input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Huawei HG255 - Directory Traversal (Metasploit) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Invision Power Board 3 - 'search_app' SQL Injection | This is a webapps exploit for php platform. Description: Invision Power Board 3 - 'search_app' SQL Injection. Author: Lord Tittis3000 |
Analyze the security implications of: Invision Power Board 3 - 'search_app' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_virtuemart 1.1.7 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_virtuemart 1.1.7 - Blind SQL Injection. Author: TecR0c & mr_me |
Analyze the security implications of: Joomla! Component com_virtuemart 1.1.7 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hero Framework - '/users/forgot_password?error' Cross-Site Scripting | This is a webapps exploit for java platform. Description: Hero Framework - '/users/forgot_password?error' Cross-Site Scripting. Author: High-Tech Bridge |
Analyze the security implications of: Hero Framework - '/users/forgot_password?error' Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: ManageEngine Applications Manager Build 12700 - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: ManageEngine Applications Manager Build 12700 - Multiple Vulnerabilities. Author: Saif El-Sherei |
Analyze the security implications of: ManageEngine Applications Manager Build 12700 - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Exim 4 (Debian 8 / Ubuntu 16.04) - Spool Privilege Escalation | This is a local exploit for linux platform. Description: Exim 4 (Debian 8 / Ubuntu 16.04) - Spool Privilege Escalation. Author: halfdog |
Analyze the security implications of: Exim 4 (Debian 8 / Ubuntu 16.04) - Spool Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Samba < 2.0.5 - Local Overflow | This is a local exploit for linux platform. Description: Samba < 2.0.5 - Local Overflow. Author: Gerald Britton |
Analyze the security implications of: Samba < 2.0.5 - Local Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: HazelPress Lite 0.0.4 - Authentication Bypass | This is a webapps exploit for php platform. Description: HazelPress Lite 0.0.4 - Authentication Bypass. Author: cr4wl3r |
Analyze the security implications of: HazelPress Lite 0.0.4 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FlatCore CMS 2.0.7 - Remote Code Execution (RCE) (Authenticated) | This is a webapps exploit for php platform. Description: FlatCore CMS 2.0.7 - Remote Code Execution (RCE) (Authenticated). Author: Mason Soroka-Gill |
Analyze the security implications of: FlatCore CMS 2.0.7 - Remote Code Execution (RCE) (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: inoERP 0.6.1 - Cross-Site Scripting / Cross-Site Request Forgery / SQL Injection / Session Fixation | This is a webapps exploit for php platform. Description: inoERP 0.6.1 - Cross-Site Scripting / Cross-Site Request Forgery / SQL Injection / Session Fixation. Author: Tim Herres |
Analyze the security implications of: inoERP 0.6.1 - Cross-Site Scripting / Cross-Site Request Forgery / SQL Injection / Session Fixation | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple macOS Sierra 10.12.3 - 'IOFireWireFamily-null-deref' FireWire Port Denial of Service | This is a dos exploit for macos platform. Description: Apple macOS Sierra 10.12.3 - 'IOFireWireFamily-null-deref' FireWire Port Denial of Service. Author: Brandon Azad |
Analyze the security implications of: Apple macOS Sierra 10.12.3 - 'IOFireWireFamily-null-deref' FireWire Port Denial of Service | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: EDirectoryPro - 'Search_result.asp' SQL Injection | This is a webapps exploit for asp platform. Description: EDirectoryPro - 'Search_result.asp' SQL Injection. Author: Dj_Eyes |
Analyze the security implications of: EDirectoryPro - 'Search_result.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: MiniDVBLinux 5.4 - Change Root Password | This is a remote exploit for hardware platform. Description: MiniDVBLinux 5.4 - Change Root Password. Author: LiquidWorm |
Analyze the security implications of: MiniDVBLinux 5.4 - Change Root Password | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: JoySale 2.2.1 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: JoySale 2.2.1 - Arbitrary File Upload. Author: Mutlu Benmutlu |
Analyze the security implications of: JoySale 2.2.1 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Faethon 2.0 - 'mainpath' Remote File Inclusion | This is a webapps exploit for php platform. Description: CMS Faethon 2.0 - 'mainpath' Remote File Inclusion. Author: r0ut3r |
Analyze the security implications of: CMS Faethon 2.0 - 'mainpath' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BSA Radar 1.6.7234.24750 - Authenticated Privilege Escalation | This is a webapps exploit for multiple platform. Description: BSA Radar 1.6.7234.24750 - Authenticated Privilege Escalation. Author: William Summerhill |
Analyze the security implications of: BSA Radar 1.6.7234.24750 - Authenticated Privilege Escalation | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Nagios3 - 'history.cgi' Remote Command Execution | This is a remote exploit for multiple platform. Description: Nagios3 - 'history.cgi' Remote Command Execution. Author: blasty |
Analyze the security implications of: Nagios3 - 'history.cgi' Remote Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: IMGallery 2.5 - Create Uploader Script | This is a webapps exploit for php platform. Description: IMGallery 2.5 - Create Uploader Script. Author: Kacper |
Analyze the security implications of: IMGallery 2.5 - Create Uploader Script | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Opera 9.50/9.61 historysearch - Command Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Opera 9.50/9.61 historysearch - Command Execution (Metasploit). Author: egypt |
Analyze the security implications of: Opera 9.50/9.61 historysearch - Command Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Srcpd 2.0 - Multiple Buffer Overflow Vulnerabilities | This is a remote exploit for linux platform. Description: Srcpd 2.0 - Multiple Buffer Overflow Vulnerabilities. Author: Over_G |
Analyze the security implications of: Srcpd 2.0 - Multiple Buffer Overflow Vulnerabilities | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Document Library 1.0.1 - Arbitrary Change Admin | This is a webapps exploit for asp platform. Description: Document Library 1.0.1 - Arbitrary Change Admin. Author: ByALBAYX |
Analyze the security implications of: Document Library 1.0.1 - Arbitrary Change Admin | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Enrollment System v1.0 - SQL Injection | This is a remote exploit for php platform. Description: Enrollment System v1.0 - SQL Injection. Author: Gnanaraj Mauviel |
Analyze the security implications of: Enrollment System v1.0 - SQL Injection | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DDL-Speed Script - 'acp/backup' Admin Backup Bypass | This is a webapps exploit for php platform. Description: DDL-Speed Script - 'acp/backup' Admin Backup Bypass. Author: tmh |
Analyze the security implications of: DDL-Speed Script - 'acp/backup' Admin Backup Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cPanel 5/6/7/8/9 - Resetpass Remote Command Execution | This is a remote exploit for cgi platform. Description: cPanel 5/6/7/8/9 - Resetpass Remote Command Execution. Author: Arab VieruZ |
Analyze the security implications of: cPanel 5/6/7/8/9 - Resetpass Remote Command Execution | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: CDRDAO 1.1.x - Home Directory Configuration File Symbolic Link (3) | This is a local exploit for linux platform. Description: CDRDAO 1.1.x - Home Directory Configuration File Symbolic Link (3). Author: anonymous |
Analyze the security implications of: CDRDAO 1.1.x - Home Directory Configuration File Symbolic Link (3) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Proofpoint Protection Server 5.5.5 - 'process.cgi' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Proofpoint Protection Server 5.5.5 - 'process.cgi' Cross-Site Scripting. Author: Karan Khosla |
Analyze the security implications of: Proofpoint Protection Server 5.5.5 - 'process.cgi' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: LibTIFF - 'tif_dirwrite.c' Denial of Service | This is a dos exploit for linux platform. Description: LibTIFF - 'tif_dirwrite.c' Denial of Service. Author: team OWL337 |
Analyze the security implications of: LibTIFF - 'tif_dirwrite.c' Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: EZHomePagePro 1.5 - 'users_mgallery.asp?usid' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: EZHomePagePro 1.5 - 'users_mgallery.asp?usid' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: EZHomePagePro 1.5 - 'users_mgallery.asp?usid' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Atlassian Confluence AppFusions Doxygen 1.3.0 - Directory Traversal | This is a webapps exploit for java platform. Description: Atlassian Confluence AppFusions Doxygen 1.3.0 - Directory Traversal. Author: Julien Ahrens |
Analyze the security implications of: Atlassian Confluence AppFusions Doxygen 1.3.0 - Directory Traversal | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Adobe Flash - LoadVars.decode Use-After-Free | This is a dos exploit for multiple platform. Description: Adobe Flash - LoadVars.decode Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - LoadVars.decode Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Maian Greetings 2.1 - 'cat' SQL Injection | This is a webapps exploit for php platform. Description: Maian Greetings 2.1 - 'cat' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Maian Greetings 2.1 - 'cat' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX (Mavericks) - 'IOBluetoothHCIUserClient' Privilege Escalation | This is a dos exploit for osx platform. Description: Apple Mac OSX (Mavericks) - 'IOBluetoothHCIUserClient' Privilege Escalation. Author: rpaleari & joystick |
Analyze the security implications of: Apple Mac OSX (Mavericks) - 'IOBluetoothHCIUserClient' Privilege Escalation | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Apple Mac OSX Safari 8.0 - Crash (PoC) | This is a dos exploit for osx platform. Description: Apple Mac OSX Safari 8.0 - Crash (PoC). Author: w3bd3vil |
Analyze the security implications of: Apple Mac OSX Safari 8.0 - Crash (PoC) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: GNU Mailman 2.1 - 'email' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: GNU Mailman 2.1 - 'email' Cross-Site Scripting. Author: webmaster@procheckup.com |
Analyze the security implications of: GNU Mailman 2.1 - 'email' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.