input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: TP-Link TL-WR740N - UnAuthenticated Directory Transversal | This is a webapps exploit for hardware platform. Description: TP-Link TL-WR740N - UnAuthenticated Directory Transversal. Author: Syed Affan Ahmed (ZEROXINN) |
Analyze the security implications of: TP-Link TL-WR740N - UnAuthenticated Directory Transversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: NitroView ESM - 'ess.pm' Remote Command Execution | This is a remote exploit for linux platform. Description: NitroView ESM - 'ess.pm' Remote Command Execution. Author: s_n |
Analyze the security implications of: NitroView ESM - 'ess.pm' Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: MGinternet Property Site Manager - 'admin_login.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: MGinternet Property Site Manager - 'admin_login.asp' Multiple SQL Injections. Author: laurent gaffie |
Analyze the security implications of: MGinternet Property Site Manager - 'admin_login.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Alstrasoft Video Share Enterprise 4.72 - SQL Injection | This is a webapps exploit for php platform. Description: Alstrasoft Video Share Enterprise 4.72 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Alstrasoft Video Share Enterprise 4.72 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: id Software Solaris Quake II 3.13/3.14 / QuakeWorld 2.0/2.1 / Quake 1.9/3.13/3.14 - Command Execution | This is a remote exploit for linux platform. Description: id Software Solaris Quake II 3.13/3.14 / QuakeWorld 2.0/2.1 / Quake 1.9/3.13/3.14 - Command Execution. Author: Mark Zielinski |
Analyze the security implications of: id Software Solaris Quake II 3.13/3.14 / QuakeWorld 2.0/2.1 / Quake 1.9/3.13/3.14 - Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DbbS 2.0 - 'Topics.php' SQL Injection | This is a webapps exploit for php platform. Description: DbbS 2.0 - 'Topics.php' SQL Injection. Author: DaBDouB-MoSiKaR |
Analyze the security implications of: DbbS 2.0 - 'Topics.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.13 < 2.6.17.4 - 'sys_prctl()' Local Privilege Escalation (1) | This is a local exploit for linux platform. Description: Linux Kernel 2.6.13 < 2.6.17.4 - 'sys_prctl()' Local Privilege Escalation (1). Author: dreyer & RoMaNSoFt |
Analyze the security implications of: Linux Kernel 2.6.13 < 2.6.17.4 - 'sys_prctl()' Local Privilege Escalation (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_linkr - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_linkr - Local File Inclusion. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Joomla! Component com_linkr - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10.4.x Kernel - 'shared_region_map_file_np()' Memory Corruption | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.4.x Kernel - 'shared_region_map_file_np()' Memory Corruption. Author: Adriano Lima |
Analyze the security implications of: Apple Mac OSX 10.4.x Kernel - 'shared_region_map_file_np()' Memory Corruption | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: GL-AR300M-Lite 2.27 - (Authenticated) Command Injection / Arbitrary File Download / Directory Traversal | This is a webapps exploit for hardware platform. Description: GL-AR300M-Lite 2.27 - (Authenticated) Command Injection / Arbitrary File Download / Directory Traversal. Author: Pasquale Turi |
Analyze the security implications of: GL-AR300M-Lite 2.27 - (Authenticated) Command Injection / Arbitrary File Download / Directory Traversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Concrete CMS < 5.5.21 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Concrete CMS < 5.5.21 - Multiple Vulnerabilities. Author: AkaStep |
Analyze the security implications of: Concrete CMS < 5.5.21 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LightDM 1.0.6 - Arbitrary File Deletion | This is a local exploit for linux platform. Description: LightDM 1.0.6 - Arbitrary File Deletion. Author: Ryan Lortie |
Analyze the security implications of: LightDM 1.0.6 - Arbitrary File Deletion | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: fipsForum 2.6 - 'default2.asp' SQL Injection | This is a webapps exploit for asp platform. Description: fipsForum 2.6 - 'default2.asp' SQL Injection. Author: ajann |
Analyze the security implications of: fipsForum 2.6 - 'default2.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Exponent CMS 2.6 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Exponent CMS 2.6 - Multiple Vulnerabilities. Author: heinjame |
Analyze the security implications of: Exponent CMS 2.6 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Samsung Devices KNOX Extensions - OTP TrustZone Trustlet Stack Buffer Overflow | This is a dos exploit for android platform. Description: Samsung Devices KNOX Extensions - OTP TrustZone Trustlet Stack Buffer Overflow. Author: Google Security Research |
Analyze the security implications of: Samsung Devices KNOX Extensions - OTP TrustZone Trustlet Stack Buffer Overflow | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: CNC Technology BizDB 1.0 - 'bizdb-search.cgi' Remote Command Execution | This is a remote exploit for cgi platform. Description: CNC Technology BizDB 1.0 - 'bizdb-search.cgi' Remote Command Execution. Author: PErfecto Technology |
Analyze the security implications of: CNC Technology BizDB 1.0 - 'bizdb-search.cgi' Remote Command Execution | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Etano 1.20/1.22 - 'photo_view.php?return' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Etano 1.20/1.22 - 'photo_view.php?return' Cross-Site Scripting. Author: Aung Khant |
Analyze the security implications of: Etano 1.20/1.22 - 'photo_view.php?return' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: pfSense 2.4.4-P3 - 'User Manager' Persistent Cross-Site Scripting | This is a webapps exploit for freebsd platform. Description: pfSense 2.4.4-P3 - 'User Manager' Persistent Cross-Site Scripting. Author: Matthew Aberegg |
Analyze the security implications of: pfSense 2.4.4-P3 - 'User Manager' Persistent Cross-Site Scripting | This exploit targets freebsd systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: AirMore 1.6.1 - Denial of Service (PoC) | This is a dos exploit for android platform. Description: AirMore 1.6.1 - Denial of Service (PoC). Author: s4vitar |
Analyze the security implications of: AirMore 1.6.1 - Denial of Service (PoC) | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Magic Uploader Mini - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Magic Uploader Mini - Arbitrary File Upload. Author: indoushka |
Analyze the security implications of: Magic Uploader Mini - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bus Pass Management System 1.0 - 'adminname' Stored Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Bus Pass Management System 1.0 - 'adminname' Stored Cross-Site Scripting (XSS). Author: Emre Aslan |
Analyze the security implications of: Bus Pass Management System 1.0 - 'adminname' Stored Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_d-greinar - 'maintree' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component com_d-greinar - 'maintree' Cross-Site Scripting. Author: DevilZ TM |
Analyze the security implications of: Joomla! Component com_d-greinar - 'maintree' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SIDVault LDAP Server - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: SIDVault LDAP Server - Remote Buffer Overflow. Author: Joxean Koret |
Analyze the security implications of: SIDVault LDAP Server - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache Struts 2 - Namespace Redirect OGNL Injection (Metasploit) | This is a remote exploit for multiple platform. Description: Apache Struts 2 - Namespace Redirect OGNL Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Apache Struts 2 - Namespace Redirect OGNL Injection (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Kolifa.net Download Script 1.2 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Kolifa.net Download Script 1.2 - 'id' SQL Injection. Author: Kacak |
Analyze the security implications of: Kolifa.net Download Script 1.2 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jojo CMS - 'search' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Jojo CMS - 'search' Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: Jojo CMS - 'search' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 4.8.0-41-generic (Ubuntu) - Packet Socket Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel 4.8.0-41-generic (Ubuntu) - Packet Socket Local Privilege Escalation. Author: Andrey Konovalov |
Analyze the security implications of: Linux Kernel 4.8.0-41-generic (Ubuntu) - Packet Socket Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux Kernel 2.2.18 (RedHat 6.2/7.0 / 2.2.14/2.2.18/2.2.18ow4) - ptrace/execve Race Condition Privilege Escalation (1) | This is a local exploit for linux platform. Description: Linux Kernel 2.2.18 (RedHat 6.2/7.0 / 2.2.14/2.2.18/2.2.18ow4) - ptrace/execve Race Condition Privilege Escalation (1). Author: Wojciech Purczynski |
Analyze the security implications of: Linux Kernel 2.2.18 (RedHat 6.2/7.0 / 2.2.14/2.2.18/2.2.18ow4) - ptrace/execve Race Condition Privilege Escalation (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: TOPSEC Firewalls - 'ELIGIBLECONTESTANT' Remote Code Execution | This is a webapps exploit for cgi platform. Description: TOPSEC Firewalls - 'ELIGIBLECONTESTANT' Remote Code Execution. Author: Shadow Brokers |
Analyze the security implications of: TOPSEC Firewalls - 'ELIGIBLECONTESTANT' Remote Code Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: PHP 4.x - 'socket_recvfrom()' Signed Integer Memory Corruption | This is a dos exploit for php platform. Description: PHP 4.x - 'socket_recvfrom()' Signed Integer Memory Corruption. Author: Sir Mordred |
Analyze the security implications of: PHP 4.x - 'socket_recvfrom()' Signed Integer Memory Corruption | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DLINK DCS-5020L - Remote Code Execution (PoC) | This is a webapps exploit for hardware platform. Description: DLINK DCS-5020L - Remote Code Execution (PoC). Author: Fidus InfoSecurity |
Analyze the security implications of: DLINK DCS-5020L - Remote Code Execution (PoC) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Hashicorp vagrant-vmware-fusion 5.0.3 - Local Privilege Escalation | This is a local exploit for macos platform. Description: Hashicorp vagrant-vmware-fusion 5.0.3 - Local Privilege Escalation. Author: Mark Wadham |
Analyze the security implications of: Hashicorp vagrant-vmware-fusion 5.0.3 - Local Privilege Escalation | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Kinsey Infor/Lawson / ESBUS - SQL Injection | This is a webapps exploit for jsp platform. Description: Kinsey Infor/Lawson / ESBUS - SQL Injection. Author: Michael Benich |
Analyze the security implications of: Kinsey Infor/Lawson / ESBUS - SQL Injection | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.