input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple macOS 10.12.1 / iOS < 10.2 - syslogd Arbitrary Port Replacement | This is a dos exploit for multiple platform. Description: Apple macOS 10.12.1 / iOS < 10.2 - syslogd Arbitrary Port Replacement. Author: Google Security Research |
Analyze the security implications of: Apple macOS 10.12.1 / iOS < 10.2 - syslogd Arbitrary Port Replacement | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CSZ CMS 1.3.0 - 'Multiple' Blind SQLi | This is a webapps exploit for php platform. Description: CSZ CMS 1.3.0 - 'Multiple' Blind SQLi. Author: Dogukan Dincer |
Analyze the security implications of: CSZ CMS 1.3.0 - 'Multiple' Blind SQLi | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 4Images Image Gallery Management System - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: 4Images Image Gallery Management System - Cross-Site Request Forgery. Author: Dmar al3noOoz |
Analyze the security implications of: 4Images Image Gallery Management System - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SuSE Linux 6.2 sscw - HOME Environment Variable Buffer Overflow | This is a local exploit for linux platform. Description: SuSE Linux 6.2 sscw - HOME Environment Variable Buffer Overflow. Author: Brock Tellier |
Analyze the security implications of: SuSE Linux 6.2 sscw - HOME Environment Variable Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SCP Client - Multiple Vulnerabilities (SSHtranger Things) | This is a remote exploit for multiple platform. Description: SCP Client - Multiple Vulnerabilities (SSHtranger Things). Author: Mark E. Haase |
Analyze the security implications of: SCP Client - Multiple Vulnerabilities (SSHtranger Things) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: IdeaBox 1.1 - 'gorumDir' Remote File Inclusion | This is a webapps exploit for php platform. Description: IdeaBox 1.1 - 'gorumDir' Remote File Inclusion. Author: Kacper |
Analyze the security implications of: IdeaBox 1.1 - 'gorumDir' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TP-Link TP-SG105E 1.0.0 - Unauthenticated Remote Reboot | This is a webapps exploit for hardware platform. Description: TP-Link TP-SG105E 1.0.0 - Unauthenticated Remote Reboot. Author: PCEumel |
Analyze the security implications of: TP-Link TP-SG105E 1.0.0 - Unauthenticated Remote Reboot | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Hotel And Lodge Management System 1.0 - 'Customer Details' Stored XSS | This is a webapps exploit for php platform. Description: Hotel And Lodge Management System 1.0 - 'Customer Details' Stored XSS. Author: Jitendra Kumar Tripathi |
Analyze the security implications of: Hotel And Lodge Management System 1.0 - 'Customer Details' Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/webseal?method' Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/webseal?method' Cross-Site Scripting. Author: IBM |
Analyze the security implications of: IBM Tivoli Access Manager for E-Business - '/ibm/wpm/webseal?method' Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: QuickTeam 2.2 - SQL Injection | This is a webapps exploit for asp platform. Description: QuickTeam 2.2 - SQL Injection. Author: drunken danish rednecks |
Analyze the security implications of: QuickTeam 2.2 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: MiniWebsvr 0.0.7 - Remote Directory Traversal | This is a remote exploit for multiple platform. Description: MiniWebsvr 0.0.7 - Remote Directory Traversal. Author: shinnai |
Analyze the security implications of: MiniWebsvr 0.0.7 - Remote Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: kontakt formular 1.4 - Remote File Inclusion | This is a webapps exploit for php platform. Description: kontakt formular 1.4 - Remote File Inclusion. Author: bd0rk |
Analyze the security implications of: kontakt formular 1.4 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Madrese-Portal - 'haber.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Madrese-Portal - 'haber.asp' SQL Injection. Author: Sina Yazdanmehr |
Analyze the security implications of: Madrese-Portal - 'haber.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: CmsMadeSimple v2.2.17 - Stored Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: CmsMadeSimple v2.2.17 - Stored Cross-Site Scripting (XSS). Author: Mirabbas Ağalarov |
Analyze the security implications of: CmsMadeSimple v2.2.17 - Stored Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TeamSpeak Server 2.0.23 (Multiple Scripts) - Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for multiple platform. Description: TeamSpeak Server 2.0.23 (Multiple Scripts) - Multiple Cross-Site Scripting Vulnerabilities. Author: Gilberto Ficara |
Analyze the security implications of: TeamSpeak Server 2.0.23 (Multiple Scripts) - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BigACE 2.7.3 - Cross-Site Request Forgery (Change Admin Password) | This is a webapps exploit for php platform. Description: BigACE 2.7.3 - Cross-Site Request Forgery (Change Admin Password). Author: Sweet |
Analyze the security implications of: BigACE 2.7.3 - Cross-Site Request Forgery (Change Admin Password) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BoutikOne - 'description.php' SQL Injection | This is a webapps exploit for php platform. Description: BoutikOne - 'description.php' SQL Injection. Author: IRAQ_JAGUAR |
Analyze the security implications of: BoutikOne - 'description.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JE Grid Folio - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JE Grid Folio - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JE Grid Folio - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Mini Search Appliance 4.4.102.M.36 - Information Disclosure | This is a webapps exploit for php platform. Description: Google Mini Search Appliance 4.4.102.M.36 - Information Disclosure. Author: Patrick Webster |
Analyze the security implications of: Google Mini Search Appliance 4.4.102.M.36 - Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LG G4 MRA58K - 'mkvparser::Tracks constructor' Failure to Initialise Pointers | This is a dos exploit for android platform. Description: LG G4 MRA58K - 'mkvparser::Tracks constructor' Failure to Initialise Pointers. Author: Google Security Research |
Analyze the security implications of: LG G4 MRA58K - 'mkvparser::Tracks constructor' Failure to Initialise Pointers | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: YeaLink SIP-TXXXP 53.84.0.15 - 'cmd' Command Injection (Authenticated) | This is a webapps exploit for hardware platform. Description: YeaLink SIP-TXXXP 53.84.0.15 - 'cmd' Command Injection (Authenticated). Author: tahaafarooq |
Analyze the security implications of: YeaLink SIP-TXXXP 53.84.0.15 - 'cmd' Command Injection (Authenticated) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Webmin 1.900 - Remote Command Execution (Metasploit) | This is a remote exploit for cgi platform. Description: Webmin 1.900 - Remote Command Execution (Metasploit). Author: AkkuS |
Analyze the security implications of: Webmin 1.900 - Remote Command Execution (Metasploit) | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Advanced Guestbook 2.4.2 - 'picture.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Advanced Guestbook 2.4.2 - 'picture.php' Cross-Site Scripting. Author: Jesper Jurcenoks |
Analyze the security implications of: Advanced Guestbook 2.4.2 - 'picture.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla Suite/Firefox < 1.5.0.5 - Navigator Object Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Mozilla Suite/Firefox < 1.5.0.5 - Navigator Object Code Execution (Metasploit). Author: H D Moore |
Analyze the security implications of: Mozilla Suite/Firefox < 1.5.0.5 - Navigator Object Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BannerFarm 2.3 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cgi platform. Description: BannerFarm 2.3 - Multiple Cross-Site Scripting Vulnerabilities. Author: r0t |
Analyze the security implications of: BannerFarm 2.3 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Apache Tomcat 6.0.13 - JSP Example Web Applications Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Apache Tomcat 6.0.13 - JSP Example Web Applications Cross-Site Scripting. Author: anonymous |
Analyze the security implications of: Apache Tomcat 6.0.13 - JSP Example Web Applications Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Apache Continuum - Arbitrary Command Execution (Metasploit) | This is a remote exploit for linux platform. Description: Apache Continuum - Arbitrary Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Apache Continuum - Arbitrary Command Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Opera Browser 10.60 - Clickjacking | This is a remote exploit for multiple platform. Description: Opera Browser 10.60 - Clickjacking. Author: Pouya Daneshmand |
Analyze the security implications of: Opera Browser 10.60 - Clickjacking | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ethereal 0.10.9 (Linux) - '3G-A11' Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Ethereal 0.10.9 (Linux) - '3G-A11' Remote Buffer Overflow. Author: Diego Giagio |
Analyze the security implications of: Ethereal 0.10.9 (Linux) - '3G-A11' Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component WMT Content Timeline 1.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component WMT Content Timeline 1.0 - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component WMT Content Timeline 1.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wireshark - dissct_rsl_ipaccess_msg Static Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: Wireshark - dissct_rsl_ipaccess_msg Static Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: Wireshark - dissct_rsl_ipaccess_msg Static Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Aj Classifieds Real Estate 3.0 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Aj Classifieds Real Estate 3.0 - Arbitrary File Upload. Author: ZoRLu |
Analyze the security implications of: Aj Classifieds Real Estate 3.0 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FloosieTek FTGate Mail Server 1.2 - 'index.fts?folder' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: FloosieTek FTGate Mail Server 1.2 - 'index.fts?folder' Cross-Site Scripting. Author: dr_insane |
Analyze the security implications of: FloosieTek FTGate Mail Server 1.2 - 'index.fts?folder' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.