input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Joomla! Component Music Manager - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: VTENEXT 19 CE - Remote Code Execution | This is a webapps exploit for multiple platform. Description: VTENEXT 19 CE - Remote Code Execution. Author: Marco Ruela |
Analyze the security implications of: VTENEXT 19 CE - Remote Code Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Def_Blog 1.0.3 - 'comlook.php?article' SQL Injection | This is a webapps exploit for php platform. Description: Def_Blog 1.0.3 - 'comlook.php?article' SQL Injection. Author: CWH Underground |
Analyze the security implications of: Def_Blog 1.0.3 - 'comlook.php?article' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Webmin 1.962 - 'Package Updates' Escape Bypass RCE (Metasploit) | This is a webapps exploit for linux platform. Description: Webmin 1.962 - 'Package Updates' Escape Bypass RCE (Metasploit). Author: AkkuS |
Analyze the security implications of: Webmin 1.962 - 'Package Updates' Escape Bypass RCE (Metasploit) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: D-Link DWL Series Access-Point 2.10na - Config Disclosure | This is a remote exploit for hardware platform. Description: D-Link DWL Series Access-Point 2.10na - Config Disclosure. Author: INTRUDERS |
Analyze the security implications of: D-Link DWL Series Access-Point 2.10na - Config Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BPRealestate Real Estate - Authentication Bypass | This is a webapps exploit for asp platform. Description: BPRealestate Real Estate - Authentication Bypass. Author: v3n0m |
Analyze the security implications of: BPRealestate Real Estate - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: SpinetiX Fusion Digital Signage 3.4.8 - Username Enumeration | This is a webapps exploit for hardware platform. Description: SpinetiX Fusion Digital Signage 3.4.8 - Username Enumeration. Author: LiquidWorm |
Analyze the security implications of: SpinetiX Fusion Digital Signage 3.4.8 - Username Enumeration | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Grocery crud 1.6.4 - 'order_by' SQL Injection | This is a webapps exploit for multiple platform. Description: Grocery crud 1.6.4 - 'order_by' SQL Injection. Author: TonyShavez |
Analyze the security implications of: Grocery crud 1.6.4 - 'order_by' SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CMS Lokomedia - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities | This is a webapps exploit for php platform. Description: CMS Lokomedia - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities. Author: the_cyber_nuxbie |
Analyze the security implications of: CMS Lokomedia - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Calendarix 0.7.20070307 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Calendarix 0.7.20070307 - Multiple SQL Injections. Author: Jesper Jurcenoks |
Analyze the security implications of: Calendarix 0.7.20070307 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: rsync 2.5.1 - Remote (2) | This is a remote exploit for linux platform. Description: rsync 2.5.1 - Remote (2). Author: Teso |
Analyze the security implications of: rsync 2.5.1 - Remote (2) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Ipswitch IMail 5.0 - LDAP Buffer Overflow (Denial of Service) (PoC) | This is a dos exploit for multiple platform. Description: Ipswitch IMail 5.0 - LDAP Buffer Overflow (Denial of Service) (PoC). Author: Marc of eEye |
Analyze the security implications of: Ipswitch IMail 5.0 - LDAP Buffer Overflow (Denial of Service) (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: HP JetDirect PJL - Interface Universal Directory Traversal (Metasploit) | This is a remote exploit for hardware platform. Description: HP JetDirect PJL - Interface Universal Directory Traversal (Metasploit). Author: Myo Soe |
Analyze the security implications of: HP JetDirect PJL - Interface Universal Directory Traversal (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component eXtroForms 2.1.5 - 'filter_type_id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component eXtroForms 2.1.5 - 'filter_type_id' SQL Injection. Author: AkkuS |
Analyze the security implications of: Joomla! Component eXtroForms 2.1.5 - 'filter_type_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_ports.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_ports.php?base_path' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_ports.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Totemomail 4.x/5.x - Persistent Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Totemomail 4.x/5.x - Persistent Cross-Site Scripting. Author: Vulnerability-Lab |
Analyze the security implications of: Totemomail 4.x/5.x - Persistent Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Computalynx CProxy Server 3.3 SP2 - Buffer Overflow (Denial of Service) (PoC) | This is a dos exploit for multiple platform. Description: Computalynx CProxy Server 3.3 SP2 - Buffer Overflow (Denial of Service) (PoC). Author: HaCk-13 TeaM |
Analyze the security implications of: Computalynx CProxy Server 3.3 SP2 - Buffer Overflow (Denial of Service) (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: IBM Tivoli Access Manager Plugin - Directory Traversal | This is a webapps exploit for cgi platform. Description: IBM Tivoli Access Manager Plugin - Directory Traversal. Author: Timothy D. Morgan |
Analyze the security implications of: IBM Tivoli Access Manager Plugin - Directory Traversal | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Athttpd 0.4b - GET Remote Buffer Overrun | This is a remote exploit for linux platform. Description: Athttpd 0.4b - GET Remote Buffer Overrun. Author: r-code |
Analyze the security implications of: Athttpd 0.4b - GET Remote Buffer Overrun | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Ruby 1.9 dl - Module DL.dlopen Arbitrary Library Access | This is a remote exploit for multiple platform. Description: Ruby 1.9 dl - Module DL.dlopen Arbitrary Library Access. Author: Keita Yamaguchi |
Analyze the security implications of: Ruby 1.9 dl - Module DL.dlopen Arbitrary Library Access | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: iXmail 0.2/0.3 - 'iXmail_NetAttach.php' File Deletion | This is a webapps exploit for php platform. Description: iXmail 0.2/0.3 - 'iXmail_NetAttach.php' File Deletion. Author: leseulfrog |
Analyze the security implications of: iXmail 0.2/0.3 - 'iXmail_NetAttach.php' File Deletion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Highwood Design hwdVideoShare - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Highwood Design hwdVideoShare - SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! Component Highwood Design hwdVideoShare - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cory Jobs Search - 'cid' SQL Injection | This is a webapps exploit for php platform. Description: Cory Jobs Search - 'cid' SQL Injection. Author: Slotleet |
Analyze the security implications of: Cory Jobs Search - 'cid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GS Foto Uebertraeger 3.0 iOS - Local File Inclusion | This is a webapps exploit for ios platform. Description: GS Foto Uebertraeger 3.0 iOS - Local File Inclusion. Author: Vulnerability-Lab |
Analyze the security implications of: GS Foto Uebertraeger 3.0 iOS - Local File Inclusion | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: GIF Collection 2.0 - SQL Injection | This is a webapps exploit for php platform. Description: GIF Collection 2.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: GIF Collection 2.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Moeditor 0.2.0 - Persistent Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Moeditor 0.2.0 - Persistent Cross-Site Scripting. Author: TaurusOmar |
Analyze the security implications of: Moeditor 0.2.0 - Persistent Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Oracle CTI Web Service - 'EBS_ASSET_HISTORY_OPERATIONS' XML Entity Injection | This is a webapps exploit for java platform. Description: Oracle CTI Web Service - 'EBS_ASSET_HISTORY_OPERATIONS' XML Entity Injection. Author: omurugur |
Analyze the security implications of: Oracle CTI Web Service - 'EBS_ASSET_HISTORY_OPERATIONS' XML Entity Injection | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Joomla! Component RD-Autos 1.5.5 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component RD-Autos 1.5.5 - SQL Injection. Author: H!tm@N |
Analyze the security implications of: Joomla! Component RD-Autos 1.5.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco IP Phone 7940 - 10 SIP Messages Remote Denial of Service | This is a dos exploit for hardware platform. Description: Cisco IP Phone 7940 - 10 SIP Messages Remote Denial of Service. Author: MADYNES |
Analyze the security implications of: Cisco IP Phone 7940 - 10 SIP Messages Remote Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Glossword 1.8.1 - 'custom_vars.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Glossword 1.8.1 - 'custom_vars.php' Remote File Inclusion. Author: BeyazKurt |
Analyze the security implications of: Glossword 1.8.1 - 'custom_vars.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_zcalendar - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_zcalendar - Blind SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_zcalendar - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BeroFTPD 1.3.4(1) (Linux x86) - Remote Code Execution | This is a remote exploit for linux_x86 platform. Description: BeroFTPD 1.3.4(1) (Linux x86) - Remote Code Execution. Author: qitest1 |
Analyze the security implications of: BeroFTPD 1.3.4(1) (Linux x86) - Remote Code Execution | This exploit targets linux_x86 systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux_x86 platform |
What is this exploit about: lanewsfactory - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: lanewsfactory - Multiple Vulnerabilities. Author: Salvatore Fresta |
Analyze the security implications of: lanewsfactory - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Swann DVR4 SecuraNet - Directory Traversal | This is a remote exploit for linux platform. Description: Swann DVR4 SecuraNet - Directory Traversal. Author: Terry Froy |
Analyze the security implications of: Swann DVR4 SecuraNet - Directory Traversal | This exploit targets linux systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.