input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Java Applet - ProviderSkeleton Insecure Invoke Method (Metasploit)
|
This is a remote exploit for multiple platform. Description: Java Applet - ProviderSkeleton Insecure Invoke Method (Metasploit). Author: Metasploit
|
Analyze the security implications of: Java Applet - ProviderSkeleton Insecure Invoke Method (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: SGI IRIX - '/bin/login' Local Buffer Overflow
|
This is a local exploit for irix platform. Description: SGI IRIX - '/bin/login' Local Buffer Overflow. Author: David Hedley
|
Analyze the security implications of: SGI IRIX - '/bin/login' Local Buffer Overflow
|
This exploit targets irix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets irix platform
|
What is this exploit about: PoPToP < 1.1.3-b3/1.1.3-20030409 - Negative Read Overflow (Metasploit)
|
This is a remote exploit for linux platform. Description: PoPToP < 1.1.3-b3/1.1.3-20030409 - Negative Read Overflow (Metasploit). Author: spoonm
|
Analyze the security implications of: PoPToP < 1.1.3-b3/1.1.3-20030409 - Negative Read Overflow (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: VUNET Case Manager 3.4 - 'default.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: VUNET Case Manager 3.4 - 'default.asp' SQL Injection. Author: The-0utl4w
|
Analyze the security implications of: VUNET Case Manager 3.4 - 'default.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: gitWeb 1.7.3.3 - Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: gitWeb 1.7.3.3 - Cross-Site Scripting. Author: emgent
|
Analyze the security implications of: gitWeb 1.7.3.3 - Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Domain Shop - 'index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Domain Shop - 'index.php' Cross-Site Scripting. Author: Mr.PaPaRoSSe
|
Analyze the security implications of: Domain Shop - 'index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CPG Dragonfly CMS 9.3.3.0 - Multiple Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: CPG Dragonfly CMS 9.3.3.0 - Multiple Multiple Cross-Site Scripting Vulnerabilities. Author: Ariko-Security
|
Analyze the security implications of: CPG Dragonfly CMS 9.3.3.0 - Multiple Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sitebuilder 1.4 - 'sitebuilder.cgi' Directory Traversal
|
This is a webapps exploit for cgi platform. Description: Sitebuilder 1.4 - 'sitebuilder.cgi' Directory Traversal. Author: Zero X
|
Analyze the security implications of: Sitebuilder 1.4 - 'sitebuilder.cgi' Directory Traversal
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: MySQL 4.x - CREATE FUNCTION Arbitrary libc Code Execution
|
This is a remote exploit for multiple platform. Description: MySQL 4.x - CREATE FUNCTION Arbitrary libc Code Execution. Author: Stefano Di Paola
|
Analyze the security implications of: MySQL 4.x - CREATE FUNCTION Arbitrary libc Code Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Fortigate Firewall 2.x - listdel Admin Interface Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: Fortigate Firewall 2.x - listdel Admin Interface Cross-Site Scripting. Author: Maarten Hartsuijker
|
Analyze the security implications of: Fortigate Firewall 2.x - listdel Admin Interface Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: T-Dreams Job Seekers Package 3.0 - SQL Injection
|
This is a webapps exploit for asp platform. Description: T-Dreams Job Seekers Package 3.0 - SQL Injection. Author: R4dc0re
|
Analyze the security implications of: T-Dreams Job Seekers Package 3.0 - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Mandrake / Slackware /usr/bin/trn - Local Privilege Escalation (Not SUID)
|
This is a local exploit for linux platform. Description: Mandrake / Slackware /usr/bin/trn - Local Privilege Escalation (Not SUID). Author: ZzagorR
|
Analyze the security implications of: Mandrake / Slackware /usr/bin/trn - Local Privilege Escalation (Not SUID)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: GNU Zebra 0.9x / Quagga 0.96 - Remote Denial of Service
|
This is a dos exploit for linux platform. Description: GNU Zebra 0.9x / Quagga 0.96 - Remote Denial of Service. Author: Jonny Robertson
|
Analyze the security implications of: GNU Zebra 0.9x / Quagga 0.96 - Remote Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Covenant v0.5 - Remote Code Execution (RCE)
|
This is a webapps exploit for multiple platform. Description: Covenant v0.5 - Remote Code Execution (RCE). Author: xThaz
|
Analyze the security implications of: Covenant v0.5 - Remote Code Execution (RCE)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: WebKitGTK 2.23.90 / WebKitGTK+ 2.22.6 - Denial of Service
|
This is a dos exploit for linux platform. Description: WebKitGTK 2.23.90 / WebKitGTK+ 2.22.6 - Denial of Service. Author: Dhiraj Mishra
|
Analyze the security implications of: WebKitGTK 2.23.90 / WebKitGTK+ 2.22.6 - Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Pentaho 1.7.0.1062 - Cross-Site Scripting / Information Disclosure
|
This is a webapps exploit for jsp platform. Description: Pentaho 1.7.0.1062 - Cross-Site Scripting / Information Disclosure. Author: antisnatchor
|
Analyze the security implications of: Pentaho 1.7.0.1062 - Cross-Site Scripting / Information Disclosure
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: libquicktime 1.2.4 - Integer Overflow
|
This is a dos exploit for multiple platform. Description: libquicktime 1.2.4 - Integer Overflow. Author: Marco Romano
|
Analyze the security implications of: libquicktime 1.2.4 - Integer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: DirectAdmin 1.33.6 - 'CMD_REDIRECT' Cross-Site Scripting
|
This is a webapps exploit for java platform. Description: DirectAdmin 1.33.6 - 'CMD_REDIRECT' Cross-Site Scripting. Author: r0t
|
Analyze the security implications of: DirectAdmin 1.33.6 - 'CMD_REDIRECT' Cross-Site Scripting
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Bilboplanet - 'auth.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Bilboplanet - 'auth.php' SQL Injection. Author: Omar Kurt
|
Analyze the security implications of: Bilboplanet - 'auth.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Rapid Classified - 'AgencyCatResult.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: Rapid Classified - 'AgencyCatResult.asp' SQL Injection. Author: The-0utl4w
|
Analyze the security implications of: Rapid Classified - 'AgencyCatResult.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component JE Property Finder 1.6.3 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JE Property Finder 1.6.3 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component JE Property Finder 1.6.3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel < 4.4.0/ < 4.8.0 (Ubuntu 14.04/16.04 / Linux Mint 17/18 / Zorin) - Local Privilege Escalation (KASLR / SMEP)
|
This is a local exploit for linux platform. Description: Linux Kernel < 4.4.0/ < 4.8.0 (Ubuntu 14.04/16.04 / Linux Mint 17/18 / Zorin) - Local Privilege Escalation (KASLR / SMEP). Author: bcoles
|
Analyze the security implications of: Linux Kernel < 4.4.0/ < 4.8.0 (Ubuntu 14.04/16.04 / Linux Mint 17/18 / Zorin) - Local Privilege Escalation (KASLR / SMEP)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Intel Graphics Accelerator Driver - Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Intel Graphics Accelerator Driver - Remote Denial of Service. Author: Sumit Siddharth
|
Analyze the security implications of: Intel Graphics Accelerator Driver - Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_siirler 1.2 - 'sid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_siirler 1.2 - 'sid' SQL Injection. Author: v3n0m
|
Analyze the security implications of: Joomla! Component com_siirler 1.2 - 'sid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EZDatabaseRemote 2.0 - PHP Script Code Execution
|
This is a webapps exploit for php platform. Description: EZDatabaseRemote 2.0 - PHP Script Code Execution. Author: r0t3d3Vil
|
Analyze the security implications of: EZDatabaseRemote 2.0 - PHP Script Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Creato Script - SQL Injection
|
This is a webapps exploit for php platform. Description: Creato Script - SQL Injection. Author: Mr.P3rfekT
|
Analyze the security implications of: Creato Script - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AgileBill 1.4.92 - Product_Cat SQL Injection
|
This is a webapps exploit for php platform. Description: AgileBill 1.4.92 - Product_Cat SQL Injection. Author: r0t
|
Analyze the security implications of: AgileBill 1.4.92 - Product_Cat SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: gBook 1.4 - Administrative Access
|
This is a webapps exploit for php platform. Description: gBook 1.4 - Administrative Access. Author: frog
|
Analyze the security implications of: gBook 1.4 - Administrative Access
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Info Fisier 1.0 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Info Fisier 1.0 - Arbitrary File Upload. Author: wlhaan hacker
|
Analyze the security implications of: Info Fisier 1.0 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Electron WebPreferences - Remote Code Execution
|
This is a remote exploit for multiple platform. Description: Electron WebPreferences - Remote Code Execution. Author: Matt Austin
|
Analyze the security implications of: Electron WebPreferences - Remote Code Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Sun Java System Identity Manager 6.0/7.x - Multiple Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: Sun Java System Identity Manager 6.0/7.x - Multiple Vulnerabilities. Author: Richard Brain
|
Analyze the security implications of: Sun Java System Identity Manager 6.0/7.x - Multiple Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Mercantec SoftCart 4.00b - CGI Overflow (Metasploit)
|
This is a remote exploit for cgi platform. Description: Mercantec SoftCart 4.00b - CGI Overflow (Metasploit). Author: skape
|
Analyze the security implications of: Mercantec SoftCart 4.00b - CGI Overflow (Metasploit)
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: TP-Link TL-WR740N - Authenticated Directory Transversal
|
This is a webapps exploit for hardware platform. Description: TP-Link TL-WR740N - Authenticated Directory Transversal. Author: Anish Feroz
|
Analyze the security implications of: TP-Link TL-WR740N - Authenticated Directory Transversal
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.