input
stringlengths
39
228
output
stringlengths
32
324
Analyze the security implications of: CMSUno 1.6.2 - 'user' Remote Code Execution (Authenticated)
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: D-Link DCS - 'security.cgi' Cross-Site Request Forgery
This is a remote exploit for hardware platform. Description: D-Link DCS - 'security.cgi' Cross-Site Request Forgery. Author: Rigan Iimrigan
Analyze the security implications of: D-Link DCS - 'security.cgi' Cross-Site Request Forgery
This exploit targets hardware systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: BMForum 5.6 - 'bsd01footer.php' Cross-Site Scripting
This is a webapps exploit for php platform. Description: BMForum 5.6 - 'bsd01footer.php' Cross-Site Scripting. Author: CWH Underground
Analyze the security implications of: BMForum 5.6 - 'bsd01footer.php' Cross-Site Scripting
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Joomla! Component com_ponygallery - SQL Injection
This is a webapps exploit for php platform. Description: Joomla! Component com_ponygallery - SQL Injection. Author: xDarkSton3x
Analyze the security implications of: Joomla! Component com_ponygallery - SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Event Calendar PHP 1.5 - SQL Injection
This is a webapps exploit for php platform. Description: Event Calendar PHP 1.5 - SQL Injection. Author: Ehsan Hosseini
Analyze the security implications of: Event Calendar PHP 1.5 - SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Lucent Ascend MAX 5.0/Pipeline 6.0/TNT 1.0/2.0 Router - MAX UDP Port 9 (2)
This is a remote exploit for hardware platform. Description: Lucent Ascend MAX 5.0/Pipeline 6.0/TNT 1.0/2.0 Router - MAX UDP Port 9 (2). Author: Rootshell
Analyze the security implications of: Lucent Ascend MAX 5.0/Pipeline 6.0/TNT 1.0/2.0 Router - MAX UDP Port 9 (2)
This exploit targets hardware systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Admidio v4.2.10 - Remote Code Execution (RCE)
This is a webapps exploit for php platform. Description: Admidio v4.2.10 - Remote Code Execution (RCE). Author: Mirabbas Ağalarov
Analyze the security implications of: Admidio v4.2.10 - Remote Code Execution (RCE)
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Drupal Module Sections 5.x-1.2/6.x-1.2 - HTML Injection
This is a webapps exploit for php platform. Description: Drupal Module Sections 5.x-1.2/6.x-1.2 - HTML Injection. Author: Justin C. Klein Keane
Analyze the security implications of: Drupal Module Sections 5.x-1.2/6.x-1.2 - HTML Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Bandersnatch 0.4 - Multiple Input Validation Vulnerabilities
This is a webapps exploit for php platform. Description: Bandersnatch 0.4 - Multiple Input Validation Vulnerabilities. Author: Tim Brown
Analyze the security implications of: Bandersnatch 0.4 - Multiple Input Validation Vulnerabilities
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: evalSMSI 2.1.3 - Multiple Input Validation Vulnerabilities
This is a webapps exploit for php platform. Description: evalSMSI 2.1.3 - Multiple Input Validation Vulnerabilities. Author: ekse
Analyze the security implications of: evalSMSI 2.1.3 - Multiple Input Validation Vulnerabilities
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Atlassian Jira Service Desk 4.9.1 - Unrestricted File Upload to XSS
This is a webapps exploit for multiple platform. Description: Atlassian Jira Service Desk 4.9.1 - Unrestricted File Upload to XSS. Author: Captain_hook
Analyze the security implications of: Atlassian Jira Service Desk 4.9.1 - Unrestricted File Upload to XSS
This exploit targets multiple systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: CutePHP CuteNews 1.4.1 - 'index.php' Cross-Site Scripting
This is a webapps exploit for php platform. Description: CutePHP CuteNews 1.4.1 - 'index.php' Cross-Site Scripting. Author: Roozbeh Afrasiabi
Analyze the security implications of: CutePHP CuteNews 1.4.1 - 'index.php' Cross-Site Scripting
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Dawn of Time 1.69 MUD Server - Multiple Format String Vulnerabilities
This is a dos exploit for multiple platform. Description: Dawn of Time 1.69 MUD Server - Multiple Format String Vulnerabilities. Author: Luigi Auriemma
Analyze the security implications of: Dawn of Time 1.69 MUD Server - Multiple Format String Vulnerabilities
This exploit targets multiple systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: BMC Server Automation RSCD Agent - NSH Remote Command Execution (Metasploit)
This is a remote exploit for multiple platform. Description: BMC Server Automation RSCD Agent - NSH Remote Command Execution (Metasploit). Author: Metasploit
Analyze the security implications of: BMC Server Automation RSCD Agent - NSH Remote Command Execution (Metasploit)
This exploit targets multiple systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: TP-Link Wireless N Router WR840N - Denial of Service (PoC)
This is a dos exploit for hardware platform. Description: TP-Link Wireless N Router WR840N - Denial of Service (PoC). Author: Aniket Dinda
Analyze the security implications of: TP-Link Wireless N Router WR840N - Denial of Service (PoC)
This exploit targets hardware systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Microburst uDirectory 2.0 - Remote Command Execution
This is a remote exploit for cgi platform. Description: Microburst uDirectory 2.0 - Remote Command Execution. Author: Igor Dobrovitski
Analyze the security implications of: Microburst uDirectory 2.0 - Remote Command Execution
This exploit targets cgi systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets cgi platform
What is this exploit about: Joomla! Component com_paxgallery - Blind Injection
This is a webapps exploit for php platform. Description: Joomla! Component com_paxgallery - Blind Injection. Author: snakespc
Analyze the security implications of: Joomla! Component com_paxgallery - Blind Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Mumble Murmur 1.2 - Denial of Service
This is a dos exploit for linux platform. Description: Mumble Murmur 1.2 - Denial of Service. Author: Luigi Auriemma
Analyze the security implications of: Mumble Murmur 1.2 - Denial of Service
This exploit targets linux systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: D-Link DIR-601 - Command Injection
This is a remote exploit for hardware platform. Description: D-Link DIR-601 - Command Injection. Author: Samuel Huntley
Analyze the security implications of: D-Link DIR-601 - Command Injection
This exploit targets hardware systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Reliable Datagram Sockets (RDS) - rds_atomic_free_op NULL pointer dereference Privilege Escalation (Metasploit)
This is a local exploit for linux platform. Description: Reliable Datagram Sockets (RDS) - rds_atomic_free_op NULL pointer dereference Privilege Escalation (Metasploit). Author: Metasploit
Analyze the security implications of: Reliable Datagram Sockets (RDS) - rds_atomic_free_op NULL pointer dereference Privilege Escalation (Metasploit)
This exploit targets linux systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Zimbra Collaboration Server 7.2.2/8.0.2 - Local File Inclusion (Metasploit)
This is a webapps exploit for linux platform. Description: Zimbra Collaboration Server 7.2.2/8.0.2 - Local File Inclusion (Metasploit). Author: Metasploit
Analyze the security implications of: Zimbra Collaboration Server 7.2.2/8.0.2 - Local File Inclusion (Metasploit)
This exploit targets linux systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Apache Struts 2 - Struts 1 Plugin Showcase OGNL Code Execution (Metasploit)
This is a remote exploit for multiple platform. Description: Apache Struts 2 - Struts 1 Plugin Showcase OGNL Code Execution (Metasploit). Author: Metasploit
Analyze the security implications of: Apache Struts 2 - Struts 1 Plugin Showcase OGNL Code Execution (Metasploit)
This exploit targets multiple systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Joomla! Component Saxum Picker 3.2.10 - SQL Injection
This is a webapps exploit for php platform. Description: Joomla! Component Saxum Picker 3.2.10 - SQL Injection. Author: Ihsan Sencan
Analyze the security implications of: Joomla! Component Saxum Picker 3.2.10 - SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Jinzora 2.6 - '/extras/mt.php' Remote File Inclusion
This is a webapps exploit for php platform. Description: Jinzora 2.6 - '/extras/mt.php' Remote File Inclusion. Author: ddoshomo
Analyze the security implications of: Jinzora 2.6 - '/extras/mt.php' Remote File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Gitea 1.24.0 - HTML Injection
This is a webapps exploit for multiple platform. Description: Gitea 1.24.0 - HTML Injection. Author: Mikail KOCADAĞ
Analyze the security implications of: Gitea 1.24.0 - HTML Injection
This exploit targets multiple systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: OpenTTD 0.4.7 - Multiple Vulnerabilities
This is a dos exploit for multiple platform. Description: OpenTTD 0.4.7 - Multiple Vulnerabilities. Author: Luigi Auriemma
Analyze the security implications of: OpenTTD 0.4.7 - Multiple Vulnerabilities
This exploit targets multiple systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Listing Hub CMS 1.0 - 'pages.php id' SQL Injection
This is a webapps exploit for php platform. Description: Listing Hub CMS 1.0 - 'pages.php id' SQL Injection. Author: Deyaa Muhammad
Analyze the security implications of: Listing Hub CMS 1.0 - 'pages.php id' SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Xangati XSR / XNR - 'gui_input_test.pl' Remote Command Execution
This is a webapps exploit for cgi platform. Description: Xangati XSR / XNR - 'gui_input_test.pl' Remote Command Execution. Author: Jan Kadijk
Analyze the security implications of: Xangati XSR / XNR - 'gui_input_test.pl' Remote Command Execution
This exploit targets cgi systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets cgi platform
What is this exploit about: Friends in War Make or Break 1.7 - Authentication Bypass
This is a webapps exploit for php platform. Description: Friends in War Make or Break 1.7 - Authentication Bypass. Author: Adam
Analyze the security implications of: Friends in War Make or Break 1.7 - Authentication Bypass
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Belkin Wemo UPnP - Remote Code Execution (Metasploit)
This is a remote exploit for hardware platform. Description: Belkin Wemo UPnP - Remote Code Execution (Metasploit). Author: Metasploit
Analyze the security implications of: Belkin Wemo UPnP - Remote Code Execution (Metasploit)
This exploit targets hardware systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: CMS Made Simple 2.1.6 - Remote Code Execution
This is a webapps exploit for php platform. Description: CMS Made Simple 2.1.6 - Remote Code Execution. Author: Keerati T.
Analyze the security implications of: CMS Made Simple 2.1.6 - Remote Code Execution
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Geutebrueck re_porter 7.8.974.20 - Credential Disclosure
This is a webapps exploit for hardware platform. Description: Geutebrueck re_porter 7.8.974.20 - Credential Disclosure. Author: Kamil Suska
Analyze the security implications of: Geutebrueck re_porter 7.8.974.20 - Credential Disclosure
This exploit targets hardware systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Backbone Technology Expression 18.9.2010 - Cross-Site Scripting
This is a webapps exploit for php platform. Description: Backbone Technology Expression 18.9.2010 - Cross-Site Scripting. Author: High-Tech Bridge SA
Analyze the security implications of: Backbone Technology Expression 18.9.2010 - Cross-Site Scripting
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Liferay 6.0.x - WebDAV File Reading
This is a remote exploit for multiple platform. Description: Liferay 6.0.x - WebDAV File Reading. Author: Jelmer Kuperus
Analyze the security implications of: Liferay 6.0.x - WebDAV File Reading
This exploit targets multiple systems. Type: remote. Risk level: High