input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Habari Blog - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FreeBSD 3.x/4.0/5.0 / NetBSD 1.4.1/1.4.2 / OpenBSD 2.x - Denial of Service
|
This is a dos exploit for bsd platform. Description: FreeBSD 3.x/4.0/5.0 / NetBSD 1.4.1/1.4.2 / OpenBSD 2.x - Denial of Service. Author: Ussr Labs
|
Analyze the security implications of: FreeBSD 3.x/4.0/5.0 / NetBSD 1.4.1/1.4.2 / OpenBSD 2.x - Denial of Service
|
This exploit targets bsd systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets bsd platform
|
What is this exploit about: KDE Konqueror 3.5.9 - JavaScript 'load' Denial of Service
|
This is a dos exploit for linux platform. Description: KDE Konqueror 3.5.9 - JavaScript 'load' Denial of Service. Author: Jeremy Brown
|
Analyze the security implications of: KDE Konqueror 3.5.9 - JavaScript 'load' Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: X-Chat 2.0.6 - Remote Denial of Service
|
This is a dos exploit for linux platform. Description: X-Chat 2.0.6 - Remote Denial of Service. Author: Stefan Hecker
|
Analyze the security implications of: X-Chat 2.0.6 - Remote Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: cTorrent/DTorrent - '.torrent' Local Buffer Overflow
|
This is a local exploit for linux platform. Description: cTorrent/DTorrent - '.torrent' Local Buffer Overflow. Author: Michael Brooks
|
Analyze the security implications of: cTorrent/DTorrent - '.torrent' Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apple Mac OSX 10.4.7 - Mach Exception Handling Privilege Escalation
|
This is a local exploit for osx platform. Description: Apple Mac OSX 10.4.7 - Mach Exception Handling Privilege Escalation. Author: xmath
|
Analyze the security implications of: Apple Mac OSX 10.4.7 - Mach Exception Handling Privilege Escalation
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Sun Java System Directory Server 7.0 - 'core_get_proxyauth_dn' Denial of Service
|
This is a dos exploit for multiple platform. Description: Sun Java System Directory Server 7.0 - 'core_get_proxyauth_dn' Denial of Service. Author: Intevydis
|
Analyze the security implications of: Sun Java System Directory Server 7.0 - 'core_get_proxyauth_dn' Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_products - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Joomla! Component com_products - Multiple SQL Injections. Author: the_cyber_nuxbie
|
Analyze the security implications of: Joomla! Component com_products - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CANDID - '/image/view.php?image_id' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: CANDID - '/image/view.php?image_id' Cross-Site Scripting. Author: L0rd CrusAd3r
|
Analyze the security implications of: CANDID - '/image/view.php?image_id' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Group Logic ExtremeZ-IP File and Print Servers 5.1.2 x15 - Multiple Vulnerabilities
|
This is a remote exploit for hardware platform. Description: Group Logic ExtremeZ-IP File and Print Servers 5.1.2 x15 - Multiple Vulnerabilities. Author: Luigi Auriemma
|
Analyze the security implications of: Group Logic ExtremeZ-IP File and Print Servers 5.1.2 x15 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component com_books - 'book_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_books - 'book_id' SQL Injection. Author: boom3rang
|
Analyze the security implications of: Joomla! Component com_books - 'book_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Invision Gallery 2.0.7 - 'readfile()' / SQL Injection
|
This is a webapps exploit for php platform. Description: Invision Gallery 2.0.7 - 'readfile()' / SQL Injection. Author: 1nf3ct0r
|
Analyze the security implications of: Invision Gallery 2.0.7 - 'readfile()' / SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cypress Solutions CTM-200/CTM-ONE - Hard-coded Credentials Remote Root (Telnet/SSH)
|
This is a remote exploit for hardware platform. Description: Cypress Solutions CTM-200/CTM-ONE - Hard-coded Credentials Remote Root (Telnet/SSH). Author: LiquidWorm
|
Analyze the security implications of: Cypress Solutions CTM-200/CTM-ONE - Hard-coded Credentials Remote Root (Telnet/SSH)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Free PHP Petition Signing Script - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Free PHP Petition Signing Script - Authentication Bypass. Author: Qabandi
|
Analyze the security implications of: Free PHP Petition Signing Script - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Illogator Shop - SQL Injection Bypass
|
This is a webapps exploit for php platform. Description: Illogator Shop - SQL Injection Bypass. Author: bi0
|
Analyze the security implications of: Illogator Shop - SQL Injection Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Leap CMS 0.1.4 - SQL Injection / Cross-Site Scripting / Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Leap CMS 0.1.4 - SQL Injection / Cross-Site Scripting / Arbitrary File Upload. Author: YEnH4ckEr
|
Analyze the security implications of: Leap CMS 0.1.4 - SQL Injection / Cross-Site Scripting / Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Hannon Hill Cascade Server - (Authenticated) Command Execution
|
This is a webapps exploit for cgi platform. Description: Hannon Hill Cascade Server - (Authenticated) Command Execution. Author: Emory University
|
Analyze the security implications of: Hannon Hill Cascade Server - (Authenticated) Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: ISPworker 1.21 - 'download.php' Remote File Disclosure
|
This is a webapps exploit for php platform. Description: ISPworker 1.21 - 'download.php' Remote File Disclosure. Author: GoLd_M
|
Analyze the security implications of: ISPworker 1.21 - 'download.php' Remote File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Pelco Sarix/Spectra Cameras - Cross-Site Request Forgery / Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: Pelco Sarix/Spectra Cameras - Cross-Site Request Forgery / Cross-Site Scripting. Author: LiquidWorm
|
Analyze the security implications of: Pelco Sarix/Spectra Cameras - Cross-Site Request Forgery / Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: EverSync 0.5 - Arbitrary File Download
|
This is a webapps exploit for php platform. Description: EverSync 0.5 - Arbitrary File Download. Author: Ihsan Sencan
|
Analyze the security implications of: EverSync 0.5 - Arbitrary File Download
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Hotel Booking System - Cross-Site Scripting / SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Hotel Booking System - Cross-Site Scripting / SQL Injection. Author: K-159
|
Analyze the security implications of: Joomla! Component Hotel Booking System - Cross-Site Scripting / SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_hello - 'Controller' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_hello - 'Controller' Local File Inclusion. Author: AJAX Security Team
|
Analyze the security implications of: Joomla! Component com_hello - 'Controller' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Claroline E-Learning 1.6 - Remote Hash SQL Injection (2)
|
This is a webapps exploit for php platform. Description: Claroline E-Learning 1.6 - Remote Hash SQL Injection (2). Author: K-C0d3r
|
Analyze the security implications of: Claroline E-Learning 1.6 - Remote Hash SQL Injection (2)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Clantools 1.5 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Clantools 1.5 - Blind SQL Injection. Author: Solidmedia
|
Analyze the security implications of: Joomla! Component Clantools 1.5 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alcatel-Lucent OmniPCX Enterprise 7.1 - Remote Command Execution
|
This is a webapps exploit for cgi platform. Description: Alcatel-Lucent OmniPCX Enterprise 7.1 - Remote Command Execution. Author: RedTeam Pentesting GmbH
|
Analyze the security implications of: Alcatel-Lucent OmniPCX Enterprise 7.1 - Remote Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Zabbix 1.1.2 - Multiple Remote Code Execution Vulnerabilities
|
This is a dos exploit for linux platform. Description: Zabbix 1.1.2 - Multiple Remote Code Execution Vulnerabilities. Author: Max Vozeler
|
Analyze the security implications of: Zabbix 1.1.2 - Multiple Remote Code Execution Vulnerabilities
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: McAfee Virus Scan Enterprise for Linux 1.9.2 < 2.0.2 - Remote Code Execution
|
This is a remote exploit for linux platform. Description: McAfee Virus Scan Enterprise for Linux 1.9.2 < 2.0.2 - Remote Code Execution. Author: Andrew Fasano
|
Analyze the security implications of: McAfee Virus Scan Enterprise for Linux 1.9.2 < 2.0.2 - Remote Code Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Grandstream GSD3710 1.0.11.13 - Stack Buffer Overflow
|
This is a remote exploit for multiple platform. Description: Grandstream GSD3710 1.0.11.13 - Stack Buffer Overflow. Author: Pepelux
|
Analyze the security implications of: Grandstream GSD3710 1.0.11.13 - Stack Buffer Overflow
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Live TV Script - SQL Injection
|
This is a webapps exploit for php platform. Description: Live TV Script - SQL Injection. Author: R3d-D3V!L
|
Analyze the security implications of: Live TV Script - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Grapixel New Media 2 - 'pageref' SQL Injection
|
This is a webapps exploit for php platform. Description: Grapixel New Media 2 - 'pageref' SQL Injection. Author: Berk Dusunur
|
Analyze the security implications of: Grapixel New Media 2 - 'pageref' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alpin CMS 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Alpin CMS 1.0 - SQL Injection. Author: Th3 RDX
|
Analyze the security implications of: Alpin CMS 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: NCSA 1.3/1.4.x/1.5 / Apache HTTPd 0.8.11/0.8.14 - ScriptAlias Source Retrieval
|
This is a remote exploit for multiple platform. Description: NCSA 1.3/1.4.x/1.5 / Apache HTTPd 0.8.11/0.8.14 - ScriptAlias Source Retrieval. Author: anonymous
|
Analyze the security implications of: NCSA 1.3/1.4.x/1.5 / Apache HTTPd 0.8.11/0.8.14 - ScriptAlias Source Retrieval
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: FreeBSD 10.2 (x64) - 'amd64_set_ldt' Heap Overflow
|
This is a dos exploit for freebsd_x86-64 platform. Description: FreeBSD 10.2 (x64) - 'amd64_set_ldt' Heap Overflow. Author: Core Security
|
Analyze the security implications of: FreeBSD 10.2 (x64) - 'amd64_set_ldt' Heap Overflow
|
This exploit targets freebsd_x86-64 systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets freebsd_x86-64 platform
|
What is this exploit about: Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit)
|
This is a remote exploit for php platform. Description: Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.