input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Avaya Intuity Audix LX R1.1 - Multiple Remote Vulnerabilities | This is a webapps exploit for cgi platform. Description: Avaya Intuity Audix LX R1.1 - Multiple Remote Vulnerabilities. Author: pagvac |
Analyze the security implications of: Avaya Intuity Audix LX R1.1 - Multiple Remote Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: 68 Classifieds 4.1 - 'searchresults.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: 68 Classifieds 4.1 - 'searchresults.php' Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: 68 Classifieds 4.1 - 'searchresults.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Libra PHP File Manager 1.18 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Libra PHP File Manager 1.18 - Insecure Cookie Handling. Author: Stack |
Analyze the security implications of: Libra PHP File Manager 1.18 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sagem Routers - Remote Authentication Bypass | This is a webapps exploit for hardware platform. Description: Sagem Routers - Remote Authentication Bypass. Author: AlpHaNiX |
Analyze the security implications of: Sagem Routers - Remote Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Jenkins < 1.650 - Java Deserialization | This is a remote exploit for java platform. Description: Jenkins < 1.650 - Java Deserialization. Author: Janusz Piechówka |
Analyze the security implications of: Jenkins < 1.650 - Java Deserialization | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Microsoft Word 16.72.23040900 - Remote Code Execution (RCE) | This is a remote exploit for multiple platform. Description: Microsoft Word 16.72.23040900 - Remote Code Execution (RCE). Author: nu11secur1ty |
Analyze the security implications of: Microsoft Word 16.72.23040900 - Remote Code Execution (RCE) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: D-Link DIR-8xx Routers - Root Remote Code Execution | This is a webapps exploit for hardware platform. Description: D-Link DIR-8xx Routers - Root Remote Code Execution. Author: embedi |
Analyze the security implications of: D-Link DIR-8xx Routers - Root Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Crafty Syntax Image Gallery 3.1g - Remote Code Execution | This is a webapps exploit for php platform. Description: Crafty Syntax Image Gallery 3.1g - Remote Code Execution. Author: undefined1_ |
Analyze the security implications of: Crafty Syntax Image Gallery 3.1g - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Winace UnAce 1.x - ACE Archive Directory Traversal | This is a remote exploit for linux platform. Description: Winace UnAce 1.x - ACE Archive Directory Traversal. Author: Ulf Harnhammar |
Analyze the security implications of: Winace UnAce 1.x - ACE Archive Directory Traversal | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FreeNAS - 'exec_raw.php' Arbitrary Command Execution (Metasploit) | This is a webapps exploit for php platform. Description: FreeNAS - 'exec_raw.php' Arbitrary Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: FreeNAS - 'exec_raw.php' Arbitrary Command Execution (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Opera Web Browser 9.x - History Search and Links Panel Cross-Site Scripting | This is a remote exploit for linux platform. Description: Opera Web Browser 9.x - History Search and Links Panel Cross-Site Scripting. Author: Stefano Di Paola |
Analyze the security implications of: Opera Web Browser 9.x - History Search and Links Panel Cross-Site Scripting | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Discuz! 6.0 - '2fly_gift.php' SQL Injection | This is a webapps exploit for php platform. Description: Discuz! 6.0 - '2fly_gift.php' SQL Injection. Author: Securitylab.ir |
Analyze the security implications of: Discuz! 6.0 - '2fly_gift.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mosh - Remote Denial of Service | This is a dos exploit for linux platform. Description: Mosh - Remote Denial of Service. Author: Timo Juhani Lindfors |
Analyze the security implications of: Mosh - Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: LBreakout2 2.x - Login Remote Format String | This is a remote exploit for linux platform. Description: LBreakout2 2.x - Login Remote Format String. Author: V9 |
Analyze the security implications of: LBreakout2 2.x - Login Remote Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: OpenBSD 2.0 < 3.6 - TCP Timestamp Remote Denial of Service | This is a dos exploit for bsd platform. Description: OpenBSD 2.0 < 3.6 - TCP Timestamp Remote Denial of Service. Author: RusH |
Analyze the security implications of: OpenBSD 2.0 < 3.6 - TCP Timestamp Remote Denial of Service | This exploit targets bsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Avahi < 0.6.24 - mDNS Daemon Remote Denial of Service | This is a dos exploit for multiple platform. Description: Avahi < 0.6.24 - mDNS Daemon Remote Denial of Service. Author: Jon Oberheide |
Analyze the security implications of: Avahi < 0.6.24 - mDNS Daemon Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: MICO Object Key 2.3.12 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: MICO Object Key 2.3.12 - Remote Denial of Service. Author: tuergeist |
Analyze the security implications of: MICO Object Key 2.3.12 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Adobe Flash - attachMovie Use-After-Free | This is a dos exploit for multiple platform. Description: Adobe Flash - attachMovie Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - attachMovie Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Kmita Tellfriend 2.0 - 'file' Remote File Inclusion | This is a webapps exploit for php platform. Description: Kmita Tellfriend 2.0 - 'file' Remote File Inclusion. Author: K-159 |
Analyze the security implications of: Kmita Tellfriend 2.0 - 'file' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Datsogallery 1.6 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Datsogallery 1.6 - Blind SQL Injection. Author: +toxa+ |
Analyze the security implications of: Joomla! Component Datsogallery 1.6 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TELSAT marKoni FM Transmitter 1.9.5 - Root Command Injection | This is a remote exploit for hardware platform. Description: TELSAT marKoni FM Transmitter 1.9.5 - Root Command Injection. Author: LiquidWorm |
Analyze the security implications of: TELSAT marKoni FM Transmitter 1.9.5 - Root Command Injection | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: i-Net Online Community - Cross-Site Scripting / Authentication Bypass | This is a webapps exploit for php platform. Description: i-Net Online Community - Cross-Site Scripting / Authentication Bypass. Author: Sid3^effects |
Analyze the security implications of: i-Net Online Community - Cross-Site Scripting / Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple WebKit / Safari 10.0.2(12602.3.12.0.1) - 'PrototypeMap::createEmptyStructure' Universal Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Apple WebKit / Safari 10.0.2(12602.3.12.0.1) - 'PrototypeMap::createEmptyStructure' Universal Cross-Site Scripting. Author: Google Security Research |
Analyze the security implications of: Apple WebKit / Safari 10.0.2(12602.3.12.0.1) - 'PrototypeMap::createEmptyStructure' Universal Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Hadoop YARN ResourceManager - Command Execution (Metasploit) | This is a remote exploit for linux platform. Description: Hadoop YARN ResourceManager - Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Hadoop YARN ResourceManager - Command Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: 60cycleCMS - 'select.php' Multiple HTML Injection Vulnerabilities | This is a webapps exploit for php platform. Description: 60cycleCMS - 'select.php' Multiple HTML Injection Vulnerabilities. Author: pratul agrawal |
Analyze the security implications of: 60cycleCMS - 'select.php' Multiple HTML Injection Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ecommerce Systempay 1.0 - Production KEY Brute Force | This is a webapps exploit for php platform. Description: Ecommerce Systempay 1.0 - Production KEY Brute Force. Author: live3 |
Analyze the security implications of: Ecommerce Systempay 1.0 - Production KEY Brute Force | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FloosieTek FTGate Mail Server 1.2 - Full Path Disclosure | This is a webapps exploit for cgi platform. Description: FloosieTek FTGate Mail Server 1.2 - Full Path Disclosure. Author: dr_insane |
Analyze the security implications of: FloosieTek FTGate Mail Server 1.2 - Full Path Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: GoSamba 1.0.1 - 'INCLUDE_PATH' Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: GoSamba 1.0.1 - 'INCLUDE_PATH' Multiple Remote File Inclusions. Author: GoLd_M |
Analyze the security implications of: GoSamba 1.0.1 - 'INCLUDE_PATH' Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TeamCity < 9.0.2 - Disabled Registration Bypass | This is a remote exploit for multiple platform. Description: TeamCity < 9.0.2 - Disabled Registration Bypass. Author: allyshka |
Analyze the security implications of: TeamCity < 9.0.2 - Disabled Registration Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: F5 BIG-IP 16.0.x - iControl REST Remote Code Execution (Unauthenticated) | This is a webapps exploit for hardware platform. Description: F5 BIG-IP 16.0.x - iControl REST Remote Code Execution (Unauthenticated). Author: Al1ex |
Analyze the security implications of: F5 BIG-IP 16.0.x - iControl REST Remote Code Execution (Unauthenticated) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Coreutils 4.5.x - LS Width Argument Integer Overflow | This is a dos exploit for linux platform. Description: Coreutils 4.5.x - LS Width Argument Integer Overflow. Author: druid |
Analyze the security implications of: Coreutils 4.5.x - LS Width Argument Integer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component ProductShowcase 1.5 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component ProductShowcase 1.5 - SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! Component ProductShowcase 1.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AR-Blog 5.2 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: AR-Blog 5.2 - Multiple Cross-Site Scripting Vulnerabilities. Author: black-code |
Analyze the security implications of: AR-Blog 5.2 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.