input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SGI IRIX 3/4/5/6 / OpenLinux 1.0/1.1 - routed traceon
|
This is a remote exploit for irix platform. Description: SGI IRIX 3/4/5/6 / OpenLinux 1.0/1.1 - routed traceon. Author: Rootshell
|
Analyze the security implications of: SGI IRIX 3/4/5/6 / OpenLinux 1.0/1.1 - routed traceon
|
This exploit targets irix systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets irix platform
|
What is this exploit about: Apple Mac OSX 10.4.x - iMovie HD '.imovieproj' Filename Format String
|
This is a dos exploit for osx platform. Description: Apple Mac OSX 10.4.x - iMovie HD '.imovieproj' Filename Format String. Author: LMH
|
Analyze the security implications of: Apple Mac OSX 10.4.x - iMovie HD '.imovieproj' Filename Format String
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: OpenMRS Reporting Module 0.9.7 - Remote Code Execution
|
This is a webapps exploit for java platform. Description: OpenMRS Reporting Module 0.9.7 - Remote Code Execution. Author: Brian D. Hysell
|
Analyze the security implications of: OpenMRS Reporting Module 0.9.7 - Remote Code Execution
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: House Rental 1.0 - 'keywords' SQL Injection
|
This is a webapps exploit for php platform. Description: House Rental 1.0 - 'keywords' SQL Injection. Author: boku
|
Analyze the security implications of: House Rental 1.0 - 'keywords' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CoAST 0.95 - 'sections_file' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: CoAST 0.95 - 'sections_file' Remote File Inclusion. Author: DaRkLiFe
|
Analyze the security implications of: CoAST 0.95 - 'sections_file' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM 1754 GCM 1.18.0.22011 - Remote Command Execution
|
This is a remote exploit for hardware platform. Description: IBM 1754 GCM 1.18.0.22011 - Remote Command Execution. Author: Alejandro Alvarez Bravo
|
Analyze the security implications of: IBM 1754 GCM 1.18.0.22011 - Remote Command Execution
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Nginx 0.7.0 < 0.7.61 / 0.6.0 < 0.6.38 / 0.5.0 < 0.5.37 / 0.4.0 < 0.4.14 - Denial of Service (PoC)
|
This is a dos exploit for linux platform. Description: Nginx 0.7.0 < 0.7.61 / 0.6.0 < 0.6.38 / 0.5.0 < 0.5.37 / 0.4.0 < 0.4.14 - Denial of Service (PoC). Author: Zeus Penguin
|
Analyze the security implications of: Nginx 0.7.0 < 0.7.61 / 0.6.0 < 0.6.38 / 0.5.0 < 0.5.37 / 0.4.0 < 0.4.14 - Denial of Service (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: CBAuthority - ClickBank Affiliate Management SQL Injection
|
This is a webapps exploit for php platform. Description: CBAuthority - ClickBank Affiliate Management SQL Injection. Author: Angela Chang
|
Analyze the security implications of: CBAuthority - ClickBank Affiliate Management SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SAP Internet Transaction Server 6200.1017.50954.0 Bu (WGate) - 'wgate.dll?~service' Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: SAP Internet Transaction Server 6200.1017.50954.0 Bu (WGate) - 'wgate.dll?~service' Cross-Site Scripting. Author: Portcullis
|
Analyze the security implications of: SAP Internet Transaction Server 6200.1017.50954.0 Bu (WGate) - 'wgate.dll?~service' Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: ManageEngine ServiceDesk Plus 9.0 - Authentication Bypass
|
This is a webapps exploit for java platform. Description: ManageEngine ServiceDesk Plus 9.0 - Authentication Bypass. Author: ByteM3
|
Analyze the security implications of: ManageEngine ServiceDesk Plus 9.0 - Authentication Bypass
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: PHP 7.1.8 - Heap Buffer Overflow
|
This is a dos exploit for multiple platform. Description: PHP 7.1.8 - Heap Buffer Overflow. Author: Wei Lei and Liu Yang
|
Analyze the security implications of: PHP 7.1.8 - Heap Buffer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: quizz 1.01 - 'quizz.pl' Remote Command Execution
|
This is a webapps exploit for cgi platform. Description: quizz 1.01 - 'quizz.pl' Remote Command Execution. Author: FOX_MULDER
|
Analyze the security implications of: quizz 1.01 - 'quizz.pl' Remote Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Invision Power Board 1.x/2.0 - HTML Injection
|
This is a webapps exploit for php platform. Description: Invision Power Board 1.x/2.0 - HTML Injection. Author: Woody Hughes
|
Analyze the security implications of: Invision Power Board 1.x/2.0 - HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Asterisk chan_pjsip 15.2.0 - 'SUBSCRIBE' Stack Corruption
|
This is a dos exploit for linux platform. Description: Asterisk chan_pjsip 15.2.0 - 'SUBSCRIBE' Stack Corruption. Author: EnableSecurity
|
Analyze the security implications of: Asterisk chan_pjsip 15.2.0 - 'SUBSCRIBE' Stack Corruption
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Achievo 1.3.2 - 'FCKeditor' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Achievo 1.3.2 - 'FCKeditor' Arbitrary File Upload. Author: EgiX
|
Analyze the security implications of: Achievo 1.3.2 - 'FCKeditor' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Mac OSX - 'Rootpipe' Local Privilege Escalation (Metasploit)
|
This is a local exploit for osx platform. Description: Apple Mac OSX - 'Rootpipe' Local Privilege Escalation (Metasploit). Author: Metasploit
|
Analyze the security implications of: Apple Mac OSX - 'Rootpipe' Local Privilege Escalation (Metasploit)
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: PHP 4.x/5.x MySQL Library - 'Safe_mode' Filesystem Circumvention (3)
|
This is a remote exploit for php platform. Description: PHP 4.x/5.x MySQL Library - 'Safe_mode' Filesystem Circumvention (3). Author: anonymous
|
Analyze the security implications of: PHP 4.x/5.x MySQL Library - 'Safe_mode' Filesystem Circumvention (3)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iOS FileApp < 2.0 - FTP Remote Denial of Service
|
This is a dos exploit for ios platform. Description: iOS FileApp < 2.0 - FTP Remote Denial of Service. Author: m0ebiusc0de
|
Analyze the security implications of: iOS FileApp < 2.0 - FTP Remote Denial of Service
|
This exploit targets ios systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Hawkeye-G 3.0.1.4912 - Persistent Cross-Site Scripting / Information Leakage
|
This is a webapps exploit for multiple platform. Description: Hawkeye-G 3.0.1.4912 - Persistent Cross-Site Scripting / Information Leakage. Author: hyp3rlinx
|
Analyze the security implications of: Hawkeye-G 3.0.1.4912 - Persistent Cross-Site Scripting / Information Leakage
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Sophos XG Firewall 16.05.4 MR-4 - Path Traversal
|
This is a webapps exploit for hardware platform. Description: Sophos XG Firewall 16.05.4 MR-4 - Path Traversal. Author: SecuriTeam
|
Analyze the security implications of: Sophos XG Firewall 16.05.4 MR-4 - Path Traversal
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: iDevSpot iSupport 1.8 - 'index.php' Local File Inclusion
|
This is a webapps exploit for php platform. Description: iDevSpot iSupport 1.8 - 'index.php' Local File Inclusion. Author: JuMp-Er
|
Analyze the security implications of: iDevSpot iSupport 1.8 - 'index.php' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GeoVision GV-SNVR0811 - Directory Traversal
|
This is a webapps exploit for hardware platform. Description: GeoVision GV-SNVR0811 - Directory Traversal. Author: Berk Dusunur
|
Analyze the security implications of: GeoVision GV-SNVR0811 - Directory Traversal
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: H2O-CMS 3.4 - Remote Command Execution
|
This is a webapps exploit for php platform. Description: H2O-CMS 3.4 - Remote Command Execution. Author: StAkeR
|
Analyze the security implications of: H2O-CMS 3.4 - Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component JA Voice 2.0 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component JA Voice 2.0 - Local File Inclusion. Author: kaMtiEz
|
Analyze the security implications of: Joomla! Component JA Voice 2.0 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alumni Management System 1.0 - _Last Name field in Registration page_ Stored XSS
|
This is a webapps exploit for php platform. Description: Alumni Management System 1.0 - _Last Name field in Registration page_ Stored XSS. Author: Siva Rajendran
|
Analyze the security implications of: Alumni Management System 1.0 - _Last Name field in Registration page_ Stored XSS
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Grid Gallery 1.0 - Admin Panel Authentication Bypass
|
This is a webapps exploit for php platform. Description: Grid Gallery 1.0 - Admin Panel Authentication Bypass. Author: Ali BawazeEer
|
Analyze the security implications of: Grid Gallery 1.0 - Admin Panel Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LBL Traceroute 1.4 a5 - Heap Corruption (1)
|
This is a local exploit for linux platform. Description: LBL Traceroute 1.4 a5 - Heap Corruption (1). Author: Dvorak
|
Analyze the security implications of: LBL Traceroute 1.4 a5 - Heap Corruption (1)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: dproxy-nexgen (Linux x86) - Remote Buffer Overflow
|
This is a remote exploit for linux_x86 platform. Description: dproxy-nexgen (Linux x86) - Remote Buffer Overflow. Author: mu-b
|
Analyze the security implications of: dproxy-nexgen (Linux x86) - Remote Buffer Overflow
|
This exploit targets linux_x86 systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux_x86 platform
|
What is this exploit about: Sun Java Web Server - System WebDAV OPTIONS Buffer Overflow (Metasploit)
|
This is a remote exploit for multiple platform. Description: Sun Java Web Server - System WebDAV OPTIONS Buffer Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: Sun Java Web Server - System WebDAV OPTIONS Buffer Overflow (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: SGI IRIX 6.4 - 'datman'/'cdman' Local Privilege Escalation
|
This is a local exploit for irix platform. Description: SGI IRIX 6.4 - 'datman'/'cdman' Local Privilege Escalation. Author: Yuri Volobuev
|
Analyze the security implications of: SGI IRIX 6.4 - 'datman'/'cdman' Local Privilege Escalation
|
This exploit targets irix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets irix platform
|
What is this exploit about: ESyndiCat 1.5 - 'search.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: ESyndiCat 1.5 - 'search.php' Cross-Site Scripting. Author: meto5757
|
Analyze the security implications of: ESyndiCat 1.5 - 'search.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PowerScripts PlusMail WebConsole 1.0 - Weak Authentication (1)
|
This is a remote exploit for cgi platform. Description: PowerScripts PlusMail WebConsole 1.0 - Weak Authentication (1). Author: Synnergy Networks
|
Analyze the security implications of: PowerScripts PlusMail WebConsole 1.0 - Weak Authentication (1)
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Facebook Profile MyBB Plugin 2.4 - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Facebook Profile MyBB Plugin 2.4 - Persistent Cross-Site Scripting. Author: limb0
|
Analyze the security implications of: Facebook Profile MyBB Plugin 2.4 - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.