input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: InterSystems Cache 4.1.15/5.0.x - Insecure Default Permissions
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Nokia Symbian 60 3rd Edition - Browser Crash (Denial of Service)
|
This is a dos exploit for hardware platform. Description: Nokia Symbian 60 3rd Edition - Browser Crash (Denial of Service). Author: Qode
|
Analyze the security implications of: Nokia Symbian 60 3rd Edition - Browser Crash (Denial of Service)
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: SGI IRIX 6.2 - 'cdplayer' Local Privilege Escalation
|
This is a local exploit for irix platform. Description: SGI IRIX 6.2 - 'cdplayer' Local Privilege Escalation. Author: Yuri Volobuev
|
Analyze the security implications of: SGI IRIX 6.2 - 'cdplayer' Local Privilege Escalation
|
This exploit targets irix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets irix platform
|
What is this exploit about: Joomla! Component Reverse Auction Factory 4.3.8 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Reverse Auction Factory 4.3.8 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Reverse Auction Factory 4.3.8 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Simple Message Board 2.0 beta1 - 'Search.cfm' Cross-Site Scripting
|
This is a webapps exploit for cfm platform. Description: Simple Message Board 2.0 beta1 - 'Search.cfm' Cross-Site Scripting. Author: rUnViRuS
|
Analyze the security implications of: Simple Message Board 2.0 beta1 - 'Search.cfm' Cross-Site Scripting
|
This exploit targets cfm systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cfm platform
|
What is this exploit about: Binary Board System 0.2.5 - 'toc.pl?board' Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: Binary Board System 0.2.5 - 'toc.pl?board' Cross-Site Scripting. Author: r0t3d3Vil
|
Analyze the security implications of: Binary Board System 0.2.5 - 'toc.pl?board' Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: SiteSearch Indexer 3.5 - 'searchresults.asp' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: SiteSearch Indexer 3.5 - 'searchresults.asp' Cross-Site Scripting. Author: r0t
|
Analyze the security implications of: SiteSearch Indexer 3.5 - 'searchresults.asp' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: MegaBook 1.1/2.0/2.1 - Multiple HTML Injection Vulnerabilities
|
This is a webapps exploit for cgi platform. Description: MegaBook 1.1/2.0/2.1 - Multiple HTML Injection Vulnerabilities. Author: Morning Wood
|
Analyze the security implications of: MegaBook 1.1/2.0/2.1 - Multiple HTML Injection Vulnerabilities
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: D-Link DSL-320B - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: D-Link DSL-320B - Multiple Vulnerabilities. Author: m-1-k-3
|
Analyze the security implications of: D-Link DSL-320B - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Easy Live Shop System - SQL Injection
|
This is a webapps exploit for php platform. Description: Easy Live Shop System - SQL Injection. Author: Ramdan Yantu
|
Analyze the security implications of: Easy Live Shop System - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LevelOne WBR3404TX Broadband Router - 'RC' Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: LevelOne WBR3404TX Broadband Router - 'RC' Cross-Site Scripting. Author: azizov
|
Analyze the security implications of: LevelOne WBR3404TX Broadband Router - 'RC' Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: PLC Wireless Router GPN2.4P21-C-CN - Arbitrary File Disclosure
|
This is a webapps exploit for cgi platform. Description: PLC Wireless Router GPN2.4P21-C-CN - Arbitrary File Disclosure. Author: Rahul Raz
|
Analyze the security implications of: PLC Wireless Router GPN2.4P21-C-CN - Arbitrary File Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Google Android - 'APK' code Remote Security Bypass
|
This is a remote exploit for android platform. Description: Google Android - 'APK' code Remote Security Bypass. Author: Bluebox Security
|
Analyze the security implications of: Google Android - 'APK' code Remote Security Bypass
|
This exploit targets android systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Doop Content Management System 1.3.x - Multiple Input Validation Vulnerabilities
|
This is a webapps exploit for php platform. Description: Doop Content Management System 1.3.x - Multiple Input Validation Vulnerabilities. Author: KaBuS
|
Analyze the security implications of: Doop Content Management System 1.3.x - Multiple Input Validation Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Percha Fields Attach 1.0 - 'Controller' Traversal Arbitrary File Access
|
This is a webapps exploit for php platform. Description: Joomla! Component Percha Fields Attach 1.0 - 'Controller' Traversal Arbitrary File Access. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component Percha Fields Attach 1.0 - 'Controller' Traversal Arbitrary File Access
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: faceStones personal 2.0.42 - 'fs_form_links.php' File Inclusion
|
This is a webapps exploit for php platform. Description: faceStones personal 2.0.42 - 'fs_form_links.php' File Inclusion. Author: SHiKaA
|
Analyze the security implications of: faceStones personal 2.0.42 - 'fs_form_links.php' File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco CBOS 2.x - Multiple TCP Connection Denial of Service Vulnerabilities
|
This is a dos exploit for hardware platform. Description: Cisco CBOS 2.x - Multiple TCP Connection Denial of Service Vulnerabilities. Author: Cisco Security
|
Analyze the security implications of: Cisco CBOS 2.x - Multiple TCP Connection Denial of Service Vulnerabilities
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Microsoft Outlook Microsoft 365 MSO (Version 2306 Build 16.0.16529.20100) 32-bit - Remote Code Execution
|
This is a remote exploit for multiple platform. Description: Microsoft Outlook Microsoft 365 MSO (Version 2306 Build 16.0.16529.20100) 32-bit - Remote Code Execution. Author: nu11secur1ty
|
Analyze the security implications of: Microsoft Outlook Microsoft 365 MSO (Version 2306 Build 16.0.16529.20100) 32-bit - Remote Code Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Enigma NMS 65.0.0 - SQL Injection
|
This is a webapps exploit for multiple platform. Description: Enigma NMS 65.0.0 - SQL Injection. Author: xerubus
|
Analyze the security implications of: Enigma NMS 65.0.0 - SQL Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Nagios XI - Authenticated Remote Command Execution (Metasploit)
|
This is a remote exploit for linux platform. Description: Nagios XI - Authenticated Remote Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Nagios XI - Authenticated Remote Command Execution (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Juniper-SRX-Firewalls&EX-switches - (PreAuth-RCE) (PoC)
|
This is a webapps exploit for php platform. Description: Juniper-SRX-Firewalls&EX-switches - (PreAuth-RCE) (PoC). Author: whiteOwl
|
Analyze the security implications of: Juniper-SRX-Firewalls&EX-switches - (PreAuth-RCE) (PoC)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: The Includer CGI 1.0 - Remote Command Execution (1)
|
This is a webapps exploit for cgi platform. Description: The Includer CGI 1.0 - Remote Command Execution (1). Author: Francisco Alisson
|
Analyze the security implications of: The Includer CGI 1.0 - Remote Command Execution (1)
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Magic Book Professional 2.0 - 'Book.cfm' Cross-Site Scripting
|
This is a webapps exploit for cfm platform. Description: Magic Book Professional 2.0 - 'Book.cfm' Cross-Site Scripting. Author: r0t
|
Analyze the security implications of: Magic Book Professional 2.0 - 'Book.cfm' Cross-Site Scripting
|
This exploit targets cfm systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cfm platform
|
What is this exploit about: Google Search Appliance - proxystylesheet XSLT Java Code Execution (Metasploit)
|
This is a remote exploit for hardware platform. Description: Google Search Appliance - proxystylesheet XSLT Java Code Execution (Metasploit). Author: H D Moore
|
Analyze the security implications of: Google Search Appliance - proxystylesheet XSLT Java Code Execution (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Next Gen Portfolio Manager - 'default.asp' Multiple SQL Injections
|
This is a webapps exploit for asp platform. Description: Next Gen Portfolio Manager - 'default.asp' Multiple SQL Injections. Author: Aria-Security Team
|
Analyze the security implications of: Next Gen Portfolio Manager - 'default.asp' Multiple SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: PerlDesk 1.x - SQL Injection
|
This is a webapps exploit for cgi platform. Description: PerlDesk 1.x - SQL Injection. Author: deluxe89
|
Analyze the security implications of: PerlDesk 1.x - SQL Injection
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Clipbucket 1.7 - 'dwnld.php' Directory Traversal
|
This is a webapps exploit for php platform. Description: Clipbucket 1.7 - 'dwnld.php' Directory Traversal. Author: JIKO
|
Analyze the security implications of: Clipbucket 1.7 - 'dwnld.php' Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP 5.2.5 - cURL 'safe_mode' Security Bypass
|
This is a remote exploit for php platform. Description: PHP 5.2.5 - cURL 'safe_mode' Security Bypass. Author: Maksymilian Arciemowicz
|
Analyze the security implications of: PHP 5.2.5 - cURL 'safe_mode' Security Bypass
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component VMap 1.9.6 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component VMap 1.9.6 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component VMap 1.9.6 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP 5.3.0 - 'pdflib' Arbitrary File Write
|
This is a local exploit for php platform. Description: PHP 5.3.0 - 'pdflib' Arbitrary File Write. Author: Sina Yazdanmehr
|
Analyze the security implications of: PHP 5.3.0 - 'pdflib' Arbitrary File Write
|
This exploit targets php systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component iJoomla! News Portal 1.0 - 'itemID' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component iJoomla! News Portal 1.0 - 'itemID' SQL Injection. Author: ilker Kandemir
|
Analyze the security implications of: Joomla! Component iJoomla! News Portal 1.0 - 'itemID' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Calibre E-Book Reader - Local Privilege Escalation (3)
|
This is a local exploit for linux platform. Description: Calibre E-Book Reader - Local Privilege Escalation (3). Author: zx2c4
|
Analyze the security implications of: Calibre E-Book Reader - Local Privilege Escalation (3)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Blueimp's jQuery File Upload 9.22.0 - Arbitrary File Upload Exploit
|
This is a webapps exploit for php platform. Description: Blueimp's jQuery File Upload 9.22.0 - Arbitrary File Upload Exploit. Author: Larry W. Cashdollar
|
Analyze the security implications of: Blueimp's jQuery File Upload 9.22.0 - Arbitrary File Upload Exploit
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Comdev eCommerce 3.0 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Comdev eCommerce 3.0 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: SmOk3
|
Analyze the security implications of: Comdev eCommerce 3.0 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.