input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PSCS VPOP3 2.0 - Email Server Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: PSCS VPOP3 2.0 - Email Server Remote Denial of Service. Author: dr_insane
|
Analyze the security implications of: PSCS VPOP3 2.0 - Email Server Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CommuniGate Pro 5.1.8 - Web Mail HTML Injection
|
This is a webapps exploit for php platform. Description: CommuniGate Pro 5.1.8 - Web Mail HTML Injection. Author: Alla Bezroutchko
|
Analyze the security implications of: CommuniGate Pro 5.1.8 - Web Mail HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iTech Gigs Script 1.21 - SQL Injection
|
This is a webapps exploit for php platform. Description: iTech Gigs Script 1.21 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: iTech Gigs Script 1.21 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Kusaba 1.0.4 - Remote Code Execution (1)
|
This is a webapps exploit for php platform. Description: Kusaba 1.0.4 - Remote Code Execution (1). Author: Sausage
|
Analyze the security implications of: Kusaba 1.0.4 - Remote Code Execution (1)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CentOS Control Web Panel 0.9.8.836 - Privilege Escalation
|
This is a webapps exploit for linux platform. Description: CentOS Control Web Panel 0.9.8.836 - Privilege Escalation. Author: Pongtorn Angsuchotmetee_ Nissana Sirijirakal_ Narin Boonwasanarak
|
Analyze the security implications of: CentOS Control Web Panel 0.9.8.836 - Privilege Escalation
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Unicorn Router WB-3300NR - Cross-Site Request Forgery (Factory Reset/DNS Change)
|
This is a webapps exploit for hardware platform. Description: Unicorn Router WB-3300NR - Cross-Site Request Forgery (Factory Reset/DNS Change). Author: absane
|
Analyze the security implications of: Unicorn Router WB-3300NR - Cross-Site Request Forgery (Factory Reset/DNS Change)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CUPS < 1.3.8-4 - Local Privilege Escalation
|
This is a local exploit for multiple platform. Description: CUPS < 1.3.8-4 - Local Privilege Escalation. Author: Jon Oberheide
|
Analyze the security implications of: CUPS < 1.3.8-4 - Local Privilege Escalation
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: EPShop < 3.0 - 'pid' SQL Injection
|
This is a webapps exploit for php platform. Description: EPShop < 3.0 - 'pid' SQL Injection. Author: mikeX
|
Analyze the security implications of: EPShop < 3.0 - 'pid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: XPCD 2.0.8 - 'HOME Environment' Local Buffer Overflow
|
This is a local exploit for linux platform. Description: XPCD 2.0.8 - 'HOME Environment' Local Buffer Overflow. Author: r-code
|
Analyze the security implications of: XPCD 2.0.8 - 'HOME Environment' Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Libmusicbrainz 2.0.2/2.1.x - Multiple Buffer Overflow Vulnerabilities
|
This is a dos exploit for linux platform. Description: Libmusicbrainz 2.0.2/2.1.x - Multiple Buffer Overflow Vulnerabilities. Author: Luigi Auriemma
|
Analyze the security implications of: Libmusicbrainz 2.0.2/2.1.x - Multiple Buffer Overflow Vulnerabilities
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Countly - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Countly - Cross-Site Scripting. Author: Sleepy
|
Analyze the security implications of: Countly - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Optergy 2.3.0a - Remote Code Execution
|
This is a webapps exploit for hardware platform. Description: Optergy 2.3.0a - Remote Code Execution. Author: LiquidWorm
|
Analyze the security implications of: Optergy 2.3.0a - Remote Code Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: VideoLAN VLC Media Player 0.8.6i - Mms Protocol Handling Heap Overflow (PoC)
|
This is a dos exploit for multiple platform. Description: VideoLAN VLC Media Player 0.8.6i - Mms Protocol Handling Heap Overflow (PoC). Author: g_
|
Analyze the security implications of: VideoLAN VLC Media Player 0.8.6i - Mms Protocol Handling Heap Overflow (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Gnome Panel 2.28.0 - Denial of Service (PoC)
|
This is a dos exploit for linux platform. Description: Gnome Panel 2.28.0 - Denial of Service (PoC). Author: Pietro Oliva
|
Analyze the security implications of: Gnome Panel 2.28.0 - Denial of Service (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: I-Mall Commerce - 'i-mall.cgi' Remote Command Execution
|
This is a webapps exploit for cgi platform. Description: I-Mall Commerce - 'i-mall.cgi' Remote Command Execution. Author: Jerome Athias
|
Analyze the security implications of: I-Mall Commerce - 'i-mall.cgi' Remote Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Joomla! Component com_morfeoshow - 'idm' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_morfeoshow - 'idm' SQL Injection. Author: Th3.xin0x
|
Analyze the security implications of: Joomla! Component com_morfeoshow - 'idm' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Newsgrab 0.5.0pre4 - Multiple Local/Remote Vulnerabilities
|
This is a remote exploit for linux platform. Description: Newsgrab 0.5.0pre4 - Multiple Local/Remote Vulnerabilities. Author: Niels Heinen
|
Analyze the security implications of: Newsgrab 0.5.0pre4 - Multiple Local/Remote Vulnerabilities
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Deepin Linux 15 - 'lastore-daemon' Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Deepin Linux 15 - 'lastore-daemon' Local Privilege Escalation. Author: King's Way
|
Analyze the security implications of: Deepin Linux 15 - 'lastore-daemon' Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: FtpLocate 2.02 - 'current' Remote Command Execution
|
This is a webapps exploit for cgi platform. Description: FtpLocate 2.02 - 'current' Remote Command Execution. Author: newbug
|
Analyze the security implications of: FtpLocate 2.02 - 'current' Remote Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Power On Software On Guard for MacOS 3.2 - Emergency Password
|
This is a local exploit for osx platform. Description: Power On Software On Guard for MacOS 3.2 - Emergency Password. Author: Prozaq of mSec
|
Analyze the security implications of: Power On Software On Guard for MacOS 3.2 - Emergency Password
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Foodspotting Clone 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Foodspotting Clone 1.0 - SQL Injection. Author: 8bitsec
|
Analyze the security implications of: Foodspotting Clone 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Advanced Image Hosting (AIH) 2.3 - 'gal' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Advanced Image Hosting (AIH) 2.3 - 'gal' Blind SQL Injection. Author: boom3rang
|
Analyze the security implications of: Advanced Image Hosting (AIH) 2.3 - 'gal' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Fhimage 1.2.1 - Remote Command Execution (mq = off)
|
This is a webapps exploit for php platform. Description: Fhimage 1.2.1 - Remote Command Execution (mq = off). Author: Osirys
|
Analyze the security implications of: Fhimage 1.2.1 - Remote Command Execution (mq = off)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cyrus IMAPD 1.4/1.5.19/2.0.12/2.0.16/2.1.9/2.1.10 - Pre-Login Heap Corruption
|
This is a dos exploit for linux platform. Description: Cyrus IMAPD 1.4/1.5.19/2.0.12/2.0.16/2.1.9/2.1.10 - Pre-Login Heap Corruption. Author: Timo Sirainen
|
Analyze the security implications of: Cyrus IMAPD 1.4/1.5.19/2.0.12/2.0.16/2.1.9/2.1.10 - Pre-Login Heap Corruption
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Campsite 2.6.1 - 'article.php?g_documentRoot' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'article.php?g_documentRoot' Remote File Inclusion. Author: anonymous
|
Analyze the security implications of: Campsite 2.6.1 - 'article.php?g_documentRoot' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Community Translate - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Community Translate - Remote File Inclusion. Author: NoGe
|
Analyze the security implications of: Community Translate - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Livebox 3 Sagemcom SG30_sip-fr-5.15.8.1 - Denial of Service
|
This is a dos exploit for hardware platform. Description: Livebox 3 Sagemcom SG30_sip-fr-5.15.8.1 - Denial of Service. Author: Quentin Olagne
|
Analyze the security implications of: Livebox 3 Sagemcom SG30_sip-fr-5.15.8.1 - Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Qt - '.bmp' Parsing Bug Heap Overflow
|
This is a remote exploit for linux platform. Description: Qt - '.bmp' Parsing Bug Heap Overflow. Author: infamous41md
|
Analyze the security implications of: Qt - '.bmp' Parsing Bug Heap Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: HP-UX 10.20 - registrar Local Arbitrary File Read
|
This is a local exploit for hp-ux platform. Description: HP-UX 10.20 - registrar Local Arbitrary File Read. Author: J.A. Gutierrez
|
Analyze the security implications of: HP-UX 10.20 - registrar Local Arbitrary File Read
|
This exploit targets hp-ux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hp-ux platform
|
What is this exploit about: Escort Agency CMS - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Escort Agency CMS - Blind SQL Injection. Author: NoNameMT
|
Analyze the security implications of: Escort Agency CMS - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ascend R 4.5 Ci12 - Denial of Service
|
This is a dos exploit for hardware platform. Description: Ascend R 4.5 Ci12 - Denial of Service. Author: Rootshell
|
Analyze the security implications of: Ascend R 4.5 Ci12 - Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Apache Tomcat 8/7/6 (RedHat Based Distros) - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Apache Tomcat 8/7/6 (RedHat Based Distros) - Local Privilege Escalation. Author: Dawid Golunski
|
Analyze the security implications of: Apache Tomcat 8/7/6 (RedHat Based Distros) - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Life Insurance Management System 1.0 - 'client_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Life Insurance Management System 1.0 - 'client_id' SQL Injection. Author: Aitor Herrero
|
Analyze the security implications of: Life Insurance Management System 1.0 - 'client_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.