input
stringlengths
39
228
output
stringlengths
32
324
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Joomla! Component File Download Tracker 3.0 - SQL Injection
This is a webapps exploit for php platform. Description: Joomla! Component File Download Tracker 3.0 - SQL Injection. Author: Ihsan Sencan
Analyze the security implications of: Joomla! Component File Download Tracker 3.0 - SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: LightNEasy 3.1.x - Multiple Vulnerabilities
This is a webapps exploit for php platform. Description: LightNEasy 3.1.x - Multiple Vulnerabilities. Author: ITSecTeam
Analyze the security implications of: LightNEasy 3.1.x - Multiple Vulnerabilities
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Nokia BMC Log Scanner - Remote Code Execution
This is a webapps exploit for linux platform. Description: Nokia BMC Log Scanner - Remote Code Execution. Author: Carlos Andres Gonzalez_ Matthew Gregory
Analyze the security implications of: Nokia BMC Log Scanner - Remote Code Execution
This exploit targets linux systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Multiple CPUs - Information Leak Using Speculative Execution
This is a dos exploit for hardware platform. Description: Multiple CPUs - Information Leak Using Speculative Execution. Author: Google Security Research
Analyze the security implications of: Multiple CPUs - Information Leak Using Speculative Execution
This exploit targets hardware systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Wireshark - 'iseries_check_file_type' Stack Out-of-Bounds Read
This is a dos exploit for multiple platform. Description: Wireshark - 'iseries_check_file_type' Stack Out-of-Bounds Read. Author: Google Security Research
Analyze the security implications of: Wireshark - 'iseries_check_file_type' Stack Out-of-Bounds Read
This exploit targets multiple systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: DotClear 1.2.x - '/ecrire/trackback.php?post_id' Cross-Site Scripting
This is a webapps exploit for php platform. Description: DotClear 1.2.x - '/ecrire/trackback.php?post_id' Cross-Site Scripting. Author: nassim
Analyze the security implications of: DotClear 1.2.x - '/ecrire/trackback.php?post_id' Cross-Site Scripting
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Infocus Real Estate Enterprise Edition Script - Authentication Bypass
This is a webapps exploit for php platform. Description: Infocus Real Estate Enterprise Edition Script - Authentication Bypass. Author: Sid3^effects
Analyze the security implications of: Infocus Real Estate Enterprise Edition Script - Authentication Bypass
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Netgear WPN824v3 - Unauthorized Configuration Download
This is a webapps exploit for hardware platform. Description: Netgear WPN824v3 - Unauthorized Configuration Download. Author: Jens Regel
Analyze the security implications of: Netgear WPN824v3 - Unauthorized Configuration Download
This exploit targets hardware systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Netperf 2.6.0 - Stack-Based Buffer Overflow
This is a dos exploit for linux platform. Description: Netperf 2.6.0 - Stack-Based Buffer Overflow. Author: Juan Sacco
Analyze the security implications of: Netperf 2.6.0 - Stack-Based Buffer Overflow
This exploit targets linux systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: SurfControl SuperScout Email Filter 3.5 - User Credential Disclosure
This is a webapps exploit for asp platform. Description: SurfControl SuperScout Email Filter 3.5 - User Credential Disclosure. Author: ken@FTU
Analyze the security implications of: SurfControl SuperScout Email Filter 3.5 - User Credential Disclosure
This exploit targets asp systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets asp platform
What is this exploit about: Apache + PHP < 5.3.12 / < 5.4.2 - cgi-bin Remote Code Execution
This is a remote exploit for php platform. Description: Apache + PHP < 5.3.12 / < 5.4.2 - cgi-bin Remote Code Execution. Author: kingcope
Analyze the security implications of: Apache + PHP < 5.3.12 / < 5.4.2 - cgi-bin Remote Code Execution
This exploit targets php systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: BookReview 1.0 - 'add_booklist.htm?node' Cross-Site Scripting
This is a webapps exploit for php platform. Description: BookReview 1.0 - 'add_booklist.htm?node' Cross-Site Scripting. Author: Lostmon
Analyze the security implications of: BookReview 1.0 - 'add_booklist.htm?node' Cross-Site Scripting
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: GLPI 0.85.5 - Arbitrary File Upload / Filter Bypass / Remote Code Execution
This is a webapps exploit for php platform. Description: GLPI 0.85.5 - Arbitrary File Upload / Filter Bypass / Remote Code Execution. Author: Raffaele Forte
Analyze the security implications of: GLPI 0.85.5 - Arbitrary File Upload / Filter Bypass / Remote Code Execution
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Maian Uploader 4.0 - 'header.php' Cross-Site Scripting
This is a webapps exploit for php platform. Description: Maian Uploader 4.0 - 'header.php' Cross-Site Scripting. Author: Khashayar Fereidani
Analyze the security implications of: Maian Uploader 4.0 - 'header.php' Cross-Site Scripting
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: WordPress Core 4.7.0/4.7.1 - Content Injection (Ruby)
This is a webapps exploit for linux platform. Description: WordPress Core 4.7.0/4.7.1 - Content Injection (Ruby). Author: Harsh Jaiswal
Analyze the security implications of: WordPress Core 4.7.0/4.7.1 - Content Injection (Ruby)
This exploit targets linux systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: IceBB 1.0-rc10 - Multiple Vulnerabilities
This is a webapps exploit for php platform. Description: IceBB 1.0-rc10 - Multiple Vulnerabilities. Author: High-Tech Bridge SA
Analyze the security implications of: IceBB 1.0-rc10 - Multiple Vulnerabilities
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: OpenText Documentum D2 - Remote Code Execution
This is a remote exploit for java platform. Description: OpenText Documentum D2 - Remote Code Execution. Author: Andrey B. Panfilov
Analyze the security implications of: OpenText Documentum D2 - Remote Code Execution
This exploit targets java systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets java platform
What is this exploit about: Lost and Found Information System v1.0 - SQL Injection
This is a webapps exploit for php platform. Description: Lost and Found Information System v1.0 - SQL Injection. Author: Amirhossein Bahramizadeh
Analyze the security implications of: Lost and Found Information System v1.0 - SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: SyGate 5.0 - Insecure UDP Source Port Firewall Bypass Weak Default Configuration
This is a remote exploit for multiple platform. Description: SyGate 5.0 - Insecure UDP Source Port Firewall Bypass Weak Default Configuration. Author: David Fernández
Analyze the security implications of: SyGate 5.0 - Insecure UDP Source Port Firewall Bypass Weak Default Configuration
This exploit targets multiple systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Dodo Upload 1.3 - Arbitrary File Upload (Bypass)
This is a webapps exploit for php platform. Description: Dodo Upload 1.3 - Arbitrary File Upload (Bypass). Author: indoushka
Analyze the security implications of: Dodo Upload 1.3 - Arbitrary File Upload (Bypass)
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: IPFire 2.19 - Remote Code Execution
This is a webapps exploit for linux platform. Description: IPFire 2.19 - Remote Code Execution. Author: 0x09AL
Analyze the security implications of: IPFire 2.19 - Remote Code Execution
This exploit targets linux systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: TOSHIBA e-Studio 232/233/282/283 - Cross-Site Request Forgery (Change Admin Password)
This is a webapps exploit for hardware platform. Description: TOSHIBA e-Studio 232/233/282/283 - Cross-Site Request Forgery (Change Admin Password). Author: Hubert Gradek
Analyze the security implications of: TOSHIBA e-Studio 232/233/282/283 - Cross-Site Request Forgery (Change Admin Password)
This exploit targets hardware systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Linux Kernel 2.6.x - epoll Nested Structures Local Denial of Service
This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - epoll Nested Structures Local Denial of Service. Author: Nelson Elhage
Analyze the security implications of: Linux Kernel 2.6.x - epoll Nested Structures Local Denial of Service
This exploit targets linux systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Mantis Bug Tracker 1.2.0a3 < 1.2.17 XmlImportExport Plugin - PHP Code Injection (Metasploit) (2)
This is a remote exploit for php platform. Description: Mantis Bug Tracker 1.2.0a3 < 1.2.17 XmlImportExport Plugin - PHP Code Injection (Metasploit) (2). Author: Metasploit
Analyze the security implications of: Mantis Bug Tracker 1.2.0a3 < 1.2.17 XmlImportExport Plugin - PHP Code Injection (Metasploit) (2)
This exploit targets php systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Coppermine Photo Gallery 1.4.9 - SQL Injection
This is a webapps exploit for php platform. Description: Coppermine Photo Gallery 1.4.9 - SQL Injection. Author: w4ck1ng
Analyze the security implications of: Coppermine Photo Gallery 1.4.9 - SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: WU-FTPD - Site EXEC/INDEX Format String (Metasploit)
This is a remote exploit for linux platform. Description: WU-FTPD - Site EXEC/INDEX Format String (Metasploit). Author: Metasploit
Analyze the security implications of: WU-FTPD - Site EXEC/INDEX Format String (Metasploit)
This exploit targets linux systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Unalz 0.x - Archive Filename Buffer Overflow
This is a dos exploit for linux platform. Description: Unalz 0.x - Archive Filename Buffer Overflow. Author: Ulf Harnhammar
Analyze the security implications of: Unalz 0.x - Archive Filename Buffer Overflow
This exploit targets linux systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: DigiDomain 2.2 - 'suggest_result.asp' Multiple Cross-Site Scripting Vulnerabilities
This is a webapps exploit for asp platform. Description: DigiDomain 2.2 - 'suggest_result.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: Linux_Drox
Analyze the security implications of: DigiDomain 2.2 - 'suggest_result.asp' Multiple Cross-Site Scripting Vulnerabilities
This exploit targets asp systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets asp platform
What is this exploit about: Lynx 2.8 - Remote Buffer Overflow
This is a remote exploit for multiple platform. Description: Lynx 2.8 - Remote Buffer Overflow. Author: Michal Zalewski
Analyze the security implications of: Lynx 2.8 - Remote Buffer Overflow
This exploit targets multiple systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: FireEye - Wormable Remote Code Execution in MIP JAR Analysis
This is a remote exploit for java platform. Description: FireEye - Wormable Remote Code Execution in MIP JAR Analysis. Author: Tavis Ormandy & Natalie Silvanovich
Analyze the security implications of: FireEye - Wormable Remote Code Execution in MIP JAR Analysis
This exploit targets java systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets java platform
What is this exploit about: Genexis Platinum 4410 Router 2.1 - UPnP Credential Exposure
This is a remote exploit for hardware platform. Description: Genexis Platinum 4410 Router 2.1 - UPnP Credential Exposure. Author: Nitesh Surana
Analyze the security implications of: Genexis Platinum 4410 Router 2.1 - UPnP Credential Exposure
This exploit targets hardware systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Drupal < 4.7.6 - Post Comments Remote Command Execution
This is a webapps exploit for php platform. Description: Drupal < 4.7.6 - Post Comments Remote Command Execution. Author: str0ke
Analyze the security implications of: Drupal < 4.7.6 - Post Comments Remote Command Execution
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: DomainMOD 4.11.01 - Registrar Cross-Site Scripting
This is a webapps exploit for php platform. Description: DomainMOD 4.11.01 - Registrar Cross-Site Scripting. Author: Mohammed Abdul Raheem
Analyze the security implications of: DomainMOD 4.11.01 - Registrar Cross-Site Scripting
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform