input
stringlengths
39
228
output
stringlengths
32
324
Analyze the security implications of: Habari Blog - Multiple Vulnerabilities
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: FreeBSD 3.x/4.0/5.0 / NetBSD 1.4.1/1.4.2 / OpenBSD 2.x - Denial of Service
This is a dos exploit for bsd platform. Description: FreeBSD 3.x/4.0/5.0 / NetBSD 1.4.1/1.4.2 / OpenBSD 2.x - Denial of Service. Author: Ussr Labs
Analyze the security implications of: FreeBSD 3.x/4.0/5.0 / NetBSD 1.4.1/1.4.2 / OpenBSD 2.x - Denial of Service
This exploit targets bsd systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets bsd platform
What is this exploit about: KDE Konqueror 3.5.9 - JavaScript 'load' Denial of Service
This is a dos exploit for linux platform. Description: KDE Konqueror 3.5.9 - JavaScript 'load' Denial of Service. Author: Jeremy Brown
Analyze the security implications of: KDE Konqueror 3.5.9 - JavaScript 'load' Denial of Service
This exploit targets linux systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: X-Chat 2.0.6 - Remote Denial of Service
This is a dos exploit for linux platform. Description: X-Chat 2.0.6 - Remote Denial of Service. Author: Stefan Hecker
Analyze the security implications of: X-Chat 2.0.6 - Remote Denial of Service
This exploit targets linux systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: cTorrent/DTorrent - '.torrent' Local Buffer Overflow
This is a local exploit for linux platform. Description: cTorrent/DTorrent - '.torrent' Local Buffer Overflow. Author: Michael Brooks
Analyze the security implications of: cTorrent/DTorrent - '.torrent' Local Buffer Overflow
This exploit targets linux systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Apple Mac OSX 10.4.7 - Mach Exception Handling Privilege Escalation
This is a local exploit for osx platform. Description: Apple Mac OSX 10.4.7 - Mach Exception Handling Privilege Escalation. Author: xmath
Analyze the security implications of: Apple Mac OSX 10.4.7 - Mach Exception Handling Privilege Escalation
This exploit targets osx systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets osx platform
What is this exploit about: Sun Java System Directory Server 7.0 - 'core_get_proxyauth_dn' Denial of Service
This is a dos exploit for multiple platform. Description: Sun Java System Directory Server 7.0 - 'core_get_proxyauth_dn' Denial of Service. Author: Intevydis
Analyze the security implications of: Sun Java System Directory Server 7.0 - 'core_get_proxyauth_dn' Denial of Service
This exploit targets multiple systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Joomla! Component com_products - Multiple SQL Injections
This is a webapps exploit for php platform. Description: Joomla! Component com_products - Multiple SQL Injections. Author: the_cyber_nuxbie
Analyze the security implications of: Joomla! Component com_products - Multiple SQL Injections
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: CANDID - '/image/view.php?image_id' Cross-Site Scripting
This is a webapps exploit for php platform. Description: CANDID - '/image/view.php?image_id' Cross-Site Scripting. Author: L0rd CrusAd3r
Analyze the security implications of: CANDID - '/image/view.php?image_id' Cross-Site Scripting
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Group Logic ExtremeZ-IP File and Print Servers 5.1.2 x15 - Multiple Vulnerabilities
This is a remote exploit for hardware platform. Description: Group Logic ExtremeZ-IP File and Print Servers 5.1.2 x15 - Multiple Vulnerabilities. Author: Luigi Auriemma
Analyze the security implications of: Group Logic ExtremeZ-IP File and Print Servers 5.1.2 x15 - Multiple Vulnerabilities
This exploit targets hardware systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Joomla! Component com_books - 'book_id' SQL Injection
This is a webapps exploit for php platform. Description: Joomla! Component com_books - 'book_id' SQL Injection. Author: boom3rang
Analyze the security implications of: Joomla! Component com_books - 'book_id' SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Invision Gallery 2.0.7 - 'readfile()' / SQL Injection
This is a webapps exploit for php platform. Description: Invision Gallery 2.0.7 - 'readfile()' / SQL Injection. Author: 1nf3ct0r
Analyze the security implications of: Invision Gallery 2.0.7 - 'readfile()' / SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Cypress Solutions CTM-200/CTM-ONE - Hard-coded Credentials Remote Root (Telnet/SSH)
This is a remote exploit for hardware platform. Description: Cypress Solutions CTM-200/CTM-ONE - Hard-coded Credentials Remote Root (Telnet/SSH). Author: LiquidWorm
Analyze the security implications of: Cypress Solutions CTM-200/CTM-ONE - Hard-coded Credentials Remote Root (Telnet/SSH)
This exploit targets hardware systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Free PHP Petition Signing Script - Authentication Bypass
This is a webapps exploit for php platform. Description: Free PHP Petition Signing Script - Authentication Bypass. Author: Qabandi
Analyze the security implications of: Free PHP Petition Signing Script - Authentication Bypass
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Illogator Shop - SQL Injection Bypass
This is a webapps exploit for php platform. Description: Illogator Shop - SQL Injection Bypass. Author: bi0
Analyze the security implications of: Illogator Shop - SQL Injection Bypass
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Leap CMS 0.1.4 - SQL Injection / Cross-Site Scripting / Arbitrary File Upload
This is a webapps exploit for php platform. Description: Leap CMS 0.1.4 - SQL Injection / Cross-Site Scripting / Arbitrary File Upload. Author: YEnH4ckEr
Analyze the security implications of: Leap CMS 0.1.4 - SQL Injection / Cross-Site Scripting / Arbitrary File Upload
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Hannon Hill Cascade Server - (Authenticated) Command Execution
This is a webapps exploit for cgi platform. Description: Hannon Hill Cascade Server - (Authenticated) Command Execution. Author: Emory University
Analyze the security implications of: Hannon Hill Cascade Server - (Authenticated) Command Execution
This exploit targets cgi systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets cgi platform
What is this exploit about: ISPworker 1.21 - 'download.php' Remote File Disclosure
This is a webapps exploit for php platform. Description: ISPworker 1.21 - 'download.php' Remote File Disclosure. Author: GoLd_M
Analyze the security implications of: ISPworker 1.21 - 'download.php' Remote File Disclosure
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Pelco Sarix/Spectra Cameras - Cross-Site Request Forgery / Cross-Site Scripting
This is a webapps exploit for hardware platform. Description: Pelco Sarix/Spectra Cameras - Cross-Site Request Forgery / Cross-Site Scripting. Author: LiquidWorm
Analyze the security implications of: Pelco Sarix/Spectra Cameras - Cross-Site Request Forgery / Cross-Site Scripting
This exploit targets hardware systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: EverSync 0.5 - Arbitrary File Download
This is a webapps exploit for php platform. Description: EverSync 0.5 - Arbitrary File Download. Author: Ihsan Sencan
Analyze the security implications of: EverSync 0.5 - Arbitrary File Download
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Joomla! Component Hotel Booking System - Cross-Site Scripting / SQL Injection
This is a webapps exploit for php platform. Description: Joomla! Component Hotel Booking System - Cross-Site Scripting / SQL Injection. Author: K-159
Analyze the security implications of: Joomla! Component Hotel Booking System - Cross-Site Scripting / SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Joomla! Component com_hello - 'Controller' Local File Inclusion
This is a webapps exploit for php platform. Description: Joomla! Component com_hello - 'Controller' Local File Inclusion. Author: AJAX Security Team
Analyze the security implications of: Joomla! Component com_hello - 'Controller' Local File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Claroline E-Learning 1.6 - Remote Hash SQL Injection (2)
This is a webapps exploit for php platform. Description: Claroline E-Learning 1.6 - Remote Hash SQL Injection (2). Author: K-C0d3r
Analyze the security implications of: Claroline E-Learning 1.6 - Remote Hash SQL Injection (2)
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Joomla! Component Clantools 1.5 - Blind SQL Injection
This is a webapps exploit for php platform. Description: Joomla! Component Clantools 1.5 - Blind SQL Injection. Author: Solidmedia
Analyze the security implications of: Joomla! Component Clantools 1.5 - Blind SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Alcatel-Lucent OmniPCX Enterprise 7.1 - Remote Command Execution
This is a webapps exploit for cgi platform. Description: Alcatel-Lucent OmniPCX Enterprise 7.1 - Remote Command Execution. Author: RedTeam Pentesting GmbH
Analyze the security implications of: Alcatel-Lucent OmniPCX Enterprise 7.1 - Remote Command Execution
This exploit targets cgi systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets cgi platform
What is this exploit about: Zabbix 1.1.2 - Multiple Remote Code Execution Vulnerabilities
This is a dos exploit for linux platform. Description: Zabbix 1.1.2 - Multiple Remote Code Execution Vulnerabilities. Author: Max Vozeler
Analyze the security implications of: Zabbix 1.1.2 - Multiple Remote Code Execution Vulnerabilities
This exploit targets linux systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: McAfee Virus Scan Enterprise for Linux 1.9.2 < 2.0.2 - Remote Code Execution
This is a remote exploit for linux platform. Description: McAfee Virus Scan Enterprise for Linux 1.9.2 < 2.0.2 - Remote Code Execution. Author: Andrew Fasano
Analyze the security implications of: McAfee Virus Scan Enterprise for Linux 1.9.2 < 2.0.2 - Remote Code Execution
This exploit targets linux systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Grandstream GSD3710 1.0.11.13 - Stack Buffer Overflow
This is a remote exploit for multiple platform. Description: Grandstream GSD3710 1.0.11.13 - Stack Buffer Overflow. Author: Pepelux
Analyze the security implications of: Grandstream GSD3710 1.0.11.13 - Stack Buffer Overflow
This exploit targets multiple systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Live TV Script - SQL Injection
This is a webapps exploit for php platform. Description: Live TV Script - SQL Injection. Author: R3d-D3V!L
Analyze the security implications of: Live TV Script - SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Grapixel New Media 2 - 'pageref' SQL Injection
This is a webapps exploit for php platform. Description: Grapixel New Media 2 - 'pageref' SQL Injection. Author: Berk Dusunur
Analyze the security implications of: Grapixel New Media 2 - 'pageref' SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Alpin CMS 1.0 - SQL Injection
This is a webapps exploit for php platform. Description: Alpin CMS 1.0 - SQL Injection. Author: Th3 RDX
Analyze the security implications of: Alpin CMS 1.0 - SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: NCSA 1.3/1.4.x/1.5 / Apache HTTPd 0.8.11/0.8.14 - ScriptAlias Source Retrieval
This is a remote exploit for multiple platform. Description: NCSA 1.3/1.4.x/1.5 / Apache HTTPd 0.8.11/0.8.14 - ScriptAlias Source Retrieval. Author: anonymous
Analyze the security implications of: NCSA 1.3/1.4.x/1.5 / Apache HTTPd 0.8.11/0.8.14 - ScriptAlias Source Retrieval
This exploit targets multiple systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: FreeBSD 10.2 (x64) - 'amd64_set_ldt' Heap Overflow
This is a dos exploit for freebsd_x86-64 platform. Description: FreeBSD 10.2 (x64) - 'amd64_set_ldt' Heap Overflow. Author: Core Security
Analyze the security implications of: FreeBSD 10.2 (x64) - 'amd64_set_ldt' Heap Overflow
This exploit targets freebsd_x86-64 systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets freebsd_x86-64 platform
What is this exploit about: Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit)
This is a remote exploit for php platform. Description: Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit). Author: Metasploit
Analyze the security implications of: Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit)
This exploit targets php systems. Type: remote. Risk level: High