input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: LightOpenCMS 0.1 - 'smarty.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link Devices - 'Authentication.cgi' Remote Buffer Overflow (Metasploit) | This is a remote exploit for hardware platform. Description: D-Link Devices - 'Authentication.cgi' Remote Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: D-Link Devices - 'Authentication.cgi' Remote Buffer Overflow (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: EasySiteEdit - Remote File Inclusion | This is a webapps exploit for php platform. Description: EasySiteEdit - Remote File Inclusion. Author: koskesh jakesh |
Analyze the security implications of: EasySiteEdit - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Docebo 3.5.0.3 - 'lib.regset.php' Command Execution | This is a webapps exploit for php platform. Description: Docebo 3.5.0.3 - 'lib.regset.php' Command Execution. Author: EgiX |
Analyze the security implications of: Docebo 3.5.0.3 - 'lib.regset.php' Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Samsung Internet Browser - SOP Bypass (Metasploit) | This is a remote exploit for android platform. Description: Samsung Internet Browser - SOP Bypass (Metasploit). Author: Dhiraj Mishra |
Analyze the security implications of: Samsung Internet Browser - SOP Bypass (Metasploit) | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Adiscan LogAnalyzer 3.4.3 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Adiscan LogAnalyzer 3.4.3 - Cross-Site Scripting. Author: Sooraj K.S |
Analyze the security implications of: Adiscan LogAnalyzer 3.4.3 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SAP SOAP RFC - SXPG_COMMAND_EXECUTE Remote Command Execution (Metasploit) | This is a remote exploit for multiple platform. Description: SAP SOAP RFC - SXPG_COMMAND_EXECUTE Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: SAP SOAP RFC - SXPG_COMMAND_EXECUTE Remote Command Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: KDE Konqueror 3.5.7 - Assert Denial of Service | This is a dos exploit for linux platform. Description: KDE Konqueror 3.5.7 - Assert Denial of Service. Author: Thomas Waldegger |
Analyze the security implications of: KDE Konqueror 3.5.7 - Assert Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GUnet OpenEclass E-learning platform 3.15 - 'certbadge.php' Unrestricted File Upload | This is a webapps exploit for php platform. Description: GUnet OpenEclass E-learning platform 3.15 - 'certbadge.php' Unrestricted File Upload. Author: George Tsimpidas |
Analyze the security implications of: GUnet OpenEclass E-learning platform 3.15 - 'certbadge.php' Unrestricted File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zend Server 5.6.0 - Multiple Remote Script Insertion Vulnerabilities | This is a webapps exploit for cgi platform. Description: Zend Server 5.6.0 - Multiple Remote Script Insertion Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: Zend Server 5.6.0 - Multiple Remote Script Insertion Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: 3editor CMS 0.42 - 'index.php' Local File Inclusion | This is a webapps exploit for php platform. Description: 3editor CMS 0.42 - 'index.php' Local File Inclusion. Author: 3l3ctric-Cracker |
Analyze the security implications of: 3editor CMS 0.42 - 'index.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple macOS/iOS - 'CAMediaTimingFunctionBuiltin' NSKeyedArchiver Memory Corruption Due to Lack of Bounds Checking | This is a dos exploit for multiple platform. Description: Apple macOS/iOS - 'CAMediaTimingFunctionBuiltin' NSKeyedArchiver Memory Corruption Due to Lack of Bounds Checking. Author: Google Security Research |
Analyze the security implications of: Apple macOS/iOS - 'CAMediaTimingFunctionBuiltin' NSKeyedArchiver Memory Corruption Due to Lack of Bounds Checking | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PIX Firewall 2.7/3.x/4.x/5 - Forged TCP RST | This is a remote exploit for hardware platform. Description: PIX Firewall 2.7/3.x/4.x/5 - Forged TCP RST. Author: Citec Network Securities |
Analyze the security implications of: PIX Firewall 2.7/3.x/4.x/5 - Forged TCP RST | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: IBM AIX 4.3.x/5.1 - 'LSMCODE' Environment Variable Local Buffer Overflow | This is a local exploit for aix platform. Description: IBM AIX 4.3.x/5.1 - 'LSMCODE' Environment Variable Local Buffer Overflow. Author: watercloud |
Analyze the security implications of: IBM AIX 4.3.x/5.1 - 'LSMCODE' Environment Variable Local Buffer Overflow | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Boutique SudBox 1.2 - Cross-Site Request Forgery (Changer Login et Mot de Passe) | This is a webapps exploit for php platform. Description: Boutique SudBox 1.2 - Cross-Site Request Forgery (Changer Login et Mot de Passe). Author: indoushka |
Analyze the security implications of: Boutique SudBox 1.2 - Cross-Site Request Forgery (Changer Login et Mot de Passe) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ktools Photostore 3.5.2 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Ktools Photostore 3.5.2 - Multiple SQL Injections. Author: DNX |
Analyze the security implications of: Ktools Photostore 3.5.2 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Skia and Firefox - Integer Overflow in SkTDArray Leading to Out-of-Bounds Write | This is a dos exploit for multiple platform. Description: Skia and Firefox - Integer Overflow in SkTDArray Leading to Out-of-Bounds Write. Author: Google Security Research |
Analyze the security implications of: Skia and Firefox - Integer Overflow in SkTDArray Leading to Out-of-Bounds Write | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ezUpload 2.2 - 'customize.php?path' Remote File Inclusion | This is a webapps exploit for php platform. Description: ezUpload 2.2 - 'customize.php?path' Remote File Inclusion. Author: Johnnie Walker |
Analyze the security implications of: ezUpload 2.2 - 'customize.php?path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Chrome 78.0.3904.70 - Remote Code Execution | This is a remote exploit for multiple platform. Description: Google Chrome 78.0.3904.70 - Remote Code Execution. Author: Forrest Orr |
Analyze the security implications of: Google Chrome 78.0.3904.70 - Remote Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Calendar Express - 'search.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Calendar Express - 'search.php' Cross-Site Scripting. Author: BL4CK |
Analyze the security implications of: Calendar Express - 'search.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nokia Affix < 3.2.0 - btftp Remote Client | This is a remote exploit for hardware platform. Description: Nokia Affix < 3.2.0 - btftp Remote Client. Author: Kevin Finisterre |
Analyze the security implications of: Nokia Affix < 3.2.0 - btftp Remote Client | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PHP GMP - 'unserialize()' Use-After-Free | This is a dos exploit for php platform. Description: PHP GMP - 'unserialize()' Use-After-Free. Author: Taoguang Chen |
Analyze the security implications of: PHP GMP - 'unserialize()' Use-After-Free | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel - 'SCTP_GET_ASSOC_STATS()' Stack Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: Linux Kernel - 'SCTP_GET_ASSOC_STATS()' Stack Buffer Overflow (PoC). Author: Petr Matousek |
Analyze the security implications of: Linux Kernel - 'SCTP_GET_ASSOC_STATS()' Stack Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Unitrends UEB 9.1 - 'Unitrends bpserverd' Remote Command Execution | This is a remote exploit for linux platform. Description: Unitrends UEB 9.1 - 'Unitrends bpserverd' Remote Command Execution. Author: Jared Arave |
Analyze the security implications of: Unitrends UEB 9.1 - 'Unitrends bpserverd' Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GLPI Activity v3.1.0 - Authenticated Local File Inclusion on Activity plugin | This is a webapps exploit for php platform. Description: GLPI Activity v3.1.0 - Authenticated Local File Inclusion on Activity plugin. Author: Nuri Çilengir |
Analyze the security implications of: GLPI Activity v3.1.0 - Authenticated Local File Inclusion on Activity plugin | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BrowserCRM 5.002.00 - 'clients.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: BrowserCRM 5.002.00 - 'clients.php' Remote File Inclusion. Author: ahmadbady |
Analyze the security implications of: BrowserCRM 5.002.00 - 'clients.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Keyfax Customer Response Management 3.2.2.6 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: Keyfax Customer Response Management 3.2.2.6 - Multiple Cross-Site Scripting Vulnerabilities. Author: Richard Brain |
Analyze the security implications of: Keyfax Customer Response Management 3.2.2.6 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Platform Load Sharing Facility 4/5/6 - 'EAuth' Local Privilege Escalation | This is a local exploit for linux platform. Description: Platform Load Sharing Facility 4/5/6 - 'EAuth' Local Privilege Escalation. Author: Tomasz Grabowski |
Analyze the security implications of: Platform Load Sharing Facility 4/5/6 - 'EAuth' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Dolibarr ERP/CRM < 7.0.3 - PHP Code Injection | This is a webapps exploit for php platform. Description: Dolibarr ERP/CRM < 7.0.3 - PHP Code Injection. Author: om3rcitak |
Analyze the security implications of: Dolibarr ERP/CRM < 7.0.3 - PHP Code Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Good for Enterprise 2.2.2.1611 - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Good for Enterprise 2.2.2.1611 - Cross-Site Scripting. Author: Mario |
Analyze the security implications of: Good for Enterprise 2.2.2.1611 - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PHP-Nuke 8.2 - Arbitrary File Upload | This is a webapps exploit for aix platform. Description: PHP-Nuke 8.2 - Arbitrary File Upload. Author: Net.Edit0r |
Analyze the security implications of: PHP-Nuke 8.2 - Arbitrary File Upload | This exploit targets aix systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Image voting 1.0 - 'index.php?show' SQL Injection | This is a webapps exploit for php platform. Description: Image voting 1.0 - 'index.php?show' SQL Injection. Author: SkuLL-HackeR |
Analyze the security implications of: Image voting 1.0 - 'index.php?show' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iDS6 DSSPro Digital Signage System 6.2 - CAPTCHA Security Bypass | This is a webapps exploit for hardware platform. Description: iDS6 DSSPro Digital Signage System 6.2 - CAPTCHA Security Bypass. Author: LiquidWorm |
Analyze the security implications of: iDS6 DSSPro Digital Signage System 6.2 - CAPTCHA Security Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component JTicketing 2.0.16 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JTicketing 2.0.16 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JTicketing 2.0.16 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.