input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Akka HTTP 10.1.14 - Denial of Service | This is a remote exploit for multiple platform. Description: Akka HTTP 10.1.14 - Denial of Service. Author: cxosmo |
Analyze the security implications of: Akka HTTP 10.1.14 - Denial of Service | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Jan Erdmann Jebuch 1.0 - HTML Injection | This is a webapps exploit for php platform. Description: Jan Erdmann Jebuch 1.0 - HTML Injection. Author: PuWu |
Analyze the security implications of: Jan Erdmann Jebuch 1.0 - HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AdaptCMS Lite 1.4 - Cross-Site Scripting / Remote File Inclusion | This is a webapps exploit for php platform. Description: AdaptCMS Lite 1.4 - Cross-Site Scripting / Remote File Inclusion. Author: RoMaNcYxHaCkEr |
Analyze the security implications of: AdaptCMS Lite 1.4 - Cross-Site Scripting / Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.2.8 - 'popen()' Function Buffer Overflow | This is a dos exploit for php platform. Description: PHP 5.2.8 - 'popen()' Function Buffer Overflow. Author: e.wiZz! |
Analyze the security implications of: PHP 5.2.8 - 'popen()' Function Buffer Overflow | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EasyService Billing 1.0 - 'q' SQL Injection | This is a webapps exploit for php platform. Description: EasyService Billing 1.0 - 'q' SQL Injection. Author: Divya Jain |
Analyze the security implications of: EasyService Billing 1.0 - 'q' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP Intelligent Management Center - 'topoContent.jsf' Cross-Site Scripting | This is a webapps exploit for java platform. Description: HP Intelligent Management Center - 'topoContent.jsf' Cross-Site Scripting. Author: Julien Ahrens |
Analyze the security implications of: HP Intelligent Management Center - 'topoContent.jsf' Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: KubeSphere 3.4.0 - Insecure Direct Object Reference (IDOR) | This is a webapps exploit for multiple platform. Description: KubeSphere 3.4.0 - Insecure Direct Object Reference (IDOR). Author: Okan Kurtulus |
Analyze the security implications of: KubeSphere 3.4.0 - Insecure Direct Object Reference (IDOR) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component RWCards 2.4.3 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component RWCards 2.4.3 - SQL Injection. Author: ajann |
Analyze the security implications of: Joomla! Component RWCards 2.4.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Authenex A-Key/ASAS Web Management Control 3.1.0.2 - Blind SQL Injection | This is a webapps exploit for multiple platform. Description: Authenex A-Key/ASAS Web Management Control 3.1.0.2 - Blind SQL Injection. Author: Jose Carlos de Arriba |
Analyze the security implications of: Authenex A-Key/ASAS Web Management Control 3.1.0.2 - Blind SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mozilla Firefox/Thunderbird/SeaMonkey - Multiple Memory Corruption Vulnerabilities | This is a dos exploit for linux platform. Description: Mozilla Firefox/Thunderbird/SeaMonkey - Multiple Memory Corruption Vulnerabilities. Author: Bob Clary |
Analyze the security implications of: Mozilla Firefox/Thunderbird/SeaMonkey - Multiple Memory Corruption Vulnerabilities | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DUdForum 3.0 - 'iFor' SQL Injection | This is a webapps exploit for asp platform. Description: DUdForum 3.0 - 'iFor' SQL Injection. Author: Bl@ckbe@rD |
Analyze the security implications of: DUdForum 3.0 - 'iFor' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: WiFi HD 7.3.0 iOS - Multiple Vulnerabilities | This is a webapps exploit for ios platform. Description: WiFi HD 7.3.0 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: WiFi HD 7.3.0 iOS - Multiple Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: CMSimple 5.4 - Cross Site Scripting (XSS) | This is a webapps exploit for php platform. Description: CMSimple 5.4 - Cross Site Scripting (XSS). Author: heinjame |
Analyze the security implications of: CMSimple 5.4 - Cross Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LILDBI - Arbitrary File Upload | This is a webapps exploit for php platform. Description: LILDBI - Arbitrary File Upload. Author: EraGoN |
Analyze the security implications of: LILDBI - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CF_Auction - Blind SQL Injection | This is a webapps exploit for asp platform. Description: CF_Auction - Blind SQL Injection. Author: AlpHaNiX |
Analyze the security implications of: CF_Auction - Blind SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Belkin Wireless G Router / ADSL2 Modem - Authentication Bypass | This is a remote exploit for hardware platform. Description: Belkin Wireless G Router / ADSL2 Modem - Authentication Bypass. Author: noensr |
Analyze the security implications of: Belkin Wireless G Router / ADSL2 Modem - Authentication Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Bs Realtor_Web Script - SQL Injection | This is a webapps exploit for php platform. Description: Bs Realtor_Web Script - SQL Injection. Author: Sid3^effects |
Analyze the security implications of: Bs Realtor_Web Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Integria IMS 5.0.86 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Integria IMS 5.0.86 - Arbitrary File Upload. Author: Greg.Priest |
Analyze the security implications of: Integria IMS 5.0.86 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FestOS 2.3 - 'contents' Cross-Site Scripting | This is a webapps exploit for php platform. Description: FestOS 2.3 - 'contents' Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: FestOS 2.3 - 'contents' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LightNEasy 1.2 - no database Remote Hash Retrieve | This is a webapps exploit for php platform. Description: LightNEasy 1.2 - no database Remote Hash Retrieve. Author: girex |
Analyze the security implications of: LightNEasy 1.2 - no database Remote Hash Retrieve | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DCP-Portal 5.0.1 - 'editor.php?Root' Remote File Inclusion | This is a webapps exploit for php platform. Description: DCP-Portal 5.0.1 - 'editor.php?Root' Remote File Inclusion. Author: frog |
Analyze the security implications of: DCP-Portal 5.0.1 - 'editor.php?Root' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Joomla-Visites 1.1 RC2 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Joomla-Visites 1.1 RC2 - Remote File Inclusion. Author: NoGe |
Analyze the security implications of: Joomla! Component Joomla-Visites 1.1 RC2 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alumni Management System 1.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: Alumni Management System 1.0 - Authentication Bypass. Author: Ankita Pal |
Analyze the security implications of: Alumni Management System 1.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Netman 204 - Remote command without authentication | This is a hardware exploit for multiple platform. Description: Netman 204 - Remote command without authentication. Author: Parsa Rezaie Khiabanloo |
Analyze the security implications of: Netman 204 - Remote command without authentication | This exploit targets multiple systems. Type: hardware. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Chameleon Social Networking Software - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Chameleon Social Networking Software - Persistent Cross-Site Scripting. Author: Dr-mosta |
Analyze the security implications of: Chameleon Social Networking Software - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Chyrp 2.x swfupload Extension - 'upload_handler.php' Arbitrary File Upload / Arbitrary PHP Code Execution | This is a webapps exploit for php platform. Description: Chyrp 2.x swfupload Extension - 'upload_handler.php' Arbitrary File Upload / Arbitrary PHP Code Execution. Author: Wireghoul |
Analyze the security implications of: Chyrp 2.x swfupload Extension - 'upload_handler.php' Arbitrary File Upload / Arbitrary PHP Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IP3 NetAccess < 4.1.9.6 - Arbitrary File Disclosure | This is a remote exploit for hardware platform. Description: IP3 NetAccess < 4.1.9.6 - Arbitrary File Disclosure. Author: Sebastian Wolfgarten |
Analyze the security implications of: IP3 NetAccess < 4.1.9.6 - Arbitrary File Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Skype Technologies Skype 1.5 - NSRunAlertPanel Remote Format String | This is a remote exploit for osx platform. Description: Skype Technologies Skype 1.5 - NSRunAlertPanel Remote Format String. Author: Tom Ferris |
Analyze the security implications of: Skype Technologies Skype 1.5 - NSRunAlertPanel Remote Format String | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: mySCADA myPRO 7 - Hardcoded Credentials | This is a remote exploit for hardware platform. Description: mySCADA myPRO 7 - Hardcoded Credentials. Author: Emre ÖVÜNÇ |
Analyze the security implications of: mySCADA myPRO 7 - Hardcoded Credentials | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: IBM GCM16/32 1.20.0.22575 - Multiple Vulnerabilities | This is a remote exploit for php platform. Description: IBM GCM16/32 1.20.0.22575 - Multiple Vulnerabilities. Author: Alejandro Alvarez Bravo |
Analyze the security implications of: IBM GCM16/32 1.20.0.22575 - Multiple Vulnerabilities | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_alfresco - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_alfresco - SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_alfresco - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM Tivoli Access Manager 6.1.1 for E-Business - Directory Traversal | This is a remote exploit for linux platform. Description: IBM Tivoli Access Manager 6.1.1 for E-Business - Directory Traversal. Author: anonymous |
Analyze the security implications of: IBM Tivoli Access Manager 6.1.1 for E-Business - Directory Traversal | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux Kernel - 'AF_PACKET' Use-After-Free (1) | This is a dos exploit for linux platform. Description: Linux Kernel - 'AF_PACKET' Use-After-Free (1). Author: SecuriTeam |
Analyze the security implications of: Linux Kernel - 'AF_PACKET' Use-After-Free (1) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.