input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: ABB Cylon Aspect 3.07.01 - Hard-coded Default Credentials
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Wolf CMS 0.8.2 - Arbitrary File Upload (Metasploit)
|
This is a remote exploit for php platform. Description: Wolf CMS 0.8.2 - Arbitrary File Upload (Metasploit). Author: s0nk3y
|
Analyze the security implications of: Wolf CMS 0.8.2 - Arbitrary File Upload (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Atcom 2.7.x.x - Authenticated Command Injection
|
This is a remote exploit for hardware platform. Description: Atcom 2.7.x.x - Authenticated Command Injection. Author: Mohammed Adel
|
Analyze the security implications of: Atcom 2.7.x.x - Authenticated Command Injection
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Grails PDF Plugin 0.6 - XML External Entity Injection
|
This is a webapps exploit for java platform. Description: Grails PDF Plugin 0.6 - XML External Entity Injection. Author: Charles Fol
|
Analyze the security implications of: Grails PDF Plugin 0.6 - XML External Entity Injection
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Kostenloses Linkmanagementscript - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Kostenloses Linkmanagementscript - Remote File Inclusion. Author: HaCkeR_EgY
|
Analyze the security implications of: Kostenloses Linkmanagementscript - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Fonality trixbox - 'endpoint_generic.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Fonality trixbox - 'endpoint_generic.php' SQL Injection. Author: AtT4CKxT3rR0r1ST
|
Analyze the security implications of: Fonality trixbox - 'endpoint_generic.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ASP Battle Blog - Database Disclosure
|
This is a webapps exploit for asp platform. Description: ASP Battle Blog - Database Disclosure. Author: indoushka
|
Analyze the security implications of: ASP Battle Blog - Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Acuity CMS 2.7.1 - SQL Injection
|
This is a webapps exploit for asp platform. Description: Acuity CMS 2.7.1 - SQL Injection. Author: L0rd CrusAd3r
|
Analyze the security implications of: Acuity CMS 2.7.1 - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Virtualmin < 3.703 - Multiple Local/Remote Vulnerabilities
|
This is a remote exploit for linux platform. Description: Virtualmin < 3.703 - Multiple Local/Remote Vulnerabilities. Author: Filip Palian
|
Analyze the security implications of: Virtualmin < 3.703 - Multiple Local/Remote Vulnerabilities
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Xt Library - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Xt Library - Local Privilege Escalation. Author: b0z0 bra1n
|
Analyze the security implications of: Xt Library - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: EgavilanMedia User Registration & Login System with Admin Panel 1.0 - Stored Cross Site Scripting
|
This is a webapps exploit for multiple platform. Description: EgavilanMedia User Registration & Login System with Admin Panel 1.0 - Stored Cross Site Scripting. Author: Soushikta Chowdhury
|
Analyze the security implications of: EgavilanMedia User Registration & Login System with Admin Panel 1.0 - Stored Cross Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: e107 Plugin ZoGo-Shop 1.15.4 - 'product' SQL Injection
|
This is a webapps exploit for php platform. Description: e107 Plugin ZoGo-Shop 1.15.4 - 'product' SQL Injection. Author: NoGe
|
Analyze the security implications of: e107 Plugin ZoGo-Shop 1.15.4 - 'product' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Mac OSX 10.4.6 (x86) - 'launchd' Local Format String
|
This is a local exploit for osx platform. Description: Apple Mac OSX 10.4.6 (x86) - 'launchd' Local Format String. Author: Kevin Finisterre
|
Analyze the security implications of: Apple Mac OSX 10.4.6 (x86) - 'launchd' Local Format String
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Gauntlet Firewall for Unix 6.0 - SQL-GW Connection Denial of Service
|
This is a dos exploit for linux platform. Description: Gauntlet Firewall for Unix 6.0 - SQL-GW Connection Denial of Service. Author: Oliver Heinz & Thomas Neuderth
|
Analyze the security implications of: Gauntlet Firewall for Unix 6.0 - SQL-GW Connection Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Net Clubs Pro 4.0 - 'sendim.cgi' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for cgi platform. Description: Net Clubs Pro 4.0 - 'sendim.cgi' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t
|
Analyze the security implications of: Net Clubs Pro 4.0 - 'sendim.cgi' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Watchguard Firewalls - 'ESCALATEPLOWMAN' ifconfig Privilege Escalation
|
This is a local exploit for linux platform. Description: Watchguard Firewalls - 'ESCALATEPLOWMAN' ifconfig Privilege Escalation. Author: Shadow Brokers
|
Analyze the security implications of: Watchguard Firewalls - 'ESCALATEPLOWMAN' ifconfig Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: libiec61850 1.3 - Stack Based Buffer Overflow
|
This is a local exploit for linux platform. Description: libiec61850 1.3 - Stack Based Buffer Overflow. Author: Dhiraj Mishra
|
Analyze the security implications of: libiec61850 1.3 - Stack Based Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Check Box 2016 Q2 Survey - Multiple Vulnerabilities
|
This is a webapps exploit for aspx platform. Description: Check Box 2016 Q2 Survey - Multiple Vulnerabilities. Author: Fady Mohammed Osman
|
Analyze the security implications of: Check Box 2016 Q2 Survey - Multiple Vulnerabilities
|
This exploit targets aspx systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aspx platform
|
What is this exploit about: LibTiff 3.x - Multiple Denial of Service Vulnerabilities
|
This is a dos exploit for linux platform. Description: LibTiff 3.x - Multiple Denial of Service Vulnerabilities. Author: Tavis Ormandy
|
Analyze the security implications of: LibTiff 3.x - Multiple Denial of Service Vulnerabilities
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: gdomap - Multiple Local Information Disclosure Vulnerabilities
|
This is a local exploit for linux platform. Description: gdomap - Multiple Local Information Disclosure Vulnerabilities. Author: Dan Rosenberg
|
Analyze the security implications of: gdomap - Multiple Local Information Disclosure Vulnerabilities
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Novell Netware - NWFTPD RMD/RNFR/DELE Argument Parsing Buffer Overflow
|
This is a dos exploit for novell platform. Description: Novell Netware - NWFTPD RMD/RNFR/DELE Argument Parsing Buffer Overflow. Author: Abysssec
|
Analyze the security implications of: Novell Netware - NWFTPD RMD/RNFR/DELE Argument Parsing Buffer Overflow
|
This exploit targets novell systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets novell platform
|
What is this exploit about: CyberBuild - 'browse0.htm?ProductIndex' SQL Injection
|
This is a webapps exploit for asp platform. Description: CyberBuild - 'browse0.htm?ProductIndex' SQL Injection. Author: r0t
|
Analyze the security implications of: CyberBuild - 'browse0.htm?ProductIndex' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: MailEnable Enterprise 2.0 - 'ASP' Multiple Vulnerabilities
|
This is a webapps exploit for asp platform. Description: MailEnable Enterprise 2.0 - 'ASP' Multiple Vulnerabilities. Author: Soroush Dalili
|
Analyze the security implications of: MailEnable Enterprise 2.0 - 'ASP' Multiple Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Banner Management Script - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Banner Management Script - 'id' SQL Injection. Author: S.W.A.T.
|
Analyze the security implications of: Banner Management Script - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bludit - Directory Traversal Image File Upload (Metasploit)
|
This is a remote exploit for php platform. Description: Bludit - Directory Traversal Image File Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: Bludit - Directory Traversal Image File Upload (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mozilla 1.x / Netscape 7.0/7.1 - SOAP Integer Overflow
|
This is a dos exploit for linux platform. Description: Mozilla 1.x / Netscape 7.0/7.1 - SOAP Integer Overflow. Author: zen-parse
|
Analyze the security implications of: Mozilla 1.x / Netscape 7.0/7.1 - SOAP Integer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Electrolink FM/DAB/TV Transmitter (controlloLogin.js) - Credentials Disclosure
|
This is a webapps exploit for hardware platform. Description: Electrolink FM/DAB/TV Transmitter (controlloLogin.js) - Credentials Disclosure. Author: LiquidWorm
|
Analyze the security implications of: Electrolink FM/DAB/TV Transmitter (controlloLogin.js) - Credentials Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Unitrends UEB 9 - bpserverd Authentication Bypass Remote Command Execution (Metasploit)
|
This is a remote exploit for linux_x86 platform. Description: Unitrends UEB 9 - bpserverd Authentication Bypass Remote Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Unitrends UEB 9 - bpserverd Authentication Bypass Remote Command Execution (Metasploit)
|
This exploit targets linux_x86 systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux_x86 platform
|
What is this exploit about: CuteNews 2.1.2 - Arbitrary File Deletion
|
This is a webapps exploit for php platform. Description: CuteNews 2.1.2 - Arbitrary File Deletion. Author: Besim
|
Analyze the security implications of: CuteNews 2.1.2 - Arbitrary File Deletion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CodeAvalanche Directory - Database Disclosure
|
This is a webapps exploit for asp platform. Description: CodeAvalanche Directory - Database Disclosure. Author: Pouya_Server
|
Analyze the security implications of: CodeAvalanche Directory - Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ALCASAR 2.8 - Remote Code Execution
|
This is a remote exploit for linux platform. Description: ALCASAR 2.8 - Remote Code Execution. Author: eF
|
Analyze the security implications of: ALCASAR 2.8 - Remote Code Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Ceragon FibeAir IP-10 - SSH Private Key Exposure (Metasploit)
|
This is a remote exploit for linux platform. Description: Ceragon FibeAir IP-10 - SSH Private Key Exposure (Metasploit). Author: Metasploit
|
Analyze the security implications of: Ceragon FibeAir IP-10 - SSH Private Key Exposure (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: FLIR AX8 Thermal Camera 1.32.16 - Arbitrary File Disclosure
|
This is a webapps exploit for hardware platform. Description: FLIR AX8 Thermal Camera 1.32.16 - Arbitrary File Disclosure. Author: LiquidWorm
|
Analyze the security implications of: FLIR AX8 Thermal Camera 1.32.16 - Arbitrary File Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ZTE Modem ZXDSL 531BIIV7.3.0f_D09_IN - Persistent Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: ZTE Modem ZXDSL 531BIIV7.3.0f_D09_IN - Persistent Cross-Site Scripting. Author: Ravi Rajput
|
Analyze the security implications of: ZTE Modem ZXDSL 531BIIV7.3.0f_D09_IN - Persistent Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.