input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: TP-Link Technologies TL-WA850RE Wi-Fi Range Extender - Remote Reboot | This is a webapps exploit for hardware platform. Description: TP-Link Technologies TL-WA850RE Wi-Fi Range Extender - Remote Reboot. Author: Wadeek |
Analyze the security implications of: TP-Link Technologies TL-WA850RE Wi-Fi Range Extender - Remote Reboot | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linux Kernel < 2.6.29 - 'exit_notify()' Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel < 2.6.29 - 'exit_notify()' Local Privilege Escalation. Author: gat3way |
Analyze the security implications of: Linux Kernel < 2.6.29 - 'exit_notify()' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: doop CMS 1.3.7 - Local File Inclusion | This is a webapps exploit for php platform. Description: doop CMS 1.3.7 - Local File Inclusion. Author: vladii |
Analyze the security implications of: doop CMS 1.3.7 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: APBook 1.3 - Admin Login Multiple SQL Injections | This is a webapps exploit for php platform. Description: APBook 1.3 - Admin Login Multiple SQL Injections. Author: n3w7u |
Analyze the security implications of: APBook 1.3 - Admin Login Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Collaborative Portal Server 3.4 - 'POS' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Collaborative Portal Server 3.4 - 'POS' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: Collaborative Portal Server 3.4 - 'POS' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OTRS 2.0.4 - index.pl Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: OTRS 2.0.4 - index.pl Cross-Site Scripting. Author: ciri |
Analyze the security implications of: OTRS 2.0.4 - index.pl Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Apache HTTP Server 2.4.49 - Path Traversal & Remote Code Execution (RCE) | This is a webapps exploit for multiple platform. Description: Apache HTTP Server 2.4.49 - Path Traversal & Remote Code Execution (RCE). Author: Lucas Souza |
Analyze the security implications of: Apache HTTP Server 2.4.49 - Path Traversal & Remote Code Execution (RCE) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Address Book - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Address Book - Blind SQL Injection. Author: Sid3^effects |
Analyze the security implications of: Joomla! Component Address Book - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM DB2 < 9.5 pack 3a - Data Stream Denial of Service | This is a dos exploit for multiple platform. Description: IBM DB2 < 9.5 pack 3a - Data Stream Denial of Service. Author: Dennis Yurichev |
Analyze the security implications of: IBM DB2 < 9.5 pack 3a - Data Stream Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ariadne 2.4 - store_config[code] Remote File Inclusion | This is a webapps exploit for php platform. Description: Ariadne 2.4 - store_config[code] Remote File Inclusion. Author: Mehmet Ince |
Analyze the security implications of: Ariadne 2.4 - store_config[code] Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BearFTP 0.1.0 - 'PASV' Denial of Service | This is a dos exploit for linux platform. Description: BearFTP 0.1.0 - 'PASV' Denial of Service. Author: kolya5544 |
Analyze the security implications of: BearFTP 0.1.0 - 'PASV' Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! 1.5 - URL Redirecting | This is a webapps exploit for php platform. Description: Joomla! 1.5 - URL Redirecting. Author: Mr.MLL |
Analyze the security implications of: Joomla! 1.5 - URL Redirecting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dick Copits PDEstore 1.8 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cgi platform. Description: Dick Copits PDEstore 1.8 - Multiple Cross-Site Scripting Vulnerabilities. Author: r0t3d3Vil |
Analyze the security implications of: Dick Copits PDEstore 1.8 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Domains & Hostings Manager PRO 3.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: Domains & Hostings Manager PRO 3.0 - Authentication Bypass. Author: Tauco |
Analyze the security implications of: Domains & Hostings Manager PRO 3.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Comtrend VR-3033 - Command Injection | This is a webapps exploit for hardware platform. Description: Comtrend VR-3033 - Command Injection. Author: Raki Ben Hamouda |
Analyze the security implications of: Comtrend VR-3033 - Command Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Mountain Network Systems WebCart 8.4 - Command Execution | This is a remote exploit for cgi platform. Description: Mountain Network Systems WebCart 8.4 - Command Execution. Author: root@xpteam.f2s.com |
Analyze the security implications of: Mountain Network Systems WebCart 8.4 - Command Execution | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Nagios Plugins check_dhcp 2.0.1 - Arbitrary Option File Read | This is a local exploit for linux platform. Description: Nagios Plugins check_dhcp 2.0.1 - Arbitrary Option File Read. Author: Dawid Golunski |
Analyze the security implications of: Nagios Plugins check_dhcp 2.0.1 - Arbitrary Option File Read | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: easyGB 2.1.1 - 'index.php' Local File Inclusion | This is a webapps exploit for php platform. Description: easyGB 2.1.1 - 'index.php' Local File Inclusion. Author: h4ck3r |
Analyze the security implications of: easyGB 2.1.1 - 'index.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel < 2.6.31-rc4 - 'nfs4_proc_lock()' Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel < 2.6.31-rc4 - 'nfs4_proc_lock()' Denial of Service. Author: Simon Vallet |
Analyze the security implications of: Linux Kernel < 2.6.31-rc4 - 'nfs4_proc_lock()' Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GOautodial 4.0 - Authenticated Shell Upload | This is a webapps exploit for php platform. Description: GOautodial 4.0 - Authenticated Shell Upload. Author: Balzabu |
Analyze the security implications of: GOautodial 4.0 - Authenticated Shell Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Component com_zoom - 'catid' Blind SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component com_zoom - 'catid' Blind SQL Injection. Author: boom3rang |
Analyze the security implications of: Mambo Component com_zoom - 'catid' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Feed on Feeds 0.5 - Remote PHP Code Injection | This is a webapps exploit for php platform. Description: Feed on Feeds 0.5 - Remote PHP Code Injection. Author: EgiX |
Analyze the security implications of: Feed on Feeds 0.5 - Remote PHP Code Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ezbounce 1.0/1.5 - Format String | This is a remote exploit for linux platform. Description: ezbounce 1.0/1.5 - Format String. Author: V9 |
Analyze the security implications of: ezbounce 1.0/1.5 - Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AN HTTPD 1.41 e - Cross-Site Scripting | This is a remote exploit for multiple platform. Description: AN HTTPD 1.41 e - Cross-Site Scripting. Author: D4rkGr3y |
Analyze the security implications of: AN HTTPD 1.41 e - Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Sitekit CMS 6.6 - 'registration-form.html?ClickFrom' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Sitekit CMS 6.6 - 'registration-form.html?ClickFrom' Cross-Site Scripting. Author: r0t3d3Vil |
Analyze the security implications of: Sitekit CMS 6.6 - 'registration-form.html?ClickFrom' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ICDental Clinic 1.2 - 'key' SQL Injection | This is a webapps exploit for php platform. Description: ICDental Clinic 1.2 - 'key' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: ICDental Clinic 1.2 - 'key' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Heat-On HSWeb Web Server 2.0 - Full Path Disclosure | This is a remote exploit for cgi platform. Description: Heat-On HSWeb Web Server 2.0 - Full Path Disclosure. Author: Joe Testa |
Analyze the security implications of: Heat-On HSWeb Web Server 2.0 - Full Path Disclosure | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: CentOS Web Panel 0.9.8.793 (Free) / v0.9.8.753 (Pro) / 0.9.8.807 (Pro) - Domain Field (Add DNS Zone) Cross-Site Scripting | This is a webapps exploit for linux platform. Description: CentOS Web Panel 0.9.8.793 (Free) / v0.9.8.753 (Pro) / 0.9.8.807 (Pro) - Domain Field (Add DNS Zone) Cross-Site Scripting. Author: DKM |
Analyze the security implications of: CentOS Web Panel 0.9.8.793 (Free) / v0.9.8.753 (Pro) / 0.9.8.807 (Pro) - Domain Field (Add DNS Zone) Cross-Site Scripting | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ZoIPer 2.22 - Call-Info Remote Denial of Service | This is a dos exploit for multiple platform. Description: ZoIPer 2.22 - Call-Info Remote Denial of Service. Author: Tomer Bitton |
Analyze the security implications of: ZoIPer 2.22 - Call-Info Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Humhub 0.10.0-rc.1 - Multiple Persistent Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Humhub 0.10.0-rc.1 - Multiple Persistent Cross-Site Scripting Vulnerabilities. Author: Jos Wetzels_ Emiel Florijn |
Analyze the security implications of: Humhub 0.10.0-rc.1 - Multiple Persistent Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco PIX - TCP SYN Packet Denial of Service | This is a dos exploit for hardware platform. Description: Cisco PIX - TCP SYN Packet Denial of Service. Author: Janis Vizulis |
Analyze the security implications of: Cisco PIX - TCP SYN Packet Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Atlassian Confluence < 8.5.3 - Remote Code Execution | This is a webapps exploit for multiple platform. Description: Atlassian Confluence < 8.5.3 - Remote Code Execution. Author: MaanVader |
Analyze the security implications of: Atlassian Confluence < 8.5.3 - Remote Code Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Pserv 2.0 - User-Agent HTTP Header Buffer Overflow (2) | This is a remote exploit for linux platform. Description: Pserv 2.0 - User-Agent HTTP Header Buffer Overflow (2). Author: jsk |
Analyze the security implications of: Pserv 2.0 - User-Agent HTTP Header Buffer Overflow (2) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component Music Manager - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Music Manager - Local File Inclusion. Author: Sid3^effects |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.