input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Siemens S55 - Cellular Telephone Sms Confirmation Message Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Cuppa CMS - '/alertConfigField.php' Local/Remote File Inclusion | This is a webapps exploit for php platform. Description: Cuppa CMS - '/alertConfigField.php' Local/Remote File Inclusion. Author: CWH Underground |
Analyze the security implications of: Cuppa CMS - '/alertConfigField.php' Local/Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linksys WRT54G < 4.20.7 / WRT54GS < 1.05.2 - 'apply.cgi' Remote Buffer Overflow (Metasploit) | This is a remote exploit for cgi platform. Description: Linksys WRT54G < 4.20.7 / WRT54GS < 1.05.2 - 'apply.cgi' Remote Buffer Overflow (Metasploit). Author: Raphael Rigo |
Analyze the security implications of: Linksys WRT54G < 4.20.7 / WRT54GS < 1.05.2 - 'apply.cgi' Remote Buffer Overflow (Metasploit) | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Anevia Flamingo XS 3.6.5 - Authenticated Root Remote Code Execution | This is a remote exploit for hardware platform. Description: Anevia Flamingo XS 3.6.5 - Authenticated Root Remote Code Execution. Author: LiquidWorm |
Analyze the security implications of: Anevia Flamingo XS 3.6.5 - Authenticated Root Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Freelancers Marketplace Script - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Freelancers Marketplace Script - Persistent Cross-Site Scripting. Author: Sid3^effects |
Analyze the security implications of: Freelancers Marketplace Script - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adult Script 1.6 - Unauthorized Administrative Access | This is a webapps exploit for php platform. Description: Adult Script 1.6 - Unauthorized Administrative Access. Author: Liz0ziM |
Analyze the security implications of: Adult Script 1.6 - Unauthorized Administrative Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Made Simple 2.2.14 - Persistent Cross-Site Scripting (Authenticated) | This is a webapps exploit for php platform. Description: CMS Made Simple 2.2.14 - Persistent Cross-Site Scripting (Authenticated). Author: Roel van Beurden |
Analyze the security implications of: CMS Made Simple 2.2.14 - Persistent Cross-Site Scripting (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Netgear WNR500 Wireless Router - 'webproc?getpage' Traversal Arbitrary File Access | This is a webapps exploit for hardware platform. Description: Netgear WNR500 Wireless Router - 'webproc?getpage' Traversal Arbitrary File Access. Author: LiquidWorm |
Analyze the security implications of: Netgear WNR500 Wireless Router - 'webproc?getpage' Traversal Arbitrary File Access | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Mambo Component Remository - 'cat' SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component Remository - 'cat' SQL Injection. Author: ajann |
Analyze the security implications of: Mambo Component Remository - 'cat' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Easyndexer 1.0 - Arbitrary File Download | This is a webapps exploit for php platform. Description: Easyndexer 1.0 - Arbitrary File Download. Author: Ihsan Sencan |
Analyze the security implications of: Easyndexer 1.0 - Arbitrary File Download | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10.4.x - OpenLDAP Denial of Service | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.4.x - OpenLDAP Denial of Service. Author: Mu Security research |
Analyze the security implications of: Apple Mac OSX 10.4.x - OpenLDAP Denial of Service | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Joomla! Component SMF Forum 1.1.4 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component SMF Forum 1.1.4 - Multiple Cross-Site Scripting Vulnerabilities. Author: Doz |
Analyze the security implications of: Joomla! Component SMF Forum 1.1.4 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_some - 'Controller' Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_some - 'Controller' Local File Inclusion. Author: the_cyber_nuxbie |
Analyze the security implications of: Joomla! Component com_some - 'Controller' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla Firefox 0.x/1.x - Large History File Buffer Overflow | This is a dos exploit for multiple platform. Description: Mozilla Firefox 0.x/1.x - Large History File Buffer Overflow. Author: ZIPLOCK |
Analyze the security implications of: Mozilla Firefox 0.x/1.x - Large History File Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Berlios GPSD 1.91-1 < 2.7-2 - Format String | This is a remote exploit for linux platform. Description: Berlios GPSD 1.91-1 < 2.7-2 - Format String. Author: Yann Senotier |
Analyze the security implications of: Berlios GPSD 1.91-1 < 2.7-2 - Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Horde 3.3.12 - Backdoor Arbitrary PHP Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: Horde 3.3.12 - Backdoor Arbitrary PHP Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Horde 3.3.12 - Backdoor Arbitrary PHP Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: IBM AIX 4.x - '/usr/bin/setsenv' Local Buffer Overflow | This is a local exploit for aix platform. Description: IBM AIX 4.x - '/usr/bin/setsenv' Local Buffer Overflow. Author: Last Stage of Delirium |
Analyze the security implications of: IBM AIX 4.x - '/usr/bin/setsenv' Local Buffer Overflow | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Madwifi 0.9.2.1 - WPA/RSN IE Remote Kernel Buffer Overflow | This is a remote exploit for linux platform. Description: Madwifi 0.9.2.1 - WPA/RSN IE Remote Kernel Buffer Overflow. Author: Massimiliano Oldani |
Analyze the security implications of: Madwifi 0.9.2.1 - WPA/RSN IE Remote Kernel Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: freeForum 1.7 - 'acuparam' Cross-Site Scripting | This is a webapps exploit for php platform. Description: freeForum 1.7 - 'acuparam' Cross-Site Scripting. Author: ahmadbady |
Analyze the security implications of: freeForum 1.7 - 'acuparam' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Amateur Photographer's Image Gallery - 'fullscreen.php?albumid' SQL Injection | This is a webapps exploit for php platform. Description: Amateur Photographer's Image Gallery - 'fullscreen.php?albumid' SQL Injection. Author: cr4wl3r |
Analyze the security implications of: Amateur Photographer's Image Gallery - 'fullscreen.php?albumid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AspPired2Poll 1.0 - 'MoreInfo.asp' SQL Injection | This is a webapps exploit for asp platform. Description: AspPired2Poll 1.0 - 'MoreInfo.asp' SQL Injection. Author: ajann |
Analyze the security implications of: AspPired2Poll 1.0 - 'MoreInfo.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apache Struts 2.0.9/2.1.8 - Session Tampering Security Bypass | This is a remote exploit for multiple platform. Description: Apache Struts 2.0.9/2.1.8 - Session Tampering Security Bypass. Author: Hisato Killing |
Analyze the security implications of: Apache Struts 2.0.9/2.1.8 - Session Tampering Security Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Halon Security Router (SR) 3.2-winter-r1 - Multiple Vulnerabilities | This is a remote exploit for hardware platform. Description: Halon Security Router (SR) 3.2-winter-r1 - Multiple Vulnerabilities. Author: Juan Manuel Garcia |
Analyze the security implications of: Halon Security Router (SR) 3.2-winter-r1 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ISC BIND 8.2.2-P5 - Denial of Service | This is a dos exploit for linux platform. Description: ISC BIND 8.2.2-P5 - Denial of Service. Author: Fabio Pietrosanti |
Analyze the security implications of: ISC BIND 8.2.2-P5 - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: VMware Fusion - USB Arbitrator Setuid Privilege Escalation (Metasploit) | This is a local exploit for macos platform. Description: VMware Fusion - USB Arbitrator Setuid Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: VMware Fusion - USB Arbitrator Setuid Privilege Escalation (Metasploit) | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: SOUND4 LinkAndShare Transmitter 1.1.2 - Format String Stack Buffer Overflow | This is a remote exploit for hardware platform. Description: SOUND4 LinkAndShare Transmitter 1.1.2 - Format String Stack Buffer Overflow. Author: LiquidWorm |
Analyze the security implications of: SOUND4 LinkAndShare Transmitter 1.1.2 - Format String Stack Buffer Overflow | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component Template Be2004-2 - 'index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Template Be2004-2 - 'index.php' Remote File Inclusion. Author: Cold Zero |
Analyze the security implications of: Joomla! Component Template Be2004-2 - 'index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PoDoFo 0.9.5 - Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: PoDoFo 0.9.5 - Buffer Overflow (PoC). Author: r4xis |
Analyze the security implications of: PoDoFo 0.9.5 - Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: COMTREND CT-536 / HG-536 Routers - Multiple Remote Vulnerabilities | This is a remote exploit for hardware platform. Description: COMTREND CT-536 / HG-536 Routers - Multiple Remote Vulnerabilities. Author: Daniel Fernandez Bleda |
Analyze the security implications of: COMTREND CT-536 / HG-536 Routers - Multiple Remote Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Brother HL-5370DW - series Authentication Bypass printer flooder | This is a dos exploit for hardware platform. Description: Brother HL-5370DW - series Authentication Bypass printer flooder. Author: chrisB |
Analyze the security implications of: Brother HL-5370DW - series Authentication Bypass printer flooder | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: LM Starmail 2.0 - SQL Injection / File Inclusion | This is a webapps exploit for php platform. Description: LM Starmail 2.0 - SQL Injection / File Inclusion. Author: int_main(); |
Analyze the security implications of: LM Starmail 2.0 - SQL Injection / File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SGI IRIX - 'LsD' Multiple Local Buffer Overflows | This is a local exploit for irix platform. Description: SGI IRIX - 'LsD' Multiple Local Buffer Overflows. Author: LSD-PLaNET |
Analyze the security implications of: SGI IRIX - 'LsD' Multiple Local Buffer Overflows | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: compteur 2.0 - 'param_editor.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: compteur 2.0 - 'param_editor.php' Remote File Inclusion. Author: DarkFig |
Analyze the security implications of: compteur 2.0 - 'param_editor.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash Player 22.0.0.192 - DefineSprite Memory Corruption | This is a dos exploit for multiple platform. Description: Adobe Flash Player 22.0.0.192 - DefineSprite Memory Corruption. Author: COSIG |
Analyze the security implications of: Adobe Flash Player 22.0.0.192 - DefineSprite Memory Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.