input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Jenkins 1.633 - Credential Recovery | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Cisco IDS Device Manager 3.1.1 - Arbitrary File Read Access | This is a remote exploit for hardware platform. Description: Cisco IDS Device Manager 3.1.1 - Arbitrary File Read Access. Author: Andrew Lopacki |
Analyze the security implications of: Cisco IDS Device Manager 3.1.1 - Arbitrary File Read Access | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ChiKoi v1.0 - SQL Injection | This is a webapps exploit for php platform. Description: ChiKoi v1.0 - SQL Injection. Author: nu11secur1ty |
Analyze the security implications of: ChiKoi v1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KEMP LoadMaster 7.135.0.13245 - Persistent Cross-Site Scripting / Remote Code Execution | This is a webapps exploit for multiple platform. Description: KEMP LoadMaster 7.135.0.13245 - Persistent Cross-Site Scripting / Remote Code Execution. Author: SecuriTeam |
Analyze the security implications of: KEMP LoadMaster 7.135.0.13245 - Persistent Cross-Site Scripting / Remote Code Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CANDID - '/image/view.php?image_id' SQL Injection | This is a webapps exploit for php platform. Description: CANDID - '/image/view.php?image_id' SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: CANDID - '/image/view.php?image_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel - 'mincore()' Heap Page Disclosure (PoC) | This is a dos exploit for linux platform. Description: Linux Kernel - 'mincore()' Heap Page Disclosure (PoC). Author: anonymous |
Analyze the security implications of: Linux Kernel - 'mincore()' Heap Page Disclosure (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AT 3.1.8 - Formatted Time Heap Overflow | This is a local exploit for linux platform. Description: AT 3.1.8 - Formatted Time Heap Overflow. Author: SuSE Security |
Analyze the security implications of: AT 3.1.8 - Formatted Time Heap Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: HP Procurve 4000M Switch - Device Reset Denial of Service | This is a dos exploit for hardware platform. Description: HP Procurve 4000M Switch - Device Reset Denial of Service. Author: Brook Powers |
Analyze the security implications of: HP Procurve 4000M Switch - Device Reset Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Aztech Modem Routers - Information Disclosure | This is a remote exploit for hardware platform. Description: Aztech Modem Routers - Information Disclosure. Author: Eric Fajardo |
Analyze the security implications of: Aztech Modem Routers - Information Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: HID discoveryd - 'command_blink_on' Remote Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: HID discoveryd - 'command_blink_on' Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: HID discoveryd - 'command_blink_on' Remote Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: MiniUPnP MiniUPnPc < 2.0 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: MiniUPnP MiniUPnPc < 2.0 - Remote Denial of Service. Author: tintinweb |
Analyze the security implications of: MiniUPnP MiniUPnPc < 2.0 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AjaxExplorer 1.10.3.2 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: AjaxExplorer 1.10.3.2 - Multiple Vulnerabilities. Author: hyp3rlinx |
Analyze the security implications of: AjaxExplorer 1.10.3.2 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle 9i/10g Database - Network Foundation Remote Overflow | This is a remote exploit for multiple platform. Description: Oracle 9i/10g Database - Network Foundation Remote Overflow. Author: Dennis Yurichev |
Analyze the security implications of: Oracle 9i/10g Database - Network Foundation Remote Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Plesk Server Administrator (PSA) - 'locale' Local File Inclusion | This is a webapps exploit for multiple platform. Description: Plesk Server Administrator (PSA) - 'locale' Local File Inclusion. Author: Pouya Daneshmand |
Analyze the security implications of: Plesk Server Administrator (PSA) - 'locale' Local File Inclusion | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Casino 0.3.1 - Multiple SQL Injections s | This is a webapps exploit for php platform. Description: Joomla! Component Casino 0.3.1 - Multiple SQL Injections s. Author: ByALBAYX |
Analyze the security implications of: Joomla! Component Casino 0.3.1 - Multiple SQL Injections s | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Virtual Vertex Muster 6.1.6 - Web Interface Directory Traversal | This is a webapps exploit for asp platform. Description: Virtual Vertex Muster 6.1.6 - Web Interface Directory Traversal. Author: Nick Freeman |
Analyze the security implications of: Virtual Vertex Muster 6.1.6 - Web Interface Directory Traversal | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Netgear WNR2000v5 - 'hidden_lang_avi' Remote Stack Overflow (Metasploit) | This is a remote exploit for hardware platform. Description: Netgear WNR2000v5 - 'hidden_lang_avi' Remote Stack Overflow (Metasploit). Author: Pedro Ribeiro |
Analyze the security implications of: Netgear WNR2000v5 - 'hidden_lang_avi' Remote Stack Overflow (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DAMICMS 6.0.0 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: DAMICMS 6.0.0 - Cross-Site Request Forgery (Add Admin). Author: bay0net |
Analyze the security implications of: DAMICMS 6.0.0 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_tag - 'tag' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_tag - 'tag' SQL Injection. Author: D4NB4R |
Analyze the security implications of: Joomla! Component com_tag - 'tag' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ION Script 1.4 - Remote File Disclosure | This is a webapps exploit for cgi platform. Description: ION Script 1.4 - Remote File Disclosure. Author: Zero X |
Analyze the security implications of: ION Script 1.4 - Remote File Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: docpile:we 0.2.2 - 'INIT_PATH' Remote File Inclusion | This is a webapps exploit for php platform. Description: docpile:we 0.2.2 - 'INIT_PATH' Remote File Inclusion. Author: Mehmet Ince |
Analyze the security implications of: docpile:we 0.2.2 - 'INIT_PATH' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ask Expert Script 3.0.5 - Cross Site Scripting / SQL Injection | This is a webapps exploit for php platform. Description: Ask Expert Script 3.0.5 - Cross Site Scripting / SQL Injection. Author: Mr Winst0n |
Analyze the security implications of: Ask Expert Script 3.0.5 - Cross Site Scripting / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OFTPD 0.3.x - User Command Buffer Overflow | This is a dos exploit for linux platform. Description: OFTPD 0.3.x - User Command Buffer Overflow. Author: new.security@gmail.com |
Analyze the security implications of: OFTPD 0.3.x - User Command Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Pay Roll Time Sheet and Punch Card Application With Web UI - 'login.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Pay Roll Time Sheet and Punch Card Application With Web UI - 'login.asp' SQL Injection. Author: Aria-Security Team |
Analyze the security implications of: Pay Roll Time Sheet and Punch Card Application With Web UI - 'login.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Alibaba Clone Platinum - 'about_us.php' SQL Injection | This is a webapps exploit for php platform. Description: Alibaba Clone Platinum - 'about_us.php' SQL Injection. Author: CoBRa_21 |
Analyze the security implications of: Alibaba Clone Platinum - 'about_us.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pre Survey Generator - 'default.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Pre Survey Generator - 'default.asp' SQL Injection. Author: DreamTurk |
Analyze the security implications of: Pre Survey Generator - 'default.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: McAfee Email Gateway (formerly IronMail) - Denial of Service | This is a dos exploit for hardware platform. Description: McAfee Email Gateway (formerly IronMail) - Denial of Service. Author: Nahuel Grisolia |
Analyze the security implications of: McAfee Email Gateway (formerly IronMail) - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Double Your Bitcoin Script Automatic - Authentication Bypass | This is a webapps exploit for php platform. Description: Double Your Bitcoin Script Automatic - Authentication Bypass. Author: Veyselxan |
Analyze the security implications of: Double Your Bitcoin Script Automatic - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco CallManager 3.x/4.x - 'Web Interface 'ccmadmin/phonelist.asp?Pattern' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Cisco CallManager 3.x/4.x - 'Web Interface 'ccmadmin/phonelist.asp?Pattern' Cross-Site Scripting. Author: Jake Reynolds |
Analyze the security implications of: Cisco CallManager 3.x/4.x - 'Web Interface 'ccmadmin/phonelist.asp?Pattern' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component com_org - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_org - SQL Injection. Author: N2n-Hacker |
Analyze the security implications of: Joomla! Component com_org - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FluxBB 1.5.11 - Stored Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: FluxBB 1.5.11 - Stored Cross-Site Scripting (XSS). Author: Chokri Hammedi |
Analyze the security implications of: FluxBB 1.5.11 - Stored Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Asterisk 1.0.12/1.2.12.1 - 'chan_skinny' Remote Heap Overflow (PoC) | This is a dos exploit for multiple platform. Description: Asterisk 1.0.12/1.2.12.1 - 'chan_skinny' Remote Heap Overflow (PoC). Author: Noam Rathaus |
Analyze the security implications of: Asterisk 1.0.12/1.2.12.1 - 'chan_skinny' Remote Heap Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PHP 5.2.1 - Multiple functions 'Reference' Information Disclosures | This is a local exploit for php platform. Description: PHP 5.2.1 - Multiple functions 'Reference' Information Disclosures. Author: Stefan Esser |
Analyze the security implications of: PHP 5.2.1 - Multiple functions 'Reference' Information Disclosures | This exploit targets php systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Automatic-Systems SOC FL9600 FastLine - Directory Transversal | This is a webapps exploit for php platform. Description: Automatic-Systems SOC FL9600 FastLine - Directory Transversal. Author: Marcin Kozlowski |
Analyze the security implications of: Automatic-Systems SOC FL9600 FastLine - Directory Transversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.