input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Gemtek CPE7000 - WLTCS-106 Administrator SID Retriever (Metasploit) | This is a webapps exploit for hardware platform. Description: Gemtek CPE7000 - WLTCS-106 Administrator SID Retriever (Metasploit). Author: Federico Scalco |
Analyze the security implications of: Gemtek CPE7000 - WLTCS-106 Administrator SID Retriever (Metasploit) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DCForum 1-6 - Arbitrary File Disclosure | This is a remote exploit for cgi platform. Description: DCForum 1-6 - Arbitrary File Disclosure. Author: steeLe |
Analyze the security implications of: DCForum 1-6 - Arbitrary File Disclosure | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: SuSE Linux Professional 8.2 - SuSEWM Configuration File Insecure Temporary File | This is a local exploit for linux platform. Description: SuSE Linux Professional 8.2 - SuSEWM Configuration File Insecure Temporary File. Author: Nash Leon |
Analyze the security implications of: SuSE Linux Professional 8.2 - SuSEWM Configuration File Insecure Temporary File | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ProficySCADA for iOS 5.0.25920 - 'Password' Denial of Service (PoC) | This is a dos exploit for ios platform. Description: ProficySCADA for iOS 5.0.25920 - 'Password' Denial of Service (PoC). Author: Ivan Marmolejo |
Analyze the security implications of: ProficySCADA for iOS 5.0.25920 - 'Password' Denial of Service (PoC) | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Joomla! Component com_nfnaddressbook - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_nfnaddressbook - SQL Injection. Author: snakespc |
Analyze the security implications of: Joomla! Component com_nfnaddressbook - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: e-webtech - 'fixed_page.asp' SQL Injection | This is a webapps exploit for php platform. Description: e-webtech - 'fixed_page.asp' SQL Injection. Author: FL0RiX |
Analyze the security implications of: e-webtech - 'fixed_page.asp' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alienvault Open Source SIEM (OSSIM) 3.1 - Reflected Cross-Site Scripting / Blind SQL Injection | This is a webapps exploit for php platform. Description: Alienvault Open Source SIEM (OSSIM) 3.1 - Reflected Cross-Site Scripting / Blind SQL Injection. Author: muts |
Analyze the security implications of: Alienvault Open Source SIEM (OSSIM) 3.1 - Reflected Cross-Site Scripting / Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CSSTidy 1.3 - 'css_optimiser.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CSSTidy 1.3 - 'css_optimiser.php' Cross-Site Scripting. Author: John Leitch |
Analyze the security implications of: CSSTidy 1.3 - 'css_optimiser.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IPSwitch IMail Server 8.15 - IMAPD Remote Code Execution | This is a remote exploit for linux platform. Description: IPSwitch IMail Server 8.15 - IMAPD Remote Code Execution. Author: kingcope |
Analyze the security implications of: IPSwitch IMail Server 8.15 - IMAPD Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: MyDesing Sayac 2.0 - Authentication Bypass | This is a webapps exploit for asp platform. Description: MyDesing Sayac 2.0 - Authentication Bypass. Author: Kacak |
Analyze the security implications of: MyDesing Sayac 2.0 - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: WordPress Plugin Polls 1.2.4 - SQL Injection (PoC) | This is a remote exploit for php platform. Description: WordPress Plugin Polls 1.2.4 - SQL Injection (PoC). Author: Manish Tanwar |
Analyze the security implications of: WordPress Plugin Polls 1.2.4 - SQL Injection (PoC) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CRS Manager - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: CRS Manager - Multiple Remote File Inclusions. Author: iNs |
Analyze the security implications of: CRS Manager - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alkacon OpenCMS 7.0.3 - 'logfileViewSettings.jsp?filePath' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Alkacon OpenCMS 7.0.3 - 'logfileViewSettings.jsp?filePath' Cross-Site Scripting. Author: nnposter |
Analyze the security implications of: Alkacon OpenCMS 7.0.3 - 'logfileViewSettings.jsp?filePath' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Microsoft IIS 4.0 - UNC Mapped Virtual Host | This is a remote exploit for multiple platform. Description: Microsoft IIS 4.0 - UNC Mapped Virtual Host. Author: Adam Coyne |
Analyze the security implications of: Microsoft IIS 4.0 - UNC Mapped Virtual Host | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Free FAQ 1.0 - 'index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Free FAQ 1.0 - 'index.php' Remote File Inclusion. Author: Alireza Ahari |
Analyze the security implications of: Free FAQ 1.0 - 'index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GitStack - Remote Code Execution | This is a webapps exploit for php platform. Description: GitStack - Remote Code Execution. Author: SecuriTeam |
Analyze the security implications of: GitStack - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Java - Debug Wire Protocol Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Java - Debug Wire Protocol Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Java - Debug Wire Protocol Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mozilla Firefox 3.0.9 - 'nsTextFrame::ClearTextRun()' Remote Memory Corruption | This is a dos exploit for linux platform. Description: Mozilla Firefox 3.0.9 - 'nsTextFrame::ClearTextRun()' Remote Memory Corruption. Author: Marc Gueury |
Analyze the security implications of: Mozilla Firefox 3.0.9 - 'nsTextFrame::ClearTextRun()' Remote Memory Corruption | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: iPlanet Messaging Server - Messenger Express Expression() HTML Injection | This is a webapps exploit for php platform. Description: iPlanet Messaging Server - Messenger Express Expression() HTML Injection. Author: LegendaryZion |
Analyze the security implications of: iPlanet Messaging Server - Messenger Express Expression() HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Xmail 0.5/0.6 CTRLServer - Arbitrary Commands | This is a remote exploit for linux platform. Description: Xmail 0.5/0.6 CTRLServer - Arbitrary Commands. Author: isno |
Analyze the security implications of: Xmail 0.5/0.6 CTRLServer - Arbitrary Commands | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Barracuda Spam Firewall 3.3.03.053 - Remote Code Execution (1) | This is a remote exploit for hardware platform. Description: Barracuda Spam Firewall 3.3.03.053 - Remote Code Execution (1). Author: Greg Sinclair |
Analyze the security implications of: Barracuda Spam Firewall 3.3.03.053 - Remote Code Execution (1) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BoutikOne - 'rss_promo.php?lang' SQL Injection | This is a webapps exploit for php platform. Description: BoutikOne - 'rss_promo.php?lang' SQL Injection. Author: cdx.security |
Analyze the security implications of: BoutikOne - 'rss_promo.php?lang' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BlueShoes Framework 4.6 - 'GoogleSearch.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: BlueShoes Framework 4.6 - 'GoogleSearch.php' Remote File Inclusion. Author: k1tk4t |
Analyze the security implications of: BlueShoes Framework 4.6 - 'GoogleSearch.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Minify4Joomla! - Arbitrary File Upload / Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component Minify4Joomla! - Arbitrary File Upload / Persistent Cross-Site Scripting. Author: Sid3^effects |
Analyze the security implications of: Joomla! Component Minify4Joomla! - Arbitrary File Upload / Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle Weblogic Server Deserialization RCE - Raw Object (Metasploit) | This is a remote exploit for multiple platform. Description: Oracle Weblogic Server Deserialization RCE - Raw Object (Metasploit). Author: Metasploit |
Analyze the security implications of: Oracle Weblogic Server Deserialization RCE - Raw Object (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Vesta Control Panel 0.9.8-16 - Local Privilege Escalation | This is a local exploit for linux platform. Description: Vesta Control Panel 0.9.8-16 - Local Privilege Escalation. Author: Jaka Hudoklin |
Analyze the security implications of: Vesta Control Panel 0.9.8-16 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AVE DOMINAplus 1.10.x - Credential Disclosure | This is a webapps exploit for hardware platform. Description: AVE DOMINAplus 1.10.x - Credential Disclosure. Author: LiquidWorm |
Analyze the security implications of: AVE DOMINAplus 1.10.x - Credential Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Bitweaver 1.x - '/wiki/list_pages.php?sort_mode' SQL Injection | This is a webapps exploit for php platform. Description: Bitweaver 1.x - '/wiki/list_pages.php?sort_mode' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: Bitweaver 1.x - '/wiki/list_pages.php?sort_mode' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Power Services Invision Gallery 1.0.1 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Invision Power Services Invision Gallery 1.0.1 - Multiple SQL Injections. Author: JeiAr |
Analyze the security implications of: Invision Power Services Invision Gallery 1.0.1 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AjaXplorer - 'checkInstall.php' Remote Command Execution (Metasploit) | This is a remote exploit for php platform. Description: AjaXplorer - 'checkInstall.php' Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: AjaXplorer - 'checkInstall.php' Remote Command Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Chrome 67_ 68 and 69 - Object.create Type Confusion (Metasploit) | This is a remote exploit for multiple platform. Description: Google Chrome 67_ 68 and 69 - Object.create Type Confusion (Metasploit). Author: Metasploit |
Analyze the security implications of: Google Chrome 67_ 68 and 69 - Object.create Type Confusion (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_remository - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component com_remository - Arbitrary File Upload. Author: J3yk0ob |
Analyze the security implications of: Joomla! Component com_remository - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SuSE Linux 6.1/6.2 - 'cwdtools' Local Overflow / Local Privilege Escalation | This is a local exploit for linux platform. Description: SuSE Linux 6.1/6.2 - 'cwdtools' Local Overflow / Local Privilege Escalation. Author: Brock Tellier |
Analyze the security implications of: SuSE Linux 6.1/6.2 - 'cwdtools' Local Overflow / Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.