input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: ABB Cylon Aspect 3.07.01 - Hard-coded Default Credentials | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wolf CMS 0.8.2 - Arbitrary File Upload (Metasploit) | This is a remote exploit for php platform. Description: Wolf CMS 0.8.2 - Arbitrary File Upload (Metasploit). Author: s0nk3y |
Analyze the security implications of: Wolf CMS 0.8.2 - Arbitrary File Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Atcom 2.7.x.x - Authenticated Command Injection | This is a remote exploit for hardware platform. Description: Atcom 2.7.x.x - Authenticated Command Injection. Author: Mohammed Adel |
Analyze the security implications of: Atcom 2.7.x.x - Authenticated Command Injection | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Grails PDF Plugin 0.6 - XML External Entity Injection | This is a webapps exploit for java platform. Description: Grails PDF Plugin 0.6 - XML External Entity Injection. Author: Charles Fol |
Analyze the security implications of: Grails PDF Plugin 0.6 - XML External Entity Injection | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Kostenloses Linkmanagementscript - Remote File Inclusion | This is a webapps exploit for php platform. Description: Kostenloses Linkmanagementscript - Remote File Inclusion. Author: HaCkeR_EgY |
Analyze the security implications of: Kostenloses Linkmanagementscript - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fonality trixbox - 'endpoint_generic.php' SQL Injection | This is a webapps exploit for php platform. Description: Fonality trixbox - 'endpoint_generic.php' SQL Injection. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Fonality trixbox - 'endpoint_generic.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASP Battle Blog - Database Disclosure | This is a webapps exploit for asp platform. Description: ASP Battle Blog - Database Disclosure. Author: indoushka |
Analyze the security implications of: ASP Battle Blog - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Acuity CMS 2.7.1 - SQL Injection | This is a webapps exploit for asp platform. Description: Acuity CMS 2.7.1 - SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: Acuity CMS 2.7.1 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Virtualmin < 3.703 - Multiple Local/Remote Vulnerabilities | This is a remote exploit for linux platform. Description: Virtualmin < 3.703 - Multiple Local/Remote Vulnerabilities. Author: Filip Palian |
Analyze the security implications of: Virtualmin < 3.703 - Multiple Local/Remote Vulnerabilities | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Xt Library - Local Privilege Escalation | This is a local exploit for linux platform. Description: Xt Library - Local Privilege Escalation. Author: b0z0 bra1n |
Analyze the security implications of: Xt Library - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: EgavilanMedia User Registration & Login System with Admin Panel 1.0 - Stored Cross Site Scripting | This is a webapps exploit for multiple platform. Description: EgavilanMedia User Registration & Login System with Admin Panel 1.0 - Stored Cross Site Scripting. Author: Soushikta Chowdhury |
Analyze the security implications of: EgavilanMedia User Registration & Login System with Admin Panel 1.0 - Stored Cross Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: e107 Plugin ZoGo-Shop 1.15.4 - 'product' SQL Injection | This is a webapps exploit for php platform. Description: e107 Plugin ZoGo-Shop 1.15.4 - 'product' SQL Injection. Author: NoGe |
Analyze the security implications of: e107 Plugin ZoGo-Shop 1.15.4 - 'product' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10.4.6 (x86) - 'launchd' Local Format String | This is a local exploit for osx platform. Description: Apple Mac OSX 10.4.6 (x86) - 'launchd' Local Format String. Author: Kevin Finisterre |
Analyze the security implications of: Apple Mac OSX 10.4.6 (x86) - 'launchd' Local Format String | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Gauntlet Firewall for Unix 6.0 - SQL-GW Connection Denial of Service | This is a dos exploit for linux platform. Description: Gauntlet Firewall for Unix 6.0 - SQL-GW Connection Denial of Service. Author: Oliver Heinz & Thomas Neuderth |
Analyze the security implications of: Gauntlet Firewall for Unix 6.0 - SQL-GW Connection Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Net Clubs Pro 4.0 - 'sendim.cgi' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cgi platform. Description: Net Clubs Pro 4.0 - 'sendim.cgi' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t |
Analyze the security implications of: Net Clubs Pro 4.0 - 'sendim.cgi' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Watchguard Firewalls - 'ESCALATEPLOWMAN' ifconfig Privilege Escalation | This is a local exploit for linux platform. Description: Watchguard Firewalls - 'ESCALATEPLOWMAN' ifconfig Privilege Escalation. Author: Shadow Brokers |
Analyze the security implications of: Watchguard Firewalls - 'ESCALATEPLOWMAN' ifconfig Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: libiec61850 1.3 - Stack Based Buffer Overflow | This is a local exploit for linux platform. Description: libiec61850 1.3 - Stack Based Buffer Overflow. Author: Dhiraj Mishra |
Analyze the security implications of: libiec61850 1.3 - Stack Based Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Check Box 2016 Q2 Survey - Multiple Vulnerabilities | This is a webapps exploit for aspx platform. Description: Check Box 2016 Q2 Survey - Multiple Vulnerabilities. Author: Fady Mohammed Osman |
Analyze the security implications of: Check Box 2016 Q2 Survey - Multiple Vulnerabilities | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: LibTiff 3.x - Multiple Denial of Service Vulnerabilities | This is a dos exploit for linux platform. Description: LibTiff 3.x - Multiple Denial of Service Vulnerabilities. Author: Tavis Ormandy |
Analyze the security implications of: LibTiff 3.x - Multiple Denial of Service Vulnerabilities | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: gdomap - Multiple Local Information Disclosure Vulnerabilities | This is a local exploit for linux platform. Description: gdomap - Multiple Local Information Disclosure Vulnerabilities. Author: Dan Rosenberg |
Analyze the security implications of: gdomap - Multiple Local Information Disclosure Vulnerabilities | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Novell Netware - NWFTPD RMD/RNFR/DELE Argument Parsing Buffer Overflow | This is a dos exploit for novell platform. Description: Novell Netware - NWFTPD RMD/RNFR/DELE Argument Parsing Buffer Overflow. Author: Abysssec |
Analyze the security implications of: Novell Netware - NWFTPD RMD/RNFR/DELE Argument Parsing Buffer Overflow | This exploit targets novell systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: CyberBuild - 'browse0.htm?ProductIndex' SQL Injection | This is a webapps exploit for asp platform. Description: CyberBuild - 'browse0.htm?ProductIndex' SQL Injection. Author: r0t |
Analyze the security implications of: CyberBuild - 'browse0.htm?ProductIndex' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: MailEnable Enterprise 2.0 - 'ASP' Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: MailEnable Enterprise 2.0 - 'ASP' Multiple Vulnerabilities. Author: Soroush Dalili |
Analyze the security implications of: MailEnable Enterprise 2.0 - 'ASP' Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Banner Management Script - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Banner Management Script - 'id' SQL Injection. Author: S.W.A.T. |
Analyze the security implications of: Banner Management Script - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bludit - Directory Traversal Image File Upload (Metasploit) | This is a remote exploit for php platform. Description: Bludit - Directory Traversal Image File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: Bludit - Directory Traversal Image File Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla 1.x / Netscape 7.0/7.1 - SOAP Integer Overflow | This is a dos exploit for linux platform. Description: Mozilla 1.x / Netscape 7.0/7.1 - SOAP Integer Overflow. Author: zen-parse |
Analyze the security implications of: Mozilla 1.x / Netscape 7.0/7.1 - SOAP Integer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Electrolink FM/DAB/TV Transmitter (controlloLogin.js) - Credentials Disclosure | This is a webapps exploit for hardware platform. Description: Electrolink FM/DAB/TV Transmitter (controlloLogin.js) - Credentials Disclosure. Author: LiquidWorm |
Analyze the security implications of: Electrolink FM/DAB/TV Transmitter (controlloLogin.js) - Credentials Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Unitrends UEB 9 - bpserverd Authentication Bypass Remote Command Execution (Metasploit) | This is a remote exploit for linux_x86 platform. Description: Unitrends UEB 9 - bpserverd Authentication Bypass Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Unitrends UEB 9 - bpserverd Authentication Bypass Remote Command Execution (Metasploit) | This exploit targets linux_x86 systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux_x86 platform |
What is this exploit about: CuteNews 2.1.2 - Arbitrary File Deletion | This is a webapps exploit for php platform. Description: CuteNews 2.1.2 - Arbitrary File Deletion. Author: Besim |
Analyze the security implications of: CuteNews 2.1.2 - Arbitrary File Deletion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CodeAvalanche Directory - Database Disclosure | This is a webapps exploit for asp platform. Description: CodeAvalanche Directory - Database Disclosure. Author: Pouya_Server |
Analyze the security implications of: CodeAvalanche Directory - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ALCASAR 2.8 - Remote Code Execution | This is a remote exploit for linux platform. Description: ALCASAR 2.8 - Remote Code Execution. Author: eF |
Analyze the security implications of: ALCASAR 2.8 - Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Ceragon FibeAir IP-10 - SSH Private Key Exposure (Metasploit) | This is a remote exploit for linux platform. Description: Ceragon FibeAir IP-10 - SSH Private Key Exposure (Metasploit). Author: Metasploit |
Analyze the security implications of: Ceragon FibeAir IP-10 - SSH Private Key Exposure (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FLIR AX8 Thermal Camera 1.32.16 - Arbitrary File Disclosure | This is a webapps exploit for hardware platform. Description: FLIR AX8 Thermal Camera 1.32.16 - Arbitrary File Disclosure. Author: LiquidWorm |
Analyze the security implications of: FLIR AX8 Thermal Camera 1.32.16 - Arbitrary File Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ZTE Modem ZXDSL 531BIIV7.3.0f_D09_IN - Persistent Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: ZTE Modem ZXDSL 531BIIV7.3.0f_D09_IN - Persistent Cross-Site Scripting. Author: Ravi Rajput |
Analyze the security implications of: ZTE Modem ZXDSL 531BIIV7.3.0f_D09_IN - Persistent Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.