input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: WhatsUp Gold 16.3 - Remote Code Execution | This is a webapps exploit for asp platform. Description: WhatsUp Gold 16.3 - Remote Code Execution. Author: Matt Buzanowski |
Analyze the security implications of: WhatsUp Gold 16.3 - Remote Code Execution | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Dodo's Quiz Script 1.1 - Local File Inclusion | This is a webapps exploit for php platform. Description: Dodo's Quiz Script 1.1 - Local File Inclusion. Author: Stack |
Analyze the security implications of: Dodo's Quiz Script 1.1 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_adagency - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_adagency - Local File Inclusion. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_adagency - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DD-WRT HTTPd Daemon/Service - Arbitrary Command Execution (Metasploit) | This is a webapps exploit for cgi platform. Description: DD-WRT HTTPd Daemon/Service - Arbitrary Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: DD-WRT HTTPd Daemon/Service - Arbitrary Command Execution (Metasploit) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: WebKit JavaScriptCore - CodeBlock Dangling Watchpoints Use-After-Free | This is a dos exploit for multiple platform. Description: WebKit JavaScriptCore - CodeBlock Dangling Watchpoints Use-After-Free. Author: Google Security Research |
Analyze the security implications of: WebKit JavaScriptCore - CodeBlock Dangling Watchpoints Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Orion Application Server 2.0.7 - 'Terminal Escape Sequence in Logs' Command Injection | This is a remote exploit for multiple platform. Description: Orion Application Server 2.0.7 - 'Terminal Escape Sequence in Logs' Command Injection. Author: evilaliv3 |
Analyze the security implications of: Orion Application Server 2.0.7 - 'Terminal Escape Sequence in Logs' Command Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: OpenBSD 6.x - Dynamic Loader Privilege Escalation | This is a local exploit for openbsd platform. Description: OpenBSD 6.x - Dynamic Loader Privilege Escalation. Author: Qualys Corporation |
Analyze the security implications of: OpenBSD 6.x - Dynamic Loader Privilege Escalation | This exploit targets openbsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets openbsd platform |
What is this exploit about: Ez Cart 1.0 - Multiple Cross-Site Request Forgery Vulnerabilities | This is a webapps exploit for php platform. Description: Ez Cart 1.0 - Multiple Cross-Site Request Forgery Vulnerabilities. Author: Milos Zivanovic |
Analyze the security implications of: Ez Cart 1.0 - Multiple Cross-Site Request Forgery Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AirDroid 4.2.1.6 - Denial of Service | This is a dos exploit for android platform. Description: AirDroid 4.2.1.6 - Denial of Service. Author: s4vitar |
Analyze the security implications of: AirDroid 4.2.1.6 - Denial of Service | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Mozilla Firefox < 55 - Denial of Service | This is a dos exploit for multiple platform. Description: Mozilla Firefox < 55 - Denial of Service. Author: Amit Sangra |
Analyze the security implications of: Mozilla Firefox < 55 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Itech Travel Portal Script 9.33 - SQL Injection | This is a webapps exploit for php platform. Description: Itech Travel Portal Script 9.33 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Itech Travel Portal Script 9.33 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Orion Network Performance Monitor 10.1.3 - 'CustomChart.aspx' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Orion Network Performance Monitor 10.1.3 - 'CustomChart.aspx' Cross-Site Scripting. Author: Gustavo Roberto |
Analyze the security implications of: Orion Network Performance Monitor 10.1.3 - 'CustomChart.aspx' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ALCASAR 2.8.1 - Remote Code Execution | This is a webapps exploit for php platform. Description: ALCASAR 2.8.1 - Remote Code Execution. Author: eF |
Analyze the security implications of: ALCASAR 2.8.1 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ProFTPd 1.2.0 pre10 - Remote Denial of Service | This is a dos exploit for linux platform. Description: ProFTPd 1.2.0 pre10 - Remote Denial of Service. Author: JeT-Li |
Analyze the security implications of: ProFTPd 1.2.0 pre10 - Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FreeBSD-SA-19:15.mqueuefs - Privilege Escalation | This is a local exploit for freebsd platform. Description: FreeBSD-SA-19:15.mqueuefs - Privilege Escalation. Author: Karsten König |
Analyze the security implications of: FreeBSD-SA-19:15.mqueuefs - Privilege Escalation | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Adobe ColdFusion < 11 Update 10 - XML External Entity Injection | This is a webapps exploit for multiple platform. Description: Adobe ColdFusion < 11 Update 10 - XML External Entity Injection. Author: Dawid Golunski |
Analyze the security implications of: Adobe ColdFusion < 11 Update 10 - XML External Entity Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FaScript FaPersianHack 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: FaScript FaPersianHack 1.0 - SQL Injection. Author: Khashayar Fereidani |
Analyze the security implications of: FaScript FaPersianHack 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Egreetings 1.0b - Remote Database Disclosure | This is a webapps exploit for asp platform. Description: Egreetings 1.0b - Remote Database Disclosure. Author: ViRuSMaN |
Analyze the security implications of: Egreetings 1.0b - Remote Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: IMGallery 2.5 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: IMGallery 2.5 - Multiple SQL Injections. Author: cOndemned |
Analyze the security implications of: IMGallery 2.5 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe RoboHelp Server 8 - Arbitrary File Upload / Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Adobe RoboHelp Server 8 - Arbitrary File Upload / Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Adobe RoboHelp Server 8 - Arbitrary File Upload / Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Google Chrome V8 JavaScript Engine 71.0.3578.98 - Out-of-Memory in Invalid Array Length | This is a dos exploit for multiple platform. Description: Google Chrome V8 JavaScript Engine 71.0.3578.98 - Out-of-Memory in Invalid Array Length. Author: Bogdan Kurinnoy |
Analyze the security implications of: Google Chrome V8 JavaScript Engine 71.0.3578.98 - Out-of-Memory in Invalid Array Length | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: cms -db 0.7.13 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: cms -db 0.7.13 - Multiple Vulnerabilities. Author: cp77fk4r |
Analyze the security implications of: cms -db 0.7.13 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 32-bit - Remote Code Execution (RCE) | This is a remote exploit for multiple platform. Description: Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 32-bit - Remote Code Execution (RCE). Author: nu11secur1ty |
Analyze the security implications of: Microsoft 365 MSO (Version 2305 Build 16.0.16501.20074) 32-bit - Remote Code Execution (RCE) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cisco Router - HTTP Administration Cross-Site Request Forgery / Command Execution (1) | This is a remote exploit for hardware platform. Description: Cisco Router - HTTP Administration Cross-Site Request Forgery / Command Execution (1). Author: Jeremy Brown |
Analyze the security implications of: Cisco Router - HTTP Administration Cross-Site Request Forgery / Command Execution (1) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Sun Java System Calendar Server 6 - 'command.shtml' Cross-Site Scripting | This is a webapps exploit for java platform. Description: Sun Java System Calendar Server 6 - 'command.shtml' Cross-Site Scripting. Author: SCS team |
Analyze the security implications of: Sun Java System Calendar Server 6 - 'command.shtml' Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Sun/Oracle GlassFish Server - (Authenticated) Code Execution (Metasploit) | This is a webapps exploit for jsp platform. Description: Sun/Oracle GlassFish Server - (Authenticated) Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Sun/Oracle GlassFish Server - (Authenticated) Code Execution (Metasploit) | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Mambo Component CopperminePhotoGalery - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Component CopperminePhotoGalery - Remote File Inclusion. Author: k1tk4t |
Analyze the security implications of: Mambo Component CopperminePhotoGalery - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FlashChat 6.0.2 < 6.0.8 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: FlashChat 6.0.2 < 6.0.8 - Arbitrary File Upload. Author: x-hayben21 |
Analyze the security implications of: FlashChat 6.0.2 < 6.0.8 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iTech Travel Script 9.49 - SQL Injection | This is a webapps exploit for php platform. Description: iTech Travel Script 9.49 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: iTech Travel Script 9.49 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: java Bridge 5.5 - Directory Traversal | This is a webapps exploit for php platform. Description: java Bridge 5.5 - Directory Traversal. Author: Saxtor |
Analyze the security implications of: java Bridge 5.5 - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BMForum 3.0 - 'topic.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: BMForum 3.0 - 'topic.php' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: BMForum 3.0 - 'topic.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Achievo 0.7/0.8/0.9 - Remote File Inclusion / Command Execution | This is a webapps exploit for php platform. Description: Achievo 0.7/0.8/0.9 - Remote File Inclusion / Command Execution. Author: Jeroen Latour |
Analyze the security implications of: Achievo 0.7/0.8/0.9 - Remote File Inclusion / Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Easy Banner Pro 2.8 - 'info.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Easy Banner Pro 2.8 - 'info.php' Remote File Inclusion. Author: rUnViRuS |
Analyze the security implications of: Easy Banner Pro 2.8 - 'info.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LucidCMS 2.0 - Login SQL Injection | This is a webapps exploit for php platform. Description: LucidCMS 2.0 - Login SQL Injection. Author: rgod |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.