input
stringlengths
39
228
output
stringlengths
32
324
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Clever Copy 3.0 - 'postview.php' SQL Injection
This is a webapps exploit for php platform. Description: Clever Copy 3.0 - 'postview.php' SQL Injection. Author: U238
Analyze the security implications of: Clever Copy 3.0 - 'postview.php' SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Discuz! - Remote Reset User Password
This is a webapps exploit for php platform. Description: Discuz! - Remote Reset User Password. Author: 80vul
Analyze the security implications of: Discuz! - Remote Reset User Password
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Elxis CMS 2009 - 'administrator/index.php' URI Cross-Site Scripting
This is a webapps exploit for php platform. Description: Elxis CMS 2009 - 'administrator/index.php' URI Cross-Site Scripting. Author: Ewerson Guimaraes
Analyze the security implications of: Elxis CMS 2009 - 'administrator/index.php' URI Cross-Site Scripting
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Courier Management System 1.0 - 'MULTIPART street ((custom) ' SQL Injection
This is a webapps exploit for php platform. Description: Courier Management System 1.0 - 'MULTIPART street ((custom) ' SQL Injection. Author: Zhaiyi
Analyze the security implications of: Courier Management System 1.0 - 'MULTIPART street ((custom) ' SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Davolink DV-2051 - Multiple Vulnerabilities
This is a webapps exploit for cgi platform. Description: Davolink DV-2051 - Multiple Vulnerabilities. Author: Eric Flokstra
Analyze the security implications of: Davolink DV-2051 - Multiple Vulnerabilities
This exploit targets cgi systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets cgi platform
What is this exploit about: Cisco DPC2100 - Denial of Service
This is a dos exploit for hardware platform. Description: Cisco DPC2100 - Denial of Service. Author: Daniel Smith
Analyze the security implications of: Cisco DPC2100 - Denial of Service
This exploit targets hardware systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Alcatel-Lucent Omnivista 8770 - Remote Code Execution
This is a webapps exploit for php platform. Description: Alcatel-Lucent Omnivista 8770 - Remote Code Execution. Author: 0x1911
Analyze the security implications of: Alcatel-Lucent Omnivista 8770 - Remote Code Execution
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Wireshark - DIAMETER Dissector Denial of Service
This is a dos exploit for multiple platform. Description: Wireshark - DIAMETER Dissector Denial of Service. Author: Wireshark
Analyze the security implications of: Wireshark - DIAMETER Dissector Denial of Service
This exploit targets multiple systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Apple XNU Kernel - Memory Corruption due to Integer Overflow in __offsetof Usage in posix_spawn on 32-bit Platforms
This is a dos exploit for multiple platform. Description: Apple XNU Kernel - Memory Corruption due to Integer Overflow in __offsetof Usage in posix_spawn on 32-bit Platforms. Author: Google Security Research
Analyze the security implications of: Apple XNU Kernel - Memory Corruption due to Integer Overflow in __offsetof Usage in posix_spawn on 32-bit Platforms
This exploit targets multiple systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Apple Mac OSX - OSMetaClassBase::safeMetaCast in IOAccelContext2::connectClient NULL Dereference
This is a dos exploit for osx platform. Description: Apple Mac OSX - OSMetaClassBase::safeMetaCast in IOAccelContext2::connectClient NULL Dereference. Author: Google Security Research
Analyze the security implications of: Apple Mac OSX - OSMetaClassBase::safeMetaCast in IOAccelContext2::connectClient NULL Dereference
This exploit targets osx systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets osx platform
What is this exploit about: IBM Websphere Application Server 7.0.0.13 - Cross-Site Request Forgery
This is a webapps exploit for multiple platform. Description: IBM Websphere Application Server 7.0.0.13 - Cross-Site Request Forgery. Author: Core Security
Analyze the security implications of: IBM Websphere Application Server 7.0.0.13 - Cross-Site Request Forgery
This exploit targets multiple systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Apexis IP CAM - Information Disclosure
This is a webapps exploit for hardware platform. Description: Apexis IP CAM - Information Disclosure. Author: Sunplace Solutions
Analyze the security implications of: Apexis IP CAM - Information Disclosure
This exploit targets hardware systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Maian Weblog 4.0 - Insecure Cookie Handling
This is a webapps exploit for php platform. Description: Maian Weblog 4.0 - Insecure Cookie Handling. Author: S.W.A.T.
Analyze the security implications of: Maian Weblog 4.0 - Insecure Cookie Handling
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Apache 2.4.7 + PHP 7.0.2 - 'openssl_seal()' Uninitialized Memory Code Execution
This is a remote exploit for php platform. Description: Apache 2.4.7 + PHP 7.0.2 - 'openssl_seal()' Uninitialized Memory Code Execution. Author: akat1
Analyze the security implications of: Apache 2.4.7 + PHP 7.0.2 - 'openssl_seal()' Uninitialized Memory Code Execution
This exploit targets php systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: DirectAdmin 1.28/1.29 - 'CMD_FTP_SHOW' Cross-Site Scripting
This is a webapps exploit for php platform. Description: DirectAdmin 1.28/1.29 - 'CMD_FTP_SHOW' Cross-Site Scripting. Author: Aria-Security Team
Analyze the security implications of: DirectAdmin 1.28/1.29 - 'CMD_FTP_SHOW' Cross-Site Scripting
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Limny 1.01 - Authentication Bypass
This is a webapps exploit for php platform. Description: Limny 1.01 - Authentication Bypass. Author: SirGod
Analyze the security implications of: Limny 1.01 - Authentication Bypass
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: COMMAX UMS Client ActiveX Control 1.7.0.2 - 'CNC_Ctrl.dll' Heap Buffer Overflow
This is a webapps exploit for hardware platform. Description: COMMAX UMS Client ActiveX Control 1.7.0.2 - 'CNC_Ctrl.dll' Heap Buffer Overflow. Author: LiquidWorm
Analyze the security implications of: COMMAX UMS Client ActiveX Control 1.7.0.2 - 'CNC_Ctrl.dll' Heap Buffer Overflow
This exploit targets hardware systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: ElasticSearch - Remote Code Execution
This is a remote exploit for linux platform. Description: ElasticSearch - Remote Code Execution. Author: Xiphos Research Ltd
Analyze the security implications of: ElasticSearch - Remote Code Execution
This exploit targets linux systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Megabbs Forum 2.2 - SQL Injection / Cross-Site Scripting
This is a webapps exploit for asp platform. Description: Megabbs Forum 2.2 - SQL Injection / Cross-Site Scripting. Author: BugReport.IR
Analyze the security implications of: Megabbs Forum 2.2 - SQL Injection / Cross-Site Scripting
This exploit targets asp systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets asp platform
What is this exploit about: Shoplazza 1.1 - Stored Cross-Site Scripting (XSS)
This is a webapps exploit for multiple platform. Description: Shoplazza 1.1 - Stored Cross-Site Scripting (XSS). Author: Andrey Stoykov
Analyze the security implications of: Shoplazza 1.1 - Stored Cross-Site Scripting (XSS)
This exploit targets multiple systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Joomla! Component Photo Battle 1.0.1 - Local File Inclusion
This is a webapps exploit for php platform. Description: Joomla! Component Photo Battle 1.0.1 - Local File Inclusion. Author: AntiSecurity
Analyze the security implications of: Joomla! Component Photo Battle 1.0.1 - Local File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: CMS Made Simple 2.2.14 - Arbitrary File Upload (Authenticated)
This is a webapps exploit for php platform. Description: CMS Made Simple 2.2.14 - Arbitrary File Upload (Authenticated). Author: Luis Noriega
Analyze the security implications of: CMS Made Simple 2.2.14 - Arbitrary File Upload (Authenticated)
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion
This is a webapps exploit for php platform. Description: Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion. Author: Haboob Team
Analyze the security implications of: Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: SafeTP 1.46 - Passive Mode Internal IP Address Revealing
This is a remote exploit for multiple platform. Description: SafeTP 1.46 - Passive Mode Internal IP Address Revealing. Author: Jonathan G. Lampe
Analyze the security implications of: SafeTP 1.46 - Passive Mode Internal IP Address Revealing
This exploit targets multiple systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Minix 3.1.2a - Local TTY Panic (Denial of Service)
This is a dos exploit for minix platform. Description: Minix 3.1.2a - Local TTY Panic (Denial of Service). Author: kokanin
Analyze the security implications of: Minix 3.1.2a - Local TTY Panic (Denial of Service)
This exploit targets minix systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets minix platform
What is this exploit about: eVision CMS 2.0 - Remote Code Execution
This is a webapps exploit for php platform. Description: eVision CMS 2.0 - Remote Code Execution. Author: Osirys
Analyze the security implications of: eVision CMS 2.0 - Remote Code Execution
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: RAVPower 2.000.056 - Root Remote Code Execution
This is a remote exploit for hardware platform. Description: RAVPower 2.000.056 - Root Remote Code Execution. Author: Daniele Linguaglossa & Stefano Farletti
Analyze the security implications of: RAVPower 2.000.056 - Root Remote Code Execution
This exploit targets hardware systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Lotus Domino 4.6.1/4.6.4 Notes - SMTPA MTA Mail Relay
This is a dos exploit for multiple platform. Description: Lotus Domino 4.6.1/4.6.4 Notes - SMTPA MTA Mail Relay. Author: Robert Lister
Analyze the security implications of: Lotus Domino 4.6.1/4.6.4 Notes - SMTPA MTA Mail Relay
This exploit targets multiple systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Atom CMS 2.0 - Remote Code Execution (RCE)
This is a webapps exploit for php platform. Description: Atom CMS 2.0 - Remote Code Execution (RCE). Author: Ashish Koli
Analyze the security implications of: Atom CMS 2.0 - Remote Code Execution (RCE)
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: DCI-Taskeen 1.03 - 'cat.php' Multiple SQL Injections
This is a webapps exploit for php platform. Description: DCI-Taskeen 1.03 - 'cat.php' Multiple SQL Injections. Author: Linux_Drox
Analyze the security implications of: DCI-Taskeen 1.03 - 'cat.php' Multiple SQL Injections
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Verizon 4G LTE Network Extender - Weak Credentials Algorithm
This is a remote exploit for hardware platform. Description: Verizon 4G LTE Network Extender - Weak Credentials Algorithm. Author: LiquidWorm
Analyze the security implications of: Verizon 4G LTE Network Extender - Weak Credentials Algorithm
This exploit targets hardware systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Joomla! Component JD-Wiki 1.0.2 - 'wantedpages.php?MosConfig_absolute_path' Remote File Inclusion
This is a webapps exploit for php platform. Description: Joomla! Component JD-Wiki 1.0.2 - 'wantedpages.php?MosConfig_absolute_path' Remote File Inclusion. Author: DarkbiteX
Analyze the security implications of: Joomla! Component JD-Wiki 1.0.2 - 'wantedpages.php?MosConfig_absolute_path' Remote File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Sony Playstation 4 (PS4) < 7.02 - 'ValidationMessage::buildBubbleTree()' Use-After-Free WebKit Code Execution (PoC)
This is a webapps exploit for hardware platform. Description: Sony Playstation 4 (PS4) < 7.02 - 'ValidationMessage::buildBubbleTree()' Use-After-Free WebKit Code Execution (PoC). Author: ChendoChap
Analyze the security implications of: Sony Playstation 4 (PS4) < 7.02 - 'ValidationMessage::buildBubbleTree()' Use-After-Free WebKit Code Execution (PoC)
This exploit targets hardware systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform