input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: TP-Link Technologies TL-WA850RE Wi-Fi Range Extender - Remote Reboot
|
This is a webapps exploit for hardware platform. Description: TP-Link Technologies TL-WA850RE Wi-Fi Range Extender - Remote Reboot. Author: Wadeek
|
Analyze the security implications of: TP-Link Technologies TL-WA850RE Wi-Fi Range Extender - Remote Reboot
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Linux Kernel < 2.6.29 - 'exit_notify()' Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Linux Kernel < 2.6.29 - 'exit_notify()' Local Privilege Escalation. Author: gat3way
|
Analyze the security implications of: Linux Kernel < 2.6.29 - 'exit_notify()' Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: doop CMS 1.3.7 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: doop CMS 1.3.7 - Local File Inclusion. Author: vladii
|
Analyze the security implications of: doop CMS 1.3.7 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: APBook 1.3 - Admin Login Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: APBook 1.3 - Admin Login Multiple SQL Injections. Author: n3w7u
|
Analyze the security implications of: APBook 1.3 - Admin Login Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Collaborative Portal Server 3.4 - 'POS' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Collaborative Portal Server 3.4 - 'POS' Cross-Site Scripting. Author: r0t
|
Analyze the security implications of: Collaborative Portal Server 3.4 - 'POS' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OTRS 2.0.4 - index.pl Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: OTRS 2.0.4 - index.pl Cross-Site Scripting. Author: ciri
|
Analyze the security implications of: OTRS 2.0.4 - index.pl Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Apache HTTP Server 2.4.49 - Path Traversal & Remote Code Execution (RCE)
|
This is a webapps exploit for multiple platform. Description: Apache HTTP Server 2.4.49 - Path Traversal & Remote Code Execution (RCE). Author: Lucas Souza
|
Analyze the security implications of: Apache HTTP Server 2.4.49 - Path Traversal & Remote Code Execution (RCE)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component Address Book - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Address Book - Blind SQL Injection. Author: Sid3^effects
|
Analyze the security implications of: Joomla! Component Address Book - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM DB2 < 9.5 pack 3a - Data Stream Denial of Service
|
This is a dos exploit for multiple platform. Description: IBM DB2 < 9.5 pack 3a - Data Stream Denial of Service. Author: Dennis Yurichev
|
Analyze the security implications of: IBM DB2 < 9.5 pack 3a - Data Stream Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Ariadne 2.4 - store_config[code] Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Ariadne 2.4 - store_config[code] Remote File Inclusion. Author: Mehmet Ince
|
Analyze the security implications of: Ariadne 2.4 - store_config[code] Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BearFTP 0.1.0 - 'PASV' Denial of Service
|
This is a dos exploit for linux platform. Description: BearFTP 0.1.0 - 'PASV' Denial of Service. Author: kolya5544
|
Analyze the security implications of: BearFTP 0.1.0 - 'PASV' Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! 1.5 - URL Redirecting
|
This is a webapps exploit for php platform. Description: Joomla! 1.5 - URL Redirecting. Author: Mr.MLL
|
Analyze the security implications of: Joomla! 1.5 - URL Redirecting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dick Copits PDEstore 1.8 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for cgi platform. Description: Dick Copits PDEstore 1.8 - Multiple Cross-Site Scripting Vulnerabilities. Author: r0t3d3Vil
|
Analyze the security implications of: Dick Copits PDEstore 1.8 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Domains & Hostings Manager PRO 3.0 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Domains & Hostings Manager PRO 3.0 - Authentication Bypass. Author: Tauco
|
Analyze the security implications of: Domains & Hostings Manager PRO 3.0 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Comtrend VR-3033 - Command Injection
|
This is a webapps exploit for hardware platform. Description: Comtrend VR-3033 - Command Injection. Author: Raki Ben Hamouda
|
Analyze the security implications of: Comtrend VR-3033 - Command Injection
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Mountain Network Systems WebCart 8.4 - Command Execution
|
This is a remote exploit for cgi platform. Description: Mountain Network Systems WebCart 8.4 - Command Execution. Author: root@xpteam.f2s.com
|
Analyze the security implications of: Mountain Network Systems WebCart 8.4 - Command Execution
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Nagios Plugins check_dhcp 2.0.1 - Arbitrary Option File Read
|
This is a local exploit for linux platform. Description: Nagios Plugins check_dhcp 2.0.1 - Arbitrary Option File Read. Author: Dawid Golunski
|
Analyze the security implications of: Nagios Plugins check_dhcp 2.0.1 - Arbitrary Option File Read
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: easyGB 2.1.1 - 'index.php' Local File Inclusion
|
This is a webapps exploit for php platform. Description: easyGB 2.1.1 - 'index.php' Local File Inclusion. Author: h4ck3r
|
Analyze the security implications of: easyGB 2.1.1 - 'index.php' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel < 2.6.31-rc4 - 'nfs4_proc_lock()' Denial of Service
|
This is a dos exploit for linux platform. Description: Linux Kernel < 2.6.31-rc4 - 'nfs4_proc_lock()' Denial of Service. Author: Simon Vallet
|
Analyze the security implications of: Linux Kernel < 2.6.31-rc4 - 'nfs4_proc_lock()' Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: GOautodial 4.0 - Authenticated Shell Upload
|
This is a webapps exploit for php platform. Description: GOautodial 4.0 - Authenticated Shell Upload. Author: Balzabu
|
Analyze the security implications of: GOautodial 4.0 - Authenticated Shell Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mambo Component com_zoom - 'catid' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Mambo Component com_zoom - 'catid' Blind SQL Injection. Author: boom3rang
|
Analyze the security implications of: Mambo Component com_zoom - 'catid' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Feed on Feeds 0.5 - Remote PHP Code Injection
|
This is a webapps exploit for php platform. Description: Feed on Feeds 0.5 - Remote PHP Code Injection. Author: EgiX
|
Analyze the security implications of: Feed on Feeds 0.5 - Remote PHP Code Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ezbounce 1.0/1.5 - Format String
|
This is a remote exploit for linux platform. Description: ezbounce 1.0/1.5 - Format String. Author: V9
|
Analyze the security implications of: ezbounce 1.0/1.5 - Format String
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AN HTTPD 1.41 e - Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: AN HTTPD 1.41 e - Cross-Site Scripting. Author: D4rkGr3y
|
Analyze the security implications of: AN HTTPD 1.41 e - Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Sitekit CMS 6.6 - 'registration-form.html?ClickFrom' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Sitekit CMS 6.6 - 'registration-form.html?ClickFrom' Cross-Site Scripting. Author: r0t3d3Vil
|
Analyze the security implications of: Sitekit CMS 6.6 - 'registration-form.html?ClickFrom' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ICDental Clinic 1.2 - 'key' SQL Injection
|
This is a webapps exploit for php platform. Description: ICDental Clinic 1.2 - 'key' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: ICDental Clinic 1.2 - 'key' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Heat-On HSWeb Web Server 2.0 - Full Path Disclosure
|
This is a remote exploit for cgi platform. Description: Heat-On HSWeb Web Server 2.0 - Full Path Disclosure. Author: Joe Testa
|
Analyze the security implications of: Heat-On HSWeb Web Server 2.0 - Full Path Disclosure
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: CentOS Web Panel 0.9.8.793 (Free) / v0.9.8.753 (Pro) / 0.9.8.807 (Pro) - Domain Field (Add DNS Zone) Cross-Site Scripting
|
This is a webapps exploit for linux platform. Description: CentOS Web Panel 0.9.8.793 (Free) / v0.9.8.753 (Pro) / 0.9.8.807 (Pro) - Domain Field (Add DNS Zone) Cross-Site Scripting. Author: DKM
|
Analyze the security implications of: CentOS Web Panel 0.9.8.793 (Free) / v0.9.8.753 (Pro) / 0.9.8.807 (Pro) - Domain Field (Add DNS Zone) Cross-Site Scripting
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ZoIPer 2.22 - Call-Info Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: ZoIPer 2.22 - Call-Info Remote Denial of Service. Author: Tomer Bitton
|
Analyze the security implications of: ZoIPer 2.22 - Call-Info Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Humhub 0.10.0-rc.1 - Multiple Persistent Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Humhub 0.10.0-rc.1 - Multiple Persistent Cross-Site Scripting Vulnerabilities. Author: Jos Wetzels_ Emiel Florijn
|
Analyze the security implications of: Humhub 0.10.0-rc.1 - Multiple Persistent Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco PIX - TCP SYN Packet Denial of Service
|
This is a dos exploit for hardware platform. Description: Cisco PIX - TCP SYN Packet Denial of Service. Author: Janis Vizulis
|
Analyze the security implications of: Cisco PIX - TCP SYN Packet Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Atlassian Confluence < 8.5.3 - Remote Code Execution
|
This is a webapps exploit for multiple platform. Description: Atlassian Confluence < 8.5.3 - Remote Code Execution. Author: MaanVader
|
Analyze the security implications of: Atlassian Confluence < 8.5.3 - Remote Code Execution
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Pserv 2.0 - User-Agent HTTP Header Buffer Overflow (2)
|
This is a remote exploit for linux platform. Description: Pserv 2.0 - User-Agent HTTP Header Buffer Overflow (2). Author: jsk
|
Analyze the security implications of: Pserv 2.0 - User-Agent HTTP Header Buffer Overflow (2)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component Music Manager - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Music Manager - Local File Inclusion. Author: Sid3^effects
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.