input
stringlengths
39
228
output
stringlengths
32
324
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: SGI IRIX 3/4/5/6 / OpenLinux 1.0/1.1 - routed traceon
This is a remote exploit for irix platform. Description: SGI IRIX 3/4/5/6 / OpenLinux 1.0/1.1 - routed traceon. Author: Rootshell
Analyze the security implications of: SGI IRIX 3/4/5/6 / OpenLinux 1.0/1.1 - routed traceon
This exploit targets irix systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets irix platform
What is this exploit about: Apple Mac OSX 10.4.x - iMovie HD '.imovieproj' Filename Format String
This is a dos exploit for osx platform. Description: Apple Mac OSX 10.4.x - iMovie HD '.imovieproj' Filename Format String. Author: LMH
Analyze the security implications of: Apple Mac OSX 10.4.x - iMovie HD '.imovieproj' Filename Format String
This exploit targets osx systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets osx platform
What is this exploit about: OpenMRS Reporting Module 0.9.7 - Remote Code Execution
This is a webapps exploit for java platform. Description: OpenMRS Reporting Module 0.9.7 - Remote Code Execution. Author: Brian D. Hysell
Analyze the security implications of: OpenMRS Reporting Module 0.9.7 - Remote Code Execution
This exploit targets java systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets java platform
What is this exploit about: House Rental 1.0 - 'keywords' SQL Injection
This is a webapps exploit for php platform. Description: House Rental 1.0 - 'keywords' SQL Injection. Author: boku
Analyze the security implications of: House Rental 1.0 - 'keywords' SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: CoAST 0.95 - 'sections_file' Remote File Inclusion
This is a webapps exploit for php platform. Description: CoAST 0.95 - 'sections_file' Remote File Inclusion. Author: DaRkLiFe
Analyze the security implications of: CoAST 0.95 - 'sections_file' Remote File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: IBM 1754 GCM 1.18.0.22011 - Remote Command Execution
This is a remote exploit for hardware platform. Description: IBM 1754 GCM 1.18.0.22011 - Remote Command Execution. Author: Alejandro Alvarez Bravo
Analyze the security implications of: IBM 1754 GCM 1.18.0.22011 - Remote Command Execution
This exploit targets hardware systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Nginx 0.7.0 < 0.7.61 / 0.6.0 < 0.6.38 / 0.5.0 < 0.5.37 / 0.4.0 < 0.4.14 - Denial of Service (PoC)
This is a dos exploit for linux platform. Description: Nginx 0.7.0 < 0.7.61 / 0.6.0 < 0.6.38 / 0.5.0 < 0.5.37 / 0.4.0 < 0.4.14 - Denial of Service (PoC). Author: Zeus Penguin
Analyze the security implications of: Nginx 0.7.0 < 0.7.61 / 0.6.0 < 0.6.38 / 0.5.0 < 0.5.37 / 0.4.0 < 0.4.14 - Denial of Service (PoC)
This exploit targets linux systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: CBAuthority - ClickBank Affiliate Management SQL Injection
This is a webapps exploit for php platform. Description: CBAuthority - ClickBank Affiliate Management SQL Injection. Author: Angela Chang
Analyze the security implications of: CBAuthority - ClickBank Affiliate Management SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: SAP Internet Transaction Server 6200.1017.50954.0 Bu (WGate) - 'wgate.dll?~service' Cross-Site Scripting
This is a webapps exploit for cgi platform. Description: SAP Internet Transaction Server 6200.1017.50954.0 Bu (WGate) - 'wgate.dll?~service' Cross-Site Scripting. Author: Portcullis
Analyze the security implications of: SAP Internet Transaction Server 6200.1017.50954.0 Bu (WGate) - 'wgate.dll?~service' Cross-Site Scripting
This exploit targets cgi systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets cgi platform
What is this exploit about: ManageEngine ServiceDesk Plus 9.0 - Authentication Bypass
This is a webapps exploit for java platform. Description: ManageEngine ServiceDesk Plus 9.0 - Authentication Bypass. Author: ByteM3
Analyze the security implications of: ManageEngine ServiceDesk Plus 9.0 - Authentication Bypass
This exploit targets java systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets java platform
What is this exploit about: PHP 7.1.8 - Heap Buffer Overflow
This is a dos exploit for multiple platform. Description: PHP 7.1.8 - Heap Buffer Overflow. Author: Wei Lei and Liu Yang
Analyze the security implications of: PHP 7.1.8 - Heap Buffer Overflow
This exploit targets multiple systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: quizz 1.01 - 'quizz.pl' Remote Command Execution
This is a webapps exploit for cgi platform. Description: quizz 1.01 - 'quizz.pl' Remote Command Execution. Author: FOX_MULDER
Analyze the security implications of: quizz 1.01 - 'quizz.pl' Remote Command Execution
This exploit targets cgi systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets cgi platform
What is this exploit about: Invision Power Board 1.x/2.0 - HTML Injection
This is a webapps exploit for php platform. Description: Invision Power Board 1.x/2.0 - HTML Injection. Author: Woody Hughes
Analyze the security implications of: Invision Power Board 1.x/2.0 - HTML Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Asterisk chan_pjsip 15.2.0 - 'SUBSCRIBE' Stack Corruption
This is a dos exploit for linux platform. Description: Asterisk chan_pjsip 15.2.0 - 'SUBSCRIBE' Stack Corruption. Author: EnableSecurity
Analyze the security implications of: Asterisk chan_pjsip 15.2.0 - 'SUBSCRIBE' Stack Corruption
This exploit targets linux systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Achievo 1.3.2 - 'FCKeditor' Arbitrary File Upload
This is a webapps exploit for php platform. Description: Achievo 1.3.2 - 'FCKeditor' Arbitrary File Upload. Author: EgiX
Analyze the security implications of: Achievo 1.3.2 - 'FCKeditor' Arbitrary File Upload
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Apple Mac OSX - 'Rootpipe' Local Privilege Escalation (Metasploit)
This is a local exploit for osx platform. Description: Apple Mac OSX - 'Rootpipe' Local Privilege Escalation (Metasploit). Author: Metasploit
Analyze the security implications of: Apple Mac OSX - 'Rootpipe' Local Privilege Escalation (Metasploit)
This exploit targets osx systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets osx platform
What is this exploit about: PHP 4.x/5.x MySQL Library - 'Safe_mode' Filesystem Circumvention (3)
This is a remote exploit for php platform. Description: PHP 4.x/5.x MySQL Library - 'Safe_mode' Filesystem Circumvention (3). Author: anonymous
Analyze the security implications of: PHP 4.x/5.x MySQL Library - 'Safe_mode' Filesystem Circumvention (3)
This exploit targets php systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: iOS FileApp < 2.0 - FTP Remote Denial of Service
This is a dos exploit for ios platform. Description: iOS FileApp < 2.0 - FTP Remote Denial of Service. Author: m0ebiusc0de
Analyze the security implications of: iOS FileApp < 2.0 - FTP Remote Denial of Service
This exploit targets ios systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets ios platform
What is this exploit about: Hawkeye-G 3.0.1.4912 - Persistent Cross-Site Scripting / Information Leakage
This is a webapps exploit for multiple platform. Description: Hawkeye-G 3.0.1.4912 - Persistent Cross-Site Scripting / Information Leakage. Author: hyp3rlinx
Analyze the security implications of: Hawkeye-G 3.0.1.4912 - Persistent Cross-Site Scripting / Information Leakage
This exploit targets multiple systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Sophos XG Firewall 16.05.4 MR-4 - Path Traversal
This is a webapps exploit for hardware platform. Description: Sophos XG Firewall 16.05.4 MR-4 - Path Traversal. Author: SecuriTeam
Analyze the security implications of: Sophos XG Firewall 16.05.4 MR-4 - Path Traversal
This exploit targets hardware systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: iDevSpot iSupport 1.8 - 'index.php' Local File Inclusion
This is a webapps exploit for php platform. Description: iDevSpot iSupport 1.8 - 'index.php' Local File Inclusion. Author: JuMp-Er
Analyze the security implications of: iDevSpot iSupport 1.8 - 'index.php' Local File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: GeoVision GV-SNVR0811 - Directory Traversal
This is a webapps exploit for hardware platform. Description: GeoVision GV-SNVR0811 - Directory Traversal. Author: Berk Dusunur
Analyze the security implications of: GeoVision GV-SNVR0811 - Directory Traversal
This exploit targets hardware systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: H2O-CMS 3.4 - Remote Command Execution
This is a webapps exploit for php platform. Description: H2O-CMS 3.4 - Remote Command Execution. Author: StAkeR
Analyze the security implications of: H2O-CMS 3.4 - Remote Command Execution
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Joomla! Component JA Voice 2.0 - Local File Inclusion
This is a webapps exploit for php platform. Description: Joomla! Component JA Voice 2.0 - Local File Inclusion. Author: kaMtiEz
Analyze the security implications of: Joomla! Component JA Voice 2.0 - Local File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Alumni Management System 1.0 - _Last Name field in Registration page_ Stored XSS
This is a webapps exploit for php platform. Description: Alumni Management System 1.0 - _Last Name field in Registration page_ Stored XSS. Author: Siva Rajendran
Analyze the security implications of: Alumni Management System 1.0 - _Last Name field in Registration page_ Stored XSS
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Grid Gallery 1.0 - Admin Panel Authentication Bypass
This is a webapps exploit for php platform. Description: Grid Gallery 1.0 - Admin Panel Authentication Bypass. Author: Ali BawazeEer
Analyze the security implications of: Grid Gallery 1.0 - Admin Panel Authentication Bypass
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: LBL Traceroute 1.4 a5 - Heap Corruption (1)
This is a local exploit for linux platform. Description: LBL Traceroute 1.4 a5 - Heap Corruption (1). Author: Dvorak
Analyze the security implications of: LBL Traceroute 1.4 a5 - Heap Corruption (1)
This exploit targets linux systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: dproxy-nexgen (Linux x86) - Remote Buffer Overflow
This is a remote exploit for linux_x86 platform. Description: dproxy-nexgen (Linux x86) - Remote Buffer Overflow. Author: mu-b
Analyze the security implications of: dproxy-nexgen (Linux x86) - Remote Buffer Overflow
This exploit targets linux_x86 systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets linux_x86 platform
What is this exploit about: Sun Java Web Server - System WebDAV OPTIONS Buffer Overflow (Metasploit)
This is a remote exploit for multiple platform. Description: Sun Java Web Server - System WebDAV OPTIONS Buffer Overflow (Metasploit). Author: Metasploit
Analyze the security implications of: Sun Java Web Server - System WebDAV OPTIONS Buffer Overflow (Metasploit)
This exploit targets multiple systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: SGI IRIX 6.4 - 'datman'/'cdman' Local Privilege Escalation
This is a local exploit for irix platform. Description: SGI IRIX 6.4 - 'datman'/'cdman' Local Privilege Escalation. Author: Yuri Volobuev
Analyze the security implications of: SGI IRIX 6.4 - 'datman'/'cdman' Local Privilege Escalation
This exploit targets irix systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets irix platform
What is this exploit about: ESyndiCat 1.5 - 'search.php' Cross-Site Scripting
This is a webapps exploit for php platform. Description: ESyndiCat 1.5 - 'search.php' Cross-Site Scripting. Author: meto5757
Analyze the security implications of: ESyndiCat 1.5 - 'search.php' Cross-Site Scripting
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: PowerScripts PlusMail WebConsole 1.0 - Weak Authentication (1)
This is a remote exploit for cgi platform. Description: PowerScripts PlusMail WebConsole 1.0 - Weak Authentication (1). Author: Synnergy Networks
Analyze the security implications of: PowerScripts PlusMail WebConsole 1.0 - Weak Authentication (1)
This exploit targets cgi systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets cgi platform
What is this exploit about: Facebook Profile MyBB Plugin 2.4 - Persistent Cross-Site Scripting
This is a webapps exploit for php platform. Description: Facebook Profile MyBB Plugin 2.4 - Persistent Cross-Site Scripting. Author: limb0
Analyze the security implications of: Facebook Profile MyBB Plugin 2.4 - Persistent Cross-Site Scripting
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform