input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Gemtek CPE7000 - WLTCS-106 Administrator SID Retriever (Metasploit)
|
This is a webapps exploit for hardware platform. Description: Gemtek CPE7000 - WLTCS-106 Administrator SID Retriever (Metasploit). Author: Federico Scalco
|
Analyze the security implications of: Gemtek CPE7000 - WLTCS-106 Administrator SID Retriever (Metasploit)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: DCForum 1-6 - Arbitrary File Disclosure
|
This is a remote exploit for cgi platform. Description: DCForum 1-6 - Arbitrary File Disclosure. Author: steeLe
|
Analyze the security implications of: DCForum 1-6 - Arbitrary File Disclosure
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: SuSE Linux Professional 8.2 - SuSEWM Configuration File Insecure Temporary File
|
This is a local exploit for linux platform. Description: SuSE Linux Professional 8.2 - SuSEWM Configuration File Insecure Temporary File. Author: Nash Leon
|
Analyze the security implications of: SuSE Linux Professional 8.2 - SuSEWM Configuration File Insecure Temporary File
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ProficySCADA for iOS 5.0.25920 - 'Password' Denial of Service (PoC)
|
This is a dos exploit for ios platform. Description: ProficySCADA for iOS 5.0.25920 - 'Password' Denial of Service (PoC). Author: Ivan Marmolejo
|
Analyze the security implications of: ProficySCADA for iOS 5.0.25920 - 'Password' Denial of Service (PoC)
|
This exploit targets ios systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Joomla! Component com_nfnaddressbook - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_nfnaddressbook - SQL Injection. Author: snakespc
|
Analyze the security implications of: Joomla! Component com_nfnaddressbook - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: e-webtech - 'fixed_page.asp' SQL Injection
|
This is a webapps exploit for php platform. Description: e-webtech - 'fixed_page.asp' SQL Injection. Author: FL0RiX
|
Analyze the security implications of: e-webtech - 'fixed_page.asp' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alienvault Open Source SIEM (OSSIM) 3.1 - Reflected Cross-Site Scripting / Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Alienvault Open Source SIEM (OSSIM) 3.1 - Reflected Cross-Site Scripting / Blind SQL Injection. Author: muts
|
Analyze the security implications of: Alienvault Open Source SIEM (OSSIM) 3.1 - Reflected Cross-Site Scripting / Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CSSTidy 1.3 - 'css_optimiser.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: CSSTidy 1.3 - 'css_optimiser.php' Cross-Site Scripting. Author: John Leitch
|
Analyze the security implications of: CSSTidy 1.3 - 'css_optimiser.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IPSwitch IMail Server 8.15 - IMAPD Remote Code Execution
|
This is a remote exploit for linux platform. Description: IPSwitch IMail Server 8.15 - IMAPD Remote Code Execution. Author: kingcope
|
Analyze the security implications of: IPSwitch IMail Server 8.15 - IMAPD Remote Code Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: MyDesing Sayac 2.0 - Authentication Bypass
|
This is a webapps exploit for asp platform. Description: MyDesing Sayac 2.0 - Authentication Bypass. Author: Kacak
|
Analyze the security implications of: MyDesing Sayac 2.0 - Authentication Bypass
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: WordPress Plugin Polls 1.2.4 - SQL Injection (PoC)
|
This is a remote exploit for php platform. Description: WordPress Plugin Polls 1.2.4 - SQL Injection (PoC). Author: Manish Tanwar
|
Analyze the security implications of: WordPress Plugin Polls 1.2.4 - SQL Injection (PoC)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CRS Manager - Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: CRS Manager - Multiple Remote File Inclusions. Author: iNs
|
Analyze the security implications of: CRS Manager - Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alkacon OpenCMS 7.0.3 - 'logfileViewSettings.jsp?filePath' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Alkacon OpenCMS 7.0.3 - 'logfileViewSettings.jsp?filePath' Cross-Site Scripting. Author: nnposter
|
Analyze the security implications of: Alkacon OpenCMS 7.0.3 - 'logfileViewSettings.jsp?filePath' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Microsoft IIS 4.0 - UNC Mapped Virtual Host
|
This is a remote exploit for multiple platform. Description: Microsoft IIS 4.0 - UNC Mapped Virtual Host. Author: Adam Coyne
|
Analyze the security implications of: Microsoft IIS 4.0 - UNC Mapped Virtual Host
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Free FAQ 1.0 - 'index.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Free FAQ 1.0 - 'index.php' Remote File Inclusion. Author: Alireza Ahari
|
Analyze the security implications of: Free FAQ 1.0 - 'index.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GitStack - Remote Code Execution
|
This is a webapps exploit for php platform. Description: GitStack - Remote Code Execution. Author: SecuriTeam
|
Analyze the security implications of: GitStack - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Java - Debug Wire Protocol Remote Code Execution (Metasploit)
|
This is a remote exploit for multiple platform. Description: Java - Debug Wire Protocol Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Java - Debug Wire Protocol Remote Code Execution (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Mozilla Firefox 3.0.9 - 'nsTextFrame::ClearTextRun()' Remote Memory Corruption
|
This is a dos exploit for linux platform. Description: Mozilla Firefox 3.0.9 - 'nsTextFrame::ClearTextRun()' Remote Memory Corruption. Author: Marc Gueury
|
Analyze the security implications of: Mozilla Firefox 3.0.9 - 'nsTextFrame::ClearTextRun()' Remote Memory Corruption
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: iPlanet Messaging Server - Messenger Express Expression() HTML Injection
|
This is a webapps exploit for php platform. Description: iPlanet Messaging Server - Messenger Express Expression() HTML Injection. Author: LegendaryZion
|
Analyze the security implications of: iPlanet Messaging Server - Messenger Express Expression() HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Xmail 0.5/0.6 CTRLServer - Arbitrary Commands
|
This is a remote exploit for linux platform. Description: Xmail 0.5/0.6 CTRLServer - Arbitrary Commands. Author: isno
|
Analyze the security implications of: Xmail 0.5/0.6 CTRLServer - Arbitrary Commands
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Barracuda Spam Firewall 3.3.03.053 - Remote Code Execution (1)
|
This is a remote exploit for hardware platform. Description: Barracuda Spam Firewall 3.3.03.053 - Remote Code Execution (1). Author: Greg Sinclair
|
Analyze the security implications of: Barracuda Spam Firewall 3.3.03.053 - Remote Code Execution (1)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: BoutikOne - 'rss_promo.php?lang' SQL Injection
|
This is a webapps exploit for php platform. Description: BoutikOne - 'rss_promo.php?lang' SQL Injection. Author: cdx.security
|
Analyze the security implications of: BoutikOne - 'rss_promo.php?lang' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BlueShoes Framework 4.6 - 'GoogleSearch.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: BlueShoes Framework 4.6 - 'GoogleSearch.php' Remote File Inclusion. Author: k1tk4t
|
Analyze the security implications of: BlueShoes Framework 4.6 - 'GoogleSearch.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Minify4Joomla! - Arbitrary File Upload / Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Joomla! Component Minify4Joomla! - Arbitrary File Upload / Persistent Cross-Site Scripting. Author: Sid3^effects
|
Analyze the security implications of: Joomla! Component Minify4Joomla! - Arbitrary File Upload / Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle Weblogic Server Deserialization RCE - Raw Object (Metasploit)
|
This is a remote exploit for multiple platform. Description: Oracle Weblogic Server Deserialization RCE - Raw Object (Metasploit). Author: Metasploit
|
Analyze the security implications of: Oracle Weblogic Server Deserialization RCE - Raw Object (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Vesta Control Panel 0.9.8-16 - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Vesta Control Panel 0.9.8-16 - Local Privilege Escalation. Author: Jaka Hudoklin
|
Analyze the security implications of: Vesta Control Panel 0.9.8-16 - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AVE DOMINAplus 1.10.x - Credential Disclosure
|
This is a webapps exploit for hardware platform. Description: AVE DOMINAplus 1.10.x - Credential Disclosure. Author: LiquidWorm
|
Analyze the security implications of: AVE DOMINAplus 1.10.x - Credential Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Bitweaver 1.x - '/wiki/list_pages.php?sort_mode' SQL Injection
|
This is a webapps exploit for php platform. Description: Bitweaver 1.x - '/wiki/list_pages.php?sort_mode' SQL Injection. Author: laurent gaffie
|
Analyze the security implications of: Bitweaver 1.x - '/wiki/list_pages.php?sort_mode' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Invision Power Services Invision Gallery 1.0.1 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Invision Power Services Invision Gallery 1.0.1 - Multiple SQL Injections. Author: JeiAr
|
Analyze the security implications of: Invision Power Services Invision Gallery 1.0.1 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AjaXplorer - 'checkInstall.php' Remote Command Execution (Metasploit)
|
This is a remote exploit for php platform. Description: AjaXplorer - 'checkInstall.php' Remote Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: AjaXplorer - 'checkInstall.php' Remote Command Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Google Chrome 67_ 68 and 69 - Object.create Type Confusion (Metasploit)
|
This is a remote exploit for multiple platform. Description: Google Chrome 67_ 68 and 69 - Object.create Type Confusion (Metasploit). Author: Metasploit
|
Analyze the security implications of: Google Chrome 67_ 68 and 69 - Object.create Type Confusion (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_remository - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Joomla! Component com_remository - Arbitrary File Upload. Author: J3yk0ob
|
Analyze the security implications of: Joomla! Component com_remository - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SuSE Linux 6.1/6.2 - 'cwdtools' Local Overflow / Local Privilege Escalation
|
This is a local exploit for linux platform. Description: SuSE Linux 6.1/6.2 - 'cwdtools' Local Overflow / Local Privilege Escalation. Author: Brock Tellier
|
Analyze the security implications of: SuSE Linux 6.1/6.2 - 'cwdtools' Local Overflow / Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.