input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SGI IRIX 3/4/5/6 / OpenLinux 1.0/1.1 - routed traceon | This is a remote exploit for irix platform. Description: SGI IRIX 3/4/5/6 / OpenLinux 1.0/1.1 - routed traceon. Author: Rootshell |
Analyze the security implications of: SGI IRIX 3/4/5/6 / OpenLinux 1.0/1.1 - routed traceon | This exploit targets irix systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: Apple Mac OSX 10.4.x - iMovie HD '.imovieproj' Filename Format String | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.4.x - iMovie HD '.imovieproj' Filename Format String. Author: LMH |
Analyze the security implications of: Apple Mac OSX 10.4.x - iMovie HD '.imovieproj' Filename Format String | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: OpenMRS Reporting Module 0.9.7 - Remote Code Execution | This is a webapps exploit for java platform. Description: OpenMRS Reporting Module 0.9.7 - Remote Code Execution. Author: Brian D. Hysell |
Analyze the security implications of: OpenMRS Reporting Module 0.9.7 - Remote Code Execution | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: House Rental 1.0 - 'keywords' SQL Injection | This is a webapps exploit for php platform. Description: House Rental 1.0 - 'keywords' SQL Injection. Author: boku |
Analyze the security implications of: House Rental 1.0 - 'keywords' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CoAST 0.95 - 'sections_file' Remote File Inclusion | This is a webapps exploit for php platform. Description: CoAST 0.95 - 'sections_file' Remote File Inclusion. Author: DaRkLiFe |
Analyze the security implications of: CoAST 0.95 - 'sections_file' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM 1754 GCM 1.18.0.22011 - Remote Command Execution | This is a remote exploit for hardware platform. Description: IBM 1754 GCM 1.18.0.22011 - Remote Command Execution. Author: Alejandro Alvarez Bravo |
Analyze the security implications of: IBM 1754 GCM 1.18.0.22011 - Remote Command Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Nginx 0.7.0 < 0.7.61 / 0.6.0 < 0.6.38 / 0.5.0 < 0.5.37 / 0.4.0 < 0.4.14 - Denial of Service (PoC) | This is a dos exploit for linux platform. Description: Nginx 0.7.0 < 0.7.61 / 0.6.0 < 0.6.38 / 0.5.0 < 0.5.37 / 0.4.0 < 0.4.14 - Denial of Service (PoC). Author: Zeus Penguin |
Analyze the security implications of: Nginx 0.7.0 < 0.7.61 / 0.6.0 < 0.6.38 / 0.5.0 < 0.5.37 / 0.4.0 < 0.4.14 - Denial of Service (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CBAuthority - ClickBank Affiliate Management SQL Injection | This is a webapps exploit for php platform. Description: CBAuthority - ClickBank Affiliate Management SQL Injection. Author: Angela Chang |
Analyze the security implications of: CBAuthority - ClickBank Affiliate Management SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SAP Internet Transaction Server 6200.1017.50954.0 Bu (WGate) - 'wgate.dll?~service' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: SAP Internet Transaction Server 6200.1017.50954.0 Bu (WGate) - 'wgate.dll?~service' Cross-Site Scripting. Author: Portcullis |
Analyze the security implications of: SAP Internet Transaction Server 6200.1017.50954.0 Bu (WGate) - 'wgate.dll?~service' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: ManageEngine ServiceDesk Plus 9.0 - Authentication Bypass | This is a webapps exploit for java platform. Description: ManageEngine ServiceDesk Plus 9.0 - Authentication Bypass. Author: ByteM3 |
Analyze the security implications of: ManageEngine ServiceDesk Plus 9.0 - Authentication Bypass | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: PHP 7.1.8 - Heap Buffer Overflow | This is a dos exploit for multiple platform. Description: PHP 7.1.8 - Heap Buffer Overflow. Author: Wei Lei and Liu Yang |
Analyze the security implications of: PHP 7.1.8 - Heap Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: quizz 1.01 - 'quizz.pl' Remote Command Execution | This is a webapps exploit for cgi platform. Description: quizz 1.01 - 'quizz.pl' Remote Command Execution. Author: FOX_MULDER |
Analyze the security implications of: quizz 1.01 - 'quizz.pl' Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Invision Power Board 1.x/2.0 - HTML Injection | This is a webapps exploit for php platform. Description: Invision Power Board 1.x/2.0 - HTML Injection. Author: Woody Hughes |
Analyze the security implications of: Invision Power Board 1.x/2.0 - HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Asterisk chan_pjsip 15.2.0 - 'SUBSCRIBE' Stack Corruption | This is a dos exploit for linux platform. Description: Asterisk chan_pjsip 15.2.0 - 'SUBSCRIBE' Stack Corruption. Author: EnableSecurity |
Analyze the security implications of: Asterisk chan_pjsip 15.2.0 - 'SUBSCRIBE' Stack Corruption | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Achievo 1.3.2 - 'FCKeditor' Arbitrary File Upload | This is a webapps exploit for php platform. Description: Achievo 1.3.2 - 'FCKeditor' Arbitrary File Upload. Author: EgiX |
Analyze the security implications of: Achievo 1.3.2 - 'FCKeditor' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX - 'Rootpipe' Local Privilege Escalation (Metasploit) | This is a local exploit for osx platform. Description: Apple Mac OSX - 'Rootpipe' Local Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Apple Mac OSX - 'Rootpipe' Local Privilege Escalation (Metasploit) | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: PHP 4.x/5.x MySQL Library - 'Safe_mode' Filesystem Circumvention (3) | This is a remote exploit for php platform. Description: PHP 4.x/5.x MySQL Library - 'Safe_mode' Filesystem Circumvention (3). Author: anonymous |
Analyze the security implications of: PHP 4.x/5.x MySQL Library - 'Safe_mode' Filesystem Circumvention (3) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iOS FileApp < 2.0 - FTP Remote Denial of Service | This is a dos exploit for ios platform. Description: iOS FileApp < 2.0 - FTP Remote Denial of Service. Author: m0ebiusc0de |
Analyze the security implications of: iOS FileApp < 2.0 - FTP Remote Denial of Service | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Hawkeye-G 3.0.1.4912 - Persistent Cross-Site Scripting / Information Leakage | This is a webapps exploit for multiple platform. Description: Hawkeye-G 3.0.1.4912 - Persistent Cross-Site Scripting / Information Leakage. Author: hyp3rlinx |
Analyze the security implications of: Hawkeye-G 3.0.1.4912 - Persistent Cross-Site Scripting / Information Leakage | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Sophos XG Firewall 16.05.4 MR-4 - Path Traversal | This is a webapps exploit for hardware platform. Description: Sophos XG Firewall 16.05.4 MR-4 - Path Traversal. Author: SecuriTeam |
Analyze the security implications of: Sophos XG Firewall 16.05.4 MR-4 - Path Traversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: iDevSpot iSupport 1.8 - 'index.php' Local File Inclusion | This is a webapps exploit for php platform. Description: iDevSpot iSupport 1.8 - 'index.php' Local File Inclusion. Author: JuMp-Er |
Analyze the security implications of: iDevSpot iSupport 1.8 - 'index.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GeoVision GV-SNVR0811 - Directory Traversal | This is a webapps exploit for hardware platform. Description: GeoVision GV-SNVR0811 - Directory Traversal. Author: Berk Dusunur |
Analyze the security implications of: GeoVision GV-SNVR0811 - Directory Traversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: H2O-CMS 3.4 - Remote Command Execution | This is a webapps exploit for php platform. Description: H2O-CMS 3.4 - Remote Command Execution. Author: StAkeR |
Analyze the security implications of: H2O-CMS 3.4 - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JA Voice 2.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component JA Voice 2.0 - Local File Inclusion. Author: kaMtiEz |
Analyze the security implications of: Joomla! Component JA Voice 2.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alumni Management System 1.0 - _Last Name field in Registration page_ Stored XSS | This is a webapps exploit for php platform. Description: Alumni Management System 1.0 - _Last Name field in Registration page_ Stored XSS. Author: Siva Rajendran |
Analyze the security implications of: Alumni Management System 1.0 - _Last Name field in Registration page_ Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Grid Gallery 1.0 - Admin Panel Authentication Bypass | This is a webapps exploit for php platform. Description: Grid Gallery 1.0 - Admin Panel Authentication Bypass. Author: Ali BawazeEer |
Analyze the security implications of: Grid Gallery 1.0 - Admin Panel Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LBL Traceroute 1.4 a5 - Heap Corruption (1) | This is a local exploit for linux platform. Description: LBL Traceroute 1.4 a5 - Heap Corruption (1). Author: Dvorak |
Analyze the security implications of: LBL Traceroute 1.4 a5 - Heap Corruption (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: dproxy-nexgen (Linux x86) - Remote Buffer Overflow | This is a remote exploit for linux_x86 platform. Description: dproxy-nexgen (Linux x86) - Remote Buffer Overflow. Author: mu-b |
Analyze the security implications of: dproxy-nexgen (Linux x86) - Remote Buffer Overflow | This exploit targets linux_x86 systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux_x86 platform |
What is this exploit about: Sun Java Web Server - System WebDAV OPTIONS Buffer Overflow (Metasploit) | This is a remote exploit for multiple platform. Description: Sun Java Web Server - System WebDAV OPTIONS Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Sun Java Web Server - System WebDAV OPTIONS Buffer Overflow (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SGI IRIX 6.4 - 'datman'/'cdman' Local Privilege Escalation | This is a local exploit for irix platform. Description: SGI IRIX 6.4 - 'datman'/'cdman' Local Privilege Escalation. Author: Yuri Volobuev |
Analyze the security implications of: SGI IRIX 6.4 - 'datman'/'cdman' Local Privilege Escalation | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: ESyndiCat 1.5 - 'search.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: ESyndiCat 1.5 - 'search.php' Cross-Site Scripting. Author: meto5757 |
Analyze the security implications of: ESyndiCat 1.5 - 'search.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PowerScripts PlusMail WebConsole 1.0 - Weak Authentication (1) | This is a remote exploit for cgi platform. Description: PowerScripts PlusMail WebConsole 1.0 - Weak Authentication (1). Author: Synnergy Networks |
Analyze the security implications of: PowerScripts PlusMail WebConsole 1.0 - Weak Authentication (1) | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Facebook Profile MyBB Plugin 2.4 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Facebook Profile MyBB Plugin 2.4 - Persistent Cross-Site Scripting. Author: limb0 |
Analyze the security implications of: Facebook Profile MyBB Plugin 2.4 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.