input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: APC ActionApps CMS 2.8.1 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 11in1 CMS 1.2.1 - Cross-Site Request Forgery (Admin Password)
|
This is a webapps exploit for php platform. Description: 11in1 CMS 1.2.1 - Cross-Site Request Forgery (Admin Password). Author: High-Tech Bridge SA
|
Analyze the security implications of: 11in1 CMS 1.2.1 - Cross-Site Request Forgery (Admin Password)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Forma LMS 2.3 - 'First & Last Name' Stored Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Forma LMS 2.3 - 'First & Last Name' Stored Cross-Site Scripting. Author: Hemant Patidar
|
Analyze the security implications of: Forma LMS 2.3 - 'First & Last Name' Stored Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Integria IMS 5.0.83 - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: Integria IMS 5.0.83 - Cross-Site Request Forgery. Author: Javier Olmedo
|
Analyze the security implications of: Integria IMS 5.0.83 - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_oziogallery2 / IMAGIN - Arbitrary File Write
|
This is a webapps exploit for php platform. Description: Joomla! Component com_oziogallery2 / IMAGIN - Arbitrary File Write. Author: Ubik & er
|
Analyze the security implications of: Joomla! Component com_oziogallery2 / IMAGIN - Arbitrary File Write
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SpeedStream 5200 - Authentication Bypass Configuration Download
|
This is a remote exploit for hardware platform. Description: SpeedStream 5200 - Authentication Bypass Configuration Download. Author: hkm
|
Analyze the security implications of: SpeedStream 5200 - Authentication Bypass Configuration Download
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Alienvault Open Source SIEM (OSSIM) 4.6.1 - (Authenticated) SQL Injection (Metasploit)
|
This is a webapps exploit for php platform. Description: Alienvault Open Source SIEM (OSSIM) 4.6.1 - (Authenticated) SQL Injection (Metasploit). Author: Chris Hebert
|
Analyze the security implications of: Alienvault Open Source SIEM (OSSIM) 4.6.1 - (Authenticated) SQL Injection (Metasploit)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DVBBS 7.1 - 'ShowErr.asp' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: DVBBS 7.1 - 'ShowErr.asp' Cross-Site Scripting. Author: rUnViRuS
|
Analyze the security implications of: DVBBS 7.1 - 'ShowErr.asp' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Woodstock 4.2 404 - Error Page Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: Woodstock 4.2 404 - Error Page Cross-Site Scripting. Author: DSecRG
|
Analyze the security implications of: Woodstock 4.2 404 - Error Page Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apple Mac OSX - Panther Internet Connect Privilege Escalation
|
This is a local exploit for osx platform. Description: Apple Mac OSX - Panther Internet Connect Privilege Escalation. Author: B-r00t
|
Analyze the security implications of: Apple Mac OSX - Panther Internet Connect Privilege Escalation
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: E-Gold Game Series: Pirates of The Caribbean - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: E-Gold Game Series: Pirates of The Caribbean - Multiple SQL Injections. Author: Moudi
|
Analyze the security implications of: E-Gold Game Series: Pirates of The Caribbean - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: NUUO NVRMini 2 3.9.1 - 'sscanf' Stack Overflow
|
This is a remote exploit for hardware platform. Description: NUUO NVRMini 2 3.9.1 - 'sscanf' Stack Overflow. Author: @0x00string
|
Analyze the security implications of: NUUO NVRMini 2 3.9.1 - 'sscanf' Stack Overflow
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CoreHTTP 0.5.3.1 - 'CGI' Arbitrary Command Execution
|
This is a remote exploit for linux platform. Description: CoreHTTP 0.5.3.1 - 'CGI' Arbitrary Command Execution. Author: Aaron Conole
|
Analyze the security implications of: CoreHTTP 0.5.3.1 - 'CGI' Arbitrary Command Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AWStats 6.5 - 'migrate' Remote Shell Command Injection
|
This is a webapps exploit for cgi platform. Description: AWStats 6.5 - 'migrate' Remote Shell Command Injection. Author: redsand
|
Analyze the security implications of: AWStats 6.5 - 'migrate' Remote Shell Command Injection
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: 2WIRE DSL Router - 'xslt' Denial of Service
|
This is a dos exploit for hardware platform. Description: 2WIRE DSL Router - 'xslt' Denial of Service. Author: hkm
|
Analyze the security implications of: 2WIRE DSL Router - 'xslt' Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: DCP-Portal 6.1.x - 'root' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: DCP-Portal 6.1.x - 'root' Remote File Inclusion. Author: Federico Fazzi
|
Analyze the security implications of: DCP-Portal 6.1.x - 'root' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link - Captcha Bypass
|
This is a remote exploit for hardware platform. Description: D-Link - Captcha Bypass. Author: SourceSec Dev Team
|
Analyze the security implications of: D-Link - Captcha Bypass
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Linux Kernel 2.6.22 < 3.9 - 'Dirty COW /proc/self/mem' Race Condition Privilege Escalation (/etc/passwd Method)
|
This is a local exploit for linux platform. Description: Linux Kernel 2.6.22 < 3.9 - 'Dirty COW /proc/self/mem' Race Condition Privilege Escalation (/etc/passwd Method). Author: Gabriele Bonacini
|
Analyze the security implications of: Linux Kernel 2.6.22 < 3.9 - 'Dirty COW /proc/self/mem' Race Condition Privilege Escalation (/etc/passwd Method)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Ocean12 (Multiple Products) - 'Admin_ID' SQL Injection
|
This is a webapps exploit for asp platform. Description: Ocean12 (Multiple Products) - 'Admin_ID' SQL Injection. Author: Charalambous Glafkos
|
Analyze the security implications of: Ocean12 (Multiple Products) - 'Admin_ID' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Xplico - Remote Code Execution (Metasploit)
|
This is a remote exploit for linux platform. Description: Xplico - Remote Code Execution (Metasploit). Author: Mehmet Ince
|
Analyze the security implications of: Xplico - Remote Code Execution (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: WebKit JSC - 'JSObject::ensureLength' ensureLengthSlow Check Failure
|
This is a dos exploit for linux platform. Description: WebKit JSC - 'JSObject::ensureLength' ensureLengthSlow Check Failure. Author: Google Security Research
|
Analyze the security implications of: WebKit JSC - 'JSObject::ensureLength' ensureLengthSlow Check Failure
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Cisco RV110W/RV130(W)/RV215W Routers Management Interface - Remote Command Execution (Metasploit)
|
This is a remote exploit for hardware platform. Description: Cisco RV110W/RV130(W)/RV215W Routers Management Interface - Remote Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Cisco RV110W/RV130(W)/RV215W Routers Management Interface - Remote Command Execution (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: IPUX Cube Type CS303C IP Camera - 'UltraMJCamX.ocx' ActiveX Stack Buffer Overflow
|
This is a remote exploit for hardware platform. Description: IPUX Cube Type CS303C IP Camera - 'UltraMJCamX.ocx' ActiveX Stack Buffer Overflow. Author: LiquidWorm
|
Analyze the security implications of: IPUX Cube Type CS303C IP Camera - 'UltraMJCamX.ocx' ActiveX Stack Buffer Overflow
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Bonza Digital Cart Script - SQL Injection
|
This is a webapps exploit for php platform. Description: Bonza Digital Cart Script - SQL Injection. Author: Eyup CELIK
|
Analyze the security implications of: Bonza Digital Cart Script - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MikroTik RouterOS - sshd (ROSSSH) Remote Heap Corruption
|
This is a remote exploit for hardware platform. Description: MikroTik RouterOS - sshd (ROSSSH) Remote Heap Corruption. Author: kingcope
|
Analyze the security implications of: MikroTik RouterOS - sshd (ROSSSH) Remote Heap Corruption
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: D-Link DAP-1150 1.2.94 - Cross-Site Request Forgery
|
This is a remote exploit for hardware platform. Description: D-Link DAP-1150 1.2.94 - Cross-Site Request Forgery. Author: MustLive
|
Analyze the security implications of: D-Link DAP-1150 1.2.94 - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: libcdio 0.7x - GNU Compact Disc Input and Control Library Buffer Overflow
|
This is a dos exploit for linux platform. Description: libcdio 0.7x - GNU Compact Disc Input and Control Library Buffer Overflow. Author: Devon Miller
|
Analyze the security implications of: libcdio 0.7x - GNU Compact Disc Input and Control Library Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Aurora CMS - SQL Injection
|
This is a webapps exploit for php platform. Description: Aurora CMS - SQL Injection. Author: Sora
|
Analyze the security implications of: Aurora CMS - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mozilla Bugzilla 2.4/2.6/2.8/2.10 - Arbitrary Command Execution
|
This is a remote exploit for cgi platform. Description: Mozilla Bugzilla 2.4/2.6/2.8/2.10 - Arbitrary Command Execution. Author: Frank van Vliet karin
|
Analyze the security implications of: Mozilla Bugzilla 2.4/2.6/2.8/2.10 - Arbitrary Command Execution
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Joomla! Component Sponsor Wall 8.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Sponsor Wall 8.0 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Sponsor Wall 8.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Kasseler CMS 1.1.0/1.2.0 Lite - SQL Injection
|
This is a webapps exploit for php platform. Description: Kasseler CMS 1.1.0/1.2.0 Lite - SQL Injection. Author: ~!Dok_tOR!~
|
Analyze the security implications of: Kasseler CMS 1.1.0/1.2.0 Lite - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LiveStreet 0.2 - Comment Topic Header Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: LiveStreet 0.2 - Comment Topic Header Cross-Site Scripting. Author: Inj3ct0r
|
Analyze the security implications of: LiveStreet 0.2 - Comment Topic Header Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco ASA Software 8.x/9.x - IKEv1 / IKEv2 Buffer Overflow
|
This is a remote exploit for hardware platform. Description: Cisco ASA Software 8.x/9.x - IKEv1 / IKEv2 Buffer Overflow. Author: Exodus Intelligence
|
Analyze the security implications of: Cisco ASA Software 8.x/9.x - IKEv1 / IKEv2 Buffer Overflow
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Flexphplink Pro - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Flexphplink Pro - Arbitrary File Upload. Author: Osirys
|
Analyze the security implications of: Flexphplink Pro - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.