input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Contec Smart Home 4.15 - Unauthorized Password Reset | This is a webapps exploit for hardware platform. Description: Contec Smart Home 4.15 - Unauthorized Password Reset. Author: Z3ro0ne |
Analyze the security implications of: Contec Smart Home 4.15 - Unauthorized Password Reset | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BSD/OS 2.1 / FreeBSD 2.1.5 / NeXTstep 4.x / IRIX 6.4 / SunOS 4.1.3/4.1.4 - 'lpr' Buffer Overrun (1) | This is a local exploit for linux platform. Description: BSD/OS 2.1 / FreeBSD 2.1.5 / NeXTstep 4.x / IRIX 6.4 / SunOS 4.1.3/4.1.4 - 'lpr' Buffer Overrun (1). Author: Vadim Kolontsov |
Analyze the security implications of: BSD/OS 2.1 / FreeBSD 2.1.5 / NeXTstep 4.x / IRIX 6.4 / SunOS 4.1.3/4.1.4 - 'lpr' Buffer Overrun (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Brocade Network Advisor 14.4.1 - Unauthenticated Remote Code Execution | This is a webapps exploit for java platform. Description: Brocade Network Advisor 14.4.1 - Unauthenticated Remote Code Execution. Author: Jakub Palaczynski |
Analyze the security implications of: Brocade Network Advisor 14.4.1 - Unauthenticated Remote Code Execution | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: jizhi CMS 1.6.7 - Arbitrary File Download | This is a webapps exploit for php platform. Description: jizhi CMS 1.6.7 - Arbitrary File Download. Author: jizhicms |
Analyze the security implications of: jizhi CMS 1.6.7 - Arbitrary File Download | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JoomRadio 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JoomRadio 1.0 - SQL Injection. Author: Mr.tro0oqy |
Analyze the security implications of: Joomla! Component JoomRadio 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jamit Job Board - 'post_id' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Jamit Job Board - 'post_id' Cross-Site Scripting. Author: Crux |
Analyze the security implications of: Jamit Job Board - 'post_id' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.2/2.4 - Deep Symbolic Link Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.2/2.4 - Deep Symbolic Link Denial of Service. Author: Nergal |
Analyze the security implications of: Linux Kernel 2.2/2.4 - Deep Symbolic Link Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ForumJBC 4.0 - 'Haut.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: ForumJBC 4.0 - 'Haut.php' Cross-Site Scripting. Author: ThE__LeO |
Analyze the security implications of: ForumJBC 4.0 - 'Haut.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EasyImageCatalogue 1.31 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: EasyImageCatalogue 1.31 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: ZoRLu |
Analyze the security implications of: EasyImageCatalogue 1.31 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Power Board 2.0.1 - 'QPid' SQL Injection | This is a webapps exploit for php platform. Description: Invision Power Board 2.0.1 - 'QPid' SQL Injection. Author: SVT |
Analyze the security implications of: Invision Power Board 2.0.1 - 'QPid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Realpin 1.5.04 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Realpin 1.5.04 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Realpin 1.5.04 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sun Java Applet - Font.createFont Remote Denial of Service | This is a dos exploit for java platform. Description: Sun Java Applet - Font.createFont Remote Denial of Service. Author: Marc Schoenefeld |
Analyze the security implications of: Sun Java Applet - Font.createFont Remote Denial of Service | This exploit targets java systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: id Software id Tech 4 Engine - 'key' Packet Remote Code Execution | This is a remote exploit for multiple platform. Description: id Software id Tech 4 Engine - 'key' Packet Remote Code Execution. Author: Luigi Auriemma |
Analyze the security implications of: id Software id Tech 4 Engine - 'key' Packet Remote Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: NetBSD - 'mail.local(8)' Local Privilege Escalation (Metasploit) | This is a local exploit for netbsd_x86 platform. Description: NetBSD - 'mail.local(8)' Local Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: NetBSD - 'mail.local(8)' Local Privilege Escalation (Metasploit) | This exploit targets netbsd_x86 systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets netbsd_x86 platform |
What is this exploit about: Active PHP BookMarks 1.1.2 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Active PHP BookMarks 1.1.2 - Multiple Remote File Inclusions. Author: ThE-LoRd-Of-CrAcKiNg |
Analyze the security implications of: Active PHP BookMarks 1.1.2 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Crypto Currency Tracker (CCT) 9.5 - Admin Account Creation (Unauthenticated) | This is a webapps exploit for php platform. Description: Crypto Currency Tracker (CCT) 9.5 - Admin Account Creation (Unauthenticated). Author: 0xBr |
Analyze the security implications of: Crypto Currency Tracker (CCT) 9.5 - Admin Account Creation (Unauthenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Exim - 'GHOST' glibc gethostbyname Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: Exim - 'GHOST' glibc gethostbyname Buffer Overflow (Metasploit). Author: Qualys Corporation |
Analyze the security implications of: Exim - 'GHOST' glibc gethostbyname Buffer Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Hot or Not Picture Rating Script - SQL Injection | This is a webapps exploit for php platform. Description: Hot or Not Picture Rating Script - SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: Hot or Not Picture Rating Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Core News 2.0.1 - 'index.php' Remote Code Execution | This is a webapps exploit for php platform. Description: Core News 2.0.1 - 'index.php' Remote Code Execution. Author: botan |
Analyze the security implications of: Core News 2.0.1 - 'index.php' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Docker Daemon - Unprotected TCP Socket | This is a local exploit for linux platform. Description: Docker Daemon - Unprotected TCP Socket. Author: Martin Pizala |
Analyze the security implications of: Docker Daemon - Unprotected TCP Socket | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_iJoomla_archive - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_iJoomla_archive - Blind SQL Injection. Author: Stack |
Analyze the security implications of: Joomla! Component com_iJoomla_archive - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Symantec Web Gateway 5.0.2.18 - 'pbcontrol.php' Command Injection (Metasploit) | This is a remote exploit for linux platform. Description: Symantec Web Gateway 5.0.2.18 - 'pbcontrol.php' Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Symantec Web Gateway 5.0.2.18 - 'pbcontrol.php' Command Injection (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Aj RSS Reader - 'url' SQL Injection | This is a webapps exploit for php platform. Description: Aj RSS Reader - 'url' SQL Injection. Author: yassine_enp |
Analyze the security implications of: Aj RSS Reader - 'url' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JAF CMS 4.0 rc2 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: JAF CMS 4.0 rc2 - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: JAF CMS 4.0 rc2 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: F5 iControl - 'iCall::Script' Root Command Execution (Metasploit) | This is a remote exploit for hardware platform. Description: F5 iControl - 'iCall::Script' Root Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: F5 iControl - 'iCall::Script' Root Command Execution (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: IPNPro3 < 1.44 - Admin Password Changing | This is a webapps exploit for php platform. Description: IPNPro3 < 1.44 - Admin Password Changing. Author: G4N0K |
Analyze the security implications of: IPNPro3 < 1.44 - Admin Password Changing | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Master IP CAM 01 - Multiple Vulnerabilities | This is a remote exploit for hardware platform. Description: Master IP CAM 01 - Multiple Vulnerabilities. Author: Raffaele Sabato |
Analyze the security implications of: Master IP CAM 01 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: QNAP Q'Center - 'change_passwd' Command Execution (Metasploit) | This is a remote exploit for linux platform. Description: QNAP Q'Center - 'change_passwd' Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: QNAP Q'Center - 'change_passwd' Command Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Claroline 1.x - 'rqmkhtml.php' Information Disclosure | This is a webapps exploit for php platform. Description: Claroline 1.x - 'rqmkhtml.php' Information Disclosure. Author: rgod |
Analyze the security implications of: Claroline 1.x - 'rqmkhtml.php' Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AUO SunVeillance Monitoring System 1.1.9e - Incorrect Access Control | This is a webapps exploit for hardware platform. Description: AUO SunVeillance Monitoring System 1.1.9e - Incorrect Access Control. Author: Luca.Chiou |
Analyze the security implications of: AUO SunVeillance Monitoring System 1.1.9e - Incorrect Access Control | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FaName 1.0 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: FaName 1.0 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Jesper Jurcenoks |
Analyze the security implications of: FaName 1.0 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla FireFox 1.5.x/2.0 - FTP PASV Port-Scanning | This is a remote exploit for linux platform. Description: Mozilla FireFox 1.5.x/2.0 - FTP PASV Port-Scanning. Author: mark |
Analyze the security implications of: Mozilla FireFox 1.5.x/2.0 - FTP PASV Port-Scanning | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Lib2 PHP Library 0.2 - 'My_Statistics.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Lib2 PHP Library 0.2 - 'My_Statistics.php' Remote File Inclusion. Author: ilker Kandemir |
Analyze the security implications of: Lib2 PHP Library 0.2 - 'My_Statistics.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.