input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component File Download Tracker 3.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component File Download Tracker 3.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component File Download Tracker 3.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LightNEasy 3.1.x - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: LightNEasy 3.1.x - Multiple Vulnerabilities. Author: ITSecTeam |
Analyze the security implications of: LightNEasy 3.1.x - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nokia BMC Log Scanner - Remote Code Execution | This is a webapps exploit for linux platform. Description: Nokia BMC Log Scanner - Remote Code Execution. Author: Carlos Andres Gonzalez_ Matthew Gregory |
Analyze the security implications of: Nokia BMC Log Scanner - Remote Code Execution | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Multiple CPUs - Information Leak Using Speculative Execution | This is a dos exploit for hardware platform. Description: Multiple CPUs - Information Leak Using Speculative Execution. Author: Google Security Research |
Analyze the security implications of: Multiple CPUs - Information Leak Using Speculative Execution | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Wireshark - 'iseries_check_file_type' Stack Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: Wireshark - 'iseries_check_file_type' Stack Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: Wireshark - 'iseries_check_file_type' Stack Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DotClear 1.2.x - '/ecrire/trackback.php?post_id' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DotClear 1.2.x - '/ecrire/trackback.php?post_id' Cross-Site Scripting. Author: nassim |
Analyze the security implications of: DotClear 1.2.x - '/ecrire/trackback.php?post_id' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Infocus Real Estate Enterprise Edition Script - Authentication Bypass | This is a webapps exploit for php platform. Description: Infocus Real Estate Enterprise Edition Script - Authentication Bypass. Author: Sid3^effects |
Analyze the security implications of: Infocus Real Estate Enterprise Edition Script - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Netgear WPN824v3 - Unauthorized Configuration Download | This is a webapps exploit for hardware platform. Description: Netgear WPN824v3 - Unauthorized Configuration Download. Author: Jens Regel |
Analyze the security implications of: Netgear WPN824v3 - Unauthorized Configuration Download | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Netperf 2.6.0 - Stack-Based Buffer Overflow | This is a dos exploit for linux platform. Description: Netperf 2.6.0 - Stack-Based Buffer Overflow. Author: Juan Sacco |
Analyze the security implications of: Netperf 2.6.0 - Stack-Based Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SurfControl SuperScout Email Filter 3.5 - User Credential Disclosure | This is a webapps exploit for asp platform. Description: SurfControl SuperScout Email Filter 3.5 - User Credential Disclosure. Author: ken@FTU |
Analyze the security implications of: SurfControl SuperScout Email Filter 3.5 - User Credential Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apache + PHP < 5.3.12 / < 5.4.2 - cgi-bin Remote Code Execution | This is a remote exploit for php platform. Description: Apache + PHP < 5.3.12 / < 5.4.2 - cgi-bin Remote Code Execution. Author: kingcope |
Analyze the security implications of: Apache + PHP < 5.3.12 / < 5.4.2 - cgi-bin Remote Code Execution | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BookReview 1.0 - 'add_booklist.htm?node' Cross-Site Scripting | This is a webapps exploit for php platform. Description: BookReview 1.0 - 'add_booklist.htm?node' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: BookReview 1.0 - 'add_booklist.htm?node' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GLPI 0.85.5 - Arbitrary File Upload / Filter Bypass / Remote Code Execution | This is a webapps exploit for php platform. Description: GLPI 0.85.5 - Arbitrary File Upload / Filter Bypass / Remote Code Execution. Author: Raffaele Forte |
Analyze the security implications of: GLPI 0.85.5 - Arbitrary File Upload / Filter Bypass / Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Maian Uploader 4.0 - 'header.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Maian Uploader 4.0 - 'header.php' Cross-Site Scripting. Author: Khashayar Fereidani |
Analyze the security implications of: Maian Uploader 4.0 - 'header.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WordPress Core 4.7.0/4.7.1 - Content Injection (Ruby) | This is a webapps exploit for linux platform. Description: WordPress Core 4.7.0/4.7.1 - Content Injection (Ruby). Author: Harsh Jaiswal |
Analyze the security implications of: WordPress Core 4.7.0/4.7.1 - Content Injection (Ruby) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: IceBB 1.0-rc10 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: IceBB 1.0-rc10 - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: IceBB 1.0-rc10 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenText Documentum D2 - Remote Code Execution | This is a remote exploit for java platform. Description: OpenText Documentum D2 - Remote Code Execution. Author: Andrey B. Panfilov |
Analyze the security implications of: OpenText Documentum D2 - Remote Code Execution | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Lost and Found Information System v1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Lost and Found Information System v1.0 - SQL Injection. Author: Amirhossein Bahramizadeh |
Analyze the security implications of: Lost and Found Information System v1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SyGate 5.0 - Insecure UDP Source Port Firewall Bypass Weak Default Configuration | This is a remote exploit for multiple platform. Description: SyGate 5.0 - Insecure UDP Source Port Firewall Bypass Weak Default Configuration. Author: David Fernández |
Analyze the security implications of: SyGate 5.0 - Insecure UDP Source Port Firewall Bypass Weak Default Configuration | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Dodo Upload 1.3 - Arbitrary File Upload (Bypass) | This is a webapps exploit for php platform. Description: Dodo Upload 1.3 - Arbitrary File Upload (Bypass). Author: indoushka |
Analyze the security implications of: Dodo Upload 1.3 - Arbitrary File Upload (Bypass) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IPFire 2.19 - Remote Code Execution | This is a webapps exploit for linux platform. Description: IPFire 2.19 - Remote Code Execution. Author: 0x09AL |
Analyze the security implications of: IPFire 2.19 - Remote Code Execution | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: TOSHIBA e-Studio 232/233/282/283 - Cross-Site Request Forgery (Change Admin Password) | This is a webapps exploit for hardware platform. Description: TOSHIBA e-Studio 232/233/282/283 - Cross-Site Request Forgery (Change Admin Password). Author: Hubert Gradek |
Analyze the security implications of: TOSHIBA e-Studio 232/233/282/283 - Cross-Site Request Forgery (Change Admin Password) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linux Kernel 2.6.x - epoll Nested Structures Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - epoll Nested Structures Local Denial of Service. Author: Nelson Elhage |
Analyze the security implications of: Linux Kernel 2.6.x - epoll Nested Structures Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mantis Bug Tracker 1.2.0a3 < 1.2.17 XmlImportExport Plugin - PHP Code Injection (Metasploit) (2) | This is a remote exploit for php platform. Description: Mantis Bug Tracker 1.2.0a3 < 1.2.17 XmlImportExport Plugin - PHP Code Injection (Metasploit) (2). Author: Metasploit |
Analyze the security implications of: Mantis Bug Tracker 1.2.0a3 < 1.2.17 XmlImportExport Plugin - PHP Code Injection (Metasploit) (2) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Coppermine Photo Gallery 1.4.9 - SQL Injection | This is a webapps exploit for php platform. Description: Coppermine Photo Gallery 1.4.9 - SQL Injection. Author: w4ck1ng |
Analyze the security implications of: Coppermine Photo Gallery 1.4.9 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WU-FTPD - Site EXEC/INDEX Format String (Metasploit) | This is a remote exploit for linux platform. Description: WU-FTPD - Site EXEC/INDEX Format String (Metasploit). Author: Metasploit |
Analyze the security implications of: WU-FTPD - Site EXEC/INDEX Format String (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Unalz 0.x - Archive Filename Buffer Overflow | This is a dos exploit for linux platform. Description: Unalz 0.x - Archive Filename Buffer Overflow. Author: Ulf Harnhammar |
Analyze the security implications of: Unalz 0.x - Archive Filename Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DigiDomain 2.2 - 'suggest_result.asp' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: DigiDomain 2.2 - 'suggest_result.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: Linux_Drox |
Analyze the security implications of: DigiDomain 2.2 - 'suggest_result.asp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Lynx 2.8 - Remote Buffer Overflow | This is a remote exploit for multiple platform. Description: Lynx 2.8 - Remote Buffer Overflow. Author: Michal Zalewski |
Analyze the security implications of: Lynx 2.8 - Remote Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FireEye - Wormable Remote Code Execution in MIP JAR Analysis | This is a remote exploit for java platform. Description: FireEye - Wormable Remote Code Execution in MIP JAR Analysis. Author: Tavis Ormandy & Natalie Silvanovich |
Analyze the security implications of: FireEye - Wormable Remote Code Execution in MIP JAR Analysis | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Genexis Platinum 4410 Router 2.1 - UPnP Credential Exposure | This is a remote exploit for hardware platform. Description: Genexis Platinum 4410 Router 2.1 - UPnP Credential Exposure. Author: Nitesh Surana |
Analyze the security implications of: Genexis Platinum 4410 Router 2.1 - UPnP Credential Exposure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Drupal < 4.7.6 - Post Comments Remote Command Execution | This is a webapps exploit for php platform. Description: Drupal < 4.7.6 - Post Comments Remote Command Execution. Author: str0ke |
Analyze the security implications of: Drupal < 4.7.6 - Post Comments Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DomainMOD 4.11.01 - Registrar Cross-Site Scripting | This is a webapps exploit for php platform. Description: DomainMOD 4.11.01 - Registrar Cross-Site Scripting. Author: Mohammed Abdul Raheem |
Analyze the security implications of: DomainMOD 4.11.01 - Registrar Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.