input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TrendMicro InterScan Web Security Virtual Appliance - 'Shellshock' Remote Command Injection | This is a remote exploit for hardware platform. Description: TrendMicro InterScan Web Security Virtual Appliance - 'Shellshock' Remote Command Injection. Author: Hacker Fantastic |
Analyze the security implications of: TrendMicro InterScan Web Security Virtual Appliance - 'Shellshock' Remote Command Injection | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Akaunting 3.1.8 - Server-Side Template Injection (SSTI) | This is a webapps exploit for php platform. Description: Akaunting 3.1.8 - Server-Side Template Injection (SSTI). Author: tmrswrr |
Analyze the security implications of: Akaunting 3.1.8 - Server-Side Template Injection (SSTI) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CaupoShop Pro 2.x - 'action' Remote File Inclusion | This is a webapps exploit for php platform. Description: CaupoShop Pro 2.x - 'action' Remote File Inclusion. Author: mozi |
Analyze the security implications of: CaupoShop Pro 2.x - 'action' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Chameleon LE 1.203 - 'index.php' Directory Traversal | This is a webapps exploit for php platform. Description: Chameleon LE 1.203 - 'index.php' Directory Traversal. Author: kicktd |
Analyze the security implications of: Chameleon LE 1.203 - 'index.php' Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FunkyASP AD System 1.1 - Arbitrary File Upload | This is a webapps exploit for asp platform. Description: FunkyASP AD System 1.1 - Arbitrary File Upload. Author: ZoRLu |
Analyze the security implications of: FunkyASP AD System 1.1 - Arbitrary File Upload | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: NeoSys Neon Webmail for Java 5.06/5.07 - 'updateuser?in_id' Servlet Arbitrary User Information Modification | This is a webapps exploit for jsp platform. Description: NeoSys Neon Webmail for Java 5.06/5.07 - 'updateuser?in_id' Servlet Arbitrary User Information Modification. Author: Tan Chew Keong |
Analyze the security implications of: NeoSys Neon Webmail for Java 5.06/5.07 - 'updateuser?in_id' Servlet Arbitrary User Information Modification | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Adobe Flash - Type Confusion in TextRenderer.setAdvancedAntialiasingTable | This is a dos exploit for multiple platform. Description: Adobe Flash - Type Confusion in TextRenderer.setAdvancedAntialiasingTable. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Type Confusion in TextRenderer.setAdvancedAntialiasingTable | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Google Chrome - GPU Process MailboxManagerImpl Double-Read | This is a dos exploit for linux platform. Description: Google Chrome - GPU Process MailboxManagerImpl Double-Read. Author: Google Security Research |
Analyze the security implications of: Google Chrome - GPU Process MailboxManagerImpl Double-Read | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Active Business Directory 2 - 'searchadvance.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Active Business Directory 2 - 'searchadvance.asp' Cross-Site Scripting. Author: Andrea Bocchetti |
Analyze the security implications of: Active Business Directory 2 - 'searchadvance.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Allfaclassifieds 6.04 - 'Level2.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Allfaclassifieds 6.04 - 'Level2.php' Remote File Inclusion. Author: Dr.RoVeR |
Analyze the security implications of: Allfaclassifieds 6.04 - 'Level2.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco Catalyst Switches (Multiple Devices) - LanD Packet Denial of Service | This is a dos exploit for hardware platform. Description: Cisco Catalyst Switches (Multiple Devices) - LanD Packet Denial of Service. Author: Justin M. Wray |
Analyze the security implications of: Cisco Catalyst Switches (Multiple Devices) - LanD Packet Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: vBulletin 5.x - 'routestring' Remote Code Execution | This is a webapps exploit for multiple platform. Description: vBulletin 5.x - 'routestring' Remote Code Execution. Author: SecuriTeam |
Analyze the security implications of: vBulletin 5.x - 'routestring' Remote Code Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Laurent Adda Les Commentaires 2.0 - PHP Script 'fonctions.lib.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Laurent Adda Les Commentaires 2.0 - PHP Script 'fonctions.lib.php' Remote File Inclusion. Author: Himeur Nourredine |
Analyze the security implications of: Laurent Adda Les Commentaires 2.0 - PHP Script 'fonctions.lib.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lms Web Ensino - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: Lms Web Ensino - Multiple Input Validation Vulnerabilities. Author: waKKu |
Analyze the security implications of: Lms Web Ensino - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Simple E-document - Arbitrary File Upload (Metasploit) | This is a remote exploit for php platform. Description: Simple E-document - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: Simple E-document - Arbitrary File Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Virtual Postage (VPA) - Man In The Middle Remote Code Execution | This is a remote exploit for android platform. Description: Virtual Postage (VPA) - Man In The Middle Remote Code Execution. Author: intern0t |
Analyze the security implications of: Virtual Postage (VPA) - Man In The Middle Remote Code Execution | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Linux Kernel 2.6.x - CIFS CHRoot Security Restriction Bypass | This is a local exploit for linux platform. Description: Linux Kernel 2.6.x - CIFS CHRoot Security Restriction Bypass. Author: Marcel Holtmann |
Analyze the security implications of: Linux Kernel 2.6.x - CIFS CHRoot Security Restriction Bypass | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Dual DHCP DNS Server 1.0 - DHCP Options Remote Buffer Overflow | This is a dos exploit for multiple platform. Description: Dual DHCP DNS Server 1.0 - DHCP Options Remote Buffer Overflow. Author: Luigi Auriemma |
Analyze the security implications of: Dual DHCP DNS Server 1.0 - DHCP Options Remote Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Device Reboot (Unauthenticated) | This is a dos exploit for hardware platform. Description: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Device Reboot (Unauthenticated). Author: LiquidWorm |
Analyze the security implications of: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Device Reboot (Unauthenticated) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Faulty Evaluation System 1.0 - 'multiple' Stored Cross-Site Scripting | This is a webapps exploit for php platform. Description: Faulty Evaluation System 1.0 - 'multiple' Stored Cross-Site Scripting. Author: Suresh Kumar |
Analyze the security implications of: Faulty Evaluation System 1.0 - 'multiple' Stored Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenSSL - Remote Denial of Service | This is a dos exploit for linux platform. Description: OpenSSL - Remote Denial of Service. Author: Andi |
Analyze the security implications of: OpenSSL - Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Magic Photo Storage Website - '/admin/admin_email.php?_config[site_path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/admin/admin_email.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina |
Analyze the security implications of: Magic Photo Storage Website - '/admin/admin_email.php?_config[site_path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dvbbs 7.1/8.2 - 'boardhelp.asp' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: Dvbbs 7.1/8.2 - 'boardhelp.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: Lostmon |
Analyze the security implications of: Dvbbs 7.1/8.2 - 'boardhelp.asp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: John S.2 Roberts AnyForm 1.0/2.0 - CGI Semicolon | This is a remote exploit for linux platform. Description: John S.2 Roberts AnyForm 1.0/2.0 - CGI Semicolon. Author: Paul Phillips |
Analyze the security implications of: John S.2 Roberts AnyForm 1.0/2.0 - CGI Semicolon | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: agora project 2.13.1 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: agora project 2.13.1 - Multiple Vulnerabilities. Author: Chris Russell |
Analyze the security implications of: agora project 2.13.1 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wireshark 1.4.3 - '.pcap' Memory Corruption | This is a remote exploit for linux platform. Description: Wireshark 1.4.3 - '.pcap' Memory Corruption. Author: Huzaifa Sidhpurwala |
Analyze the security implications of: Wireshark 1.4.3 - '.pcap' Memory Corruption | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: iScripts ReserveLogic - SQL Injection | This is a webapps exploit for php platform. Description: iScripts ReserveLogic - SQL Injection. Author: Ahmet Ümit BAYRAM |
Analyze the security implications of: iScripts ReserveLogic - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Expinion.net Member Management System 2.1 - 'error.asp?err' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Expinion.net Member Management System 2.1 - 'error.asp?err' Cross-Site Scripting. Author: Manuel Lopez |
Analyze the security implications of: Expinion.net Member Management System 2.1 - 'error.asp?err' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe) | This is a local exploit for linux platform. Description: Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe). Author: Lance Biggerstaff |
Analyze the security implications of: Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Dokeos 1.8.4 - '/main/create_course/add_course.php?tutor_name' SQL Injection | This is a webapps exploit for php platform. Description: Dokeos 1.8.4 - '/main/create_course/add_course.php?tutor_name' SQL Injection. Author: Alexandr Polyakov |
Analyze the security implications of: Dokeos 1.8.4 - '/main/create_course/add_course.php?tutor_name' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dream4 Koobi CMS 4.2.4/4.2.5/4.3.0 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Dream4 Koobi CMS 4.2.4/4.2.5/4.3.0 - Multiple SQL Injections. Author: JosS |
Analyze the security implications of: Dream4 Koobi CMS 4.2.4/4.2.5/4.3.0 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.0/2.1/2.2 - 'autofs' Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.0/2.1/2.2 - 'autofs' Denial of Service. Author: Brian Jones |
Analyze the security implications of: Linux Kernel 2.0/2.1/2.2 - 'autofs' Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Nimble Streamer 3.0.2-2 < 3.5.4-9 - Directory Traversal | This is a webapps exploit for multiple platform. Description: Nimble Streamer 3.0.2-2 < 3.5.4-9 - Directory Traversal. Author: MaYaSeVeN |
Analyze the security implications of: Nimble Streamer 3.0.2-2 < 3.5.4-9 - Directory Traversal | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.