input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Netbilling NBMEMBER Script - Information Disclosure
|
This is a webapps exploit for cgi platform. Description: Netbilling NBMEMBER Script - Information Disclosure. Author: ls
|
Analyze the security implications of: Netbilling NBMEMBER Script - Information Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: ATutor 2.1 - 'tool_file' Local File Inclusion
|
This is a webapps exploit for php platform. Description: ATutor 2.1 - 'tool_file' Local File Inclusion. Author: Julian Horoszkiewicz
|
Analyze the security implications of: ATutor 2.1 - 'tool_file' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP 5.4.3 - wddx_serialize_* / stream_bucket_* Variant Object Null Ptr Dereference
|
This is a dos exploit for php platform. Description: PHP 5.4.3 - wddx_serialize_* / stream_bucket_* Variant Object Null Ptr Dereference. Author: condis
|
Analyze the security implications of: PHP 5.4.3 - wddx_serialize_* / stream_bucket_* Variant Object Null Ptr Dereference
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AIX 4.3.3/5.x - Getlvcb Command Line Argument Buffer Overflow (2)
|
This is a local exploit for aix platform. Description: AIX 4.3.3/5.x - Getlvcb Command Line Argument Buffer Overflow (2). Author: mattox
|
Analyze the security implications of: AIX 4.3.3/5.x - Getlvcb Command Line Argument Buffer Overflow (2)
|
This exploit targets aix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: Arris Router Firmware 9.1.103 - Remote Code Execution (RCE) (Authenticated)
|
This is a remote exploit for hardware platform. Description: Arris Router Firmware 9.1.103 - Remote Code Execution (RCE) (Authenticated). Author: Yerodin Richards
|
Analyze the security implications of: Arris Router Firmware 9.1.103 - Remote Code Execution (RCE) (Authenticated)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Apache Struts 2 - Namespace Redirect OGNL Injection (Metasploit)
|
This is a remote exploit for multiple platform. Description: Apache Struts 2 - Namespace Redirect OGNL Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: Apache Struts 2 - Namespace Redirect OGNL Injection (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Oracle Weblogic Server - 'AsyncResponseService' Deserialization Remote Code Execution (Metasploit)
|
This is a remote exploit for multiple platform. Description: Oracle Weblogic Server - 'AsyncResponseService' Deserialization Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Oracle Weblogic Server - 'AsyncResponseService' Deserialization Remote Code Execution (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Karotz Smart Rabbit 12.07.19.00 - Multiple Vulnerabilities
|
This is a local exploit for hardware platform. Description: Karotz Smart Rabbit 12.07.19.00 - Multiple Vulnerabilities. Author: Trustwave's SpiderLabs
|
Analyze the security implications of: Karotz Smart Rabbit 12.07.19.00 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: GLPI 0.83.9 - 'Unserialize()' Remote Code Execution
|
This is a webapps exploit for php platform. Description: GLPI 0.83.9 - 'Unserialize()' Remote Code Execution. Author: Xavier Mehrenberger
|
Analyze the security implications of: GLPI 0.83.9 - 'Unserialize()' Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: pfSense - 'interfaces.php?if' Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: pfSense - 'interfaces.php?if' Cross-Site Scripting. Author: dave b
|
Analyze the security implications of: pfSense - 'interfaces.php?if' Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Oracle VM VirtualBox - Cooperating VMs can Escape from Shared Folder
|
This is a local exploit for linux platform. Description: Oracle VM VirtualBox - Cooperating VMs can Escape from Shared Folder. Author: Google Security Research
|
Analyze the security implications of: Oracle VM VirtualBox - Cooperating VMs can Escape from Shared Folder
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Linux 4.8.0 < 4.8.0-46 - AF_PACKET packet_set_ring Privilege Escalation (Metasploit)
|
This is a local exploit for linux platform. Description: Linux 4.8.0 < 4.8.0-46 - AF_PACKET packet_set_ring Privilege Escalation (Metasploit). Author: Metasploit
|
Analyze the security implications of: Linux 4.8.0 < 4.8.0-46 - AF_PACKET packet_set_ring Privilege Escalation (Metasploit)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: dSMTP Mail Server 3.1b (Linux) - Format String
|
This is a remote exploit for linux platform. Description: dSMTP Mail Server 3.1b (Linux) - Format String. Author: cybertronic
|
Analyze the security implications of: dSMTP Mail Server 3.1b (Linux) - Format String
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: My File Explorer 1.3.1 iOS - Multiple Web Vulnerabilities
|
This is a webapps exploit for ios platform. Description: My File Explorer 1.3.1 iOS - Multiple Web Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: My File Explorer 1.3.1 iOS - Multiple Web Vulnerabilities
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Clicker CMS - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Clicker CMS - Blind SQL Injection. Author: hacker@sr.gov.yu
|
Analyze the security implications of: Clicker CMS - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JUX Real Estate 3.4.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: JUX Real Estate 3.4.0 - SQL Injection. Author: CraCkEr
|
Analyze the security implications of: JUX Real Estate 3.4.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bus Pass Management System 1.0 - 'viewid' Insecure direct object references (IDOR)
|
This is a webapps exploit for php platform. Description: Bus Pass Management System 1.0 - 'viewid' Insecure direct object references (IDOR). Author: sudoninja
|
Analyze the security implications of: Bus Pass Management System 1.0 - 'viewid' Insecure direct object references (IDOR)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mozilla 1.x / Opera 7.0 - LiveConnect JavaScript Denial of Service
|
This is a dos exploit for multiple platform. Description: Mozilla 1.x / Opera 7.0 - LiveConnect JavaScript Denial of Service. Author: Marc Schoenefeld
|
Analyze the security implications of: Mozilla 1.x / Opera 7.0 - LiveConnect JavaScript Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CitrusDB 2.4.1 - Local File Inclusion / SQL Injection
|
This is a webapps exploit for php platform. Description: CitrusDB 2.4.1 - Local File Inclusion / SQL Injection. Author: wacky
|
Analyze the security implications of: CitrusDB 2.4.1 - Local File Inclusion / SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gallery 1.3.x/1.4 - Remote Global Variable Injection
|
This is a webapps exploit for php platform. Description: Gallery 1.3.x/1.4 - Remote Global Variable Injection. Author: Bharat Mediratta
|
Analyze the security implications of: Gallery 1.3.x/1.4 - Remote Global Variable Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Foscam < 11.37.2.49 - Directory Traversal
|
This is a remote exploit for hardware platform. Description: Foscam < 11.37.2.49 - Directory Traversal. Author: Frederic Basse
|
Analyze the security implications of: Foscam < 11.37.2.49 - Directory Traversal
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: PHP Topsites < 2.2 - Multiple Vulnerabilities
|
This is a webapps exploit for multiple platform. Description: PHP Topsites < 2.2 - Multiple Vulnerabilities. Author: GulfTech Security
|
Analyze the security implications of: PHP Topsites < 2.2 - Multiple Vulnerabilities
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: KMail 1.x - GnuPG Arbitrary Content Injection
|
This is a remote exploit for linux platform. Description: KMail 1.x - GnuPG Arbitrary Content Injection. Author: Gerardo Richarte
|
Analyze the security implications of: KMail 1.x - GnuPG Arbitrary Content Injection
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: OpenSSH < 6.6 SFTP (x64) - Command Execution
|
This is a remote exploit for linux_x86-64 platform. Description: OpenSSH < 6.6 SFTP (x64) - Command Execution. Author: Jann Horn
|
Analyze the security implications of: OpenSSH < 6.6 SFTP (x64) - Command Execution
|
This exploit targets linux_x86-64 systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux_x86-64 platform
|
What is this exploit about: dump 0.4b15 - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: dump 0.4b15 - Local Privilege Escalation. Author: mat
|
Analyze the security implications of: dump 0.4b15 - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: EggBlog 4.1.1 - Local Directory Traversal
|
This is a webapps exploit for php platform. Description: EggBlog 4.1.1 - Local Directory Traversal. Author: StAkeR
|
Analyze the security implications of: EggBlog 4.1.1 - Local Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple macOS - '32-bit syscall exit' Kernel Register Leak
|
This is a dos exploit for macos platform. Description: Apple macOS - '32-bit syscall exit' Kernel Register Leak. Author: Google Security Research
|
Analyze the security implications of: Apple macOS - '32-bit syscall exit' Kernel Register Leak
|
This exploit targets macos systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: Sipwise C5 NGCP CSC - Click2Dial Cross-Site Request Forgery (CSRF)
|
This is a webapps exploit for hardware platform. Description: Sipwise C5 NGCP CSC - Click2Dial Cross-Site Request Forgery (CSRF). Author: LiquidWorm
|
Analyze the security implications of: Sipwise C5 NGCP CSC - Click2Dial Cross-Site Request Forgery (CSRF)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: PHP 5.3.5 libzip 0.9.3 - _zip_name_locate Null Pointer Dereference
|
This is a dos exploit for linux platform. Description: PHP 5.3.5 libzip 0.9.3 - _zip_name_locate Null Pointer Dereference. Author: Maksymilian Arciemowicz
|
Analyze the security implications of: PHP 5.3.5 libzip 0.9.3 - _zip_name_locate Null Pointer Dereference
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Libstats 1.0.3 - 'template_csv.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Libstats 1.0.3 - 'template_csv.php' Remote File Inclusion. Author: Mehmet Ince
|
Analyze the security implications of: Libstats 1.0.3 - 'template_csv.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: dsock 1.3 - 'buf' Remote Buffer Overflow (PoC)
|
This is a dos exploit for multiple platform. Description: dsock 1.3 - 'buf' Remote Buffer Overflow (PoC). Author: DaveK
|
Analyze the security implications of: dsock 1.3 - 'buf' Remote Buffer Overflow (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Mozilla Firefox 3.0 - '.JPEG' File Denial of Service
|
This is a dos exploit for linux platform. Description: Mozilla Firefox 3.0 - '.JPEG' File Denial of Service. Author: Beenu Arora
|
Analyze the security implications of: Mozilla Firefox 3.0 - '.JPEG' File Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apple macOS < 10.14.5 / iOS < 12.3 JavaScriptCore - Loop-Invariant Code Motion (LICM) in DFG JIT Leaves Stack Variable Uninitialized
|
This is a dos exploit for multiple platform. Description: Apple macOS < 10.14.5 / iOS < 12.3 JavaScriptCore - Loop-Invariant Code Motion (LICM) in DFG JIT Leaves Stack Variable Uninitialized. Author: Google Security Research
|
Analyze the security implications of: Apple macOS < 10.14.5 / iOS < 12.3 JavaScriptCore - Loop-Invariant Code Motion (LICM) in DFG JIT Leaves Stack Variable Uninitialized
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.