input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: ASPCode CMS 1.5.8 - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: ASPCode CMS 1.5.8 - Multiple Vulnerabilities. Author: Dr. Alberto Fontanella |
Analyze the security implications of: ASPCode CMS 1.5.8 - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Les Visiteurs 2.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Les Visiteurs 2.0 - Remote File Inclusion. Author: Matthieu Peschaud |
Analyze the security implications of: Les Visiteurs 2.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenSMTPD 6.6.1 - Remote Code Execution | This is a remote exploit for linux platform. Description: OpenSMTPD 6.6.1 - Remote Code Execution. Author: 1F98D |
Analyze the security implications of: OpenSMTPD 6.6.1 - Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: e107 website system 0.6 - 'usersettings.php?avmsg' Cross-Site Scripting | This is a webapps exploit for php platform. Description: e107 website system 0.6 - 'usersettings.php?avmsg' Cross-Site Scripting. Author: Janek Vind |
Analyze the security implications of: e107 website system 0.6 - 'usersettings.php?avmsg' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_jejob - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_jejob - Local File Inclusion. Author: Sid3^effects |
Analyze the security implications of: Joomla! Component com_jejob - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Article Friendly - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Article Friendly - Cross-Site Request Forgery. Author: pratul agrawal |
Analyze the security implications of: Article Friendly - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Raidsonic IB-NAS5220 and IB-NAS4220-B - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Raidsonic IB-NAS5220 and IB-NAS4220-B - Multiple Vulnerabilities. Author: m-1-k-3 |
Analyze the security implications of: Raidsonic IB-NAS5220 and IB-NAS4220-B - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: uhttp Server 0.1.0-alpha - Directory Traversal | This is a remote exploit for multiple platform. Description: uhttp Server 0.1.0-alpha - Directory Traversal. Author: Salvatore Fresta |
Analyze the security implications of: uhttp Server 0.1.0-alpha - Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Jaow CMS - 'add_ons' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Jaow CMS - 'add_ons' Cross-Site Scripting. Author: Metropolis |
Analyze the security implications of: Jaow CMS - 'add_ons' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ariadne CMS 2.4 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Ariadne CMS 2.4 - Remote File Inclusion. Author: Fidel Costa |
Analyze the security implications of: Ariadne CMS 2.4 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ecessa Edge EV150 10.7.4 - Cross-Site Request Forgery (Add Superuser) | This is a webapps exploit for linux platform. Description: Ecessa Edge EV150 10.7.4 - Cross-Site Request Forgery (Add Superuser). Author: LiquidWorm |
Analyze the security implications of: Ecessa Edge EV150 10.7.4 - Cross-Site Request Forgery (Add Superuser) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: OpenASP 3.0 - Blind SQL Injection | This is a webapps exploit for asp platform. Description: OpenASP 3.0 - Blind SQL Injection. Author: StAkeR |
Analyze the security implications of: OpenASP 3.0 - Blind SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: iBrowser Plugin 1.4.1 - 'lang' Local File Inclusion | This is a webapps exploit for php platform. Description: iBrowser Plugin 1.4.1 - 'lang' Local File Inclusion. Author: LiquidWorm |
Analyze the security implications of: iBrowser Plugin 1.4.1 - 'lang' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nagios XI Chained - Remote Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: Nagios XI Chained - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Nagios XI Chained - Remote Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SAP NetWeaver AS JAVA 7.1 < 7.5 - 'ctcprotocol Servlet' XML External Entity | This is a webapps exploit for java platform. Description: SAP NetWeaver AS JAVA 7.1 < 7.5 - 'ctcprotocol Servlet' XML External Entity. Author: ERPScan |
Analyze the security implications of: SAP NetWeaver AS JAVA 7.1 < 7.5 - 'ctcprotocol Servlet' XML External Entity | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: HOMEPIMA Design - 'filedown.php' Local File Disclosure | This is a webapps exploit for php platform. Description: HOMEPIMA Design - 'filedown.php' Local File Disclosure. Author: KnocKout |
Analyze the security implications of: HOMEPIMA Design - 'filedown.php' Local File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Magician Blog 1.0 - 'ids' SQL Injection | This is a webapps exploit for php platform. Description: Magician Blog 1.0 - 'ids' SQL Injection. Author: Evil-Cod3r |
Analyze the security implications of: Magician Blog 1.0 - 'ids' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Operator Shell (osh) 1.7-13 - Local Privilege Escalation | This is a local exploit for linux platform. Description: Operator Shell (osh) 1.7-13 - Local Privilege Escalation. Author: Charles Stevenson |
Analyze the security implications of: Operator Shell (osh) 1.7-13 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Irssi 0.8.13 - 'WALLOPS' Message Off-by-One Heap Memory Corruption | This is a dos exploit for linux platform. Description: Irssi 0.8.13 - 'WALLOPS' Message Off-by-One Heap Memory Corruption. Author: nemo |
Analyze the security implications of: Irssi 0.8.13 - 'WALLOPS' Message Off-by-One Heap Memory Corruption | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: EMC IRM License Server 4.6.1.1995 - Denial of Service | This is a dos exploit for hardware platform. Description: EMC IRM License Server 4.6.1.1995 - Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: EMC IRM License Server 4.6.1.1995 - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Opera 7.11/7.20 HREF - Malformed Server Name Heap Corruption | This is a dos exploit for multiple platform. Description: Opera 7.11/7.20 HREF - Malformed Server Name Heap Corruption. Author: @stake |
Analyze the security implications of: Opera 7.11/7.20 HREF - Malformed Server Name Heap Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: IBM DB2 - 'db2stop' Format String Arbitrary Code Execution | This is a local exploit for linux platform. Description: IBM DB2 - 'db2stop' Format String Arbitrary Code Execution. Author: SNOSoft |
Analyze the security implications of: IBM DB2 - 'db2stop' Format String Arbitrary Code Execution | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: IBM DB2 9.7/10.1/10.5/11.1 - Command Line Processor Buffer Overflow | This is a dos exploit for multiple platform. Description: IBM DB2 9.7/10.1/10.5/11.1 - Command Line Processor Buffer Overflow. Author: defensecode |
Analyze the security implications of: IBM DB2 9.7/10.1/10.5/11.1 - Command Line Processor Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Google Chrome V8 JavaScript Engine 71.0.3578.98 - Out-of-Memory. Denial of Service (PoC) | This is a dos exploit for multiple platform. Description: Google Chrome V8 JavaScript Engine 71.0.3578.98 - Out-of-Memory. Denial of Service (PoC). Author: Bogdan Kurinnoy |
Analyze the security implications of: Google Chrome V8 JavaScript Engine 71.0.3578.98 - Out-of-Memory. Denial of Service (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Survey Sparrow Enterprise Survey Software 2022 - Stored Cross-Site Scripting (XSS) | This is a webapps exploit for multiple platform. Description: Survey Sparrow Enterprise Survey Software 2022 - Stored Cross-Site Scripting (XSS). Author: Pankaj Kumar Thakur |
Analyze the security implications of: Survey Sparrow Enterprise Survey Software 2022 - Stored Cross-Site Scripting (XSS) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: 2DayBiz Advanced Poll Script - Cross-Site Scripting / Authentication Bypass | This is a webapps exploit for php platform. Description: 2DayBiz Advanced Poll Script - Cross-Site Scripting / Authentication Bypass. Author: Sid3^effects |
Analyze the security implications of: 2DayBiz Advanced Poll Script - Cross-Site Scripting / Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX xnu 1228.3.13 - IPv6-ipcomp Remote kernel Denial of Service (PoC) | This is a dos exploit for multiple platform. Description: Apple Mac OSX xnu 1228.3.13 - IPv6-ipcomp Remote kernel Denial of Service (PoC). Author: mu-b |
Analyze the security implications of: Apple Mac OSX xnu 1228.3.13 - IPv6-ipcomp Remote kernel Denial of Service (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AL-Athkat.2.0 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: AL-Athkat.2.0 - Cross-Site Scripting. Author: indoushka |
Analyze the security implications of: AL-Athkat.2.0 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Call of Duty 4 1.5 - 'stats' Denial of Service | This is a dos exploit for multiple platform. Description: Call of Duty 4 1.5 - 'stats' Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Call of Duty 4 1.5 - 'stats' Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Memcached 1.4.33 - 'Crash' (PoC) | This is a dos exploit for linux platform. Description: Memcached 1.4.33 - 'Crash' (PoC). Author: p0wd3r / dawu |
Analyze the security implications of: Memcached 1.4.33 - 'Crash' (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DUware DUforum 3.0/3.1 - 'post.asp?iFor' SQL Injection | This is a webapps exploit for asp platform. Description: DUware DUforum 3.0/3.1 - 'post.asp?iFor' SQL Injection. Author: Dedi Dwianto |
Analyze the security implications of: DUware DUforum 3.0/3.1 - 'post.asp?iFor' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: jclassifiedsmanager - Multiple Vulnerabilities | This is a webapps exploit for multiple platform. Description: jclassifiedsmanager - Multiple Vulnerabilities. Author: Sarath Nair |
Analyze the security implications of: jclassifiedsmanager - Multiple Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component CB Resume Builder - 'group_id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component CB Resume Builder - 'group_id' SQL Injection. Author: kaMtiEz |
Analyze the security implications of: Joomla! Component CB Resume Builder - 'group_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 7.2.2 - 'php_stream_url_wrap_http_ex' Buffer Overflow | This is a dos exploit for php platform. Description: PHP 7.2.2 - 'php_stream_url_wrap_http_ex' Buffer Overflow. Author: Wei Lei and Liu Yang |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.