input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Advantech/BroadWin SCADA Webaccess 7.0 - Multiple Vulnerabilities
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Elementor Website Builder < 3.12.2 - Admin+ SQLi
|
This is a webapps exploit for php platform. Description: Elementor Website Builder < 3.12.2 - Admin+ SQLi. Author: E1 Coders
|
Analyze the security implications of: Elementor Website Builder < 3.12.2 - Admin+ SQLi
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Xlight FTP Server 3.2 - 'user' SQL Injection
|
This is a remote exploit for multiple platform. Description: Xlight FTP Server 3.2 - 'user' SQL Injection. Author: fla
|
Analyze the security implications of: Xlight FTP Server 3.2 - 'user' SQL Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Ateme TITAN File 3.9 - SSRF File Enumeration
|
This is a webapps exploit for hardware platform. Description: Ateme TITAN File 3.9 - SSRF File Enumeration. Author: LiquidWorm
|
Analyze the security implications of: Ateme TITAN File 3.9 - SSRF File Enumeration
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: GaliX 2.0 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: GaliX 2.0 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: John Martinelli
|
Analyze the security implications of: GaliX 2.0 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Blox CMS - SQL Injection
|
This is a webapps exploit for php platform. Description: Blox CMS - SQL Injection. Author: CoBRa_21
|
Analyze the security implications of: Blox CMS - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LightBlog 9.6 - 'Username' Local File Inclusion
|
This is a webapps exploit for php platform. Description: LightBlog 9.6 - 'Username' Local File Inclusion. Author: muuratsalo
|
Analyze the security implications of: LightBlog 9.6 - 'Username' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CoolPlayer 2.17 - 'CPLI_ReadTag_OGG()' Buffer Overflow
|
This is a dos exploit for linux platform. Description: CoolPlayer 2.17 - 'CPLI_ReadTag_OGG()' Buffer Overflow. Author: Luigi Auriemma
|
Analyze the security implications of: CoolPlayer 2.17 - 'CPLI_ReadTag_OGG()' Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Microworld eScan AntiVirus < 3.x - Remote Code Execution
|
This is a remote exploit for linux platform. Description: Microworld eScan AntiVirus < 3.x - Remote Code Execution. Author: Mohammed almutairi
|
Analyze the security implications of: Microworld eScan AntiVirus < 3.x - Remote Code Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: BusinessSpace 1.2 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: BusinessSpace 1.2 - 'id' SQL Injection. Author: K-159
|
Analyze the security implications of: BusinessSpace 1.2 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MamboLaiThai ExtCalThai 0.9.1 - 'admin_events.php?CONFIG_EXT[LANGUAGES_DIR]' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: MamboLaiThai ExtCalThai 0.9.1 - 'admin_events.php?CONFIG_EXT[LANGUAGES_DIR]' Remote File Inclusion. Author: k1tk4t
|
Analyze the security implications of: MamboLaiThai ExtCalThai 0.9.1 - 'admin_events.php?CONFIG_EXT[LANGUAGES_DIR]' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ProjectApp 3.3 - 'default.asp?skin_number' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: ProjectApp 3.3 - 'default.asp?skin_number' Cross-Site Scripting. Author: r0t
|
Analyze the security implications of: ProjectApp 3.3 - 'default.asp?skin_number' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Adobe Flash - Image Decoding Out-of-Bounds Read
|
This is a dos exploit for multiple platform. Description: Adobe Flash - Image Decoding Out-of-Bounds Read. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - Image Decoding Out-of-Bounds Read
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Linux Kernel 4.8.0-34 < 4.8.0-45 (Ubuntu / Linux Mint) - Packet Socket Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Linux Kernel 4.8.0-34 < 4.8.0-45 (Ubuntu / Linux Mint) - Packet Socket Local Privilege Escalation. Author: bcoles
|
Analyze the security implications of: Linux Kernel 4.8.0-34 < 4.8.0-45 (Ubuntu / Linux Mint) - Packet Socket Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Enlightenment v0.25.3 - Privilege escalation
|
This is a local exploit for linux platform. Description: Enlightenment v0.25.3 - Privilege escalation. Author: nu11secur1ty
|
Analyze the security implications of: Enlightenment v0.25.3 - Privilege escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Foreman (RedHat OpenStack/Satellite) - users/create Mass Assignment (Metasploit)
|
This is a webapps exploit for linux platform. Description: Foreman (RedHat OpenStack/Satellite) - users/create Mass Assignment (Metasploit). Author: Metasploit
|
Analyze the security implications of: Foreman (RedHat OpenStack/Satellite) - users/create Mass Assignment (Metasploit)
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Sun Java Web Server 1.1.3/2.0 Servlets - information Disclosure
|
This is a remote exploit for multiple platform. Description: Sun Java Web Server 1.1.3/2.0 Servlets - information Disclosure. Author: kevin j
|
Analyze the security implications of: Sun Java Web Server 1.1.3/2.0 Servlets - information Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: PHP 5.2.0 (OSX) - EXT/Filter Space Trimming Buffer Underflow
|
This is a local exploit for osx platform. Description: PHP 5.2.0 (OSX) - EXT/Filter Space Trimming Buffer Underflow. Author: Stefan Esser
|
Analyze the security implications of: PHP 5.2.0 (OSX) - EXT/Filter Space Trimming Buffer Underflow
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Joomla! Component com_jresearch - 'Controller' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_jresearch - 'Controller' Local File Inclusion. Author: Chip d3 bi0s
|
Analyze the security implications of: Joomla! Component com_jresearch - 'Controller' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FiberHome HG-110 - Cross-Site Scripting / Directory Traversal
|
This is a remote exploit for hardware platform. Description: FiberHome HG-110 - Cross-Site Scripting / Directory Traversal. Author: Zerial
|
Analyze the security implications of: FiberHome HG-110 - Cross-Site Scripting / Directory Traversal
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: PonyOS 0.4.99-mlp - Multiple Vulnerabilities
|
This is a local exploit for linux platform. Description: PonyOS 0.4.99-mlp - Multiple Vulnerabilities. Author: John Cartwright
|
Analyze the security implications of: PonyOS 0.4.99-mlp - Multiple Vulnerabilities
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: cPanel WebHost Manager 3.1 - 'editzone?domain' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: cPanel WebHost Manager 3.1 - 'editzone?domain' Cross-Site Scripting. Author: Aria-Security Team
|
Analyze the security implications of: cPanel WebHost Manager 3.1 - 'editzone?domain' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Easy!Appointments 1.2.1 - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Easy!Appointments 1.2.1 - Cross-Site Scripting. Author: LiquidWorm
|
Analyze the security implications of: Easy!Appointments 1.2.1 - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dasan Networks GPON ONT WiFi Router H64X Series - Privilege Escalation
|
This is a webapps exploit for hardware platform. Description: Dasan Networks GPON ONT WiFi Router H64X Series - Privilege Escalation. Author: LiquidWorm
|
Analyze the security implications of: Dasan Networks GPON ONT WiFi Router H64X Series - Privilege Escalation
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: WebKit - 'WebCore::InputType::element' Use-After-Free (2)
|
This is a dos exploit for multiple platform. Description: WebKit - 'WebCore::InputType::element' Use-After-Free (2). Author: Google Security Research
|
Analyze the security implications of: WebKit - 'WebCore::InputType::element' Use-After-Free (2)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: SmartRG Router SR510n 2.6.13 - Remote Code Execution
|
This is a remote exploit for hardware platform. Description: SmartRG Router SR510n 2.6.13 - Remote Code Execution. Author: Yerodin Richards
|
Analyze the security implications of: SmartRG Router SR510n 2.6.13 - Remote Code Execution
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Linux Kernel 2.2.x/2.4.x - Privileged Process Hijacking Privilege Escalation (1)
|
This is a local exploit for linux platform. Description: Linux Kernel 2.2.x/2.4.x - Privileged Process Hijacking Privilege Escalation (1). Author: anszom@v-lo.krakow.pl
|
Analyze the security implications of: Linux Kernel 2.2.x/2.4.x - Privileged Process Hijacking Privilege Escalation (1)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Osprey Pump Controller v1.0.1 - Unauthenticated Reflected XSS
|
This is a remote exploit for hardware platform. Description: Osprey Pump Controller v1.0.1 - Unauthenticated Reflected XSS. Author: LiquidWorm
|
Analyze the security implications of: Osprey Pump Controller v1.0.1 - Unauthenticated Reflected XSS
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! v4.2.8 - Unauthenticated information disclosure
|
This is a webapps exploit for php platform. Description: Joomla! v4.2.8 - Unauthenticated information disclosure. Author: Alexandre ZANNI
|
Analyze the security implications of: Joomla! v4.2.8 - Unauthenticated information disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: mpg123 pre0.59s - Invalid MP3 Header Memory Corruption
|
This is a remote exploit for linux platform. Description: mpg123 pre0.59s - Invalid MP3 Header Memory Corruption. Author: Gobbles Security
|
Analyze the security implications of: mpg123 pre0.59s - Invalid MP3 Header Memory Corruption
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ManageEngine Desktop Central - Create Administrator
|
This is a webapps exploit for multiple platform. Description: ManageEngine Desktop Central - Create Administrator. Author: Pedro Ribeiro
|
Analyze the security implications of: ManageEngine Desktop Central - Create Administrator
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Pars CMS - 'RP' Multiple SQL Injections
|
This is a webapps exploit for asp platform. Description: Pars CMS - 'RP' Multiple SQL Injections. Author: Isfahan
|
Analyze the security implications of: Pars CMS - 'RP' Multiple SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: AutomatedShops WebC 2.0/5.0 - Symbolic Link Following Configuration File
|
This is a local exploit for linux platform. Description: AutomatedShops WebC 2.0/5.0 - Symbolic Link Following Configuration File. Author: Carl Livitt
|
Analyze the security implications of: AutomatedShops WebC 2.0/5.0 - Symbolic Link Following Configuration File
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: cURL 6.1 < 7.4 - Remote Buffer Overflow (2)
|
This is a remote exploit for linux platform. Description: cURL 6.1 < 7.4 - Remote Buffer Overflow (2). Author: zillion
|
Analyze the security implications of: cURL 6.1 < 7.4 - Remote Buffer Overflow (2)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.