input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Magnolia CMS - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Magnolia CMS - Multiple Cross-Site Scripting Vulnerabilities. Author: High-Tech Bridge |
Analyze the security implications of: Magnolia CMS - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FormMail-Clone - Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: FormMail-Clone - Cross-Site Scripting. Author: Rynho Zeros Web |
Analyze the security implications of: FormMail-Clone - Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: FubarForum 1.5 - 'index.php' Local File Inclusion | This is a webapps exploit for php platform. Description: FubarForum 1.5 - 'index.php' Local File Inclusion. Author: cOndemned |
Analyze the security implications of: FubarForum 1.5 - 'index.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX Safari 2.0.3 (417.9.2) - 'ROWSPAN' Denial of Service (PoC) | This is a dos exploit for osx platform. Description: Apple Mac OSX Safari 2.0.3 (417.9.2) - 'ROWSPAN' Denial of Service (PoC). Author: Yannick von Arx |
Analyze the security implications of: Apple Mac OSX Safari 2.0.3 (417.9.2) - 'ROWSPAN' Denial of Service (PoC) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Linux Kernel < 2.6.19 (x86/x64) - 'udp_sendmsg' Local Privilege Escalation (2) | This is a local exploit for linux platform. Description: Linux Kernel < 2.6.19 (x86/x64) - 'udp_sendmsg' Local Privilege Escalation (2). Author: spender |
Analyze the security implications of: Linux Kernel < 2.6.19 (x86/x64) - 'udp_sendmsg' Local Privilege Escalation (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Wireless Repeater BE126 - Remote Code Execution | This is a webapps exploit for hardware platform. Description: Wireless Repeater BE126 - Remote Code Execution. Author: Hay Mizrachi |
Analyze the security implications of: Wireless Repeater BE126 - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: OpenPLI 3.0 Beta (OpenPLi-beta-dm7000-20130127-272) - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: OpenPLI 3.0 Beta (OpenPLi-beta-dm7000-20130127-272) - Multiple Vulnerabilities. Author: m-1-k-3 |
Analyze the security implications of: OpenPLI 3.0 Beta (OpenPLi-beta-dm7000-20130127-272) - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Palm WebOS 1.0/1.1 - Email Arbitrary Script Injection | This is a remote exploit for hardware platform. Description: Palm WebOS 1.0/1.1 - Email Arbitrary Script Injection. Author: Townsend Ladd Harris |
Analyze the security implications of: Palm WebOS 1.0/1.1 - Email Arbitrary Script Injection | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: WU-FTPD 2.4/2.5/2.6 / Trolltech ftpd 1.2 / ProFTPd 1.2 / BeroFTPD 1.3.4 FTP - glob Expansion | This is a remote exploit for linux platform. Description: WU-FTPD 2.4/2.5/2.6 / Trolltech ftpd 1.2 / ProFTPd 1.2 / BeroFTPD 1.3.4 FTP - glob Expansion. Author: Frank DENIS |
Analyze the security implications of: WU-FTPD 2.4/2.5/2.6 / Trolltech ftpd 1.2 / ProFTPd 1.2 / BeroFTPD 1.3.4 FTP - glob Expansion | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: rsync 2.5.7 - Local Stack Overflow / Local Privilege Escalation | This is a local exploit for linux platform. Description: rsync 2.5.7 - Local Stack Overflow / Local Privilege Escalation. Author: Abhisek Datta |
Analyze the security implications of: rsync 2.5.7 - Local Stack Overflow / Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mozilla (Multiple Products) - Server Refresh Header Cross-Site Scripting | This is a remote exploit for linux platform. Description: Mozilla (Multiple Products) - Server Refresh Header Cross-Site Scripting. Author: Olli Pettay |
Analyze the security implications of: Mozilla (Multiple Products) - Server Refresh Header Cross-Site Scripting | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Magic News Plus 1.0.2 - 'news.php?&link_parameters' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Magic News Plus 1.0.2 - 'news.php?&link_parameters' Cross-Site Scripting. Author: HACKERS PAL |
Analyze the security implications of: Magic News Plus 1.0.2 - 'news.php?&link_parameters' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DevExpress ASPxFileManager 10.2 < 13.2.8 - Directory Traversal | This is a webapps exploit for asp platform. Description: DevExpress ASPxFileManager 10.2 < 13.2.8 - Directory Traversal. Author: RedTeam Pentesting |
Analyze the security implications of: DevExpress ASPxFileManager 10.2 < 13.2.8 - Directory Traversal | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Airspan AirSpot 5410 version 0.3.4.1 - Remote Code Execution (RCE) | This is a remote exploit for linux platform. Description: Airspan AirSpot 5410 version 0.3.4.1 - Remote Code Execution (RCE). Author: Samy Younsi |
Analyze the security implications of: Airspan AirSpot 5410 version 0.3.4.1 - Remote Code Execution (RCE) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache 1.3 - Artificially Long Slash Path Directory Listing (3) | This is a remote exploit for multiple platform. Description: Apache 1.3 - Artificially Long Slash Path Directory Listing (3). Author: farm9 |
Analyze the security implications of: Apache 1.3 - Artificially Long Slash Path Directory Listing (3) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Advanced Image Hosting Script 2.3 - 'report.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Advanced Image Hosting Script 2.3 - 'report.php' Cross-Site Scripting. Author: R3d-D3V!L |
Analyze the security implications of: Advanced Image Hosting Script 2.3 - 'report.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RSSH 2.x - Arbitrary Command Execution | This is a remote exploit for linux platform. Description: RSSH 2.x - Arbitrary Command Execution. Author: Jason Wies |
Analyze the security implications of: RSSH 2.x - Arbitrary Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ACME Perl-Cal 2.99 - Cal_make.pl Cross-Site Scripting | This is a remote exploit for cgi platform. Description: ACME Perl-Cal 2.99 - Cal_make.pl Cross-Site Scripting. Author: $um$id |
Analyze the security implications of: ACME Perl-Cal 2.99 - Cal_make.pl Cross-Site Scripting | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Colorful Blog - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Colorful Blog - Persistent Cross-Site Scripting. Author: Besim |
Analyze the security implications of: Colorful Blog - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HRS Multi - 'key' Blind SQL Injection | This is a webapps exploit for asp platform. Description: HRS Multi - 'key' Blind SQL Injection. Author: Mr.SQL |
Analyze the security implications of: HRS Multi - 'key' Blind SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: A-Link WL54AP3 / WL54AP2 - Cross-Site Request Forgery / Cross-Site Scripting | This is a remote exploit for hardware platform. Description: A-Link WL54AP3 / WL54AP2 - Cross-Site Request Forgery / Cross-Site Scripting. Author: Henri Lindberg |
Analyze the security implications of: A-Link WL54AP3 / WL54AP2 - Cross-Site Request Forgery / Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Speedy ASP Forum - 'profileupdate.asp' User Pass Change | This is a webapps exploit for asp platform. Description: Speedy ASP Forum - 'profileupdate.asp' User Pass Change. Author: ajann |
Analyze the security implications of: Speedy ASP Forum - 'profileupdate.asp' User Pass Change | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ImpressCMS 1.4.2 - Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: ImpressCMS 1.4.2 - Remote Code Execution (RCE). Author: Egidio Romano |
Analyze the security implications of: ImpressCMS 1.4.2 - Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AdaptCMS Lite 1.5 - Remote File Inclusion | This is a webapps exploit for php platform. Description: AdaptCMS Lite 1.5 - Remote File Inclusion. Author: v3n0m |
Analyze the security implications of: AdaptCMS Lite 1.5 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash - Crash When Freeing Memory After AVC decoding | This is a dos exploit for multiple platform. Description: Adobe Flash - Crash When Freeing Memory After AVC decoding. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Crash When Freeing Memory After AVC decoding | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component JoomTouch 1.0.2 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component JoomTouch 1.0.2 - Local File Inclusion. Author: NoGe |
Analyze the security implications of: Joomla! Component JoomTouch 1.0.2 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.x - KVM 'pit_ioport_read()' Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - KVM 'pit_ioport_read()' Local Denial of Service. Author: Marcelo Tosatti |
Analyze the security implications of: Linux Kernel 2.6.x - KVM 'pit_ioport_read()' Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: cfingerd 1.4 - Format String (1) | This is a remote exploit for linux platform. Description: cfingerd 1.4 - Format String (1). Author: Lez |
Analyze the security implications of: cfingerd 1.4 - Format String (1) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Business Objects Infoview - 'cms' Cross-Site Scripting | This is a webapps exploit for java platform. Description: Business Objects Infoview - 'cms' Cross-Site Scripting. Author: Sebastien gioria |
Analyze the security implications of: Business Objects Infoview - 'cms' Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: M/Monit 3.3.2 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: M/Monit 3.3.2 - Cross-Site Request Forgery. Author: Dolev Farhi |
Analyze the security implications of: M/Monit 3.3.2 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MetaDot Portal Server 5.6.x - 'index.pl' Multiple SQL Injections | This is a webapps exploit for cgi platform. Description: MetaDot Portal Server 5.6.x - 'index.pl' Multiple SQL Injections. Author: JeiAr |
Analyze the security implications of: MetaDot Portal Server 5.6.x - 'index.pl' Multiple SQL Injections | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: TP-LINK TD-W8151N - Denial of Service | This is a dos exploit for hardware platform. Description: TP-LINK TD-W8151N - Denial of Service. Author: Persian Hack Team |
Analyze the security implications of: TP-LINK TD-W8151N - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: OpenSSL 0.9.8c-1 < 0.9.8g-9 (Debian and Derivatives) - Predictable PRNG Brute Force SSH | This is a remote exploit for linux platform. Description: OpenSSL 0.9.8c-1 < 0.9.8g-9 (Debian and Derivatives) - Predictable PRNG Brute Force SSH. Author: Markus Mueller |
Analyze the security implications of: OpenSSL 0.9.8c-1 < 0.9.8g-9 (Debian and Derivatives) - Predictable PRNG Brute Force SSH | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.