input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Nxlog Community Edition 2.10.2150 - DoS (Poc) | This is a dos exploit for multiple platform. Description: Nxlog Community Edition 2.10.2150 - DoS (Poc). Author: Guillaume PETIT |
Analyze the security implications of: Nxlog Community Edition 2.10.2150 - DoS (Poc) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Sophos Cyberoam - Cross-site scripting | This is a webapps exploit for hardware platform. Description: Sophos Cyberoam - Cross-site scripting. Author: Bhadresh Patel |
Analyze the security implications of: Sophos Cyberoam - Cross-site scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GNU Anubis 3.6.x/3.9.x - Multiple Format String Vulnerabilities | This is a remote exploit for linux platform. Description: GNU Anubis 3.6.x/3.9.x - Multiple Format String Vulnerabilities. Author: Ulf Harnhammar |
Analyze the security implications of: GNU Anubis 3.6.x/3.9.x - Multiple Format String Vulnerabilities | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Check New 4.52 - SQL Injection | This is a webapps exploit for php platform. Description: Check New 4.52 - SQL Injection. Author: CWH Underground |
Analyze the security implications of: Check New 4.52 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: APC WEB/SNMP Management Card (9606) Firmware 3.0 - Telnet Administration Denial of Service | This is a dos exploit for hardware platform. Description: APC WEB/SNMP Management Card (9606) Firmware 3.0 - Telnet Administration Denial of Service. Author: altomo |
Analyze the security implications of: APC WEB/SNMP Management Card (9606) Firmware 3.0 - Telnet Administration Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: eLection 2.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: eLection 2.0 - 'id' SQL Injection. Author: J3rryBl4nks |
Analyze the security implications of: eLection 2.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeBSD 2.x / HP-UX 9/10/11 / Kernel 2.0.3 / Windows NT 4.0/Server 2003 / NetBSD 1 - 'land.c' loopback Denial of Service (2) | This is a dos exploit for multiple platform. Description: FreeBSD 2.x / HP-UX 9/10/11 / Kernel 2.0.3 / Windows NT 4.0/Server 2003 / NetBSD 1 - 'land.c' loopback Denial of Service (2). Author: Konrad Malewski |
Analyze the security implications of: FreeBSD 2.x / HP-UX 9/10/11 / Kernel 2.0.3 / Windows NT 4.0/Server 2003 / NetBSD 1 - 'land.c' loopback Denial of Service (2) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Netscape Enterprise Server 3.51/3.6 - JHTML View Source | This is a remote exploit for multiple platform. Description: Netscape Enterprise Server 3.51/3.6 - JHTML View Source. Author: David Litchfield |
Analyze the security implications of: Netscape Enterprise Server 3.51/3.6 - JHTML View Source | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Alkacon OpenCMS 7.0.3 - 'tree_files.jsp' Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Alkacon OpenCMS 7.0.3 - 'tree_files.jsp' Cross-Site Scripting. Author: nnposter |
Analyze the security implications of: Alkacon OpenCMS 7.0.3 - 'tree_files.jsp' Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Chipmunk Blog - 'comments.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Chipmunk Blog - 'comments.php' Cross-Site Scripting. Author: sl4xUz |
Analyze the security implications of: Chipmunk Blog - 'comments.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component panoramic 1.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component panoramic 1.0 - Remote File Inclusion. Author: NoGe |
Analyze the security implications of: Joomla! Component panoramic 1.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AvailScript Jobs Portal Script - (Authenticated) Arbitrary File Upload | This is a webapps exploit for php platform. Description: AvailScript Jobs Portal Script - (Authenticated) Arbitrary File Upload. Author: InjEctOr5 |
Analyze the security implications of: AvailScript Jobs Portal Script - (Authenticated) Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bitweaver 1.x/2.0 - 'users/register.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Bitweaver 1.x/2.0 - 'users/register.php' Cross-Site Scripting. Author: Doz |
Analyze the security implications of: Bitweaver 1.x/2.0 - 'users/register.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wavpack 5.1.0 - Denial of Service | This is a dos exploit for multiple platform. Description: Wavpack 5.1.0 - Denial of Service. Author: r4xis |
Analyze the security implications of: Wavpack 5.1.0 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: MetaProducts Offline Explorer 1.0 x/1.1 x/1.2 x - Directory Traversal | This is a remote exploit for multiple platform. Description: MetaProducts Offline Explorer 1.0 x/1.1 x/1.2 x - Directory Traversal. Author: Wyzewun |
Analyze the security implications of: MetaProducts Offline Explorer 1.0 x/1.1 x/1.2 x - Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SGI IRIX 5.1/5.2 - 'sgihelp' Local Privilege Escalation | This is a local exploit for aix platform. Description: SGI IRIX 5.1/5.2 - 'sgihelp' Local Privilege Escalation. Author: anonymous |
Analyze the security implications of: SGI IRIX 5.1/5.2 - 'sgihelp' Local Privilege Escalation | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Mozilla Firefox 2.0.0.2 - Document.Cookie Path Argument Denial of Service | This is a dos exploit for linux platform. Description: Mozilla Firefox 2.0.0.2 - Document.Cookie Path Argument Denial of Service. Author: Nicolas DEROUET |
Analyze the security implications of: Mozilla Firefox 2.0.0.2 - Document.Cookie Path Argument Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: F3Site 2009 - '/mod/new.php?GLOBALS[nlang]' Traversal Local File Inclusion | This is a webapps exploit for php platform. Description: F3Site 2009 - '/mod/new.php?GLOBALS[nlang]' Traversal Local File Inclusion. Author: cr4wl3r |
Analyze the security implications of: F3Site 2009 - '/mod/new.php?GLOBALS[nlang]' Traversal Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kasseler CMS 1.4.x lite Module Jokes - SQL Injection | This is a webapps exploit for php platform. Description: Kasseler CMS 1.4.x lite Module Jokes - SQL Injection. Author: Sc0rpi0n |
Analyze the security implications of: Kasseler CMS 1.4.x lite Module Jokes - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alstrasoft AskMe Pro 2.1 - 'que_id' SQL Injection | This is a webapps exploit for php platform. Description: Alstrasoft AskMe Pro 2.1 - 'que_id' SQL Injection. Author: v3n0m |
Analyze the security implications of: Alstrasoft AskMe Pro 2.1 - 'que_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GestioIP 3.5.7 - Cross-Site Scripting (XSS) | This is a remote exploit for multiple platform. Description: GestioIP 3.5.7 - Cross-Site Scripting (XSS). Author: Maximiliano Belino |
Analyze the security implications of: GestioIP 3.5.7 - Cross-Site Scripting (XSS) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: JE CMS 1.1 - SQL Injection | This is a webapps exploit for php platform. Description: JE CMS 1.1 - SQL Injection. Author: AntiSecurity |
Analyze the security implications of: JE CMS 1.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pcshey Portal - 'kategori.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Pcshey Portal - 'kategori.asp' SQL Injection. Author: U238 |
Analyze the security implications of: Pcshey Portal - 'kategori.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Open-AuditIT Professional 2.1 - Cross-Site Request Forgery | This is a webapps exploit for multiple platform. Description: Open-AuditIT Professional 2.1 - Cross-Site Request Forgery. Author: Nilesh Sapariya |
Analyze the security implications of: Open-AuditIT Professional 2.1 - Cross-Site Request Forgery | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple Mac OSX Kernel - NULL Dereference in CoreCaptureResponder Due to Unchecked Return Value | This is a dos exploit for osx platform. Description: Apple Mac OSX Kernel - NULL Dereference in CoreCaptureResponder Due to Unchecked Return Value. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX Kernel - NULL Dereference in CoreCaptureResponder Due to Unchecked Return Value | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Apache Struts2 2.0.0 < 2.3.15 - Prefixed Parameters OGNL Injection | This is a webapps exploit for multiple platform. Description: Apache Struts2 2.0.0 < 2.3.15 - Prefixed Parameters OGNL Injection. Author: Takeshi Terada |
Analyze the security implications of: Apache Struts2 2.0.0 < 2.3.15 - Prefixed Parameters OGNL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: WeChat for Android 7.0.4 - 'vcodec2_hls_filter' Denial of Service | This is a dos exploit for android platform. Description: WeChat for Android 7.0.4 - 'vcodec2_hls_filter' Denial of Service. Author: Hong Nhat Pham |
Analyze the security implications of: WeChat for Android 7.0.4 - 'vcodec2_hls_filter' Denial of Service | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Maian Greetings 2.1 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Maian Greetings 2.1 - Arbitrary File Upload. Author: indoushka |
Analyze the security implications of: Maian Greetings 2.1 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gaim 1.1.3 - File Download Denial of Service | This is a dos exploit for linux platform. Description: Gaim 1.1.3 - File Download Denial of Service. Author: Randall Perry |
Analyze the security implications of: Gaim 1.1.3 - File Download Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: My Postcards 6.0 - 'MagicCard.cgi' Arbitrary File Disclosure | This is a webapps exploit for cgi platform. Description: My Postcards 6.0 - 'MagicCard.cgi' Arbitrary File Disclosure. Author: cult |
Analyze the security implications of: My Postcards 6.0 - 'MagicCard.cgi' Arbitrary File Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Netgear - 'TelnetEnable' Magic Packet (Metasploit) | This is a remote exploit for hardware platform. Description: Netgear - 'TelnetEnable' Magic Packet (Metasploit). Author: Metasploit |
Analyze the security implications of: Netgear - 'TelnetEnable' Magic Packet (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Job Portal 3.1 - 'job_submit' SQL Injection | This is a webapps exploit for php platform. Description: Job Portal 3.1 - 'job_submit' SQL Injection. Author: Mehmet EMIROGLU |
Analyze the security implications of: Job Portal 3.1 - 'job_submit' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HLStats 1.34 - 'hlstats.php' SQL Injection | This is a webapps exploit for php platform. Description: HLStats 1.34 - 'hlstats.php' SQL Injection. Author: Michael Brooks |
Analyze the security implications of: HLStats 1.34 - 'hlstats.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.