input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Airties Air5650TT - Remote Stack Overflow | This is a remote exploit for multiple platform. Description: Airties Air5650TT - Remote Stack Overflow. Author: Batuhan Burakcin |
Analyze the security implications of: Airties Air5650TT - Remote Stack Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ax Developer CMS 0.1.1 - 'index.php?module' Local File Inclusion | This is a webapps exploit for php platform. Description: Ax Developer CMS 0.1.1 - 'index.php?module' Local File Inclusion. Author: GoLd_M |
Analyze the security implications of: Ax Developer CMS 0.1.1 - 'index.php?module' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LimeSurvey 5.2.4 - Remote Code Execution (RCE) (Authenticated) | This is a webapps exploit for php platform. Description: LimeSurvey 5.2.4 - Remote Code Execution (RCE) (Authenticated). Author: Y1LD1R1M |
Analyze the security implications of: LimeSurvey 5.2.4 - Remote Code Execution (RCE) (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Trend Micro Smart Protection Server - Session Hijacking / Log File Disclosure / Remote Command Execution / Cron Job Injection / Local File Inclusion / Stored Cross-Site Scripting / Improper Access Con | This is a remote exploit for multiple platform. Description: Trend Micro Smart Protection Server - Session Hijacking / Log File Disclosure / Remote Command Execution / Cron Job Injection / Local File Inclusion / Stored Cross-Site Scripting / Improper Access Control. Author: CoreLabs |
Analyze the security implications of: Trend Micro Smart Protection Server - Session Hijacking / Log File Disclosure / Remote Command Execution / Cron Job Injection / Local File Inclusion / | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PHP 5.2.1 - STR_IReplace Remote Denial of Service | This is a dos exploit for php platform. Description: PHP 5.2.1 - STR_IReplace Remote Denial of Service. Author: Thomas Hruska |
Analyze the security implications of: PHP 5.2.1 - STR_IReplace Remote Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FluxBB 1.5.3 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: FluxBB 1.5.3 - Multiple Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: FluxBB 1.5.3 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Citrix Metaframe 1.0/1.8 - Weak Encryption | This is a local exploit for multiple platform. Description: Citrix Metaframe 1.0/1.8 - Weak Encryption. Author: Dug Song |
Analyze the security implications of: Citrix Metaframe 1.0/1.8 - Weak Encryption | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: gpEasy CMS - 'section' Cross-Site Scripting | This is a webapps exploit for php platform. Description: gpEasy CMS - 'section' Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: gpEasy CMS - 'section' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Login-Reg Members Management PHP 1.0 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Login-Reg Members Management PHP 1.0 - Arbitrary File Upload. Author: Ihsan Sencan |
Analyze the security implications of: Login-Reg Members Management PHP 1.0 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: agXchange ESM - 'ucquerydetails.jsp' Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: agXchange ESM - 'ucquerydetails.jsp' Cross-Site Scripting. Author: Lament |
Analyze the security implications of: agXchange ESM - 'ucquerydetails.jsp' Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Joomla! Component Jimtawl 2.1.6 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component Jimtawl 2.1.6 - Arbitrary File Upload. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Jimtawl 2.1.6 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alstrasoft EPay Pro 2.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Alstrasoft EPay Pro 2.0 - Remote File Inclusion. Author: Dcrab |
Analyze the security implications of: Alstrasoft EPay Pro 2.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Aastra 6755i SIP SP4 - Denial of Service | This is a dos exploit for hardware platform. Description: Aastra 6755i SIP SP4 - Denial of Service. Author: Wadeek |
Analyze the security implications of: Aastra 6755i SIP SP4 - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: NRPE 2.15 - Remote Code Execution | This is a remote exploit for multiple platform. Description: NRPE 2.15 - Remote Code Execution. Author: Claudio Viviani |
Analyze the security implications of: NRPE 2.15 - Remote Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Jetbox CMS 2.1 - 'liste' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Jetbox CMS 2.1 - 'liste' Cross-Site Scripting. Author: Omer Singer |
Analyze the security implications of: Jetbox CMS 2.1 - 'liste' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Netgear DGN2200B - 'pppoe.cgi' Remote Command Execution (Metasploit) | This is a remote exploit for hardware platform. Description: Netgear DGN2200B - 'pppoe.cgi' Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Netgear DGN2200B - 'pppoe.cgi' Remote Command Execution (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linux Kernel 2.6.x - 'qdisc_run()' Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - 'qdisc_run()' Local Denial of Service. Author: Herbert Xu |
Analyze the security implications of: Linux Kernel 2.6.x - 'qdisc_run()' Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ClaSS 0.8.60 - 'export.php' Local File Inclusion | This is a webapps exploit for php platform. Description: ClaSS 0.8.60 - 'export.php' Local File Inclusion. Author: fuzion |
Analyze the security implications of: ClaSS 0.8.60 - 'export.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hexjector 1.0.7.2 - 'hexjector.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Hexjector 1.0.7.2 - 'hexjector.php' Cross-Site Scripting. Author: hexon |
Analyze the security implications of: Hexjector 1.0.7.2 - 'hexjector.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Global In - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Global In - Arbitrary File Upload. Author: Ihsan Sencan |
Analyze the security implications of: Global In - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DHCP Client - Command Injection 'DynoRoot' (Metasploit) | This is a remote exploit for linux platform. Description: DHCP Client - Command Injection 'DynoRoot' (Metasploit). Author: Metasploit |
Analyze the security implications of: DHCP Client - Command Injection 'DynoRoot' (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: campus virtual-lms - Cross-Site Scripting / SQL Injection | This is a webapps exploit for php platform. Description: campus virtual-lms - Cross-Site Scripting / SQL Injection. Author: Yasión |
Analyze the security implications of: campus virtual-lms - Cross-Site Scripting / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ElasticSearch - Search Groovy Sandbox Bypass (Metasploit) | This is a remote exploit for java platform. Description: ElasticSearch - Search Groovy Sandbox Bypass (Metasploit). Author: Metasploit |
Analyze the security implications of: ElasticSearch - Search Groovy Sandbox Bypass (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: MangoBery CMS 0.5.5 - 'quotes.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: MangoBery CMS 0.5.5 - 'quotes.php' Remote File Inclusion. Author: kezzap66345 |
Analyze the security implications of: MangoBery CMS 0.5.5 - 'quotes.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Git 1.6.3 - Parameter Processing Remote Denial of Service | This is a dos exploit for linux platform. Description: Git 1.6.3 - Parameter Processing Remote Denial of Service. Author: Shawn O. Pearce |
Analyze the security implications of: Git 1.6.3 - Parameter Processing Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: HPUX 10.20/11 Wall Message - Local Buffer Overflow | This is a local exploit for hp-ux platform. Description: HPUX 10.20/11 Wall Message - Local Buffer Overflow. Author: Scotty |
Analyze the security implications of: HPUX 10.20/11 Wall Message - Local Buffer Overflow | This exploit targets hp-ux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: MetaDot Portal Server 5.6.x - 'userchannel.pl?op' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: MetaDot Portal Server 5.6.x - 'userchannel.pl?op' Cross-Site Scripting. Author: JeiAr |
Analyze the security implications of: MetaDot Portal Server 5.6.x - 'userchannel.pl?op' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: KodExplorer v4.51.03 - Pwned-Admin File-Inclusion - Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: KodExplorer v4.51.03 - Pwned-Admin File-Inclusion - Remote Code Execution (RCE). Author: nu11secur1ty |
Analyze the security implications of: KodExplorer v4.51.03 - Pwned-Admin File-Inclusion - Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_vxdate - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component com_vxdate - Multiple Vulnerabilities. Author: MustLive |
Analyze the security implications of: Joomla! Component com_vxdate - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebKit - Use-After-Free when Resuming Generator | This is a dos exploit for multiple platform. Description: WebKit - Use-After-Free when Resuming Generator. Author: Google Security Research |
Analyze the security implications of: WebKit - Use-After-Free when Resuming Generator | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CuteFTP Mac 3.1 - Denial of Service (PoC) | This is a dos exploit for macos platform. Description: CuteFTP Mac 3.1 - Denial of Service (PoC). Author: Yair Rodríguez Aparicio |
Analyze the security implications of: CuteFTP Mac 3.1 - Denial of Service (PoC) | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: VisualSite CMS 1.3 - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: VisualSite CMS 1.3 - Multiple Vulnerabilities. Author: Abysssec |
Analyze the security implications of: VisualSite CMS 1.3 - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Saxum Numerology 3.0.4 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Saxum Numerology 3.0.4 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Saxum Numerology 3.0.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.