication Bypass. Author: Wolves Security Team |
Analyze the security implications of: DeDeCMS 5.5 - '_SESSION[dede_admin_id]' Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SuperBackup 2.0.5 for iOS - Persistent Cross-Site Scripting | This is a webapps exploit for ios platform. Description: SuperBackup 2.0.5 for iOS - Persistent Cross-Site Scripting. Author: Vulnerability-Lab |
Analyze the security implications of: SuperBackup 2.0.5 for iOS - Persistent Cross-Site Scripting | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Mozilla Firefox 1.5.0.6 - FTP Request Remote Denial of Service | This is a dos exploit for multiple platform. Description: Mozilla Firefox 1.5.0.6 - FTP Request Remote Denial of Service. Author: Tomas Kempinsky |
Analyze the security implications of: Mozilla Firefox 1.5.0.6 - FTP Request Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Genexis Platinum-4410 2.1 - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Genexis Platinum-4410 2.1 - Authentication Bypass. Author: Husinul Sanub |
Analyze the security implications of: Genexis Platinum-4410 2.1 - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: KDE 4.4.1 - Ksysguard Remote Code Execution (via Cross Application Scripting) | This is a remote exploit for multiple platform. Description: KDE 4.4.1 - Ksysguard Remote Code Execution (via Cross Application Scripting). Author: emgent |
Analyze the security implications of: KDE 4.4.1 - Ksysguard Remote Code Execution (via Cross Application Scripting) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FCKEditor Core - 'Editor 'spellchecker.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: FCKEditor Core - 'Editor 'spellchecker.php' Cross-Site Scripting. Author: Emilio Pinna |
Analyze the security implications of: FCKEditor Core - 'Editor 'spellchecker.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Drunken:Golem Portal 0.5.1 Alpha 2 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Drunken:Golem Portal 0.5.1 Alpha 2 - Remote File Inclusion. Author: MackRulZ |
Analyze the security implications of: Drunken:Golem Portal 0.5.1 Alpha 2 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Censtore 7.3.x - 'censtore.cgi' Remote Command Execution | This is a webapps exploit for cgi platform. Description: Censtore 7.3.x - 'censtore.cgi' Remote Command Execution. Author: FOX_MULDER |
Analyze the security implications of: Censtore 7.3.x - 'censtore.cgi' Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Linksys WAG54G2 - Web Management Console Arbitrary Command Execution | This is a local exploit for hardware platform. Description: Linksys WAG54G2 - Web Management Console Arbitrary Command Execution. Author: Securitum |
Analyze the security implications of: Linksys WAG54G2 - Web Management Console Arbitrary Command Execution | This exploit targets hardware systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Musicqueue 0.9/1.0/1.1 - Multiple Buffer Overrun Vulnerabilities | This is a local exploit for linux platform. Description: Musicqueue 0.9/1.0/1.1 - Multiple Buffer Overrun Vulnerabilities. Author: dong-h0un U |
Analyze the security implications of: Musicqueue 0.9/1.0/1.1 - Multiple Buffer Overrun Vulnerabilities | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mambo Component com_sim 0.8 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component com_sim 0.8 - Blind SQL Injection. Author: Mehmet Ince |
Analyze the security implications of: Mambo Component com_sim 0.8 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PlaySMS 1.4 - 'sendfromfile.php?Filename' (Authenticated) 'Code Execution (Metasploit) | This is a remote exploit for php platform. Description: PlaySMS 1.4 - 'sendfromfile.php?Filename' (Authenticated) 'Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: PlaySMS 1.4 - 'sendfromfile.php?Filename' (Authenticated) 'Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ListMail 112 - Command Execution | This is a webapps exploit for cgi platform. Description: ListMail 112 - Command Execution. Author: teleh0r |
Analyze the security implications of: ListMail 112 - Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: PHP 5.2.0/5.2.1 - Rejected Session ID Double-Free | This is a local exploit for linux platform. Description: PHP 5.2.0/5.2.1 - Rejected Session ID Double-Free. Author: Stefan Esser |
Analyze the security implications of: PHP 5.2.0/5.2.1 - Rejected Session ID Double-Free | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Active Trade 2 - Authentication Bypass | This is a webapps exploit for asp platform. Description: Active Trade 2 - Authentication Bypass. Author: R3d-D3V!L |
Analyze the security implications of: Active Trade 2 - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Mambo Open Source 4.6 - 'Itemid' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Mambo Open Source 4.6 - 'Itemid' Cross-Site Scripting. Author: David Sopas Ferreira |
Analyze the security implications of: Mambo Open Source 4.6 - 'Itemid' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebKit JSC - Incorrect Check in emitPutDerivedConstructorToArrowFunctionContextScope | This is a dos exploit for multiple platform. Description: WebKit JSC - Incorrect Check in emitPutDerivedConstructorToArrowFunctionContextScope. Author: Google Security Research |
Analyze the security implications of: WebKit JSC - Incorrect Check in emitPutDerivedConstructorToArrowFunctionContextScope | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: systemd - 'reexec' State Injection | This is a dos exploit for linux platform. Description: systemd - 'reexec' State Injection. Author: Google Security Research |
Analyze the security implications of: systemd - 'reexec' State Injection | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BosClassifieds 1.20 - 'recent.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: BosClassifieds 1.20 - 'recent.php' Cross-Site Scripting. Author: indoushka |
Analyze the security implications of: BosClassifieds 1.20 - 'recent.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Geotarget - 'script.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Geotarget - 'script.php' Remote File Inclusion. Author: RaVeR shi mozi |
Analyze the security implications of: Geotarget - 'script.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Teracom Modem T2-B-Gawv1.4U10Y-BI - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Teracom Modem T2-B-Gawv1.4U10Y-BI - Cross-Site Request Forgery. Author: Rakesh S |
Analyze the security implications of: Teracom Modem T2-B-Gawv1.4U10Y-BI - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AV Arcade 2.1b - 'index.php?id' SQL Injection | This is a webapps exploit for php platform. Description: AV Arcade 2.1b - 'index.php?id' SQL Injection. Author: Kw3[R]Ln |
Analyze the security implications of: AV Arcade 2.1b - 'index.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ATFTP 0.7 - Timeout Command Line Argument Local Buffer Overflow | This is a local exploit for linux platform. Description: ATFTP 0.7 - Timeout Command Line Argument Local Buffer Overflow. Author: Julien LANTHEA |
Analyze the security implications of: ATFTP 0.7 - Timeout Command Line Argument Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple Mac OSX / iOS - Unsandboxable Kernel Code Exection Due to iokit Double Release in IOKit | This is a dos exploit for osx platform. Description: Apple Mac OSX / iOS - Unsandboxable Kernel Code Exection Due to iokit Double Release in IOKit. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX / iOS - Unsandboxable Kernel Code Exection Due to iokit Double Release in IOKit | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Color Notes 1.4 - Denial of Service (PoC) | This is a dos exploit for ios platform. Description: Color Notes 1.4 - Denial of Service (PoC). Author: Geovanni Ruiz |
Analyze the security implications of: Color Notes 1.4 - Denial of Service (PoC) | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: DB4Web 3.4/3.6 - Connection Proxy | This is a remote exploit for multiple platform. Description: DB4Web 3.4/3.6 - Connection Proxy. Author: Stefan Bagdohn |
Analyze the security implications of: DB4Web 3.4/3.6 - Connection Proxy | This exploit targets multiple systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.