input
stringlengths 39
228
| output
stringlengths 32
324
|
|---|---|
Analyze the security implications of: Jenkins 1.633 - Credential Recovery
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Cisco IDS Device Manager 3.1.1 - Arbitrary File Read Access
|
This is a remote exploit for hardware platform. Description: Cisco IDS Device Manager 3.1.1 - Arbitrary File Read Access. Author: Andrew Lopacki
|
Analyze the security implications of: Cisco IDS Device Manager 3.1.1 - Arbitrary File Read Access
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ChiKoi v1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: ChiKoi v1.0 - SQL Injection. Author: nu11secur1ty
|
Analyze the security implications of: ChiKoi v1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: KEMP LoadMaster 7.135.0.13245 - Persistent Cross-Site Scripting / Remote Code Execution
|
This is a webapps exploit for multiple platform. Description: KEMP LoadMaster 7.135.0.13245 - Persistent Cross-Site Scripting / Remote Code Execution. Author: SecuriTeam
|
Analyze the security implications of: KEMP LoadMaster 7.135.0.13245 - Persistent Cross-Site Scripting / Remote Code Execution
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CANDID - '/image/view.php?image_id' SQL Injection
|
This is a webapps exploit for php platform. Description: CANDID - '/image/view.php?image_id' SQL Injection. Author: L0rd CrusAd3r
|
Analyze the security implications of: CANDID - '/image/view.php?image_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel - 'mincore()' Heap Page Disclosure (PoC)
|
This is a dos exploit for linux platform. Description: Linux Kernel - 'mincore()' Heap Page Disclosure (PoC). Author: anonymous
|
Analyze the security implications of: Linux Kernel - 'mincore()' Heap Page Disclosure (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AT 3.1.8 - Formatted Time Heap Overflow
|
This is a local exploit for linux platform. Description: AT 3.1.8 - Formatted Time Heap Overflow. Author: SuSE Security
|
Analyze the security implications of: AT 3.1.8 - Formatted Time Heap Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: HP Procurve 4000M Switch - Device Reset Denial of Service
|
This is a dos exploit for hardware platform. Description: HP Procurve 4000M Switch - Device Reset Denial of Service. Author: Brook Powers
|
Analyze the security implications of: HP Procurve 4000M Switch - Device Reset Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Aztech Modem Routers - Information Disclosure
|
This is a remote exploit for hardware platform. Description: Aztech Modem Routers - Information Disclosure. Author: Eric Fajardo
|
Analyze the security implications of: Aztech Modem Routers - Information Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: HID discoveryd - 'command_blink_on' Remote Code Execution (Metasploit)
|
This is a remote exploit for linux platform. Description: HID discoveryd - 'command_blink_on' Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: HID discoveryd - 'command_blink_on' Remote Code Execution (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: MiniUPnP MiniUPnPc < 2.0 - Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: MiniUPnP MiniUPnPc < 2.0 - Remote Denial of Service. Author: tintinweb
|
Analyze the security implications of: MiniUPnP MiniUPnPc < 2.0 - Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: AjaxExplorer 1.10.3.2 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: AjaxExplorer 1.10.3.2 - Multiple Vulnerabilities. Author: hyp3rlinx
|
Analyze the security implications of: AjaxExplorer 1.10.3.2 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle 9i/10g Database - Network Foundation Remote Overflow
|
This is a remote exploit for multiple platform. Description: Oracle 9i/10g Database - Network Foundation Remote Overflow. Author: Dennis Yurichev
|
Analyze the security implications of: Oracle 9i/10g Database - Network Foundation Remote Overflow
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Plesk Server Administrator (PSA) - 'locale' Local File Inclusion
|
This is a webapps exploit for multiple platform. Description: Plesk Server Administrator (PSA) - 'locale' Local File Inclusion. Author: Pouya Daneshmand
|
Analyze the security implications of: Plesk Server Administrator (PSA) - 'locale' Local File Inclusion
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component Casino 0.3.1 - Multiple SQL Injections s
|
This is a webapps exploit for php platform. Description: Joomla! Component Casino 0.3.1 - Multiple SQL Injections s. Author: ByALBAYX
|
Analyze the security implications of: Joomla! Component Casino 0.3.1 - Multiple SQL Injections s
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Virtual Vertex Muster 6.1.6 - Web Interface Directory Traversal
|
This is a webapps exploit for asp platform. Description: Virtual Vertex Muster 6.1.6 - Web Interface Directory Traversal. Author: Nick Freeman
|
Analyze the security implications of: Virtual Vertex Muster 6.1.6 - Web Interface Directory Traversal
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Netgear WNR2000v5 - 'hidden_lang_avi' Remote Stack Overflow (Metasploit)
|
This is a remote exploit for hardware platform. Description: Netgear WNR2000v5 - 'hidden_lang_avi' Remote Stack Overflow (Metasploit). Author: Pedro Ribeiro
|
Analyze the security implications of: Netgear WNR2000v5 - 'hidden_lang_avi' Remote Stack Overflow (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: DAMICMS 6.0.0 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for php platform. Description: DAMICMS 6.0.0 - Cross-Site Request Forgery (Add Admin). Author: bay0net
|
Analyze the security implications of: DAMICMS 6.0.0 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_tag - 'tag' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_tag - 'tag' SQL Injection. Author: D4NB4R
|
Analyze the security implications of: Joomla! Component com_tag - 'tag' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ION Script 1.4 - Remote File Disclosure
|
This is a webapps exploit for cgi platform. Description: ION Script 1.4 - Remote File Disclosure. Author: Zero X
|
Analyze the security implications of: ION Script 1.4 - Remote File Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: docpile:we 0.2.2 - 'INIT_PATH' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: docpile:we 0.2.2 - 'INIT_PATH' Remote File Inclusion. Author: Mehmet Ince
|
Analyze the security implications of: docpile:we 0.2.2 - 'INIT_PATH' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ask Expert Script 3.0.5 - Cross Site Scripting / SQL Injection
|
This is a webapps exploit for php platform. Description: Ask Expert Script 3.0.5 - Cross Site Scripting / SQL Injection. Author: Mr Winst0n
|
Analyze the security implications of: Ask Expert Script 3.0.5 - Cross Site Scripting / SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OFTPD 0.3.x - User Command Buffer Overflow
|
This is a dos exploit for linux platform. Description: OFTPD 0.3.x - User Command Buffer Overflow. Author: new.security@gmail.com
|
Analyze the security implications of: OFTPD 0.3.x - User Command Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Pay Roll Time Sheet and Punch Card Application With Web UI - 'login.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: Pay Roll Time Sheet and Punch Card Application With Web UI - 'login.asp' SQL Injection. Author: Aria-Security Team
|
Analyze the security implications of: Pay Roll Time Sheet and Punch Card Application With Web UI - 'login.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Alibaba Clone Platinum - 'about_us.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Alibaba Clone Platinum - 'about_us.php' SQL Injection. Author: CoBRa_21
|
Analyze the security implications of: Alibaba Clone Platinum - 'about_us.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Pre Survey Generator - 'default.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: Pre Survey Generator - 'default.asp' SQL Injection. Author: DreamTurk
|
Analyze the security implications of: Pre Survey Generator - 'default.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: McAfee Email Gateway (formerly IronMail) - Denial of Service
|
This is a dos exploit for hardware platform. Description: McAfee Email Gateway (formerly IronMail) - Denial of Service. Author: Nahuel Grisolia
|
Analyze the security implications of: McAfee Email Gateway (formerly IronMail) - Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Double Your Bitcoin Script Automatic - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Double Your Bitcoin Script Automatic - Authentication Bypass. Author: Veyselxan
|
Analyze the security implications of: Double Your Bitcoin Script Automatic - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco CallManager 3.x/4.x - 'Web Interface 'ccmadmin/phonelist.asp?Pattern' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Cisco CallManager 3.x/4.x - 'Web Interface 'ccmadmin/phonelist.asp?Pattern' Cross-Site Scripting. Author: Jake Reynolds
|
Analyze the security implications of: Cisco CallManager 3.x/4.x - 'Web Interface 'ccmadmin/phonelist.asp?Pattern' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component com_org - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_org - SQL Injection. Author: N2n-Hacker
|
Analyze the security implications of: Joomla! Component com_org - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FluxBB 1.5.11 - Stored Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: FluxBB 1.5.11 - Stored Cross-Site Scripting (XSS). Author: Chokri Hammedi
|
Analyze the security implications of: FluxBB 1.5.11 - Stored Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Asterisk 1.0.12/1.2.12.1 - 'chan_skinny' Remote Heap Overflow (PoC)
|
This is a dos exploit for multiple platform. Description: Asterisk 1.0.12/1.2.12.1 - 'chan_skinny' Remote Heap Overflow (PoC). Author: Noam Rathaus
|
Analyze the security implications of: Asterisk 1.0.12/1.2.12.1 - 'chan_skinny' Remote Heap Overflow (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: PHP 5.2.1 - Multiple functions 'Reference' Information Disclosures
|
This is a local exploit for php platform. Description: PHP 5.2.1 - Multiple functions 'Reference' Information Disclosures. Author: Stefan Esser
|
Analyze the security implications of: PHP 5.2.1 - Multiple functions 'Reference' Information Disclosures
|
This exploit targets php systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Automatic-Systems SOC FL9600 FastLine - Directory Transversal
|
This is a webapps exploit for php platform. Description: Automatic-Systems SOC FL9600 FastLine - Directory Transversal. Author: Marcin Kozlowski
|
Analyze the security implications of: Automatic-Systems SOC FL9600 FastLine - Directory Transversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.