input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component File Download Tracker 3.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component File Download Tracker 3.0 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component File Download Tracker 3.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LightNEasy 3.1.x - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: LightNEasy 3.1.x - Multiple Vulnerabilities. Author: ITSecTeam
|
Analyze the security implications of: LightNEasy 3.1.x - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Nokia BMC Log Scanner - Remote Code Execution
|
This is a webapps exploit for linux platform. Description: Nokia BMC Log Scanner - Remote Code Execution. Author: Carlos Andres Gonzalez_ Matthew Gregory
|
Analyze the security implications of: Nokia BMC Log Scanner - Remote Code Execution
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Multiple CPUs - Information Leak Using Speculative Execution
|
This is a dos exploit for hardware platform. Description: Multiple CPUs - Information Leak Using Speculative Execution. Author: Google Security Research
|
Analyze the security implications of: Multiple CPUs - Information Leak Using Speculative Execution
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Wireshark - 'iseries_check_file_type' Stack Out-of-Bounds Read
|
This is a dos exploit for multiple platform. Description: Wireshark - 'iseries_check_file_type' Stack Out-of-Bounds Read. Author: Google Security Research
|
Analyze the security implications of: Wireshark - 'iseries_check_file_type' Stack Out-of-Bounds Read
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: DotClear 1.2.x - '/ecrire/trackback.php?post_id' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DotClear 1.2.x - '/ecrire/trackback.php?post_id' Cross-Site Scripting. Author: nassim
|
Analyze the security implications of: DotClear 1.2.x - '/ecrire/trackback.php?post_id' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Infocus Real Estate Enterprise Edition Script - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Infocus Real Estate Enterprise Edition Script - Authentication Bypass. Author: Sid3^effects
|
Analyze the security implications of: Infocus Real Estate Enterprise Edition Script - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Netgear WPN824v3 - Unauthorized Configuration Download
|
This is a webapps exploit for hardware platform. Description: Netgear WPN824v3 - Unauthorized Configuration Download. Author: Jens Regel
|
Analyze the security implications of: Netgear WPN824v3 - Unauthorized Configuration Download
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Netperf 2.6.0 - Stack-Based Buffer Overflow
|
This is a dos exploit for linux platform. Description: Netperf 2.6.0 - Stack-Based Buffer Overflow. Author: Juan Sacco
|
Analyze the security implications of: Netperf 2.6.0 - Stack-Based Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: SurfControl SuperScout Email Filter 3.5 - User Credential Disclosure
|
This is a webapps exploit for asp platform. Description: SurfControl SuperScout Email Filter 3.5 - User Credential Disclosure. Author: ken@FTU
|
Analyze the security implications of: SurfControl SuperScout Email Filter 3.5 - User Credential Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Apache + PHP < 5.3.12 / < 5.4.2 - cgi-bin Remote Code Execution
|
This is a remote exploit for php platform. Description: Apache + PHP < 5.3.12 / < 5.4.2 - cgi-bin Remote Code Execution. Author: kingcope
|
Analyze the security implications of: Apache + PHP < 5.3.12 / < 5.4.2 - cgi-bin Remote Code Execution
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BookReview 1.0 - 'add_booklist.htm?node' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: BookReview 1.0 - 'add_booklist.htm?node' Cross-Site Scripting. Author: Lostmon
|
Analyze the security implications of: BookReview 1.0 - 'add_booklist.htm?node' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GLPI 0.85.5 - Arbitrary File Upload / Filter Bypass / Remote Code Execution
|
This is a webapps exploit for php platform. Description: GLPI 0.85.5 - Arbitrary File Upload / Filter Bypass / Remote Code Execution. Author: Raffaele Forte
|
Analyze the security implications of: GLPI 0.85.5 - Arbitrary File Upload / Filter Bypass / Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Maian Uploader 4.0 - 'header.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Maian Uploader 4.0 - 'header.php' Cross-Site Scripting. Author: Khashayar Fereidani
|
Analyze the security implications of: Maian Uploader 4.0 - 'header.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WordPress Core 4.7.0/4.7.1 - Content Injection (Ruby)
|
This is a webapps exploit for linux platform. Description: WordPress Core 4.7.0/4.7.1 - Content Injection (Ruby). Author: Harsh Jaiswal
|
Analyze the security implications of: WordPress Core 4.7.0/4.7.1 - Content Injection (Ruby)
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: IceBB 1.0-rc10 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: IceBB 1.0-rc10 - Multiple Vulnerabilities. Author: High-Tech Bridge SA
|
Analyze the security implications of: IceBB 1.0-rc10 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OpenText Documentum D2 - Remote Code Execution
|
This is a remote exploit for java platform. Description: OpenText Documentum D2 - Remote Code Execution. Author: Andrey B. Panfilov
|
Analyze the security implications of: OpenText Documentum D2 - Remote Code Execution
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Lost and Found Information System v1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Lost and Found Information System v1.0 - SQL Injection. Author: Amirhossein Bahramizadeh
|
Analyze the security implications of: Lost and Found Information System v1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SyGate 5.0 - Insecure UDP Source Port Firewall Bypass Weak Default Configuration
|
This is a remote exploit for multiple platform. Description: SyGate 5.0 - Insecure UDP Source Port Firewall Bypass Weak Default Configuration. Author: David Fernández
|
Analyze the security implications of: SyGate 5.0 - Insecure UDP Source Port Firewall Bypass Weak Default Configuration
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Dodo Upload 1.3 - Arbitrary File Upload (Bypass)
|
This is a webapps exploit for php platform. Description: Dodo Upload 1.3 - Arbitrary File Upload (Bypass). Author: indoushka
|
Analyze the security implications of: Dodo Upload 1.3 - Arbitrary File Upload (Bypass)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IPFire 2.19 - Remote Code Execution
|
This is a webapps exploit for linux platform. Description: IPFire 2.19 - Remote Code Execution. Author: 0x09AL
|
Analyze the security implications of: IPFire 2.19 - Remote Code Execution
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: TOSHIBA e-Studio 232/233/282/283 - Cross-Site Request Forgery (Change Admin Password)
|
This is a webapps exploit for hardware platform. Description: TOSHIBA e-Studio 232/233/282/283 - Cross-Site Request Forgery (Change Admin Password). Author: Hubert Gradek
|
Analyze the security implications of: TOSHIBA e-Studio 232/233/282/283 - Cross-Site Request Forgery (Change Admin Password)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Linux Kernel 2.6.x - epoll Nested Structures Local Denial of Service
|
This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - epoll Nested Structures Local Denial of Service. Author: Nelson Elhage
|
Analyze the security implications of: Linux Kernel 2.6.x - epoll Nested Structures Local Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Mantis Bug Tracker 1.2.0a3 < 1.2.17 XmlImportExport Plugin - PHP Code Injection (Metasploit) (2)
|
This is a remote exploit for php platform. Description: Mantis Bug Tracker 1.2.0a3 < 1.2.17 XmlImportExport Plugin - PHP Code Injection (Metasploit) (2). Author: Metasploit
|
Analyze the security implications of: Mantis Bug Tracker 1.2.0a3 < 1.2.17 XmlImportExport Plugin - PHP Code Injection (Metasploit) (2)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Coppermine Photo Gallery 1.4.9 - SQL Injection
|
This is a webapps exploit for php platform. Description: Coppermine Photo Gallery 1.4.9 - SQL Injection. Author: w4ck1ng
|
Analyze the security implications of: Coppermine Photo Gallery 1.4.9 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WU-FTPD - Site EXEC/INDEX Format String (Metasploit)
|
This is a remote exploit for linux platform. Description: WU-FTPD - Site EXEC/INDEX Format String (Metasploit). Author: Metasploit
|
Analyze the security implications of: WU-FTPD - Site EXEC/INDEX Format String (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Unalz 0.x - Archive Filename Buffer Overflow
|
This is a dos exploit for linux platform. Description: Unalz 0.x - Archive Filename Buffer Overflow. Author: Ulf Harnhammar
|
Analyze the security implications of: Unalz 0.x - Archive Filename Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: DigiDomain 2.2 - 'suggest_result.asp' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for asp platform. Description: DigiDomain 2.2 - 'suggest_result.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: Linux_Drox
|
Analyze the security implications of: DigiDomain 2.2 - 'suggest_result.asp' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Lynx 2.8 - Remote Buffer Overflow
|
This is a remote exploit for multiple platform. Description: Lynx 2.8 - Remote Buffer Overflow. Author: Michal Zalewski
|
Analyze the security implications of: Lynx 2.8 - Remote Buffer Overflow
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: FireEye - Wormable Remote Code Execution in MIP JAR Analysis
|
This is a remote exploit for java platform. Description: FireEye - Wormable Remote Code Execution in MIP JAR Analysis. Author: Tavis Ormandy & Natalie Silvanovich
|
Analyze the security implications of: FireEye - Wormable Remote Code Execution in MIP JAR Analysis
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Genexis Platinum 4410 Router 2.1 - UPnP Credential Exposure
|
This is a remote exploit for hardware platform. Description: Genexis Platinum 4410 Router 2.1 - UPnP Credential Exposure. Author: Nitesh Surana
|
Analyze the security implications of: Genexis Platinum 4410 Router 2.1 - UPnP Credential Exposure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Drupal < 4.7.6 - Post Comments Remote Command Execution
|
This is a webapps exploit for php platform. Description: Drupal < 4.7.6 - Post Comments Remote Command Execution. Author: str0ke
|
Analyze the security implications of: Drupal < 4.7.6 - Post Comments Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DomainMOD 4.11.01 - Registrar Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DomainMOD 4.11.01 - Registrar Cross-Site Scripting. Author: Mohammed Abdul Raheem
|
Analyze the security implications of: DomainMOD 4.11.01 - Registrar Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.