input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: CMSUno 1.6.2 - 'user' Remote Code Execution (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DCS - 'security.cgi' Cross-Site Request Forgery | This is a remote exploit for hardware platform. Description: D-Link DCS - 'security.cgi' Cross-Site Request Forgery. Author: Rigan Iimrigan |
Analyze the security implications of: D-Link DCS - 'security.cgi' Cross-Site Request Forgery | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BMForum 5.6 - 'bsd01footer.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: BMForum 5.6 - 'bsd01footer.php' Cross-Site Scripting. Author: CWH Underground |
Analyze the security implications of: BMForum 5.6 - 'bsd01footer.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_ponygallery - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_ponygallery - SQL Injection. Author: xDarkSton3x |
Analyze the security implications of: Joomla! Component com_ponygallery - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Event Calendar PHP 1.5 - SQL Injection | This is a webapps exploit for php platform. Description: Event Calendar PHP 1.5 - SQL Injection. Author: Ehsan Hosseini |
Analyze the security implications of: Event Calendar PHP 1.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lucent Ascend MAX 5.0/Pipeline 6.0/TNT 1.0/2.0 Router - MAX UDP Port 9 (2) | This is a remote exploit for hardware platform. Description: Lucent Ascend MAX 5.0/Pipeline 6.0/TNT 1.0/2.0 Router - MAX UDP Port 9 (2). Author: Rootshell |
Analyze the security implications of: Lucent Ascend MAX 5.0/Pipeline 6.0/TNT 1.0/2.0 Router - MAX UDP Port 9 (2) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Admidio v4.2.10 - Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: Admidio v4.2.10 - Remote Code Execution (RCE). Author: Mirabbas Ağalarov |
Analyze the security implications of: Admidio v4.2.10 - Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Drupal Module Sections 5.x-1.2/6.x-1.2 - HTML Injection | This is a webapps exploit for php platform. Description: Drupal Module Sections 5.x-1.2/6.x-1.2 - HTML Injection. Author: Justin C. Klein Keane |
Analyze the security implications of: Drupal Module Sections 5.x-1.2/6.x-1.2 - HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bandersnatch 0.4 - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: Bandersnatch 0.4 - Multiple Input Validation Vulnerabilities. Author: Tim Brown |
Analyze the security implications of: Bandersnatch 0.4 - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: evalSMSI 2.1.3 - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: evalSMSI 2.1.3 - Multiple Input Validation Vulnerabilities. Author: ekse |
Analyze the security implications of: evalSMSI 2.1.3 - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Atlassian Jira Service Desk 4.9.1 - Unrestricted File Upload to XSS | This is a webapps exploit for multiple platform. Description: Atlassian Jira Service Desk 4.9.1 - Unrestricted File Upload to XSS. Author: Captain_hook |
Analyze the security implications of: Atlassian Jira Service Desk 4.9.1 - Unrestricted File Upload to XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CutePHP CuteNews 1.4.1 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CutePHP CuteNews 1.4.1 - 'index.php' Cross-Site Scripting. Author: Roozbeh Afrasiabi |
Analyze the security implications of: CutePHP CuteNews 1.4.1 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dawn of Time 1.69 MUD Server - Multiple Format String Vulnerabilities | This is a dos exploit for multiple platform. Description: Dawn of Time 1.69 MUD Server - Multiple Format String Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: Dawn of Time 1.69 MUD Server - Multiple Format String Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BMC Server Automation RSCD Agent - NSH Remote Command Execution (Metasploit) | This is a remote exploit for multiple platform. Description: BMC Server Automation RSCD Agent - NSH Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: BMC Server Automation RSCD Agent - NSH Remote Command Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: TP-Link Wireless N Router WR840N - Denial of Service (PoC) | This is a dos exploit for hardware platform. Description: TP-Link Wireless N Router WR840N - Denial of Service (PoC). Author: Aniket Dinda |
Analyze the security implications of: TP-Link Wireless N Router WR840N - Denial of Service (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Microburst uDirectory 2.0 - Remote Command Execution | This is a remote exploit for cgi platform. Description: Microburst uDirectory 2.0 - Remote Command Execution. Author: Igor Dobrovitski |
Analyze the security implications of: Microburst uDirectory 2.0 - Remote Command Execution | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! Component com_paxgallery - Blind Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_paxgallery - Blind Injection. Author: snakespc |
Analyze the security implications of: Joomla! Component com_paxgallery - Blind Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mumble Murmur 1.2 - Denial of Service | This is a dos exploit for linux platform. Description: Mumble Murmur 1.2 - Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Mumble Murmur 1.2 - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: D-Link DIR-601 - Command Injection | This is a remote exploit for hardware platform. Description: D-Link DIR-601 - Command Injection. Author: Samuel Huntley |
Analyze the security implications of: D-Link DIR-601 - Command Injection | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Reliable Datagram Sockets (RDS) - rds_atomic_free_op NULL pointer dereference Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: Reliable Datagram Sockets (RDS) - rds_atomic_free_op NULL pointer dereference Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Reliable Datagram Sockets (RDS) - rds_atomic_free_op NULL pointer dereference Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Zimbra Collaboration Server 7.2.2/8.0.2 - Local File Inclusion (Metasploit) | This is a webapps exploit for linux platform. Description: Zimbra Collaboration Server 7.2.2/8.0.2 - Local File Inclusion (Metasploit). Author: Metasploit |
Analyze the security implications of: Zimbra Collaboration Server 7.2.2/8.0.2 - Local File Inclusion (Metasploit) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache Struts 2 - Struts 1 Plugin Showcase OGNL Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Apache Struts 2 - Struts 1 Plugin Showcase OGNL Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Apache Struts 2 - Struts 1 Plugin Showcase OGNL Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Saxum Picker 3.2.10 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Saxum Picker 3.2.10 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Saxum Picker 3.2.10 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jinzora 2.6 - '/extras/mt.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Jinzora 2.6 - '/extras/mt.php' Remote File Inclusion. Author: ddoshomo |
Analyze the security implications of: Jinzora 2.6 - '/extras/mt.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gitea 1.24.0 - HTML Injection | This is a webapps exploit for multiple platform. Description: Gitea 1.24.0 - HTML Injection. Author: Mikail KOCADAĞ |
Analyze the security implications of: Gitea 1.24.0 - HTML Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: OpenTTD 0.4.7 - Multiple Vulnerabilities | This is a dos exploit for multiple platform. Description: OpenTTD 0.4.7 - Multiple Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: OpenTTD 0.4.7 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Listing Hub CMS 1.0 - 'pages.php id' SQL Injection | This is a webapps exploit for php platform. Description: Listing Hub CMS 1.0 - 'pages.php id' SQL Injection. Author: Deyaa Muhammad |
Analyze the security implications of: Listing Hub CMS 1.0 - 'pages.php id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Xangati XSR / XNR - 'gui_input_test.pl' Remote Command Execution | This is a webapps exploit for cgi platform. Description: Xangati XSR / XNR - 'gui_input_test.pl' Remote Command Execution. Author: Jan Kadijk |
Analyze the security implications of: Xangati XSR / XNR - 'gui_input_test.pl' Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Friends in War Make or Break 1.7 - Authentication Bypass | This is a webapps exploit for php platform. Description: Friends in War Make or Break 1.7 - Authentication Bypass. Author: Adam |
Analyze the security implications of: Friends in War Make or Break 1.7 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Belkin Wemo UPnP - Remote Code Execution (Metasploit) | This is a remote exploit for hardware platform. Description: Belkin Wemo UPnP - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Belkin Wemo UPnP - Remote Code Execution (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CMS Made Simple 2.1.6 - Remote Code Execution | This is a webapps exploit for php platform. Description: CMS Made Simple 2.1.6 - Remote Code Execution. Author: Keerati T. |
Analyze the security implications of: CMS Made Simple 2.1.6 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Geutebrueck re_porter 7.8.974.20 - Credential Disclosure | This is a webapps exploit for hardware platform. Description: Geutebrueck re_porter 7.8.974.20 - Credential Disclosure. Author: Kamil Suska |
Analyze the security implications of: Geutebrueck re_porter 7.8.974.20 - Credential Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Backbone Technology Expression 18.9.2010 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Backbone Technology Expression 18.9.2010 - Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: Backbone Technology Expression 18.9.2010 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Liferay 6.0.x - WebDAV File Reading | This is a remote exploit for multiple platform. Description: Liferay 6.0.x - WebDAV File Reading. Author: Jelmer Kuperus |
Analyze the security implications of: Liferay 6.0.x - WebDAV File Reading | This exploit targets multiple systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.