input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Mozilla Suite/Firefox - Navigator Object Code Execution (Metasploit)
|
This is a remote exploit for multiple platform. Description: Mozilla Suite/Firefox - Navigator Object Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Mozilla Suite/Firefox - Navigator Object Code Execution (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Procentia IntelliPen 1.1.12.1520 - 'data.aspx' Blind SQL Injection
|
This is a webapps exploit for asp platform. Description: Procentia IntelliPen 1.1.12.1520 - 'data.aspx' Blind SQL Injection. Author: Portcullis
|
Analyze the security implications of: Procentia IntelliPen 1.1.12.1520 - 'data.aspx' Blind SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: X.Org xorg 1.4 < 1.11.2 - File Permission Change
|
This is a local exploit for linux platform. Description: X.Org xorg 1.4 < 1.11.2 - File Permission Change. Author: vladz
|
Analyze the security implications of: X.Org xorg 1.4 < 1.11.2 - File Permission Change
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: kr-web 1.1b2 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: kr-web 1.1b2 - Remote File Inclusion. Author: cr4wl3r
|
Analyze the security implications of: kr-web 1.1b2 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Drupal 4.0 - News Message HTML Injection
|
This is a webapps exploit for php platform. Description: Drupal 4.0 - News Message HTML Injection. Author: das@hush.com
|
Analyze the security implications of: Drupal 4.0 - News Message HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apache OFBiz - Admin Creator
|
This is a remote exploit for multiple platform. Description: Apache OFBiz - Admin Creator. Author: Lucas Apa
|
Analyze the security implications of: Apache OFBiz - Admin Creator
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Mitel Audio and Web Conferencing (AWC) - Arbitrary Shell Command Injection
|
This is a remote exploit for linux platform. Description: Mitel Audio and Web Conferencing (AWC) - Arbitrary Shell Command Injection. Author: Jan Fry
|
Analyze the security implications of: Mitel Audio and Web Conferencing (AWC) - Arbitrary Shell Command Injection
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Websense Proxy - Filter Bypass
|
This is a dos exploit for multiple platform. Description: Websense Proxy - Filter Bypass. Author: Nahuel Grisolia
|
Analyze the security implications of: Websense Proxy - Filter Bypass
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: JioFi 4G M2S 1.0.2 - Denial of Service
|
This is a dos exploit for hardware platform. Description: JioFi 4G M2S 1.0.2 - Denial of Service. Author: Vikas Chaudhary
|
Analyze the security implications of: JioFi 4G M2S 1.0.2 - Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Mambo Module MOStlyCE 2.4 - 'connector.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Mambo Module MOStlyCE 2.4 - 'connector.php' Cross-Site Scripting. Author: AmnPardaz
|
Analyze the security implications of: Mambo Module MOStlyCE 2.4 - 'connector.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: NetWare 6.5 - SunRPC Portmapper CALLIT Stack Buffer Overflow (Metasploit)
|
This is a remote exploit for netware platform. Description: NetWare 6.5 - SunRPC Portmapper CALLIT Stack Buffer Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: NetWare 6.5 - SunRPC Portmapper CALLIT Stack Buffer Overflow (Metasploit)
|
This exploit targets netware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets netware platform
|
What is this exploit about: Ubee EVW3200 - Multiple Persistent Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Ubee EVW3200 - Multiple Persistent Cross-Site Scripting Vulnerabilities. Author: Jeroen - IT Nerdbox
|
Analyze the security implications of: Ubee EVW3200 - Multiple Persistent Cross-Site Scripting Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: eazyPortal 1.0.0 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: eazyPortal 1.0.0 - Multiple Vulnerabilities. Author: Milos Zivanovic
|
Analyze the security implications of: eazyPortal 1.0.0 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Interbase 5/6 - GDS_Lock_MGR UMask File Permission Changing
|
This is a local exploit for linux platform. Description: Interbase 5/6 - GDS_Lock_MGR UMask File Permission Changing. Author: grazer
|
Analyze the security implications of: Interbase 5/6 - GDS_Lock_MGR UMask File Permission Changing
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: PSCS VPOP3 2.0 Email Server WebAdmin - Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: PSCS VPOP3 2.0 Email Server WebAdmin - Cross-Site Scripting. Author: SecuriTeam
|
Analyze the security implications of: PSCS VPOP3 2.0 Email Server WebAdmin - Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Sun Java System Web Server 6.1/7.0 - 'TRACE' Heap Buffer Overflow (PoC)
|
This is a dos exploit for multiple platform. Description: Sun Java System Web Server 6.1/7.0 - 'TRACE' Heap Buffer Overflow (PoC). Author: Evgeny Legerov
|
Analyze the security implications of: Sun Java System Web Server 6.1/7.0 - 'TRACE' Heap Buffer Overflow (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Pimcore customer-data-framework 4.2.0 - SQL injection
|
This is a webapps exploit for multiple platform. Description: Pimcore customer-data-framework 4.2.0 - SQL injection. Author: maeitsec
|
Analyze the security implications of: Pimcore customer-data-framework 4.2.0 - SQL injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Wireshark - ascend_seek Static Out-of-Bounds Read
|
This is a dos exploit for multiple platform. Description: Wireshark - ascend_seek Static Out-of-Bounds Read. Author: Google Security Research
|
Analyze the security implications of: Wireshark - ascend_seek Static Out-of-Bounds Read
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Sendmail 8.11.x (Linux/i386) - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Sendmail 8.11.x (Linux/i386) - Local Privilege Escalation. Author: sd
|
Analyze the security implications of: Sendmail 8.11.x (Linux/i386) - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Bubbling Library 1.32 - Multiple Local File Inclusions
|
This is a webapps exploit for php platform. Description: Bubbling Library 1.32 - Multiple Local File Inclusions. Author: Stack
|
Analyze the security implications of: Bubbling Library 1.32 - Multiple Local File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Buffalo TeraStation TS-Series - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Buffalo TeraStation TS-Series - Multiple Vulnerabilities. Author: Andrea Fabrizi
|
Analyze the security implications of: Buffalo TeraStation TS-Series - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Teradici Management Console 2.2.0 - Privilege Escalation
|
This is a webapps exploit for linux platform. Description: Teradici Management Console 2.2.0 - Privilege Escalation. Author: hantwister
|
Analyze the security implications of: Teradici Management Console 2.2.0 - Privilege Escalation
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: kalimat new system 1.0 - 'index.php' SQL Injection
|
This is a webapps exploit for php platform. Description: kalimat new system 1.0 - 'index.php' SQL Injection. Author: ProF.Code
|
Analyze the security implications of: kalimat new system 1.0 - 'index.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AGENCY4NET WEBFTP 1 - 'download2.php' File Disclosure
|
This is a webapps exploit for php platform. Description: AGENCY4NET WEBFTP 1 - 'download2.php' File Disclosure. Author: GoLd_M
|
Analyze the security implications of: AGENCY4NET WEBFTP 1 - 'download2.php' File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Host Directory PRO 2.1.0 - Remote Change Admin Password
|
This is a webapps exploit for php platform. Description: Host Directory PRO 2.1.0 - Remote Change Admin Password. Author: TiGeR-Dz
|
Analyze the security implications of: Host Directory PRO 2.1.0 - Remote Change Admin Password
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Airia - Cross-Site Request Forgery (Add Content)
|
This is a webapps exploit for php platform. Description: Airia - Cross-Site Request Forgery (Add Content). Author: HaHwul
|
Analyze the security implications of: Airia - Cross-Site Request Forgery (Add Content)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MySQL 3.20.32/3.22.x/3.23.x - Null Root Password Weak Default Configuration (2)
|
This is a remote exploit for linux platform. Description: MySQL 3.20.32/3.22.x/3.23.x - Null Root Password Weak Default Configuration (2). Author: st0ic
|
Analyze the security implications of: MySQL 3.20.32/3.22.x/3.23.x - Null Root Password Weak Default Configuration (2)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: M/Monit 3.7.4 - Password Disclosure
|
This is a webapps exploit for multiple platform. Description: M/Monit 3.7.4 - Password Disclosure. Author: Dolev Farhi
|
Analyze the security implications of: M/Monit 3.7.4 - Password Disclosure
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Emby MediaServer 3.2.5 - Password Reset
|
This is a webapps exploit for multiple platform. Description: Emby MediaServer 3.2.5 - Password Reset. Author: LiquidWorm
|
Analyze the security implications of: Emby MediaServer 3.2.5 - Password Reset
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: UApplication Uguestbook 1.0 - 'index.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: UApplication Uguestbook 1.0 - 'index.asp' SQL Injection. Author: Aria-Security Team
|
Analyze the security implications of: UApplication Uguestbook 1.0 - 'index.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Cisco IP Phone 7940 - 3 SIP Messages Remote Denial of Service
|
This is a dos exploit for hardware platform. Description: Cisco IP Phone 7940 - 3 SIP Messages Remote Denial of Service. Author: MADYNES
|
Analyze the security implications of: Cisco IP Phone 7940 - 3 SIP Messages Remote Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Western Digital Arkeia < 11.0.12 - Remote Code Execution (Metasploit)
|
This is a remote exploit for multiple platform. Description: Western Digital Arkeia < 11.0.12 - Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Western Digital Arkeia < 11.0.12 - Remote Code Execution (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ECOA Building Automation System - Remote Privilege Escalation
|
This is a webapps exploit for hardware platform. Description: ECOA Building Automation System - Remote Privilege Escalation. Author: Neurogenesia
|
Analyze the security implications of: ECOA Building Automation System - Remote Privilege Escalation
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.