input
stringlengths
39
228
output
stringlengths
32
324
Analyze the security implications of: F5 FirePass 6.0.2.3 - '/vdesk/admincon/index.php?sql_matchscope' Cross-Site Scripting
This exploit targets hardware systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Joomla! Component com_motor - 'cid' SQL Injection
This is a webapps exploit for php platform. Description: Joomla! Component com_motor - 'cid' SQL Injection. Author: the_cyber_nuxbie
Analyze the security implications of: Joomla! Component com_motor - 'cid' SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: ERPNext 12.14.0 - SQL Injection (Authenticated)
This is a webapps exploit for multiple platform. Description: ERPNext 12.14.0 - SQL Injection (Authenticated). Author: Hodorsec
Analyze the security implications of: ERPNext 12.14.0 - SQL Injection (Authenticated)
This exploit targets multiple systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Apple macOS - 'getrusage' Stack Leak Through struct Padding
This is a dos exploit for macos platform. Description: Apple macOS - 'getrusage' Stack Leak Through struct Padding. Author: Google Security Research
Analyze the security implications of: Apple macOS - 'getrusage' Stack Leak Through struct Padding
This exploit targets macos systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets macos platform
What is this exploit about: Buy and Sell Market Place Software - SQL Injection
This is a webapps exploit for php platform. Description: Buy and Sell Market Place Software - SQL Injection. Author: Ihsan Sencan
Analyze the security implications of: Buy and Sell Market Place Software - SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: UCOPIA Wireless Appliance < 5.1.8 - Restricted Shell Escape
This is a local exploit for linux platform. Description: UCOPIA Wireless Appliance < 5.1.8 - Restricted Shell Escape. Author: Sysdream
Analyze the security implications of: UCOPIA Wireless Appliance < 5.1.8 - Restricted Shell Escape
This exploit targets linux systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Invision Power Services Invision Gallery 1.0.1/1.3 - SQL Injection
This is a webapps exploit for php platform. Description: Invision Power Services Invision Gallery 1.0.1/1.3 - SQL Injection. Author: GulfTech Security
Analyze the security implications of: Invision Power Services Invision Gallery 1.0.1/1.3 - SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: AnnonceScriptHP 2.0 - '/Templates/admin.dwt.php?email' Cross-Site Scripting
This is a webapps exploit for php platform. Description: AnnonceScriptHP 2.0 - '/Templates/admin.dwt.php?email' Cross-Site Scripting. Author: Mr_KaLiMaN
Analyze the security implications of: AnnonceScriptHP 2.0 - '/Templates/admin.dwt.php?email' Cross-Site Scripting
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Samsung ml85p Printer Driver 1.0 - Insecure Temporary File Creation (2)
This is a local exploit for hardware platform. Description: Samsung ml85p Printer Driver 1.0 - Insecure Temporary File Creation (2). Author: ml85p
Analyze the security implications of: Samsung ml85p Printer Driver 1.0 - Insecure Temporary File Creation (2)
This exploit targets hardware systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Advanced File Management 1.4 - 'users.php' Cross-Site Scripting
This is a webapps exploit for php platform. Description: Advanced File Management 1.4 - 'users.php' Cross-Site Scripting. Author: Am!r
Analyze the security implications of: Advanced File Management 1.4 - 'users.php' Cross-Site Scripting
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Church Management System 1.0 - 'password' SQL Injection (Authentication Bypass)
This is a webapps exploit for php platform. Description: Church Management System 1.0 - 'password' SQL Injection (Authentication Bypass). Author: Murat DEMİRCİ
Analyze the security implications of: Church Management System 1.0 - 'password' SQL Injection (Authentication Bypass)
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: FreeCMS.us 0.2 - 'index.php' SQL Injection
This is a webapps exploit for php platform. Description: FreeCMS.us 0.2 - 'index.php' SQL Injection. Author: Mr.SQL
Analyze the security implications of: FreeCMS.us 0.2 - 'index.php' SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Joomla! / Mambo Component Cinema 1.0 - 'id' SQL Injection
This is a webapps exploit for php platform. Description: Joomla! / Mambo Component Cinema 1.0 - 'id' SQL Injection. Author: S@BUN
Analyze the security implications of: Joomla! / Mambo Component Cinema 1.0 - 'id' SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Google Chrome < M73 - FileSystemOperationRunner Use-After-Free
This is a dos exploit for multiple platform. Description: Google Chrome < M73 - FileSystemOperationRunner Use-After-Free. Author: Google Security Research
Analyze the security implications of: Google Chrome < M73 - FileSystemOperationRunner Use-After-Free
This exploit targets multiple systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Webmin < 1.290 / Usermin < 1.220 - Arbitrary File Disclosure
This is a remote exploit for multiple platform. Description: Webmin < 1.290 / Usermin < 1.220 - Arbitrary File Disclosure. Author: joffer
Analyze the security implications of: Webmin < 1.290 / Usermin < 1.220 - Arbitrary File Disclosure
This exploit targets multiple systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Xmind 2020 - Persistent Cross-Site Scripting
This is a webapps exploit for multiple platform. Description: Xmind 2020 - Persistent Cross-Site Scripting. Author: TaurusOmar
Analyze the security implications of: Xmind 2020 - Persistent Cross-Site Scripting
This exploit targets multiple systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Zemra Botnet (C2 Web Panel) - Remote Code Execution (Metasploit)
This is a remote exploit for multiple platform. Description: Zemra Botnet (C2 Web Panel) - Remote Code Execution (Metasploit). Author: Metasploit
Analyze the security implications of: Zemra Botnet (C2 Web Panel) - Remote Code Execution (Metasploit)
This exploit targets multiple systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: CuteNews 1.4.1 - 'categories.mdu' Remote Command Execution
This is a webapps exploit for php platform. Description: CuteNews 1.4.1 - 'categories.mdu' Remote Command Execution. Author: cijfer
Analyze the security implications of: CuteNews 1.4.1 - 'categories.mdu' Remote Command Execution
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: lcxbbportal 0.1 alpha 2 - Remote File Inclusion
This is a webapps exploit for php platform. Description: lcxbbportal 0.1 alpha 2 - Remote File Inclusion. Author: NoGe
Analyze the security implications of: lcxbbportal 0.1 alpha 2 - Remote File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: JBoss 3.0.8/3.2.1 - HSQLDB Remote Command Injection
This is a remote exploit for multiple platform. Description: JBoss 3.0.8/3.2.1 - HSQLDB Remote Command Injection. Author: Marc Schoenefeld
Analyze the security implications of: JBoss 3.0.8/3.2.1 - HSQLDB Remote Command Injection
This exploit targets multiple systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Lot Reservation Management System - Unauthenticated File Disclosure
This is a webapps exploit for php platform. Description: Lot Reservation Management System - Unauthenticated File Disclosure. Author: Elijah Mandila Syoyi
Analyze the security implications of: Lot Reservation Management System - Unauthenticated File Disclosure
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: RedHat 6.2/7.0/7.1 Lpd - Remote Command Execution via DVI Printfilter Configuration Error
This is a remote exploit for linux platform. Description: RedHat 6.2/7.0/7.1 Lpd - Remote Command Execution via DVI Printfilter Configuration Error. Author: zenith parsec
Analyze the security implications of: RedHat 6.2/7.0/7.1 Lpd - Remote Command Execution via DVI Printfilter Configuration Error
This exploit targets linux systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: GNU C Library Dynamic Loader glibc ld.so - Memory Leak / Buffer Overflow
This is a local exploit for linux platform. Description: GNU C Library Dynamic Loader glibc ld.so - Memory Leak / Buffer Overflow. Author: Qualys Corporation
Analyze the security implications of: GNU C Library Dynamic Loader glibc ld.so - Memory Leak / Buffer Overflow
This exploit targets linux systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: TP-Link TL-WR840N/TL-WR841N - Authenticaton Bypass
This is a webapps exploit for hardware platform. Description: TP-Link TL-WR840N/TL-WR841N - Authenticaton Bypass. Author: BlackFog Team
Analyze the security implications of: TP-Link TL-WR840N/TL-WR841N - Authenticaton Bypass
This exploit targets hardware systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: ClipShare < 3.0.1 - 'tid' SQL Injection
This is a webapps exploit for php platform. Description: ClipShare < 3.0.1 - 'tid' SQL Injection. Author: SuNHouSe2
Analyze the security implications of: ClipShare < 3.0.1 - 'tid' SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: PHP < 4.4.5/5.2.1 - WDDX Session Deserialization Information Leak
This is a local exploit for multiple platform. Description: PHP < 4.4.5/5.2.1 - WDDX Session Deserialization Information Leak. Author: Stefan Esser
Analyze the security implications of: PHP < 4.4.5/5.2.1 - WDDX Session Deserialization Information Leak
This exploit targets multiple systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Apple WebKit / Safari 10.0.3 (12602.4.8) - Universal Cross-Site Scripting via a Focus Event and a Link Element
This is a webapps exploit for multiple platform. Description: Apple WebKit / Safari 10.0.3 (12602.4.8) - Universal Cross-Site Scripting via a Focus Event and a Link Element. Author: Google Security Research
Analyze the security implications of: Apple WebKit / Safari 10.0.3 (12602.4.8) - Universal Cross-Site Scripting via a Focus Event and a Link Element
This exploit targets multiple systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Joomla! Component PrayerCenter 3.0.2 - 'sessionid' SQL Injection
This is a webapps exploit for php platform. Description: Joomla! Component PrayerCenter 3.0.2 - 'sessionid' SQL Injection. Author: Ihsan Sencan
Analyze the security implications of: Joomla! Component PrayerCenter 3.0.2 - 'sessionid' SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Ecommercemax Solutions Digital Goods Seller - SQL Injection
This is a webapps exploit for asp platform. Description: Ecommercemax Solutions Digital Goods Seller - SQL Injection. Author: R4dc0re
Analyze the security implications of: Ecommercemax Solutions Digital Goods Seller - SQL Injection
This exploit targets asp systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets asp platform
What is this exploit about: Cacti 0.8.7 - '/index.php/sql.php?Login Action login_username' SQL Injection
This is a webapps exploit for php platform. Description: Cacti 0.8.7 - '/index.php/sql.php?Login Action login_username' SQL Injection. Author: aScii
Analyze the security implications of: Cacti 0.8.7 - '/index.php/sql.php?Login Action login_username' SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: F5 Networks FirePass 4100 SSL VPN - 'My.Logon.php3' Cross-Site Scripting
This is a remote exploit for hardware platform. Description: F5 Networks FirePass 4100 SSL VPN - 'My.Logon.php3' Cross-Site Scripting. Author: Richard Brain
Analyze the security implications of: F5 Networks FirePass 4100 SSL VPN - 'My.Logon.php3' Cross-Site Scripting
This exploit targets hardware systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Adobe ColdFusion - Directory Traversal
This is a remote exploit for multiple platform. Description: Adobe ColdFusion - Directory Traversal. Author: anonymous
Analyze the security implications of: Adobe ColdFusion - Directory Traversal
This exploit targets multiple systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: ZYXEL P-660R-T1 V2 - 'HomeCurrent_Date' Cross-Site Scripting
This is a webapps exploit for multiple platform. Description: ZYXEL P-660R-T1 V2 - 'HomeCurrent_Date' Cross-Site Scripting. Author: Usman Saeed
Analyze the security implications of: ZYXEL P-660R-T1 V2 - 'HomeCurrent_Date' Cross-Site Scripting
This exploit targets multiple systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Sun Java Web Start 1.0/1.2 - Remote Command Execution
This is a remote exploit for multiple platform. Description: Sun Java Web Start 1.0/1.2 - Remote Command Execution. Author: Varun Srivastava
Analyze the security implications of: Sun Java Web Start 1.0/1.2 - Remote Command Execution
This exploit targets multiple systems. Type: remote. Risk level: High