input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Mambo Open Source 4.6.2 - '/administrator/popups/index3pop.php?mosConfig_sitename' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_kp - 'Controller' Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_kp - 'Controller' Local File Inclusion. Author: the_cyber_nuxbie |
Analyze the security implications of: Joomla! Component com_kp - 'Controller' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! 1.6.3 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Joomla! 1.6.3 - Cross-Site Request Forgery. Author: Luis Santana |
Analyze the security implications of: Joomla! 1.6.3 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Neon WebDAV Client Library 0.2x - Format String | This is a dos exploit for linux platform. Description: Neon WebDAV Client Library 0.2x - Format String. Author: Thomas Wana |
Analyze the security implications of: Neon WebDAV Client Library 0.2x - Format String | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: HP Insight Diagnostics Online Edition 8.4 - 'search.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: HP Insight Diagnostics Online Edition 8.4 - 'search.php' Cross-Site Scripting. Author: Richard Brain |
Analyze the security implications of: HP Insight Diagnostics Online Edition 8.4 - 'search.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SAP NetWeaver AS JAVA 7.1 < 7.5 - Directory Traversal | This is a webapps exploit for java platform. Description: SAP NetWeaver AS JAVA 7.1 < 7.5 - Directory Traversal. Author: ERPScan |
Analyze the security implications of: SAP NetWeaver AS JAVA 7.1 < 7.5 - Directory Traversal | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: DataLife Engine 8.2 - dle_config_api Remote File Inclusion | This is a webapps exploit for php platform. Description: DataLife Engine 8.2 - dle_config_api Remote File Inclusion. Author: Kurd-Team |
Analyze the security implications of: DataLife Engine 8.2 - dle_config_api Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Whatsapp 2.19.216 - Remote Code Execution | This is a remote exploit for android platform. Description: Whatsapp 2.19.216 - Remote Code Execution. Author: Valerio Brussani |
Analyze the security implications of: Whatsapp 2.19.216 - Remote Code Execution | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Moreover CGI script - File Disclosure | This is a remote exploit for cgi platform. Description: Moreover CGI script - File Disclosure. Author: CDI |
Analyze the security implications of: Moreover CGI script - File Disclosure | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: WordPress Core 4.7.0/4.7.1 - Content Injection | This is a webapps exploit for linux platform. Description: WordPress Core 4.7.0/4.7.1 - Content Injection. Author: leonjza |
Analyze the security implications of: WordPress Core 4.7.0/4.7.1 - Content Injection | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: HP System Management Homepage - Local Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: HP System Management Homepage - Local Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: HP System Management Homepage - Local Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cisco IOS 11/12 - SNMP Message Denial of Service | This is a dos exploit for hardware platform. Description: Cisco IOS 11/12 - SNMP Message Denial of Service. Author: kundera |
Analyze the security implications of: Cisco IOS 11/12 - SNMP Message Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Mambo Component com_gallery - SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component com_gallery - SQL Injection. Author: S@BUN |
Analyze the security implications of: Mambo Component com_gallery - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 427BB 2.2 - Authentication Bypass | This is a webapps exploit for php platform. Description: 427BB 2.2 - Authentication Bypass. Author: Aliaksandr Hartsuyeu |
Analyze the security implications of: 427BB 2.2 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Airties - login-cgi Buffer Overflow (Metasploit) | This is a remote exploit for hardware platform. Description: Airties - login-cgi Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Airties - login-cgi Buffer Overflow (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FaName 1.0 - 'page.php?name' Cross-Site Scripting | This is a webapps exploit for php platform. Description: FaName 1.0 - 'page.php?name' Cross-Site Scripting. Author: Jesper Jurcenoks |
Analyze the security implications of: FaName 1.0 - 'page.php?name' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMSbright - 'id_rub_page' SQL Injection | This is a webapps exploit for php platform. Description: CMSbright - 'id_rub_page' SQL Injection. Author: h4ck3r |
Analyze the security implications of: CMSbright - 'id_rub_page' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX xnu 1228.0 - 'mach-o' Local Kernel Denial of Service (PoC) | This is a dos exploit for osx platform. Description: Apple Mac OSX xnu 1228.0 - 'mach-o' Local Kernel Denial of Service (PoC). Author: mu-b |
Analyze the security implications of: Apple Mac OSX xnu 1228.0 - 'mach-o' Local Kernel Denial of Service (PoC) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Splunk 4.3.1 - Denial of Service | This is a dos exploit for multiple platform. Description: Splunk 4.3.1 - Denial of Service. Author: Alexander Klink |
Analyze the security implications of: Splunk 4.3.1 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: EasySite 2.0 - 'skin_chooser.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: EasySite 2.0 - 'skin_chooser.php' Remote File Inclusion. Author: ZoRLu |
Analyze the security implications of: EasySite 2.0 - 'skin_chooser.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WU-IMAP 2000.287(1-2) - Remote Overflow | This is a remote exploit for linux platform. Description: WU-IMAP 2000.287(1-2) - Remote Overflow. Author: Teso |
Analyze the security implications of: WU-IMAP 2000.287(1-2) - Remote Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Newspost 2.1 - 'socket_getline()' Remote Buffer Overflow (2) | This is a remote exploit for linux platform. Description: Newspost 2.1 - 'socket_getline()' Remote Buffer Overflow (2). Author: cybertronic |
Analyze the security implications of: Newspost 2.1 - 'socket_getline()' Remote Buffer Overflow (2) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Eclipse 3.3.2 IDE - 'Help Server help/advanced/searchView.jsp?SearchWord' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Eclipse 3.3.2 IDE - 'Help Server help/advanced/searchView.jsp?SearchWord' Cross-Site Scripting. Author: Rob |
Analyze the security implications of: Eclipse 3.3.2 IDE - 'Help Server help/advanced/searchView.jsp?SearchWord' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AirTies Air5341 Modem 1.0.0.12 - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: AirTies Air5341 Modem 1.0.0.12 - Cross-Site Request Forgery. Author: Ali Can Gönüllü |
Analyze the security implications of: AirTies Air5341 Modem 1.0.0.12 - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ICAutosales 2.2 - SQL Injection | This is a webapps exploit for php platform. Description: ICAutosales 2.2 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: ICAutosales 2.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Buddy Zone 1.5 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Buddy Zone 1.5 - Multiple SQL Injections. Author: t0pP8uZz |
Analyze the security implications of: Buddy Zone 1.5 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNU Indent 2.2.9 - Local Heap Overflow | This is a local exploit for linux platform. Description: GNU Indent 2.2.9 - Local Heap Overflow. Author: Pooh Hacking Squadron |
Analyze the security implications of: GNU Indent 2.2.9 - Local Heap Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FunkBoard 0.66 - 'register.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: FunkBoard 0.66 - 'register.php' Multiple Cross-Site Scripting Vulnerabilities. Author: rgod |
Analyze the security implications of: FunkBoard 0.66 - 'register.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Novell Access Manager 3 Identity Server - 'IssueInstant' Cross-Site Scripting | This is a remote exploit for novell platform. Description: Novell Access Manager 3 Identity Server - 'IssueInstant' Cross-Site Scripting. Author: anonymous |
Analyze the security implications of: Novell Access Manager 3 Identity Server - 'IssueInstant' Cross-Site Scripting | This exploit targets novell systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: AnnonceScriptHP 2.0 - 'email.php?id' SQL Injection | This is a webapps exploit for php platform. Description: AnnonceScriptHP 2.0 - 'email.php?id' SQL Injection. Author: Mr_KaLiMaN |
Analyze the security implications of: AnnonceScriptHP 2.0 - 'email.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - 'getPreviewImage' Directory Traversal/Local File Inclusion | This is a webapps exploit for linux platform. Description: Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - 'getPreviewImage' Directory Traversal/Local File Inclusion. Author: Ivo Palazzolo |
Analyze the security implications of: Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - 'getPreviewImage' Directory Traversal/Local File Inclusion | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Gespage 7.4.8 - SQL Injection | This is a webapps exploit for jsp platform. Description: Gespage 7.4.8 - SQL Injection. Author: Sysdream |
Analyze the security implications of: Gespage 7.4.8 - SQL Injection | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Joomla! Component Spider Calendar - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Spider Calendar - SQL Injection. Author: D4NB4R |
Analyze the security implications of: Joomla! Component Spider Calendar - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Evince PDF Reader 2.32.0.145 (Windows) / 3.4.0 (Linux) - Denial of Service | This is a dos exploit for multiple platform. Description: Evince PDF Reader 2.32.0.145 (Windows) / 3.4.0 (Linux) - Denial of Service. Author: Deva |
Analyze the security implications of: Evince PDF Reader 2.32.0.145 (Windows) / 3.4.0 (Linux) - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.