input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Opera 9 IRC Client - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Opera 9 IRC Client - Remote Denial of Service. Author: Preddy |
Analyze the security implications of: Opera 9 IRC Client - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Gordano NTMail 4.2 - Web File Access | This is a remote exploit for multiple platform. Description: Gordano NTMail 4.2 - Web File Access. Author: Marc |
Analyze the security implications of: Gordano NTMail 4.2 - Web File Access | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Artifex MuPDF mujstest 1.10a - Null Pointer Dereference | This is a dos exploit for linux platform. Description: Artifex MuPDF mujstest 1.10a - Null Pointer Dereference. Author: Agostino Sarubbo |
Analyze the security implications of: Artifex MuPDF mujstest 1.10a - Null Pointer Dereference | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SH-HTTPD 0.3/0.4 - Character Filtering Remote Information Disclosure | This is a remote exploit for linux platform. Description: SH-HTTPD 0.3/0.4 - Character Filtering Remote Information Disclosure. Author: dong-h0un U |
Analyze the security implications of: SH-HTTPD 0.3/0.4 - Character Filtering Remote Information Disclosure | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_productbook - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_productbook - SQL Injection. Author: snakespc |
Analyze the security implications of: Joomla! Component com_productbook - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Agilebio Lab Collector Electronic Lab Notebook v4.234 - Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: Agilebio Lab Collector Electronic Lab Notebook v4.234 - Remote Code Execution (RCE). Author: Anthony Cole |
Analyze the security implications of: Agilebio Lab Collector Electronic Lab Notebook v4.234 - Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SAP BusinessObjects Intelligence 4.3 - XML External Entity (XXE) | This is a remote exploit for multiple platform. Description: SAP BusinessObjects Intelligence 4.3 - XML External Entity (XXE). Author: West Shepherd |
Analyze the security implications of: SAP BusinessObjects Intelligence 4.3 - XML External Entity (XXE) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: KC Wiki 1.0 - '/minimal/wiki.php?page' Remote File Inclusion | This is a webapps exploit for php platform. Description: KC Wiki 1.0 - '/minimal/wiki.php?page' Remote File Inclusion. Author: muuratsalo |
Analyze the security implications of: KC Wiki 1.0 - '/minimal/wiki.php?page' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dolibarr ERP/CRM 8.0.3 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Dolibarr ERP/CRM 8.0.3 - Cross-Site Scripting. Author: AkkuS |
Analyze the security implications of: Dolibarr ERP/CRM 8.0.3 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RICOH MP 305+ Printer - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: RICOH MP 305+ Printer - Cross-Site Scripting. Author: Ismail Tasdelen |
Analyze the security implications of: RICOH MP 305+ Printer - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: D-Link Central WiFiManager Software Controller 1.03 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: D-Link Central WiFiManager Software Controller 1.03 - Multiple Vulnerabilities. Author: Core Security |
Analyze the security implications of: D-Link Central WiFiManager Software Controller 1.03 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fork CMS 3.8.5 - SQL Injection | This is a webapps exploit for php platform. Description: Fork CMS 3.8.5 - SQL Injection. Author: Sven Schleier |
Analyze the security implications of: Fork CMS 3.8.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CommuniGate Pro Webmail 4.0.6 - Session Hijacking | This is a remote exploit for linux platform. Description: CommuniGate Pro Webmail 4.0.6 - Session Hijacking. Author: Yaroslav Polyakov |
Analyze the security implications of: CommuniGate Pro Webmail 4.0.6 - Session Hijacking | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Blue Eye CMS 1.0.0 - 'clanek' Blind SQL Injection | This is a webapps exploit for php platform. Description: Blue Eye CMS 1.0.0 - 'clanek' Blind SQL Injection. Author: darkjoker |
Analyze the security implications of: Blue Eye CMS 1.0.0 - 'clanek' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla Firefox 1.5.0.7/2.0 - 'createRange' Remote Denial of Service | This is a dos exploit for multiple platform. Description: Mozilla Firefox 1.5.0.7/2.0 - 'createRange' Remote Denial of Service. Author: Gotfault Security |
Analyze the security implications of: Mozilla Firefox 1.5.0.7/2.0 - 'createRange' Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Dental Clinic Appointment Reservation System 1.0 - Authentication Bypass (SQLi) | This is a webapps exploit for php platform. Description: Dental Clinic Appointment Reservation System 1.0 - Authentication Bypass (SQLi). Author: Mesut Cetin |
Analyze the security implications of: Dental Clinic Appointment Reservation System 1.0 - Authentication Bypass (SQLi) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Greg Matthews - 'Classifieds.cgi' 1.0 MetaCharacter | This is a remote exploit for cgi platform. Description: Greg Matthews - 'Classifieds.cgi' 1.0 MetaCharacter. Author: anonymous |
Analyze the security implications of: Greg Matthews - 'Classifieds.cgi' 1.0 MetaCharacter | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Active Web Helpdesk 2 - 'categoryId' Blind SQL Injection | This is a webapps exploit for php platform. Description: Active Web Helpdesk 2 - 'categoryId' Blind SQL Injection. Author: Cyber-Zone |
Analyze the security implications of: Active Web Helpdesk 2 - 'categoryId' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AllMyVisitors 0.x - 'info.inc.php' Arbitrary Code Execution | This is a webapps exploit for php platform. Description: AllMyVisitors 0.x - 'info.inc.php' Arbitrary Code Execution. Author: Pablo Santana |
Analyze the security implications of: AllMyVisitors 0.x - 'info.inc.php' Arbitrary Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 20/20 Real Estate 3.2 - 'listings.asp' SQL Injection | This is a webapps exploit for asp platform. Description: 20/20 Real Estate 3.2 - 'listings.asp' SQL Injection. Author: Aria-Security Team |
Analyze the security implications of: 20/20 Real Estate 3.2 - 'listings.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apple Mac OS 8 8.6 - Weak Password Encryption | This is a local exploit for osx platform. Description: Apple Mac OS 8 8.6 - Weak Password Encryption. Author: Dawid adix Adamski |
Analyze the security implications of: Apple Mac OS 8 8.6 - Weak Password Encryption | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: iGaming CMS 2.0 Alpha 1 - 'search.php' SQL Injection | This is a webapps exploit for php platform. Description: iGaming CMS 2.0 Alpha 1 - 'search.php' SQL Injection. Author: StAkeR |
Analyze the security implications of: iGaming CMS 2.0 Alpha 1 - 'search.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle Fusion Middleware 10.1.2/10.1.3 - BPEL Console Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Oracle Fusion Middleware 10.1.2/10.1.3 - BPEL Console Cross-Site Scripting. Author: Alexander Polyakov |
Analyze the security implications of: Oracle Fusion Middleware 10.1.2/10.1.3 - BPEL Console Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Android 1.x/2.x HTC Wildfire - Local Privilege Escalation | This is a local exploit for android platform. Description: Android 1.x/2.x HTC Wildfire - Local Privilege Escalation. Author: The Android Exploid Crew |
Analyze the security implications of: Android 1.x/2.x HTC Wildfire - Local Privilege Escalation | This exploit targets android systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Oracle WebLogic - wls-wsat Component Deserialization Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Oracle WebLogic - wls-wsat Component Deserialization Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Oracle WebLogic - wls-wsat Component Deserialization Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: TP-Link TL-WR902AC firmware 210730 (V3) - Remote Code Execution (RCE) (Authenticated) | This is a remote exploit for hardware platform. Description: TP-Link TL-WR902AC firmware 210730 (V3) - Remote Code Execution (RCE) (Authenticated). Author: Tobias Müller |
Analyze the security implications of: TP-Link TL-WR902AC firmware 210730 (V3) - Remote Code Execution (RCE) (Authenticated) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: SwiFTP 1.11 - Overflow (Denial of Service) (PoC) | This is a dos exploit for hardware platform. Description: SwiFTP 1.11 - Overflow (Denial of Service) (PoC). Author: Julien Bedard |
Analyze the security implications of: SwiFTP 1.11 - Overflow (Denial of Service) (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Dating Script 3.25 - SQL Injection | This is a webapps exploit for php platform. Description: Dating Script 3.25 - SQL Injection. Author: Dawid Morawski |
Analyze the security implications of: Dating Script 3.25 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: F5 BIG-IP 9.4.3 - 'SearchString' Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for hardware platform. Description: F5 BIG-IP 9.4.3 - 'SearchString' Multiple Cross-Site Scripting Vulnerabilities. Author: nnposter |
Analyze the security implications of: F5 BIG-IP 9.4.3 - 'SearchString' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Ubiquiti UbiFi / mFi / AirVision - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Ubiquiti UbiFi / mFi / AirVision - Cross-Site Request Forgery. Author: Seth Art |
Analyze the security implications of: Ubiquiti UbiFi / mFi / AirVision - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Multiple Vendor Telnet Client - Env_opt_add Heap Buffer Overflow | This is a dos exploit for linux platform. Description: Multiple Vendor Telnet Client - Env_opt_add Heap Buffer Overflow. Author: Gael Delalleau |
Analyze the security implications of: Multiple Vendor Telnet Client - Env_opt_add Heap Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PunBB 2.0.10 - Register Multiple Users Denial of Service | This is a dos exploit for php platform. Description: PunBB 2.0.10 - Register Multiple Users Denial of Service. Author: K4P0 |
Analyze the security implications of: PunBB 2.0.10 - Register Multiple Users Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Power Board (IP.Board) 3.0 - Multiple HTML Injection / Information Disclosure Vulnerabilities | This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) 3.0 - Multiple HTML Injection / Information Disclosure Vulnerabilities. Author: brain[pillow] |
Analyze the security implications of: Invision Power Board (IP.Board) 3.0 - Multiple HTML Injection / Information Disclosure Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.