input
stringlengths
39
228
output
stringlengths
32
324
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Mozilla Suite/Firefox - Navigator Object Code Execution (Metasploit)
This is a remote exploit for multiple platform. Description: Mozilla Suite/Firefox - Navigator Object Code Execution (Metasploit). Author: Metasploit
Analyze the security implications of: Mozilla Suite/Firefox - Navigator Object Code Execution (Metasploit)
This exploit targets multiple systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Procentia IntelliPen 1.1.12.1520 - 'data.aspx' Blind SQL Injection
This is a webapps exploit for asp platform. Description: Procentia IntelliPen 1.1.12.1520 - 'data.aspx' Blind SQL Injection. Author: Portcullis
Analyze the security implications of: Procentia IntelliPen 1.1.12.1520 - 'data.aspx' Blind SQL Injection
This exploit targets asp systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets asp platform
What is this exploit about: X.Org xorg 1.4 < 1.11.2 - File Permission Change
This is a local exploit for linux platform. Description: X.Org xorg 1.4 < 1.11.2 - File Permission Change. Author: vladz
Analyze the security implications of: X.Org xorg 1.4 < 1.11.2 - File Permission Change
This exploit targets linux systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: kr-web 1.1b2 - Remote File Inclusion
This is a webapps exploit for php platform. Description: kr-web 1.1b2 - Remote File Inclusion. Author: cr4wl3r
Analyze the security implications of: kr-web 1.1b2 - Remote File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Drupal 4.0 - News Message HTML Injection
This is a webapps exploit for php platform. Description: Drupal 4.0 - News Message HTML Injection. Author: das@hush.com
Analyze the security implications of: Drupal 4.0 - News Message HTML Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Apache OFBiz - Admin Creator
This is a remote exploit for multiple platform. Description: Apache OFBiz - Admin Creator. Author: Lucas Apa
Analyze the security implications of: Apache OFBiz - Admin Creator
This exploit targets multiple systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Mitel Audio and Web Conferencing (AWC) - Arbitrary Shell Command Injection
This is a remote exploit for linux platform. Description: Mitel Audio and Web Conferencing (AWC) - Arbitrary Shell Command Injection. Author: Jan Fry
Analyze the security implications of: Mitel Audio and Web Conferencing (AWC) - Arbitrary Shell Command Injection
This exploit targets linux systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Websense Proxy - Filter Bypass
This is a dos exploit for multiple platform. Description: Websense Proxy - Filter Bypass. Author: Nahuel Grisolia
Analyze the security implications of: Websense Proxy - Filter Bypass
This exploit targets multiple systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: JioFi 4G M2S 1.0.2 - Denial of Service
This is a dos exploit for hardware platform. Description: JioFi 4G M2S 1.0.2 - Denial of Service. Author: Vikas Chaudhary
Analyze the security implications of: JioFi 4G M2S 1.0.2 - Denial of Service
This exploit targets hardware systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Mambo Module MOStlyCE 2.4 - 'connector.php' Cross-Site Scripting
This is a webapps exploit for php platform. Description: Mambo Module MOStlyCE 2.4 - 'connector.php' Cross-Site Scripting. Author: AmnPardaz
Analyze the security implications of: Mambo Module MOStlyCE 2.4 - 'connector.php' Cross-Site Scripting
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: NetWare 6.5 - SunRPC Portmapper CALLIT Stack Buffer Overflow (Metasploit)
This is a remote exploit for netware platform. Description: NetWare 6.5 - SunRPC Portmapper CALLIT Stack Buffer Overflow (Metasploit). Author: Metasploit
Analyze the security implications of: NetWare 6.5 - SunRPC Portmapper CALLIT Stack Buffer Overflow (Metasploit)
This exploit targets netware systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets netware platform
What is this exploit about: Ubee EVW3200 - Multiple Persistent Cross-Site Scripting Vulnerabilities
This is a webapps exploit for hardware platform. Description: Ubee EVW3200 - Multiple Persistent Cross-Site Scripting Vulnerabilities. Author: Jeroen - IT Nerdbox
Analyze the security implications of: Ubee EVW3200 - Multiple Persistent Cross-Site Scripting Vulnerabilities
This exploit targets hardware systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: eazyPortal 1.0.0 - Multiple Vulnerabilities
This is a webapps exploit for php platform. Description: eazyPortal 1.0.0 - Multiple Vulnerabilities. Author: Milos Zivanovic
Analyze the security implications of: eazyPortal 1.0.0 - Multiple Vulnerabilities
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Interbase 5/6 - GDS_Lock_MGR UMask File Permission Changing
This is a local exploit for linux platform. Description: Interbase 5/6 - GDS_Lock_MGR UMask File Permission Changing. Author: grazer
Analyze the security implications of: Interbase 5/6 - GDS_Lock_MGR UMask File Permission Changing
This exploit targets linux systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: PSCS VPOP3 2.0 Email Server WebAdmin - Cross-Site Scripting
This is a remote exploit for multiple platform. Description: PSCS VPOP3 2.0 Email Server WebAdmin - Cross-Site Scripting. Author: SecuriTeam
Analyze the security implications of: PSCS VPOP3 2.0 Email Server WebAdmin - Cross-Site Scripting
This exploit targets multiple systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Sun Java System Web Server 6.1/7.0 - 'TRACE' Heap Buffer Overflow (PoC)
This is a dos exploit for multiple platform. Description: Sun Java System Web Server 6.1/7.0 - 'TRACE' Heap Buffer Overflow (PoC). Author: Evgeny Legerov
Analyze the security implications of: Sun Java System Web Server 6.1/7.0 - 'TRACE' Heap Buffer Overflow (PoC)
This exploit targets multiple systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Pimcore customer-data-framework 4.2.0 - SQL injection
This is a webapps exploit for multiple platform. Description: Pimcore customer-data-framework 4.2.0 - SQL injection. Author: maeitsec
Analyze the security implications of: Pimcore customer-data-framework 4.2.0 - SQL injection
This exploit targets multiple systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Wireshark - ascend_seek Static Out-of-Bounds Read
This is a dos exploit for multiple platform. Description: Wireshark - ascend_seek Static Out-of-Bounds Read. Author: Google Security Research
Analyze the security implications of: Wireshark - ascend_seek Static Out-of-Bounds Read
This exploit targets multiple systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Sendmail 8.11.x (Linux/i386) - Local Privilege Escalation
This is a local exploit for linux platform. Description: Sendmail 8.11.x (Linux/i386) - Local Privilege Escalation. Author: sd
Analyze the security implications of: Sendmail 8.11.x (Linux/i386) - Local Privilege Escalation
This exploit targets linux systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Bubbling Library 1.32 - Multiple Local File Inclusions
This is a webapps exploit for php platform. Description: Bubbling Library 1.32 - Multiple Local File Inclusions. Author: Stack
Analyze the security implications of: Bubbling Library 1.32 - Multiple Local File Inclusions
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Buffalo TeraStation TS-Series - Multiple Vulnerabilities
This is a webapps exploit for hardware platform. Description: Buffalo TeraStation TS-Series - Multiple Vulnerabilities. Author: Andrea Fabrizi
Analyze the security implications of: Buffalo TeraStation TS-Series - Multiple Vulnerabilities
This exploit targets hardware systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Teradici Management Console 2.2.0 - Privilege Escalation
This is a webapps exploit for linux platform. Description: Teradici Management Console 2.2.0 - Privilege Escalation. Author: hantwister
Analyze the security implications of: Teradici Management Console 2.2.0 - Privilege Escalation
This exploit targets linux systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: kalimat new system 1.0 - 'index.php' SQL Injection
This is a webapps exploit for php platform. Description: kalimat new system 1.0 - 'index.php' SQL Injection. Author: ProF.Code
Analyze the security implications of: kalimat new system 1.0 - 'index.php' SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: AGENCY4NET WEBFTP 1 - 'download2.php' File Disclosure
This is a webapps exploit for php platform. Description: AGENCY4NET WEBFTP 1 - 'download2.php' File Disclosure. Author: GoLd_M
Analyze the security implications of: AGENCY4NET WEBFTP 1 - 'download2.php' File Disclosure
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Host Directory PRO 2.1.0 - Remote Change Admin Password
This is a webapps exploit for php platform. Description: Host Directory PRO 2.1.0 - Remote Change Admin Password. Author: TiGeR-Dz
Analyze the security implications of: Host Directory PRO 2.1.0 - Remote Change Admin Password
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Airia - Cross-Site Request Forgery (Add Content)
This is a webapps exploit for php platform. Description: Airia - Cross-Site Request Forgery (Add Content). Author: HaHwul
Analyze the security implications of: Airia - Cross-Site Request Forgery (Add Content)
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: MySQL 3.20.32/3.22.x/3.23.x - Null Root Password Weak Default Configuration (2)
This is a remote exploit for linux platform. Description: MySQL 3.20.32/3.22.x/3.23.x - Null Root Password Weak Default Configuration (2). Author: st0ic
Analyze the security implications of: MySQL 3.20.32/3.22.x/3.23.x - Null Root Password Weak Default Configuration (2)
This exploit targets linux systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: M/Monit 3.7.4 - Password Disclosure
This is a webapps exploit for multiple platform. Description: M/Monit 3.7.4 - Password Disclosure. Author: Dolev Farhi
Analyze the security implications of: M/Monit 3.7.4 - Password Disclosure
This exploit targets multiple systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Emby MediaServer 3.2.5 - Password Reset
This is a webapps exploit for multiple platform. Description: Emby MediaServer 3.2.5 - Password Reset. Author: LiquidWorm
Analyze the security implications of: Emby MediaServer 3.2.5 - Password Reset
This exploit targets multiple systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: UApplication Uguestbook 1.0 - 'index.asp' SQL Injection
This is a webapps exploit for asp platform. Description: UApplication Uguestbook 1.0 - 'index.asp' SQL Injection. Author: Aria-Security Team
Analyze the security implications of: UApplication Uguestbook 1.0 - 'index.asp' SQL Injection
This exploit targets asp systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets asp platform
What is this exploit about: Cisco IP Phone 7940 - 3 SIP Messages Remote Denial of Service
This is a dos exploit for hardware platform. Description: Cisco IP Phone 7940 - 3 SIP Messages Remote Denial of Service. Author: MADYNES
Analyze the security implications of: Cisco IP Phone 7940 - 3 SIP Messages Remote Denial of Service
This exploit targets hardware systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Western Digital Arkeia < 11.0.12 - Remote Code Execution (Metasploit)
This is a remote exploit for multiple platform. Description: Western Digital Arkeia < 11.0.12 - Remote Code Execution (Metasploit). Author: Metasploit
Analyze the security implications of: Western Digital Arkeia < 11.0.12 - Remote Code Execution (Metasploit)
This exploit targets multiple systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: ECOA Building Automation System - Remote Privilege Escalation
This is a webapps exploit for hardware platform. Description: ECOA Building Automation System - Remote Privilege Escalation. Author: Neurogenesia
Analyze the security implications of: ECOA Building Automation System - Remote Privilege Escalation
This exploit targets hardware systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform