input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Grandstream GXV3275 < 1.0.3.30 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Grandstream GXV3275 < 1.0.3.30 - Multiple Vulnerabilities. Author: David Jorm |
Analyze the security implications of: Grandstream GXV3275 < 1.0.3.30 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: LoCal Calendar 1.1 - 'lcUser.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: LoCal Calendar 1.1 - 'lcUser.php' Remote File Inclusion. Author: o0xxdark0o |
Analyze the security implications of: LoCal Calendar 1.1 - 'lcUser.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenSSH 2.3 < 7.7 - Username Enumeration | This is a remote exploit for linux platform. Description: OpenSSH 2.3 < 7.7 - Username Enumeration. Author: Justin Gardner |
Analyze the security implications of: OpenSSH 2.3 < 7.7 - Username Enumeration | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Aprox CMS Engine 6.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Aprox CMS Engine 6.0 - Multiple Vulnerabilities. Author: Stephan Sattler |
Analyze the security implications of: Aprox CMS Engine 6.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eoCMS 0.9.04 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: eoCMS 0.9.04 - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: eoCMS 0.9.04 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 2Moons - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: 2Moons - Multiple Vulnerabilities. Author: bRpsd |
Analyze the security implications of: 2Moons - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Komento 1.7.2 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component Komento 1.7.2 - Persistent Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: Joomla! Component Komento 1.7.2 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eXtremail 2.1.1 - 'LOGIN' Remote Stack Overflow | This is a remote exploit for linux platform. Description: eXtremail 2.1.1 - 'LOGIN' Remote Stack Overflow. Author: mu-b |
Analyze the security implications of: eXtremail 2.1.1 - 'LOGIN' Remote Stack Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ADODB < 4.70 - 'tmssql.php' Denial of Service | This is a dos exploit for php platform. Description: ADODB < 4.70 - 'tmssql.php' Denial of Service. Author: rgod |
Analyze the security implications of: ADODB < 4.70 - 'tmssql.php' Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.3.2 'xmlrpc' Extension - Multiple Remote Denial of Service Vulnerabilities | This is a dos exploit for php platform. Description: PHP 5.3.2 'xmlrpc' Extension - Multiple Remote Denial of Service Vulnerabilities. Author: Auke van Slooten |
Analyze the security implications of: PHP 5.3.2 'xmlrpc' Extension - Multiple Remote Denial of Service Vulnerabilities | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Rumpus 5.1 - Local Privilege Escalation / Remote FTP LIST | This is a local exploit for osx platform. Description: Rumpus 5.1 - Local Privilege Escalation / Remote FTP LIST. Author: MoAB |
Analyze the security implications of: Rumpus 5.1 - Local Privilege Escalation / Remote FTP LIST | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Sagemcom F@st 3184 2.1.11 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Sagemcom F@st 3184 2.1.11 - Multiple Vulnerabilities. Author: Oz Elisyan |
Analyze the security implications of: Sagemcom F@st 3184 2.1.11 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: exV2 < 2.0.4.3 - 'extract()' Remote Command Execution | This is a webapps exploit for php platform. Description: exV2 < 2.0.4.3 - 'extract()' Remote Command Execution. Author: rgod |
Analyze the security implications of: exV2 < 2.0.4.3 - 'extract()' Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IMLib2 - Home Environment Variable Buffer Overflow | This is a local exploit for linux platform. Description: IMLib2 - Home Environment Variable Buffer Overflow. Author: Charles Stevenson |
Analyze the security implications of: IMLib2 - Home Environment Variable Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Web Oddity Web Server 0.09b - Directory Traversal | This is a remote exploit for linux platform. Description: Web Oddity Web Server 0.09b - Directory Traversal. Author: Katatafish |
Analyze the security implications of: Web Oddity Web Server 0.09b - Directory Traversal | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Astaro Security Gateway 8.1 - HTML Injection | This is a remote exploit for hardware platform. Description: Astaro Security Gateway 8.1 - HTML Injection. Author: Vulnerability Research Laboratory |
Analyze the security implications of: Astaro Security Gateway 8.1 - HTML Injection | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Kayako eSupport 2.x - Ticket System Multiple SQL Injections | This is a webapps exploit for php platform. Description: Kayako eSupport 2.x - Ticket System Multiple SQL Injections. Author: GulfTech Security |
Analyze the security implications of: Kayako eSupport 2.x - Ticket System Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASUS DSL-N14U B1 Router 1.1.2.3_345 - Change Administrator Password | This is a webapps exploit for hardware platform. Description: ASUS DSL-N14U B1 Router 1.1.2.3_345 - Change Administrator Password. Author: Víctor Calvo |
Analyze the security implications of: ASUS DSL-N14U B1 Router 1.1.2.3_345 - Change Administrator Password | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: cm3 Acora CMS - 'top.aspx' Information Disclosure | This is a webapps exploit for php platform. Description: cm3 Acora CMS - 'top.aspx' Information Disclosure. Author: Pedro Andujar |
Analyze the security implications of: cm3 Acora CMS - 'top.aspx' Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: myNewsletter 1.1.2 - 'adminLogin.asp' Authentication Bypass | This is a webapps exploit for asp platform. Description: myNewsletter 1.1.2 - 'adminLogin.asp' Authentication Bypass. Author: FarhadKey |
Analyze the security implications of: myNewsletter 1.1.2 - 'adminLogin.asp' Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Skulltag Huffman 0.97d-beta4.1 - Packet Decompression Remote Heap Buffer Overflow | This is a remote exploit for multiple platform. Description: Skulltag Huffman 0.97d-beta4.1 - Packet Decompression Remote Heap Buffer Overflow. Author: Luigi Auriemma |
Analyze the security implications of: Skulltag Huffman 0.97d-beta4.1 - Packet Decompression Remote Heap Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: cPanel 10.x - 'editit.html?File' Cross-Site Scripting | This is a webapps exploit for php platform. Description: cPanel 10.x - 'editit.html?File' Cross-Site Scripting. Author: preth00nker |
Analyze the security implications of: cPanel 10.x - 'editit.html?File' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Spidermonkey - IonMonkey Unexpected ObjectGroup in ObjectGroupDispatch Operation | This is a dos exploit for multiple platform. Description: Spidermonkey - IonMonkey Unexpected ObjectGroup in ObjectGroupDispatch Operation. Author: Google Security Research |
Analyze the security implications of: Spidermonkey - IonMonkey Unexpected ObjectGroup in ObjectGroupDispatch Operation | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Coppermine Photo Gallery 1.4.10 - 'cpg1410_xek.php' SQL Injection | This is a webapps exploit for php platform. Description: Coppermine Photo Gallery 1.4.10 - 'cpg1410_xek.php' SQL Injection. Author: bazik |
Analyze the security implications of: Coppermine Photo Gallery 1.4.10 - 'cpg1410_xek.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IPTBB 0.5.4 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: IPTBB 0.5.4 - 'id' SQL Injection. Author: MhZ91 |
Analyze the security implications of: IPTBB 0.5.4 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DZ Auktionshaus 'V4.rgo' - 'id' news.php?SQL Injection | This is a webapps exploit for php platform. Description: DZ Auktionshaus 'V4.rgo' - 'id' news.php?SQL Injection. Author: Easy Laster |
Analyze the security implications of: DZ Auktionshaus 'V4.rgo' - 'id' news.php?SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenBSD - 'at Stack Clash' Local Privilege Escalation | This is a local exploit for openbsd platform. Description: OpenBSD - 'at Stack Clash' Local Privilege Escalation. Author: Qualys Corporation |
Analyze the security implications of: OpenBSD - 'at Stack Clash' Local Privilege Escalation | This exploit targets openbsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets openbsd platform |
What is this exploit about: Digital Scribe 1.5 - register_form()' Multiple POST Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Digital Scribe 1.5 - register_form()' Multiple POST Cross-Site Scripting Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: Digital Scribe 1.5 - register_form()' Multiple POST Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SimpleBlog 2.1 - Multiple Input Validation Vulnerabilities | This is a webapps exploit for asp platform. Description: SimpleBlog 2.1 - Multiple Input Validation Vulnerabilities. Author: Zinho |
Analyze the security implications of: SimpleBlog 2.1 - Multiple Input Validation Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apple Mac OSX Kernel - Unchecked Array Index Used to Read Object Pointer Then Call Virtual Method in Nvidia Geforce Driver | This is a dos exploit for osx platform. Description: Apple Mac OSX Kernel - Unchecked Array Index Used to Read Object Pointer Then Call Virtual Method in Nvidia Geforce Driver. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX Kernel - Unchecked Array Index Used to Read Object Pointer Then Call Virtual Method in Nvidia Geforce Driver | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: GNU Beep 1.3 - 'HoleyBeep' Local Privilege Escalation | This is a local exploit for linux platform. Description: GNU Beep 1.3 - 'HoleyBeep' Local Privilege Escalation. Author: Pirhack |
Analyze the security implications of: GNU Beep 1.3 - 'HoleyBeep' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! / Mambo Component com_formtool - 'catid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_formtool - 'catid' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! / Mambo Component com_formtool - 'catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Unitrends Enterprise Backup - bpserverd Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: Unitrends Enterprise Backup - bpserverd Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Unitrends Enterprise Backup - bpserverd Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.