input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: dotDefender 3.8-5 - Remote Command Execution | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Osprey Pump Controller 1.0.1 - Predictable Session Token / Session Hijack | This is a remote exploit for hardware platform. Description: Osprey Pump Controller 1.0.1 - Predictable Session Token / Session Hijack. Author: LiquidWorm |
Analyze the security implications of: Osprey Pump Controller 1.0.1 - Predictable Session Token / Session Hijack | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: libxml2 - htmlCurrentChar Heap Buffer Overread | This is a dos exploit for linux platform. Description: libxml2 - htmlCurrentChar Heap Buffer Overread. Author: Google Security Research |
Analyze the security implications of: libxml2 - htmlCurrentChar Heap Buffer Overread | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component Xe webtv - 'id' Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Xe webtv - 'id' Blind SQL Injection. Author: His0k4 |
Analyze the security implications of: Joomla! Component Xe webtv - 'id' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fork CMS 5.4.0 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Fork CMS 5.4.0 - Cross-Site Scripting. Author: Ismail Tasdelen |
Analyze the security implications of: Fork CMS 5.4.0 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IPBProArcade 2.5.2 - 'GameID' SQL Injection | This is a webapps exploit for php platform. Description: IPBProArcade 2.5.2 - 'GameID' SQL Injection. Author: almaster |
Analyze the security implications of: IPBProArcade 2.5.2 - 'GameID' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Symantec Endpoint Protection 12.1.4023.4080 - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: Symantec Endpoint Protection 12.1.4023.4080 - Multiple Vulnerabilities. Author: SEC Consult |
Analyze the security implications of: Symantec Endpoint Protection 12.1.4023.4080 - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: AutoCar 1.1 - 'category' SQL Injection | This is a webapps exploit for php platform. Description: AutoCar 1.1 - 'category' SQL Injection. Author: Bora Bozdogan |
Analyze the security implications of: AutoCar 1.1 - 'category' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Colloquy 2.1.3545 - 'INVITE' Format String Denial of Service | This is a dos exploit for osx platform. Description: Colloquy 2.1.3545 - 'INVITE' Format String Denial of Service. Author: MoAB |
Analyze the security implications of: Colloquy 2.1.3545 - 'INVITE' Format String Denial of Service | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: cPanel 5 < 9 - Local Privilege Escalation | This is a local exploit for linux platform. Description: cPanel 5 < 9 - Local Privilege Escalation. Author: Rob Brown |
Analyze the security implications of: cPanel 5 < 9 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Etomite CMS 0.6.1.2 - '/manager/index.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Etomite CMS 0.6.1.2 - '/manager/index.php' Local File Inclusion. Author: Revenge |
Analyze the security implications of: Etomite CMS 0.6.1.2 - '/manager/index.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Atlassian JIRA FishEye 2.5.7 / Crucible 2.5.7 Plugins - XML Parsing Security | This is a webapps exploit for jsp platform. Description: Atlassian JIRA FishEye 2.5.7 / Crucible 2.5.7 Plugins - XML Parsing Security. Author: anonymous |
Analyze the security implications of: Atlassian JIRA FishEye 2.5.7 / Crucible 2.5.7 Plugins - XML Parsing Security | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Chipmunk Guestbook 1.3 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: Chipmunk Guestbook 1.3 - 'index.php' SQL Injection. Author: Dr.Jr7 |
Analyze the security implications of: Chipmunk Guestbook 1.3 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Arab Portal 3 - SQL Injection | This is a webapps exploit for php platform. Description: Arab Portal 3 - SQL Injection. Author: ali ahmady |
Analyze the security implications of: Arab Portal 3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EasyPHPCalendar 6.1.5/6.2.x - 'popup.php?serverPath' Remote File Inclusion | This is a webapps exploit for php platform. Description: EasyPHPCalendar 6.1.5/6.2.x - 'popup.php?serverPath' Remote File Inclusion. Author: Albania Security Clan |
Analyze the security implications of: EasyPHPCalendar 6.1.5/6.2.x - 'popup.php?serverPath' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Netgear DGN2200B - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Netgear DGN2200B - Multiple Vulnerabilities. Author: m-1-k-3 |
Analyze the security implications of: Netgear DGN2200B - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Barebones CMS v2.0.2 - Stored Cross-Site Scripting (XSS) (Authenticated) | This is a webapps exploit for php platform. Description: Barebones CMS v2.0.2 - Stored Cross-Site Scripting (XSS) (Authenticated). Author: tmrswrr |
Analyze the security implications of: Barebones CMS v2.0.2 - Stored Cross-Site Scripting (XSS) (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreshRSS 1.11.1 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: FreshRSS 1.11.1 - Cross-Site Scripting. Author: Netsparker |
Analyze the security implications of: FreshRSS 1.11.1 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lokomedia CMS - 'sukaCMS' Local File Disclosure | This is a webapps exploit for php platform. Description: Lokomedia CMS - 'sukaCMS' Local File Disclosure. Author: vir0e5 |
Analyze the security implications of: Lokomedia CMS - 'sukaCMS' Local File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Samhain Labs 1.x - HSFTP Remote Format String | This is a remote exploit for linux platform. Description: Samhain Labs 1.x - HSFTP Remote Format String. Author: priest@priestmaster.org |
Analyze the security implications of: Samhain Labs 1.x - HSFTP Remote Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PHP 5.2.3 - 'bz2 com_print_typeinfo()' Denial of Service | This is a dos exploit for multiple platform. Description: PHP 5.2.3 - 'bz2 com_print_typeinfo()' Denial of Service. Author: shinnai |
Analyze the security implications of: PHP 5.2.3 - 'bz2 com_print_typeinfo()' Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: file upload Ar Version - Arbitrary File Upload | This is a webapps exploit for php platform. Description: file upload Ar Version - Arbitrary File Upload. Author: indoushka |
Analyze the security implications of: file upload Ar Version - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BSDi 3.0 inc - Local Buffer Overflow / Local Privilege Escalation | This is a local exploit for bsd platform. Description: BSDi 3.0 inc - Local Buffer Overflow / Local Privilege Escalation. Author: vade79 |
Analyze the security implications of: BSDi 3.0 inc - Local Buffer Overflow / Local Privilege Escalation | This exploit targets bsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Serious Sam Engine 1.0.5 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Serious Sam Engine 1.0.5 - Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Serious Sam Engine 1.0.5 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linksys WRT160N - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Linksys WRT160N - Multiple Vulnerabilities. Author: m-1-k-3 |
Analyze the security implications of: Linksys WRT160N - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Check Point VPN-1 UTM Edge NGX 7.0.48x - Login Page Cross-Site Scripting | This is a remote exploit for hardware platform. Description: Check Point VPN-1 UTM Edge NGX 7.0.48x - Login Page Cross-Site Scripting. Author: Henri Lindberg |
Analyze the security implications of: Check Point VPN-1 UTM Edge NGX 7.0.48x - Login Page Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Trustwave SWG 11.8.0.27 - SSH Unauthorized Access | This is a remote exploit for linux platform. Description: Trustwave SWG 11.8.0.27 - SSH Unauthorized Access. Author: SecuriTeam |
Analyze the security implications of: Trustwave SWG 11.8.0.27 - SSH Unauthorized Access | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Markdownify 1.2.0 - Persistent Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Markdownify 1.2.0 - Persistent Cross-Site Scripting. Author: TaurusOmar |
Analyze the security implications of: Markdownify 1.2.0 - Persistent Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: WebKit - TypedArray.fill Memory Corruption | This is a dos exploit for multiple platform. Description: WebKit - TypedArray.fill Memory Corruption. Author: Google Security Research |
Analyze the security implications of: WebKit - TypedArray.fill Memory Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Novell Groupwise Webaccess - Stack Overflow | This is a dos exploit for multiple platform. Description: Novell Groupwise Webaccess - Stack Overflow. Author: Francis Provencher |
Analyze the security implications of: Novell Groupwise Webaccess - Stack Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Python 2.7 - 'array.fromstring' Method Use-After-Free | This is a dos exploit for multiple platform. Description: Python 2.7 - 'array.fromstring' Method Use-After-Free. Author: John Leitch |
Analyze the security implications of: Python 2.7 - 'array.fromstring' Method Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Foro Domus 2.10 - 'phpbb_root_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Foro Domus 2.10 - 'phpbb_root_path' Remote File Inclusion. Author: Mehmet Ince |
Analyze the security implications of: Foro Domus 2.10 - 'phpbb_root_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JGS-Portal 3.0.1/3.0.2 - 'jgs_portal_sponsor.php?id' SQL Injection | This is a webapps exploit for php platform. Description: JGS-Portal 3.0.1/3.0.2 - 'jgs_portal_sponsor.php?id' SQL Injection. Author: deluxe@security-project.org |
Analyze the security implications of: JGS-Portal 3.0.1/3.0.2 - 'jgs_portal_sponsor.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Image Sharing Script 4.13 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Image Sharing Script 4.13 - Multiple Vulnerabilities. Author: Hasan Emre Ozer |
Analyze the security implications of: Image Sharing Script 4.13 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.