input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: I-RATER Platinum - 'Config_settings.TPL.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.2.x/2.4.x - I/O System Call File Existence | This is a local exploit for linux platform. Description: Linux Kernel 2.2.x/2.4.x - I/O System Call File Existence. Author: Andrew Griffiths |
Analyze the security implications of: Linux Kernel 2.2.x/2.4.x - I/O System Call File Existence | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Lonerunner Zeroo HTTP Server 1.5 - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Lonerunner Zeroo HTTP Server 1.5 - Remote Buffer Overflow. Author: dong-h0un U |
Analyze the security implications of: Lonerunner Zeroo HTTP Server 1.5 - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Movable Type 7 r.5002 - XMLRPC API OS Command Injection (Metasploit) | This is a webapps exploit for cgi platform. Description: Movable Type 7 r.5002 - XMLRPC API OS Command Injection (Metasploit). Author: Charl-Alexandre Le Brun |
Analyze the security implications of: Movable Type 7 r.5002 - XMLRPC API OS Command Injection (Metasploit) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Logitech Media Server 7.9.0 - 'Radio URL' Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Logitech Media Server 7.9.0 - 'Radio URL' Cross-Site Scripting. Author: Dewank Pant |
Analyze the security implications of: Logitech Media Server 7.9.0 - 'Radio URL' Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SonicWALL - 'SessId' Cookie Brute Force / Admin Session Hijacking | This is a remote exploit for hardware platform. Description: SonicWALL - 'SessId' Cookie Brute Force / Admin Session Hijacking. Author: Hugo Vazquez |
Analyze the security implications of: SonicWALL - 'SessId' Cookie Brute Force / Admin Session Hijacking | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Google Chrome - V8 Private Property Arbitrary Code Execution | This is a remote exploit for android platform. Description: Google Chrome - V8 Private Property Arbitrary Code Execution. Author: Qihoo360 |
Analyze the security implications of: Google Chrome - V8 Private Property Arbitrary Code Execution | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: WebKit JSC - 'ArgumentsEliminationPhase::transform' Incorrect LoadVarargs Handling | This is a dos exploit for multiple platform. Description: WebKit JSC - 'ArgumentsEliminationPhase::transform' Incorrect LoadVarargs Handling. Author: Google Security Research |
Analyze the security implications of: WebKit JSC - 'ArgumentsEliminationPhase::transform' Incorrect LoadVarargs Handling | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CoreHTTP Web server 0.5.3.1 - Off-by-One Buffer Overflow | This is a dos exploit for linux platform. Description: CoreHTTP Web server 0.5.3.1 - Off-by-One Buffer Overflow. Author: Patroklos Argyroudis |
Analyze the security implications of: CoreHTTP Web server 0.5.3.1 - Off-by-One Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Kronos WebTA 4.0 - Authenticated Remote Privilege Escalation | This is a webapps exploit for java platform. Description: Kronos WebTA 4.0 - Authenticated Remote Privilege Escalation. Author: nxkennedy |
Analyze the security implications of: Kronos WebTA 4.0 - Authenticated Remote Privilege Escalation | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: CoolPHP 1.0 - Multiple Remote Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: CoolPHP 1.0 - Multiple Remote Input Validation Vulnerabilities. Author: R00tCr4ck |
Analyze the security implications of: CoolPHP 1.0 - Multiple Remote Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASUSWRT 3.0.0.4.376_1071 - LAN Backdoor Command Execution | This is a remote exploit for hardware platform. Description: ASUSWRT 3.0.0.4.376_1071 - LAN Backdoor Command Execution. Author: Friedrich Postelstorfer |
Analyze the security implications of: ASUSWRT 3.0.0.4.376_1071 - LAN Backdoor Command Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Event Calendar 3.7.4 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Event Calendar 3.7.4 - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Event Calendar 3.7.4 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: VocalTec VGW120/VGW480 Telephony Gateway Remote H.225 - Denial of Service | This is a dos exploit for hardware platform. Description: VocalTec VGW120/VGW480 Telephony Gateway Remote H.225 - Denial of Service. Author: Alexander |
Analyze the security implications of: VocalTec VGW120/VGW480 Telephony Gateway Remote H.225 - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CAT2 - 'spaw_root' Local File Inclusion | This is a webapps exploit for php platform. Description: CAT2 - 'spaw_root' Local File Inclusion. Author: StAkeR |
Analyze the security implications of: CAT2 - 'spaw_root' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Struts2/XWork < 2.2.0 - Remote Command Execution | This is a remote exploit for multiple platform. Description: Struts2/XWork < 2.2.0 - Remote Command Execution. Author: Meder Kydyraliev |
Analyze the security implications of: Struts2/XWork < 2.2.0 - Remote Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CMS Auditor Website 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: CMS Auditor Website 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: CMS Auditor Website 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS) | This is a webapps exploit for multiple platform. Description: ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS). Author: Mufaddal Masalawala |
Analyze the security implications of: ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Web Wiz Forums 7.x - 'Registration_Rules.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Web Wiz Forums 7.x - 'Registration_Rules.asp' Cross-Site Scripting. Author: Ferruh Mavituna |
Analyze the security implications of: Web Wiz Forums 7.x - 'Registration_Rules.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Wireshark - dissect_tds7_colmetadata_token Stack Buffer Overflow | This is a dos exploit for multiple platform. Description: Wireshark - dissect_tds7_colmetadata_token Stack Buffer Overflow. Author: Google Security Research |
Analyze the security implications of: Wireshark - dissect_tds7_colmetadata_token Stack Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: A-shop 0.70 - Remote File Deletion | This is a webapps exploit for asp platform. Description: A-shop 0.70 - Remote File Deletion. Author: Timq |
Analyze the security implications of: A-shop 0.70 - Remote File Deletion | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Hostel Management System 2.1 - Cross Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Hostel Management System 2.1 - Cross Site Scripting (XSS). Author: Chinmay Divekar |
Analyze the security implications of: Hostel Management System 2.1 - Cross Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ArticlesOne 07232006 - 'page' Remote File Inclusion | This is a webapps exploit for php platform. Description: ArticlesOne 07232006 - 'page' Remote File Inclusion. Author: CyberLord |
Analyze the security implications of: ArticlesOne 07232006 - 'page' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Neon Responders 5.4 - Remote Clock Synchronization Denial of Service | This is a dos exploit for multiple platform. Description: Neon Responders 5.4 - Remote Clock Synchronization Denial of Service. Author: Stefan Lochbihler |
Analyze the security implications of: Neon Responders 5.4 - Remote Clock Synchronization Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component 5starhotels - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component 5starhotels - SQL Injection. Author: EcHoLL |
Analyze the security implications of: Joomla! Component 5starhotels - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Android Gmail < 7.11.5.176568039 - Directory Traversal in Attachment Download | This is a dos exploit for android platform. Description: Android Gmail < 7.11.5.176568039 - Directory Traversal in Attachment Download. Author: Google Security Research |
Analyze the security implications of: Android Gmail < 7.11.5.176568039 - Directory Traversal in Attachment Download | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: LightDM (Ubuntu 16.04/16.10) - 'Guest Account' Local Privilege Escalation | This is a local exploit for linux platform. Description: LightDM (Ubuntu 16.04/16.10) - 'Guest Account' Local Privilege Escalation. Author: G. Geshev |
Analyze the security implications of: LightDM (Ubuntu 16.04/16.10) - 'Guest Account' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple WebKit / Safari 10.0.3(12602.4.8) - 'Editor::Command::execute' Universal Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Apple WebKit / Safari 10.0.3(12602.4.8) - 'Editor::Command::execute' Universal Cross-Site Scripting. Author: Google Security Research |
Analyze the security implications of: Apple WebKit / Safari 10.0.3(12602.4.8) - 'Editor::Command::execute' Universal Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cisco IOS 11.x/12.x - HTTP Configuration Arbitrary Administrative Access (4) | This is a remote exploit for hardware platform. Description: Cisco IOS 11.x/12.x - HTTP Configuration Arbitrary Administrative Access (4). Author: blackangels |
Analyze the security implications of: Cisco IOS 11.x/12.x - HTTP Configuration Arbitrary Administrative Access (4) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linksys E1500/E2500 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Linksys E1500/E2500 - Multiple Vulnerabilities. Author: m-1-k-3 |
Analyze the security implications of: Linksys E1500/E2500 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: NuStore 1.0 - 'Products.asp' SQL Injection | This is a webapps exploit for asp platform. Description: NuStore 1.0 - 'Products.asp' SQL Injection. Author: ajann |
Analyze the security implications of: NuStore 1.0 - 'Products.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Excuse Online - 'pwd.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Excuse Online - 'pwd.asp' SQL Injection. Author: Unohope |
Analyze the security implications of: Excuse Online - 'pwd.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: gtcatalog 0.9.1 - 'index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: gtcatalog 0.9.1 - 'index.php' Remote File Inclusion. Author: v1per-haCker |
Analyze the security implications of: gtcatalog 0.9.1 - 'index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DIR-818W - Multiple Vulnerabilities | This is a remote exploit for hardware platform. Description: D-Link DIR-818W - Multiple Vulnerabilities. Author: Samuel Huntley |
Analyze the security implications of: D-Link DIR-818W - Multiple Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.