input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pandora Fms - Remote Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: Pandora Fms - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Pandora Fms - Remote Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Vtiger - 'Install' Remote Command Execution (Metasploit) | This is a remote exploit for php platform. Description: Vtiger - 'Install' Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Vtiger - 'Install' Remote Command Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eMerge E3 1.00-06 - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: eMerge E3 1.00-06 - Cross-Site Request Forgery. Author: LiquidWorm |
Analyze the security implications of: eMerge E3 1.00-06 - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CONTENTCustomizer 3.1 - 'Dialog.php' Information Disclosure | This is a webapps exploit for php platform. Description: CONTENTCustomizer 3.1 - 'Dialog.php' Information Disclosure. Author: d3hydr8 |
Analyze the security implications of: CONTENTCustomizer 3.1 - 'Dialog.php' Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Contenido CMS 4.8.12 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Contenido CMS 4.8.12 - Multiple Cross-Site Scripting Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: Contenido CMS 4.8.12 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Android Bluetooth - 'Blueborne' Information Leak (2) | This is a remote exploit for android platform. Description: Android Bluetooth - 'Blueborne' Information Leak (2). Author: Kert Ojasoo |
Analyze the security implications of: Android Bluetooth - 'Blueborne' Information Leak (2) | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Mambo Component Sermon 0.2 - 'gid' SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component Sermon 0.2 - 'gid' SQL Injection. Author: S@BUN |
Analyze the security implications of: Mambo Component Sermon 0.2 - 'gid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GnuTLS 2.6.x - libgnutls lib/gnutls_pk.c DSA Key Storage Remote Spoofing | This is a remote exploit for linux platform. Description: GnuTLS 2.6.x - libgnutls lib/gnutls_pk.c DSA Key Storage Remote Spoofing. Author: Miroslav Kratochvil |
Analyze the security implications of: GnuTLS 2.6.x - libgnutls lib/gnutls_pk.c DSA Key Storage Remote Spoofing | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_newsflash - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_newsflash - 'id' SQL Injection. Author: EcHoLL |
Analyze the security implications of: Joomla! Component com_newsflash - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BrightSign Digital Signage Diagnostic Web Server 8.2.26 - File Delete Path Traversal | This is a webapps exploit for hardware platform. Description: BrightSign Digital Signage Diagnostic Web Server 8.2.26 - File Delete Path Traversal. Author: LiquidWorm |
Analyze the security implications of: BrightSign Digital Signage Diagnostic Web Server 8.2.26 - File Delete Path Traversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Google Chrome for Android - com.android.browser.application_id Intent Extra Data Cross-Site Scripting | This is a remote exploit for android platform. Description: Google Chrome for Android - com.android.browser.application_id Intent Extra Data Cross-Site Scripting. Author: Artem Chaykin |
Analyze the security implications of: Google Chrome for Android - com.android.browser.application_id Intent Extra Data Cross-Site Scripting | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: DRZES Hms 3.2 - 'login.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DRZES Hms 3.2 - 'login.php' Cross-Site Scripting. Author: Vipsta |
Analyze the security implications of: DRZES Hms 3.2 - 'login.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MailBee WebMail Pro 4.1 - Remote File Disclosure | This is a webapps exploit for asp platform. Description: MailBee WebMail Pro 4.1 - Remote File Disclosure. Author: -=M.o.B=- |
Analyze the security implications of: MailBee WebMail Pro 4.1 - Remote File Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: WebGUI 6.x - Arbitrary Command Execution | This is a webapps exploit for cgi platform. Description: WebGUI 6.x - Arbitrary Command Execution. Author: David Maciejak |
Analyze the security implications of: WebGUI 6.x - Arbitrary Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Sera 1.2 - Local Privilege Escalation / Password Disclosure | This is a local exploit for macos platform. Description: Sera 1.2 - Local Privilege Escalation / Password Disclosure. Author: Mark Wadham |
Analyze the security implications of: Sera 1.2 - Local Privilege Escalation / Password Disclosure | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Edimax EW-7438RPn - Information Disclosure (WiFi Password) | This is a webapps exploit for hardware platform. Description: Edimax EW-7438RPn - Information Disclosure (WiFi Password). Author: Besim |
Analyze the security implications of: Edimax EW-7438RPn - Information Disclosure (WiFi Password) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ESMI PayPal StoreFront 1.7 - 'products1.php?id2' SQL Injection | This is a webapps exploit for php platform. Description: ESMI PayPal StoreFront 1.7 - 'products1.php?id2' SQL Injection. Author: Dcrab |
Analyze the security implications of: ESMI PayPal StoreFront 1.7 - 'products1.php?id2' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreePBX 2.5.1 - SQL Injection | This is a webapps exploit for multiple platform. Description: FreePBX 2.5.1 - SQL Injection. Author: Ivan Huertas |
Analyze the security implications of: FreePBX 2.5.1 - SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ethereal 0.10.10 / tcpdump 3.9.1 - 'rsvp_print' Infinite Loop Denial of Service | This is a dos exploit for multiple platform. Description: Ethereal 0.10.10 / tcpdump 3.9.1 - 'rsvp_print' Infinite Loop Denial of Service. Author: vade79 |
Analyze the security implications of: Ethereal 0.10.10 / tcpdump 3.9.1 - 'rsvp_print' Infinite Loop Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Invision Power Board (IP.Board) 3.0.0b5 - Active Cross-Site Scripting / Full Path Disclosure | This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) 3.0.0b5 - Active Cross-Site Scripting / Full Path Disclosure. Author: brain[pillow] |
Analyze the security implications of: Invision Power Board (IP.Board) 3.0.0b5 - Active Cross-Site Scripting / Full Path Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Proclaim 9.1.1 - Backup File Download | This is a webapps exploit for php platform. Description: Joomla! Component Proclaim 9.1.1 - Backup File Download. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Proclaim 9.1.1 - Backup File Download | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ECShop - 'search.php' SQL Injection | This is a webapps exploit for php platform. Description: ECShop - 'search.php' SQL Injection. Author: Jannock |
Analyze the security implications of: ECShop - 'search.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Active Websurvey 9.1 - Authentication Bypass | This is a webapps exploit for asp platform. Description: Active Websurvey 9.1 - Authentication Bypass. Author: R3d-D3V!L |
Analyze the security implications of: Active Websurvey 9.1 - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Cycade Gallery - SQL Injection | This is a webapps exploit for php platform. Description: Cycade Gallery - SQL Injection. Author: -DownFall |
Analyze the security implications of: Cycade Gallery - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gphotos 1.4/1.5 - 'affich.php?image' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Gphotos 1.4/1.5 - 'affich.php?image' Cross-Site Scripting. Author: Morocco Security Team |
Analyze the security implications of: Gphotos 1.4/1.5 - 'affich.php?image' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EZContents 2.0.3 - 'review_summary.php?GLOBALS[admin_home]' Remote File Inclusion | This is a webapps exploit for php platform. Description: EZContents 2.0.3 - 'review_summary.php?GLOBALS[admin_home]' Remote File Inclusion. Author: DarkFig |
Analyze the security implications of: EZContents 2.0.3 - 'review_summary.php?GLOBALS[admin_home]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ARASTAR - SQL Injection | This is a webapps exploit for php platform. Description: ARASTAR - SQL Injection. Author: TH3_N3RD |
Analyze the security implications of: ARASTAR - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Free Online Dictionary of Computing 1.0 - Remote File Viewing | This is a remote exploit for cgi platform. Description: Free Online Dictionary of Computing 1.0 - Remote File Viewing. Author: Cgisecurity |
Analyze the security implications of: Free Online Dictionary of Computing 1.0 - Remote File Viewing | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Epic Games Unreal Tournament Server 436.0 - Denial of Service Amplifier | This is a dos exploit for multiple platform. Description: Epic Games Unreal Tournament Server 436.0 - Denial of Service Amplifier. Author: Auriemma Luigi |
Analyze the security implications of: Epic Games Unreal Tournament Server 436.0 - Denial of Service Amplifier | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple Mac OSX EvoCam Web Server - GET Buffer Overflow (Metasploit) | This is a remote exploit for osx platform. Description: Apple Mac OSX EvoCam Web Server - GET Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Apple Mac OSX EvoCam Web Server - GET Buffer Overflow (Metasploit) | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Samba 3.4.5 - Symlink Directory Traversal (Metasploit) | This is a remote exploit for linux platform. Description: Samba 3.4.5 - Symlink Directory Traversal (Metasploit). Author: kingcope |
Analyze the security implications of: Samba 3.4.5 - Symlink Directory Traversal (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Super Guestbook 1.0 - Sensitive Information Disclosure | This is a webapps exploit for cgi platform. Description: Super Guestbook 1.0 - Sensitive Information Disclosure. Author: Over_G |
Analyze the security implications of: Super Guestbook 1.0 - Sensitive Information Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: APT - Repository Signing Bypass via Memory Allocation Failure | This is a remote exploit for linux platform. Description: APT - Repository Signing Bypass via Memory Allocation Failure. Author: Google Security Research |
Analyze the security implications of: APT - Repository Signing Bypass via Memory Allocation Failure | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.