input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: TVT NVMS 1000 - Directory Traversal
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Openfire 3.6.4 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: Openfire 3.6.4 - Multiple Cross-Site Scripting Vulnerabilities. Author: Walikar Riyaz Ahemed Dawalmalik
|
Analyze the security implications of: Openfire 3.6.4 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: foomatic-gui python-foomatic 0.7.9.4 - 'pysmb.py' Arbitrary Shell Command Execution
|
This is a remote exploit for multiple platform. Description: foomatic-gui python-foomatic 0.7.9.4 - 'pysmb.py' Arbitrary Shell Command Execution. Author: daveb
|
Analyze the security implications of: foomatic-gui python-foomatic 0.7.9.4 - 'pysmb.py' Arbitrary Shell Command Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: sudo.bin - NLSPATH Privilege Escalation
|
This is a local exploit for linux platform. Description: sudo.bin - NLSPATH Privilege Escalation. Author: _Phantom_
|
Analyze the security implications of: sudo.bin - NLSPATH Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Kasseler CMS 2.0.5 - 'index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Kasseler CMS 2.0.5 - 'index.php' Cross-Site Scripting. Author: indoushka
|
Analyze the security implications of: Kasseler CMS 2.0.5 - 'index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_guide - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_guide - SQL Injection. Author: DevilZ TM
|
Analyze the security implications of: Joomla! Component com_guide - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco Subscriber Edge Services Manager - Cross-Site Scripting / HTML Injection
|
This is a webapps exploit for java platform. Description: Cisco Subscriber Edge Services Manager - Cross-Site Scripting / HTML Injection. Author: Usman Saeed
|
Analyze the security implications of: Cisco Subscriber Edge Services Manager - Cross-Site Scripting / HTML Injection
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Joomla! Component JV Comment 3.0.2 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JV Comment 3.0.2 - 'id' SQL Injection. Author: High-Tech Bridge SA
|
Analyze the security implications of: Joomla! Component JV Comment 3.0.2 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Itech Travel Portal Script 9.35 - SQL Injection
|
This is a webapps exploit for php platform. Description: Itech Travel Portal Script 9.35 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Itech Travel Portal Script 9.35 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iOS IOUSBDeviceFamily 12.4.1 - 'IOInterruptEventSource' Heap Corruption (PoC)
|
This is a dos exploit for ios platform. Description: iOS IOUSBDeviceFamily 12.4.1 - 'IOInterruptEventSource' Heap Corruption (PoC). Author: Sem Voigtlander
|
Analyze the security implications of: iOS IOUSBDeviceFamily 12.4.1 - 'IOInterruptEventSource' Heap Corruption (PoC)
|
This exploit targets ios systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: thttpd 2.24 - HTTP Request Escape Sequence Terminal Command Injection
|
This is a remote exploit for multiple platform. Description: thttpd 2.24 - HTTP Request Escape Sequence Terminal Command Injection. Author: evilaliv3
|
Analyze the security implications of: thttpd 2.24 - HTTP Request Escape Sequence Terminal Command Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Common UNIX Printing System 1.2/1.3 SNMP - 'asn1_get_string()' Remote Buffer Overflow
|
This is a dos exploit for linux platform. Description: Common UNIX Printing System 1.2/1.3 SNMP - 'asn1_get_string()' Remote Buffer Overflow. Author: wei_wang
|
Analyze the security implications of: Common UNIX Printing System 1.2/1.3 SNMP - 'asn1_get_string()' Remote Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: LG MRA58K - Out-of-Bounds Heap Read in CAVIFileParser::Destroy Resulting in Invalid Free
|
This is a dos exploit for android platform. Description: LG MRA58K - Out-of-Bounds Heap Read in CAVIFileParser::Destroy Resulting in Invalid Free. Author: Google Security Research
|
Analyze the security implications of: LG MRA58K - Out-of-Bounds Heap Read in CAVIFileParser::Destroy Resulting in Invalid Free
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: 35mm Slide Gallery - Directory Traversal
|
This is a webapps exploit for php platform. Description: 35mm Slide Gallery - Directory Traversal. Author: Mr.tro0oqy
|
Analyze the security implications of: 35mm Slide Gallery - Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: KingMedia 4.1 - File Upload
|
This is a webapps exploit for php platform. Description: KingMedia 4.1 - File Upload. Author: Efrén Díaz
|
Analyze the security implications of: KingMedia 4.1 - File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FreeBSD 4.8 - 'realpath()' Off-by-One Buffer Overflow
|
This is a remote exploit for freebsd platform. Description: FreeBSD 4.8 - 'realpath()' Off-by-One Buffer Overflow. Author: daniels@legend.co.uk
|
Analyze the security implications of: FreeBSD 4.8 - 'realpath()' Off-by-One Buffer Overflow
|
This exploit targets freebsd systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: Sflog! CMS 1.0 - Arbitrary File Upload (Metasploit)
|
This is a remote exploit for php platform. Description: Sflog! CMS 1.0 - Arbitrary File Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: Sflog! CMS 1.0 - Arbitrary File Upload (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: McAfee Network Security Manager < 5.1.11.8.1 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: McAfee Network Security Manager < 5.1.11.8.1 - Multiple Cross-Site Scripting Vulnerabilities. Author: Daniel King
|
Analyze the security implications of: McAfee Network Security Manager < 5.1.11.8.1 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Ingenious 2.3.0 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Ingenious 2.3.0 - Arbitrary File Upload. Author: Ihsan Sencan
|
Analyze the security implications of: Ingenious 2.3.0 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Event Script PHP 1.1 CMS - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Event Script PHP 1.1 CMS - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: Event Script PHP 1.1 CMS - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: TP LINK TL-WR849N - Remote Code Execution
|
This is a webapps exploit for hardware platform. Description: TP LINK TL-WR849N - Remote Code Execution. Author: Elber Tavares
|
Analyze the security implications of: TP LINK TL-WR849N - Remote Code Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Accounting Journal Management System 1.0 - 'id' SQLi (Authenticated)
|
This is a webapps exploit for php platform. Description: Accounting Journal Management System 1.0 - 'id' SQLi (Authenticated). Author: Alperen Ergel
|
Analyze the security implications of: Accounting Journal Management System 1.0 - 'id' SQLi (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EyesOfNetwork 5.3 - LFI
|
This is a webapps exploit for multiple platform. Description: EyesOfNetwork 5.3 - LFI. Author: Audencia Business SCHOOL Red Team
|
Analyze the security implications of: EyesOfNetwork 5.3 - LFI
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ExoPHPDesk 1.2 - 'Pipe.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: ExoPHPDesk 1.2 - 'Pipe.php' Remote File Inclusion. Author: Firewall1954
|
Analyze the security implications of: ExoPHPDesk 1.2 - 'Pipe.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ASUS RT-AC66U - 'acsd' Remote Command Execution
|
This is a remote exploit for linux_mips platform. Description: ASUS RT-AC66U - 'acsd' Remote Command Execution. Author: Jacob Holcomb
|
Analyze the security implications of: ASUS RT-AC66U - 'acsd' Remote Command Execution
|
This exploit targets linux_mips systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux_mips platform
|
What is this exploit about: Campsite 2.6.1 - 'IPAccess.php?g_documentRoot' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'IPAccess.php?g_documentRoot' Remote File Inclusion. Author: anonymous
|
Analyze the security implications of: Campsite 2.6.1 - 'IPAccess.php?g_documentRoot' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Grep < 2.11 - Integer Overflow Crash (PoC)
|
This is a dos exploit for linux platform. Description: Grep < 2.11 - Integer Overflow Crash (PoC). Author: Joshua Rogers
|
Analyze the security implications of: Grep < 2.11 - Integer Overflow Crash (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Java 7 Applet - Remote Code Execution (Metasploit)
|
This is a remote exploit for java platform. Description: Java 7 Applet - Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Java 7 Applet - Remote Code Execution (Metasploit)
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Mozilla Firefox 3.0.6 - BODY onload Remote Crash
|
This is a dos exploit for multiple platform. Description: Mozilla Firefox 3.0.6 - BODY onload Remote Crash. Author: Skylined
|
Analyze the security implications of: Mozilla Firefox 3.0.6 - BODY onload Remote Crash
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Concrete5 CMS FlashUploader - Arbitrary '.SWF' File Upload
|
This is a webapps exploit for php platform. Description: Concrete5 CMS FlashUploader - Arbitrary '.SWF' File Upload. Author: AkaStep
|
Analyze the security implications of: Concrete5 CMS FlashUploader - Arbitrary '.SWF' File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: acontent 1.1 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: acontent 1.1 - Multiple Vulnerabilities. Author: LiquidWorm
|
Analyze the security implications of: acontent 1.1 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OpenSMTPD < 6.6.3p1 - Local Privilege Escalation + Remote Code Execution
|
This is a remote exploit for openbsd platform. Description: OpenSMTPD < 6.6.3p1 - Local Privilege Escalation + Remote Code Execution. Author: Qualys Corporation
|
Analyze the security implications of: OpenSMTPD < 6.6.3p1 - Local Privilege Escalation + Remote Code Execution
|
This exploit targets openbsd systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets openbsd platform
|
What is this exploit about: E107 Website System 0.6 - Attached File Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: E107 Website System 0.6 - Attached File Cross-Site Scripting. Author: edward11
|
Analyze the security implications of: E107 Website System 0.6 - Attached File Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: TRENDnet TE100-P1U Print Server Firmware 4.11 - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: TRENDnet TE100-P1U Print Server Firmware 4.11 - Authentication Bypass. Author: Chako
|
Analyze the security implications of: TRENDnet TE100-P1U Print Server Firmware 4.11 - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.