input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: PHP 5.5.37/5.6.23/7.0.8 - 'bzread()' Out-of-Bounds Write | This is a dos exploit for php platform. Description: PHP 5.5.37/5.6.23/7.0.8 - 'bzread()' Out-of-Bounds Write. Author: Hans Jerry Illikainen |
Analyze the security implications of: PHP 5.5.37/5.6.23/7.0.8 - 'bzread()' Out-of-Bounds Write | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 3Com SuperStack II RAS 1500 - Unauthorized Access | This is a remote exploit for hardware platform. Description: 3Com SuperStack II RAS 1500 - Unauthorized Access. Author: Piotr Chytla |
Analyze the security implications of: 3Com SuperStack II RAS 1500 - Unauthorized Access | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Duplicate-Post 3.2.3 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Duplicate-Post 3.2.3 - Persistent Cross-Site Scripting. Author: Unk9vvN |
Analyze the security implications of: Duplicate-Post 3.2.3 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Aqar Script 1.0 - Remote Bypass | This is a webapps exploit for php platform. Description: Aqar Script 1.0 - Remote Bypass. Author: indoushka |
Analyze the security implications of: Aqar Script 1.0 - Remote Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Elastix 2.x - Blind SQL Injection | This is a webapps exploit for php platform. Description: Elastix 2.x - Blind SQL Injection. Author: Ahmed Aboul-Ela |
Analyze the security implications of: Elastix 2.x - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Beehive Forum 1.4.4 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Beehive Forum 1.4.4 - Persistent Cross-Site Scripting. Author: Halil Dalabasmaz |
Analyze the security implications of: Beehive Forum 1.4.4 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Servisnet Tessa - MQTT Credentials Dump (Unauthenticated) (Metasploit) | This is a webapps exploit for multiple platform. Description: Servisnet Tessa - MQTT Credentials Dump (Unauthenticated) (Metasploit). Author: AkkuS |
Analyze the security implications of: Servisnet Tessa - MQTT Credentials Dump (Unauthenticated) (Metasploit) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_category - 'catid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_category - 'catid' SQL Injection. Author: Prince_Pwn3r |
Analyze the security implications of: Joomla! Component com_category - 'catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenBSD 3.x - PF RDR Network Information Leakage | This is a remote exploit for openbsd platform. Description: OpenBSD 3.x - PF RDR Network Information Leakage. Author: Ed3f |
Analyze the security implications of: OpenBSD 3.x - PF RDR Network Information Leakage | This exploit targets openbsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets openbsd platform |
What is this exploit about: ASMAX AR 804 gu Web Management Console - Arbitrary Command Execution | This is a remote exploit for hardware platform. Description: ASMAX AR 804 gu Web Management Console - Arbitrary Command Execution. Author: Securitum |
Analyze the security implications of: ASMAX AR 804 gu Web Management Console - Arbitrary Command Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ESTsoft InternetDisk - Arbitrary File Upload / Script Execution | This is a webapps exploit for php platform. Description: ESTsoft InternetDisk - Arbitrary File Upload / Script Execution. Author: Kil13r |
Analyze the security implications of: ESTsoft InternetDisk - Arbitrary File Upload / Script Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10.6 - HFS FileSystem (Denial of Service) | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.6 - HFS FileSystem (Denial of Service). Author: Maksymilian Arciemowicz |
Analyze the security implications of: Apple Mac OSX 10.6 - HFS FileSystem (Denial of Service) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Gentoo Webapp-Config 1.10 - Insecure File Creation | This is a local exploit for linux platform. Description: Gentoo Webapp-Config 1.10 - Insecure File Creation. Author: Eric Romang |
Analyze the security implications of: Gentoo Webapp-Config 1.10 - Insecure File Creation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PhotoSync Wifi & Bluetooth 1.0 - Local File Inclusion | This is a webapps exploit for ios platform. Description: PhotoSync Wifi & Bluetooth 1.0 - Local File Inclusion. Author: Vulnerability-Lab |
Analyze the security implications of: PhotoSync Wifi & Bluetooth 1.0 - Local File Inclusion | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Claroline 1.x - '/inc/lib/language.lib.php?language' Traversal Local File Inclusion | This is a webapps exploit for php platform. Description: Claroline 1.x - '/inc/lib/language.lib.php?language' Traversal Local File Inclusion. Author: Fernando Munoz |
Analyze the security implications of: Claroline 1.x - '/inc/lib/language.lib.php?language' Traversal Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Netgear DGN1000 / DGN2200 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Netgear DGN1000 / DGN2200 - Multiple Vulnerabilities. Author: Roberto Paleari |
Analyze the security implications of: Netgear DGN1000 / DGN2200 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Desktop Central 9.1.0 - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: Desktop Central 9.1.0 - Multiple Vulnerabilities. Author: Rafael Pedrero |
Analyze the security implications of: Desktop Central 9.1.0 - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Pngren 2.0.1 - 'Kaiseki.cgi' Remote Command Execution | This is a webapps exploit for cgi platform. Description: Pngren 2.0.1 - 'Kaiseki.cgi' Remote Command Execution. Author: blahplok |
Analyze the security implications of: Pngren 2.0.1 - 'Kaiseki.cgi' Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: DedeCMS 7.5 SP2 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: DedeCMS 7.5 SP2 - Persistent Cross-Site Scripting. Author: Vulnerability Research Laboratory |
Analyze the security implications of: DedeCMS 7.5 SP2 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Network Manager VPNC 1.2.6 - 'Username' Local Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: Network Manager VPNC 1.2.6 - 'Username' Local Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Network Manager VPNC 1.2.6 - 'Username' Local Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ITechBids 6.0 - 'item_id' SQL Injection | This is a webapps exploit for php platform. Description: ITechBids 6.0 - 'item_id' SQL Injection. Author: SoSo H H |
Analyze the security implications of: ITechBids 6.0 - 'item_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.0 Sendmail - Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.0 Sendmail - Denial of Service. Author: Michal Zalewski |
Analyze the security implications of: Linux Kernel 2.0 Sendmail - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FS Indiamart Clone - 'keywords' SQL Injection | This is a webapps exploit for php platform. Description: FS Indiamart Clone - 'keywords' SQL Injection. Author: 8bitsec |
Analyze the security implications of: FS Indiamart Clone - 'keywords' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CF Image Hosting Script 1.3 - 'settings.cdb' Information Disclosure | This is a webapps exploit for php platform. Description: CF Image Hosting Script 1.3 - 'settings.cdb' Information Disclosure. Author: Dr.$audi |
Analyze the security implications of: CF Image Hosting Script 1.3 - 'settings.cdb' Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Connect Daily 3.2.8/3.2.9 - 'ViewYear.html' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Connect Daily 3.2.8/3.2.9 - 'ViewYear.html' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t |
Analyze the security implications of: Connect Daily 3.2.8/3.2.9 - 'ViewYear.html' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: McAfee Email Gateway (formerly IronMail) - Local Privilege Escalation | This is a local exploit for freebsd platform. Description: McAfee Email Gateway (formerly IronMail) - Local Privilege Escalation. Author: Nahuel Grisolia |
Analyze the security implications of: McAfee Email Gateway (formerly IronMail) - Local Privilege Escalation | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Barracuda IMFirewall 620 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Barracuda IMFirewall 620 - Multiple Vulnerabilities. Author: Global-Evolution |
Analyze the security implications of: Barracuda IMFirewall 620 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Itech Job Portal Script 9.13 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Itech Job Portal Script 9.13 - Multiple Vulnerabilities. Author: Th3GundY |
Analyze the security implications of: Itech Job Portal Script 9.13 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: fipsForum 2.6 - Remote Database Disclosure | This is a webapps exploit for asp platform. Description: fipsForum 2.6 - Remote Database Disclosure. Author: ViRuSMaN |
Analyze the security implications of: fipsForum 2.6 - Remote Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Barracuda CudaTel - Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for hardware platform. Description: Barracuda CudaTel - Multiple Cross-Site Scripting Vulnerabilities. Author: Benjamin Kunz Mejri |
Analyze the security implications of: Barracuda CudaTel - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AM4SS 1.2 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: AM4SS 1.2 - Cross-Site Request Forgery (Add Admin). Author: red virus |
Analyze the security implications of: AM4SS 1.2 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EDUMOD Pro 1.3 - SQL Injection | This is a webapps exploit for php platform. Description: EDUMOD Pro 1.3 - SQL Injection. Author: Kaan KAMIS |
Analyze the security implications of: EDUMOD Pro 1.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.2.3 - EXT/Session HTTP Response Header Injection | This is a remote exploit for php platform. Description: PHP 5.2.3 - EXT/Session HTTP Response Header Injection. Author: Stefan Esser |
Analyze the security implications of: PHP 5.2.3 - EXT/Session HTTP Response Header Injection | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.