input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Mozilla Suite/Firefox - Navigator Object Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Mozilla Suite/Firefox - Navigator Object Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Mozilla Suite/Firefox - Navigator Object Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Procentia IntelliPen 1.1.12.1520 - 'data.aspx' Blind SQL Injection | This is a webapps exploit for asp platform. Description: Procentia IntelliPen 1.1.12.1520 - 'data.aspx' Blind SQL Injection. Author: Portcullis |
Analyze the security implications of: Procentia IntelliPen 1.1.12.1520 - 'data.aspx' Blind SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: X.Org xorg 1.4 < 1.11.2 - File Permission Change | This is a local exploit for linux platform. Description: X.Org xorg 1.4 < 1.11.2 - File Permission Change. Author: vladz |
Analyze the security implications of: X.Org xorg 1.4 < 1.11.2 - File Permission Change | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: kr-web 1.1b2 - Remote File Inclusion | This is a webapps exploit for php platform. Description: kr-web 1.1b2 - Remote File Inclusion. Author: cr4wl3r |
Analyze the security implications of: kr-web 1.1b2 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Drupal 4.0 - News Message HTML Injection | This is a webapps exploit for php platform. Description: Drupal 4.0 - News Message HTML Injection. Author: das@hush.com |
Analyze the security implications of: Drupal 4.0 - News Message HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache OFBiz - Admin Creator | This is a remote exploit for multiple platform. Description: Apache OFBiz - Admin Creator. Author: Lucas Apa |
Analyze the security implications of: Apache OFBiz - Admin Creator | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mitel Audio and Web Conferencing (AWC) - Arbitrary Shell Command Injection | This is a remote exploit for linux platform. Description: Mitel Audio and Web Conferencing (AWC) - Arbitrary Shell Command Injection. Author: Jan Fry |
Analyze the security implications of: Mitel Audio and Web Conferencing (AWC) - Arbitrary Shell Command Injection | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Websense Proxy - Filter Bypass | This is a dos exploit for multiple platform. Description: Websense Proxy - Filter Bypass. Author: Nahuel Grisolia |
Analyze the security implications of: Websense Proxy - Filter Bypass | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: JioFi 4G M2S 1.0.2 - Denial of Service | This is a dos exploit for hardware platform. Description: JioFi 4G M2S 1.0.2 - Denial of Service. Author: Vikas Chaudhary |
Analyze the security implications of: JioFi 4G M2S 1.0.2 - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Mambo Module MOStlyCE 2.4 - 'connector.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Mambo Module MOStlyCE 2.4 - 'connector.php' Cross-Site Scripting. Author: AmnPardaz |
Analyze the security implications of: Mambo Module MOStlyCE 2.4 - 'connector.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NetWare 6.5 - SunRPC Portmapper CALLIT Stack Buffer Overflow (Metasploit) | This is a remote exploit for netware platform. Description: NetWare 6.5 - SunRPC Portmapper CALLIT Stack Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: NetWare 6.5 - SunRPC Portmapper CALLIT Stack Buffer Overflow (Metasploit) | This exploit targets netware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets netware platform |
What is this exploit about: Ubee EVW3200 - Multiple Persistent Cross-Site Scripting Vulnerabilities | This is a webapps exploit for hardware platform. Description: Ubee EVW3200 - Multiple Persistent Cross-Site Scripting Vulnerabilities. Author: Jeroen - IT Nerdbox |
Analyze the security implications of: Ubee EVW3200 - Multiple Persistent Cross-Site Scripting Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: eazyPortal 1.0.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: eazyPortal 1.0.0 - Multiple Vulnerabilities. Author: Milos Zivanovic |
Analyze the security implications of: eazyPortal 1.0.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Interbase 5/6 - GDS_Lock_MGR UMask File Permission Changing | This is a local exploit for linux platform. Description: Interbase 5/6 - GDS_Lock_MGR UMask File Permission Changing. Author: grazer |
Analyze the security implications of: Interbase 5/6 - GDS_Lock_MGR UMask File Permission Changing | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PSCS VPOP3 2.0 Email Server WebAdmin - Cross-Site Scripting | This is a remote exploit for multiple platform. Description: PSCS VPOP3 2.0 Email Server WebAdmin - Cross-Site Scripting. Author: SecuriTeam |
Analyze the security implications of: PSCS VPOP3 2.0 Email Server WebAdmin - Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Sun Java System Web Server 6.1/7.0 - 'TRACE' Heap Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: Sun Java System Web Server 6.1/7.0 - 'TRACE' Heap Buffer Overflow (PoC). Author: Evgeny Legerov |
Analyze the security implications of: Sun Java System Web Server 6.1/7.0 - 'TRACE' Heap Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Pimcore customer-data-framework 4.2.0 - SQL injection | This is a webapps exploit for multiple platform. Description: Pimcore customer-data-framework 4.2.0 - SQL injection. Author: maeitsec |
Analyze the security implications of: Pimcore customer-data-framework 4.2.0 - SQL injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Wireshark - ascend_seek Static Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: Wireshark - ascend_seek Static Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: Wireshark - ascend_seek Static Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Sendmail 8.11.x (Linux/i386) - Local Privilege Escalation | This is a local exploit for linux platform. Description: Sendmail 8.11.x (Linux/i386) - Local Privilege Escalation. Author: sd |
Analyze the security implications of: Sendmail 8.11.x (Linux/i386) - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Bubbling Library 1.32 - Multiple Local File Inclusions | This is a webapps exploit for php platform. Description: Bubbling Library 1.32 - Multiple Local File Inclusions. Author: Stack |
Analyze the security implications of: Bubbling Library 1.32 - Multiple Local File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Buffalo TeraStation TS-Series - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Buffalo TeraStation TS-Series - Multiple Vulnerabilities. Author: Andrea Fabrizi |
Analyze the security implications of: Buffalo TeraStation TS-Series - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Teradici Management Console 2.2.0 - Privilege Escalation | This is a webapps exploit for linux platform. Description: Teradici Management Console 2.2.0 - Privilege Escalation. Author: hantwister |
Analyze the security implications of: Teradici Management Console 2.2.0 - Privilege Escalation | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: kalimat new system 1.0 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: kalimat new system 1.0 - 'index.php' SQL Injection. Author: ProF.Code |
Analyze the security implications of: kalimat new system 1.0 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AGENCY4NET WEBFTP 1 - 'download2.php' File Disclosure | This is a webapps exploit for php platform. Description: AGENCY4NET WEBFTP 1 - 'download2.php' File Disclosure. Author: GoLd_M |
Analyze the security implications of: AGENCY4NET WEBFTP 1 - 'download2.php' File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Host Directory PRO 2.1.0 - Remote Change Admin Password | This is a webapps exploit for php platform. Description: Host Directory PRO 2.1.0 - Remote Change Admin Password. Author: TiGeR-Dz |
Analyze the security implications of: Host Directory PRO 2.1.0 - Remote Change Admin Password | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Airia - Cross-Site Request Forgery (Add Content) | This is a webapps exploit for php platform. Description: Airia - Cross-Site Request Forgery (Add Content). Author: HaHwul |
Analyze the security implications of: Airia - Cross-Site Request Forgery (Add Content) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MySQL 3.20.32/3.22.x/3.23.x - Null Root Password Weak Default Configuration (2) | This is a remote exploit for linux platform. Description: MySQL 3.20.32/3.22.x/3.23.x - Null Root Password Weak Default Configuration (2). Author: st0ic |
Analyze the security implications of: MySQL 3.20.32/3.22.x/3.23.x - Null Root Password Weak Default Configuration (2) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: M/Monit 3.7.4 - Password Disclosure | This is a webapps exploit for multiple platform. Description: M/Monit 3.7.4 - Password Disclosure. Author: Dolev Farhi |
Analyze the security implications of: M/Monit 3.7.4 - Password Disclosure | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Emby MediaServer 3.2.5 - Password Reset | This is a webapps exploit for multiple platform. Description: Emby MediaServer 3.2.5 - Password Reset. Author: LiquidWorm |
Analyze the security implications of: Emby MediaServer 3.2.5 - Password Reset | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: UApplication Uguestbook 1.0 - 'index.asp' SQL Injection | This is a webapps exploit for asp platform. Description: UApplication Uguestbook 1.0 - 'index.asp' SQL Injection. Author: Aria-Security Team |
Analyze the security implications of: UApplication Uguestbook 1.0 - 'index.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Cisco IP Phone 7940 - 3 SIP Messages Remote Denial of Service | This is a dos exploit for hardware platform. Description: Cisco IP Phone 7940 - 3 SIP Messages Remote Denial of Service. Author: MADYNES |
Analyze the security implications of: Cisco IP Phone 7940 - 3 SIP Messages Remote Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Western Digital Arkeia < 11.0.12 - Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Western Digital Arkeia < 11.0.12 - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Western Digital Arkeia < 11.0.12 - Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ECOA Building Automation System - Remote Privilege Escalation | This is a webapps exploit for hardware platform. Description: ECOA Building Automation System - Remote Privilege Escalation. Author: Neurogenesia |
Analyze the security implications of: ECOA Building Automation System - Remote Privilege Escalation | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.