input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: ISPConfig - (Authenticated) Arbitrary PHP Code Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: contentserver 5.6.2929 - '/errors/transaction.asp?msg' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: contentserver 5.6.2929 - '/errors/transaction.asp?msg' Cross-Site Scripting. Author: RedTeam Pentesting
|
Analyze the security implications of: contentserver 5.6.2929 - '/errors/transaction.asp?msg' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: KKE Info Media Kmita Gallery - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: KKE Info Media Kmita Gallery - Multiple Cross-Site Scripting Vulnerabilities. Author: cize0f
|
Analyze the security implications of: KKE Info Media Kmita Gallery - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Limbo CMS 1.0.4.2 - 'sql.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Limbo CMS 1.0.4.2 - 'sql.php' Remote File Inclusion. Author: [Oo]
|
Analyze the security implications of: Limbo CMS 1.0.4.2 - 'sql.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Tincd - (Authenticated) Remote TCP Stack Buffer Overflow (Metasploit)
|
This is a remote exploit for multiple platform. Description: Tincd - (Authenticated) Remote TCP Stack Buffer Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: Tincd - (Authenticated) Remote TCP Stack Buffer Overflow (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Wireshark - wmem_alloc Assertion Failure
|
This is a dos exploit for multiple platform. Description: Wireshark - wmem_alloc Assertion Failure. Author: Google Security Research
|
Analyze the security implications of: Wireshark - wmem_alloc Assertion Failure
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Baby Gekko CMS 1.1.5c - Multiple Persistent Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Baby Gekko CMS 1.1.5c - Multiple Persistent Cross-Site Scripting Vulnerabilities. Author: LiquidWorm
|
Analyze the security implications of: Baby Gekko CMS 1.1.5c - Multiple Persistent Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eyeOS 0.8.x - Session Remote Command Execution
|
This is a webapps exploit for php platform. Description: eyeOS 0.8.x - Session Remote Command Execution. Author: GulfTech Security
|
Analyze the security implications of: eyeOS 0.8.x - Session Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Kohana Framework 2.3.3 - Directory Traversal
|
This is a webapps exploit for php platform. Description: Kohana Framework 2.3.3 - Directory Traversal. Author: Vulnerability-Lab
|
Analyze the security implications of: Kohana Framework 2.3.3 - Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: A-Blog 2.0 - '/sources/search.php' SQL Injection
|
This is a webapps exploit for php platform. Description: A-Blog 2.0 - '/sources/search.php' SQL Injection. Author: Ptrace Security
|
Analyze the security implications of: A-Blog 2.0 - '/sources/search.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alegro 1.2.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: Alegro 1.2.1 - SQL Injection. Author: indoushka
|
Analyze the security implications of: Alegro 1.2.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IRIX 5.3/6.2/6.3/6.4/6.5/6.5.11 - '/usr/lib/print/netprint' Local Privilege Escalation
|
This is a local exploit for irix platform. Description: IRIX 5.3/6.2/6.3/6.4/6.5/6.5.11 - '/usr/lib/print/netprint' Local Privilege Escalation. Author: LSD-PLaNET
|
Analyze the security implications of: IRIX 5.3/6.2/6.3/6.4/6.5/6.5.11 - '/usr/lib/print/netprint' Local Privilege Escalation
|
This exploit targets irix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets irix platform
|
What is this exploit about: F5 BIG-IP - SSH Private Key Exposure (Metasploit)
|
This is a remote exploit for hardware platform. Description: F5 BIG-IP - SSH Private Key Exposure (Metasploit). Author: Metasploit
|
Analyze the security implications of: F5 BIG-IP - SSH Private Key Exposure (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component Delicious Bookmarks 0.0.1 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Delicious Bookmarks 0.0.1 - Local File Inclusion. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component Delicious Bookmarks 0.0.1 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Eurologon CMS - 'files.php' Arbitrary File Download
|
This is a webapps exploit for php platform. Description: Eurologon CMS - 'files.php' Arbitrary File Download. Author: KiNgOfThEwOrLd
|
Analyze the security implications of: Eurologon CMS - 'files.php' Arbitrary File Download
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 2.6.26 - Auerswald USB Device Driver Buffer Overflow (PoC)
|
This is a dos exploit for linux platform. Description: Linux Kernel 2.6.26 - Auerswald USB Device Driver Buffer Overflow (PoC). Author: R. Dominguez Veg
|
Analyze the security implications of: Linux Kernel 2.6.26 - Auerswald USB Device Driver Buffer Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: 3Com OfficeConnect Routers - 'Content-Type' Denial of Service
|
This is a dos exploit for hardware platform. Description: 3Com OfficeConnect Routers - 'Content-Type' Denial of Service. Author: Alberto Ortega
|
Analyze the security implications of: 3Com OfficeConnect Routers - 'Content-Type' Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: AIDA Web - Frame.HTML Multiple Unauthorized Access Vulnerabilities
|
This is a webapps exploit for cgi platform. Description: AIDA Web - Frame.HTML Multiple Unauthorized Access Vulnerabilities. Author: MC Iglo
|
Analyze the security implications of: AIDA Web - Frame.HTML Multiple Unauthorized Access Vulnerabilities
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: DIY - 'did' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: DIY - 'did' Blind SQL Injection. Author: Mr.SQL
|
Analyze the security implications of: DIY - 'did' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Achievo 1.3.4 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Achievo 1.3.4 - Remote File Inclusion. Author: M3NW5
|
Analyze the security implications of: Achievo 1.3.4 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Multiple Vendor - TCP Sequence Number Approximation (3)
|
This is a remote exploit for multiple platform. Description: Multiple Vendor - TCP Sequence Number Approximation (3). Author: Paul Watson
|
Analyze the security implications of: Multiple Vendor - TCP Sequence Number Approximation (3)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: all-in-one-seo-pack 3.2.7 - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: all-in-one-seo-pack 3.2.7 - Persistent Cross-Site Scripting. Author: Unk9vvN
|
Analyze the security implications of: all-in-one-seo-pack 3.2.7 - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FiberHome AN5506 - Remote DNS Change
|
This is a webapps exploit for hardware platform. Description: FiberHome AN5506 - Remote DNS Change. Author: r0ots3c
|
Analyze the security implications of: FiberHome AN5506 - Remote DNS Change
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component Projoom NovaSFH 3.0.2 - 'upload.php' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Joomla! Component Projoom NovaSFH 3.0.2 - 'upload.php' Arbitrary File Upload. Author: Yuri Kramarz
|
Analyze the security implications of: Joomla! Component Projoom NovaSFH 3.0.2 - 'upload.php' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iBooking v1.0.8 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: iBooking v1.0.8 - Arbitrary File Upload. Author: d1z1n370/oPty
|
Analyze the security implications of: iBooking v1.0.8 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ASP Basit Haber Script 1.0 - 'id' SQL Injection
|
This is a webapps exploit for asp platform. Description: ASP Basit Haber Script 1.0 - 'id' SQL Injection. Author: m3rciL3Ss
|
Analyze the security implications of: ASP Basit Haber Script 1.0 - 'id' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: AudioCode 400HD - Command Injection
|
This is a webapps exploit for cgi platform. Description: AudioCode 400HD - Command Injection. Author: Sysdream
|
Analyze the security implications of: AudioCode 400HD - Command Injection
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Instant Photo Gallery 1.0 - 'portfolio.php?cat_id' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Instant Photo Gallery 1.0 - 'portfolio.php?cat_id' Cross-Site Scripting. Author: Qex
|
Analyze the security implications of: Instant Photo Gallery 1.0 - 'portfolio.php?cat_id' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Coppermine Photo Gallery 1.4.14 - 'picEditor.php' Command Execution (Metasploit)
|
This is a webapps exploit for php platform. Description: Coppermine Photo Gallery 1.4.14 - 'picEditor.php' Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Coppermine Photo Gallery 1.4.14 - 'picEditor.php' Command Execution (Metasploit)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OCE 3121/3122 Printer - 'parser.exe' Denial of Service
|
This is a dos exploit for hardware platform. Description: OCE 3121/3122 Printer - 'parser.exe' Denial of Service. Author: sh4d0wman
|
Analyze the security implications of: OCE 3121/3122 Printer - 'parser.exe' Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: allomani 2007 - 'cat' SQL Injection
|
This is a webapps exploit for php platform. Description: allomani 2007 - 'cat' SQL Injection. Author: NeX HaCkEr
|
Analyze the security implications of: allomani 2007 - 'cat' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Antminer Monitor 0.5.0 - Authentication Bypass
|
This is a webapps exploit for multiple platform. Description: Antminer Monitor 0.5.0 - Authentication Bypass. Author: Vulnz
|
Analyze the security implications of: Antminer Monitor 0.5.0 - Authentication Bypass
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Nortel CVX 1800 Multi-Service Access Switch - Default SNMP Community
|
This is a remote exploit for hardware platform. Description: Nortel CVX 1800 Multi-Service Access Switch - Default SNMP Community. Author: Michael Rawls
|
Analyze the security implications of: Nortel CVX 1800 Multi-Service Access Switch - Default SNMP Community
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Gemtek CPE7000 - WLTCS-106 'sysconf.cgi' Remote Command Execution (Metasploit)
|
This is a webapps exploit for hardware platform. Description: Gemtek CPE7000 - WLTCS-106 'sysconf.cgi' Remote Command Execution (Metasploit). Author: Federico Scalco
|
Analyze the security implications of: Gemtek CPE7000 - WLTCS-106 'sysconf.cgi' Remote Command Execution (Metasploit)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.