input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: BitchX 1.1-final - 'do_hook()' Remote Denial of Service | This is a dos exploit for multiple platform. Description: BitchX 1.1-final - 'do_hook()' Remote Denial of Service. Author: Federico L. Bossi Bonin |
Analyze the security implications of: BitchX 1.1-final - 'do_hook()' Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Imperva SecureSphere 13 - Remote Command Execution | This is a webapps exploit for linux platform. Description: Imperva SecureSphere 13 - Remote Command Execution. Author: rsp3ar |
Analyze the security implications of: Imperva SecureSphere 13 - Remote Command Execution | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ProFTPd 1.3.2 rc3 < 1.3.3b (FreeBSD) - Telnet IAC Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: ProFTPd 1.3.2 rc3 < 1.3.3b (FreeBSD) - Telnet IAC Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: ProFTPd 1.3.2 rc3 < 1.3.3b (FreeBSD) - Telnet IAC Buffer Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component Community Builder 1.0.1 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Community Builder 1.0.1 - Blind SQL Injection. Author: $hur!k'n |
Analyze the security implications of: Joomla! Component Community Builder 1.0.1 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Trendchip HG520 ADSL2+ Wireless Modem - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Trendchip HG520 ADSL2+ Wireless Modem - Cross-Site Request Forgery. Author: Dhruv Shah |
Analyze the security implications of: Trendchip HG520 ADSL2+ Wireless Modem - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GNU gdbserver 9.2 - Remote Command Execution (RCE) | This is a remote exploit for linux platform. Description: GNU gdbserver 9.2 - Remote Command Execution (RCE). Author: Roberto Gesteira Miñarro |
Analyze the security implications of: GNU gdbserver 9.2 - Remote Command Execution (RCE) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AuraCMS 2.2.1 - 'X-Forwarded-For' HTTP Header Blind SQL Injection | This is a webapps exploit for php platform. Description: AuraCMS 2.2.1 - 'X-Forwarded-For' HTTP Header Blind SQL Injection. Author: NTOS-Team |
Analyze the security implications of: AuraCMS 2.2.1 - 'X-Forwarded-For' HTTP Header Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EJ3 TOPo 2.2 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: EJ3 TOPo 2.2 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Lostmon |
Analyze the security implications of: EJ3 TOPo 2.2 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit) | This is a remote exploit for hardware platform. Description: Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Webmin 1.x - HTML Email Command Execution | This is a webapps exploit for cgi platform. Description: Webmin 1.x - HTML Email Command Execution. Author: Keigo Yamazaki |
Analyze the security implications of: Webmin 1.x - HTML Email Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: mini_httpd 1.18 - HTTP Request Escape Sequence Terminal Command Injection | This is a remote exploit for multiple platform. Description: mini_httpd 1.18 - HTTP Request Escape Sequence Terminal Command Injection. Author: evilaliv3 |
Analyze the security implications of: mini_httpd 1.18 - HTTP Request Escape Sequence Terminal Command Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PHP 5.2.11 - 'htmlspecialCharacters()' Malformed Multibyte Character Cross-Site Scripting (2) | This is a remote exploit for php platform. Description: PHP 5.2.11 - 'htmlspecialCharacters()' Malformed Multibyte Character Cross-Site Scripting (2). Author: hello@iwamot.com |
Analyze the security implications of: PHP 5.2.11 - 'htmlspecialCharacters()' Malformed Multibyte Character Cross-Site Scripting (2) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Limbo CMS 1.0.4.2 - 'index.php?_SERVER[REMOTE_ADDR]' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Limbo CMS 1.0.4.2 - 'index.php?_SERVER[REMOTE_ADDR]' Cross-Site Scripting. Author: rgod |
Analyze the security implications of: Limbo CMS 1.0.4.2 - 'index.php?_SERVER[REMOTE_ADDR]' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Axis Communications MPQT/PACS - Heap Overflow / Information Leakage | This is a remote exploit for multiple platform. Description: Axis Communications MPQT/PACS - Heap Overflow / Information Leakage. Author: bashis |
Analyze the security implications of: Axis Communications MPQT/PACS - Heap Overflow / Information Leakage | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: bcoos 1.0.13 - 'common.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: bcoos 1.0.13 - 'common.php' Remote File Inclusion. Author: Cru3l.b0y |
Analyze the security implications of: bcoos 1.0.13 - 'common.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CreaDirectory 1.2 - 'addlisting.asp?cat' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: CreaDirectory 1.2 - 'addlisting.asp?cat' Cross-Site Scripting. Author: laurent gaffie |
Analyze the security implications of: CreaDirectory 1.2 - 'addlisting.asp?cat' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: IRIX 5.3/6.x - 'netprint' Arbitrary Shared Library Usage | This is a local exploit for irix platform. Description: IRIX 5.3/6.x - 'netprint' Arbitrary Shared Library Usage. Author: V9 |
Analyze the security implications of: IRIX 5.3/6.x - 'netprint' Arbitrary Shared Library Usage | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: JShop 1.x < 2.x - 'xPage' Local File Inclusion | This is a webapps exploit for php platform. Description: JShop 1.x < 2.x - 'xPage' Local File Inclusion. Author: v0l4arrra |
Analyze the security implications of: JShop 1.x < 2.x - 'xPage' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JoomRadio 1.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JoomRadio 1.0 - 'id' SQL Injection. Author: His0k4 |
Analyze the security implications of: Joomla! Component JoomRadio 1.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Atlassian Confluence < 5.10.6 - Persistent Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Atlassian Confluence < 5.10.6 - Persistent Cross-Site Scripting. Author: Jodson Santos |
Analyze the security implications of: Atlassian Confluence < 5.10.6 - Persistent Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Laravel 8.4.2 debug mode - Remote code execution | This is a webapps exploit for php platform. Description: Laravel 8.4.2 debug mode - Remote code execution. Author: SunCSR Team |
Analyze the security implications of: Laravel 8.4.2 debug mode - Remote code execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ArticleLive 1.7.1.2 - 'blogs.php?Id' SQL Injection | This is a webapps exploit for asp platform. Description: ArticleLive 1.7.1.2 - 'blogs.php?Id' SQL Injection. Author: BAYBORA |
Analyze the security implications of: ArticleLive 1.7.1.2 - 'blogs.php?Id' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Getacoder clone - 'sb_protype' SQL Injection | This is a webapps exploit for php platform. Description: Getacoder clone - 'sb_protype' SQL Injection. Author: Hussin X |
Analyze the security implications of: Getacoder clone - 'sb_protype' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TFS Gateway 4.0 - Denial of Service | This is a dos exploit for hardware platform. Description: TFS Gateway 4.0 - Denial of Service. Author: anonymous |
Analyze the security implications of: TFS Gateway 4.0 - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: IBM Lotus Quickr QuickPlace Server 8.0 - Calendar 'Count' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: IBM Lotus Quickr QuickPlace Server 8.0 - Calendar 'Count' Cross-Site Scripting. Author: Nir Goldshlager AVNE |
Analyze the security implications of: IBM Lotus Quickr QuickPlace Server 8.0 - Calendar 'Count' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Dental Clinic Appointment Reservation System 1.0 - 'date' UNION based SQL Injection (Authenticated) | This is a webapps exploit for php platform. Description: Dental Clinic Appointment Reservation System 1.0 - 'date' UNION based SQL Injection (Authenticated). Author: Mesut Cetin |
Analyze the security implications of: Dental Clinic Appointment Reservation System 1.0 - 'date' UNION based SQL Injection (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pdfium - Out-of-Bounds Read with Shading Pattern Backed by Pattern Colorspace | This is a dos exploit for multiple platform. Description: Pdfium - Out-of-Bounds Read with Shading Pattern Backed by Pattern Colorspace. Author: Google Security Research |
Analyze the security implications of: Pdfium - Out-of-Bounds Read with Shading Pattern Backed by Pattern Colorspace | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: IBM Rational ClearQuest - Web Authentication Bypass / SQL Injection | This is a webapps exploit for cgi platform. Description: IBM Rational ClearQuest - Web Authentication Bypass / SQL Injection. Author: s4squatch |
Analyze the security implications of: IBM Rational ClearQuest - Web Authentication Bypass / SQL Injection | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Drupal < 8.6.9 - REST Module Remote Code Execution | This is a webapps exploit for php platform. Description: Drupal < 8.6.9 - REST Module Remote Code Execution. Author: leonjza |
Analyze the security implications of: Drupal < 8.6.9 - REST Module Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flipper Poll 1.1.0 - 'poll.php?root_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Flipper Poll 1.1.0 - 'poll.php?root_path' Remote File Inclusion. Author: Mehmet Ince |
Analyze the security implications of: Flipper Poll 1.1.0 - 'poll.php?root_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Component 'com_a6mambocredits' 1.0.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Component 'com_a6mambocredits' 1.0.0 - Remote File Inclusion. Author: Cmaster4 |
Analyze the security implications of: Mambo Component 'com_a6mambocredits' 1.0.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Techno Dreams Articles & Papers Package 2.0 - 'ArticlesTablelist.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Techno Dreams Articles & Papers Package 2.0 - 'ArticlesTablelist.asp' SQL Injection. Author: R4dc0re |
Analyze the security implications of: Techno Dreams Articles & Papers Package 2.0 - 'ArticlesTablelist.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Cisco RV300 / RV320 - Information Disclosure | This is a webapps exploit for hardware platform. Description: Cisco RV300 / RV320 - Information Disclosure. Author: Harom Ramos |
Analyze the security implications of: Cisco RV300 / RV320 - Information Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.