input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: iBilling 3.7.0 - Persistent Cross-Site Scripting / Reflected Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Georgia SoftWorks Secure Shell Server 7.1.3 - Multiple Remote Code Execution Vulnerabilities
|
This is a remote exploit for linux platform. Description: Georgia SoftWorks Secure Shell Server 7.1.3 - Multiple Remote Code Execution Vulnerabilities. Author: Luigi Auriemma
|
Analyze the security implications of: Georgia SoftWorks Secure Shell Server 7.1.3 - Multiple Remote Code Execution Vulnerabilities
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Python 2.2 ImageOP Module - Multiple Integer Overflow Vulnerabilities
|
This is a dos exploit for multiple platform. Description: Python 2.2 ImageOP Module - Multiple Integer Overflow Vulnerabilities. Author: Slythers Bro
|
Analyze the security implications of: Python 2.2 ImageOP Module - Multiple Integer Overflow Vulnerabilities
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Airspan ProST WiMAX Device - Web Interface Authentication Bypass
|
This is a remote exploit for hardware platform. Description: Airspan ProST WiMAX Device - Web Interface Authentication Bypass. Author: Francis Lacoste-Cordeau
|
Analyze the security implications of: Airspan ProST WiMAX Device - Web Interface Authentication Bypass
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: EasyCalendar 4.0tr - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: EasyCalendar 4.0tr - Multiple Vulnerabilities. Author: JosS
|
Analyze the security implications of: EasyCalendar 4.0tr - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apache UNO / LibreOffice Version: 6.1.2 / OpenOffice 4.1.6 API - Remote Code Execution
|
This is a remote exploit for multiple platform. Description: Apache UNO / LibreOffice Version: 6.1.2 / OpenOffice 4.1.6 API - Remote Code Execution. Author: sud0woodo
|
Analyze the security implications of: Apache UNO / LibreOffice Version: 6.1.2 / OpenOffice 4.1.6 API - Remote Code Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Microburst uStorekeeper 1.x - Arbitrary Commands
|
This is a remote exploit for cgi platform. Description: Microburst uStorekeeper 1.x - Arbitrary Commands. Author: UkR hacking team
|
Analyze the security implications of: Microburst uStorekeeper 1.x - Arbitrary Commands
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Bananadance Wiki b2.2 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Bananadance Wiki b2.2 - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: Bananadance Wiki b2.2 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Java Debug Wire Protocol (JDWP) - Remote Code Execution
|
This is a remote exploit for java platform. Description: Java Debug Wire Protocol (JDWP) - Remote Code Execution. Author: IOactive
|
Analyze the security implications of: Java Debug Wire Protocol (JDWP) - Remote Code Execution
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Artifex MuJS 1.0.2 - Integer Overflow
|
This is a dos exploit for multiple platform. Description: Artifex MuJS 1.0.2 - Integer Overflow. Author: Andrea Sindoni
|
Analyze the security implications of: Artifex MuJS 1.0.2 - Integer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: GLPI 0.84.1 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: GLPI 0.84.1 - Multiple Vulnerabilities. Author: High-Tech Bridge SA
|
Analyze the security implications of: GLPI 0.84.1 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: jobappr 1.4 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: jobappr 1.4 - Multiple Vulnerabilities. Author: giudinvx
|
Analyze the security implications of: jobappr 1.4 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link DIR-600M - Authentication Bypass (Metasploit)
|
This is a webapps exploit for hardware platform. Description: D-Link DIR-600M - Authentication Bypass (Metasploit). Author: Devendra Singh Solanki
|
Analyze the security implications of: D-Link DIR-600M - Authentication Bypass (Metasploit)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: MySQL 3.20.32/3.22.x/3.23.x - Null Root Password Weak Default Configuration (1)
|
This is a remote exploit for linux platform. Description: MySQL 3.20.32/3.22.x/3.23.x - Null Root Password Weak Default Configuration (1). Author: g0thm0g
|
Analyze the security implications of: MySQL 3.20.32/3.22.x/3.23.x - Null Root Password Weak Default Configuration (1)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ClamAV < 0.102.0 - 'bytecode_vm' Code Execution
|
This is a local exploit for linux platform. Description: ClamAV < 0.102.0 - 'bytecode_vm' Code Execution. Author: anonymous
|
Analyze the security implications of: ClamAV < 0.102.0 - 'bytecode_vm' Code Execution
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: B2B Script 4.27 - SQL Injection
|
This is a webapps exploit for php platform. Description: B2B Script 4.27 - SQL Injection. Author: Dawid Morawski
|
Analyze the security implications of: B2B Script 4.27 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Xeneo Web Server 2.2.10 - Undisclosed Buffer Overflow (PoC)
|
This is a dos exploit for linux platform. Description: Xeneo Web Server 2.2.10 - Undisclosed Buffer Overflow (PoC). Author: badpack3t
|
Analyze the security implications of: Xeneo Web Server 2.2.10 - Undisclosed Buffer Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Creasito E-Commerce 1.3.16 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Creasito E-Commerce 1.3.16 - Authentication Bypass. Author: Salvatore Fresta
|
Analyze the security implications of: Creasito E-Commerce 1.3.16 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: godontologico 5 - SQL Injection
|
This is a webapps exploit for php platform. Description: godontologico 5 - SQL Injection. Author: vinicius777
|
Analyze the security implications of: godontologico 5 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BlueDragon CFChart Servlet 7.1.1.17759 - Arbitrary File Retrieval/Deletion
|
This is a webapps exploit for cfm platform. Description: BlueDragon CFChart Servlet 7.1.1.17759 - Arbitrary File Retrieval/Deletion. Author: Portcullis
|
Analyze the security implications of: BlueDragon CFChart Servlet 7.1.1.17759 - Arbitrary File Retrieval/Deletion
|
This exploit targets cfm systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cfm platform
|
What is this exploit about: Subversion 1.0.2 - Date Overflow (Metasploit)
|
This is a remote exploit for multiple platform. Description: Subversion 1.0.2 - Date Overflow (Metasploit). Author: spoonm
|
Analyze the security implications of: Subversion 1.0.2 - Date Overflow (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apache Struts 2.5.20 - Double OGNL evaluation
|
This is a remote exploit for multiple platform. Description: Apache Struts 2.5.20 - Double OGNL evaluation. Author: West Shepherd
|
Analyze the security implications of: Apache Struts 2.5.20 - Double OGNL evaluation
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: SpiderSales 2.0 Shopping Cart - Multiple Vulnerabilities
|
This is a webapps exploit for asp platform. Description: SpiderSales 2.0 Shopping Cart - Multiple Vulnerabilities. Author: Nick Gudov
|
Analyze the security implications of: SpiderSales 2.0 Shopping Cart - Multiple Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: HP LaserJet - Directory Traversal in PJL Interface
|
This is a remote exploit for hardware platform. Description: HP LaserJet - Directory Traversal in PJL Interface. Author: n.runs AG
|
Analyze the security implications of: HP LaserJet - Directory Traversal in PJL Interface
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ita-forum 5.1.32 - SQL Injection
|
This is a webapps exploit for php platform. Description: ita-forum 5.1.32 - SQL Injection. Author: BAYBORA
|
Analyze the security implications of: ita-forum 5.1.32 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adobe RoboHelp Server 8 - Authentication Bypass
|
This is a webapps exploit for jsp platform. Description: Adobe RoboHelp Server 8 - Authentication Bypass. Author: Intevydis
|
Analyze the security implications of: Adobe RoboHelp Server 8 - Authentication Bypass
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: CommodityRentals Real Estate Script - 'txtsearch' HTML Injection
|
This is a webapps exploit for php platform. Description: CommodityRentals Real Estate Script - 'txtsearch' HTML Injection. Author: Eyup CELIK
|
Analyze the security implications of: CommodityRentals Real Estate Script - 'txtsearch' HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cacheflow CacheOS 3.1/4.0 Web Administration - Arbitrary Cached Page Code Leakage
|
This is a remote exploit for multiple platform. Description: Cacheflow CacheOS 3.1/4.0 Web Administration - Arbitrary Cached Page Code Leakage. Author: Bjorn Djupvik
|
Analyze the security implications of: Cacheflow CacheOS 3.1/4.0 Web Administration - Arbitrary Cached Page Code Leakage
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: netPanzer 0.8 rev 952 - 'frameNum' Server Terminiation
|
This is a dos exploit for multiple platform. Description: netPanzer 0.8 rev 952 - 'frameNum' Server Terminiation. Author: Luigi Auriemma
|
Analyze the security implications of: netPanzer 0.8 rev 952 - 'frameNum' Server Terminiation
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: 212Cafe WebBoard 2.90 Beta - Remote File Disclosure
|
This is a webapps exploit for php platform. Description: 212Cafe WebBoard 2.90 Beta - Remote File Disclosure. Author: MrDoug
|
Analyze the security implications of: 212Cafe WebBoard 2.90 Beta - Remote File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: cwmVote 1.0 - 'archive.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: cwmVote 1.0 - 'archive.php' Remote File Inclusion. Author: bd0rk
|
Analyze the security implications of: cwmVote 1.0 - 'archive.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EggBlog < 3.07 - Remote SQL Injection / Privilege Escalation
|
This is a webapps exploit for php platform. Description: EggBlog < 3.07 - Remote SQL Injection / Privilege Escalation. Author: nukedx
|
Analyze the security implications of: EggBlog < 3.07 - Remote SQL Injection / Privilege Escalation
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Nacos 2.0.3 - Access Control vulnerability
|
This is a webapps exploit for java platform. Description: Nacos 2.0.3 - Access Control vulnerability. Author: Jenson Zhao
|
Analyze the security implications of: Nacos 2.0.3 - Access Control vulnerability
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: BookReview 1.0 - 'suggest_category.htm?node' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: BookReview 1.0 - 'suggest_category.htm?node' Cross-Site Scripting. Author: Lostmon
|
Analyze the security implications of: BookReview 1.0 - 'suggest_category.htm?node' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.