input
stringlengths 39
228
| output
stringlengths 32
324
|
|---|---|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: PHP 5.5.37/5.6.23/7.0.8 - 'bzread()' Out-of-Bounds Write
|
This is a dos exploit for php platform. Description: PHP 5.5.37/5.6.23/7.0.8 - 'bzread()' Out-of-Bounds Write. Author: Hans Jerry Illikainen
|
Analyze the security implications of: PHP 5.5.37/5.6.23/7.0.8 - 'bzread()' Out-of-Bounds Write
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 3Com SuperStack II RAS 1500 - Unauthorized Access
|
This is a remote exploit for hardware platform. Description: 3Com SuperStack II RAS 1500 - Unauthorized Access. Author: Piotr Chytla
|
Analyze the security implications of: 3Com SuperStack II RAS 1500 - Unauthorized Access
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Duplicate-Post 3.2.3 - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Duplicate-Post 3.2.3 - Persistent Cross-Site Scripting. Author: Unk9vvN
|
Analyze the security implications of: Duplicate-Post 3.2.3 - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Aqar Script 1.0 - Remote Bypass
|
This is a webapps exploit for php platform. Description: Aqar Script 1.0 - Remote Bypass. Author: indoushka
|
Analyze the security implications of: Aqar Script 1.0 - Remote Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Elastix 2.x - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Elastix 2.x - Blind SQL Injection. Author: Ahmed Aboul-Ela
|
Analyze the security implications of: Elastix 2.x - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Beehive Forum 1.4.4 - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Beehive Forum 1.4.4 - Persistent Cross-Site Scripting. Author: Halil Dalabasmaz
|
Analyze the security implications of: Beehive Forum 1.4.4 - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Servisnet Tessa - MQTT Credentials Dump (Unauthenticated) (Metasploit)
|
This is a webapps exploit for multiple platform. Description: Servisnet Tessa - MQTT Credentials Dump (Unauthenticated) (Metasploit). Author: AkkuS
|
Analyze the security implications of: Servisnet Tessa - MQTT Credentials Dump (Unauthenticated) (Metasploit)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_category - 'catid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_category - 'catid' SQL Injection. Author: Prince_Pwn3r
|
Analyze the security implications of: Joomla! Component com_category - 'catid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OpenBSD 3.x - PF RDR Network Information Leakage
|
This is a remote exploit for openbsd platform. Description: OpenBSD 3.x - PF RDR Network Information Leakage. Author: Ed3f
|
Analyze the security implications of: OpenBSD 3.x - PF RDR Network Information Leakage
|
This exploit targets openbsd systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets openbsd platform
|
What is this exploit about: ASMAX AR 804 gu Web Management Console - Arbitrary Command Execution
|
This is a remote exploit for hardware platform. Description: ASMAX AR 804 gu Web Management Console - Arbitrary Command Execution. Author: Securitum
|
Analyze the security implications of: ASMAX AR 804 gu Web Management Console - Arbitrary Command Execution
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ESTsoft InternetDisk - Arbitrary File Upload / Script Execution
|
This is a webapps exploit for php platform. Description: ESTsoft InternetDisk - Arbitrary File Upload / Script Execution. Author: Kil13r
|
Analyze the security implications of: ESTsoft InternetDisk - Arbitrary File Upload / Script Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Mac OSX 10.6 - HFS FileSystem (Denial of Service)
|
This is a dos exploit for osx platform. Description: Apple Mac OSX 10.6 - HFS FileSystem (Denial of Service). Author: Maksymilian Arciemowicz
|
Analyze the security implications of: Apple Mac OSX 10.6 - HFS FileSystem (Denial of Service)
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Gentoo Webapp-Config 1.10 - Insecure File Creation
|
This is a local exploit for linux platform. Description: Gentoo Webapp-Config 1.10 - Insecure File Creation. Author: Eric Romang
|
Analyze the security implications of: Gentoo Webapp-Config 1.10 - Insecure File Creation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: PhotoSync Wifi & Bluetooth 1.0 - Local File Inclusion
|
This is a webapps exploit for ios platform. Description: PhotoSync Wifi & Bluetooth 1.0 - Local File Inclusion. Author: Vulnerability-Lab
|
Analyze the security implications of: PhotoSync Wifi & Bluetooth 1.0 - Local File Inclusion
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Claroline 1.x - '/inc/lib/language.lib.php?language' Traversal Local File Inclusion
|
This is a webapps exploit for php platform. Description: Claroline 1.x - '/inc/lib/language.lib.php?language' Traversal Local File Inclusion. Author: Fernando Munoz
|
Analyze the security implications of: Claroline 1.x - '/inc/lib/language.lib.php?language' Traversal Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Netgear DGN1000 / DGN2200 - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Netgear DGN1000 / DGN2200 - Multiple Vulnerabilities. Author: Roberto Paleari
|
Analyze the security implications of: Netgear DGN1000 / DGN2200 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Desktop Central 9.1.0 - Multiple Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: Desktop Central 9.1.0 - Multiple Vulnerabilities. Author: Rafael Pedrero
|
Analyze the security implications of: Desktop Central 9.1.0 - Multiple Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Pngren 2.0.1 - 'Kaiseki.cgi' Remote Command Execution
|
This is a webapps exploit for cgi platform. Description: Pngren 2.0.1 - 'Kaiseki.cgi' Remote Command Execution. Author: blahplok
|
Analyze the security implications of: Pngren 2.0.1 - 'Kaiseki.cgi' Remote Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: DedeCMS 7.5 SP2 - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DedeCMS 7.5 SP2 - Persistent Cross-Site Scripting. Author: Vulnerability Research Laboratory
|
Analyze the security implications of: DedeCMS 7.5 SP2 - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Network Manager VPNC 1.2.6 - 'Username' Local Privilege Escalation (Metasploit)
|
This is a local exploit for linux platform. Description: Network Manager VPNC 1.2.6 - 'Username' Local Privilege Escalation (Metasploit). Author: Metasploit
|
Analyze the security implications of: Network Manager VPNC 1.2.6 - 'Username' Local Privilege Escalation (Metasploit)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ITechBids 6.0 - 'item_id' SQL Injection
|
This is a webapps exploit for php platform. Description: ITechBids 6.0 - 'item_id' SQL Injection. Author: SoSo H H
|
Analyze the security implications of: ITechBids 6.0 - 'item_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 2.0 Sendmail - Denial of Service
|
This is a dos exploit for linux platform. Description: Linux Kernel 2.0 Sendmail - Denial of Service. Author: Michal Zalewski
|
Analyze the security implications of: Linux Kernel 2.0 Sendmail - Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: FS Indiamart Clone - 'keywords' SQL Injection
|
This is a webapps exploit for php platform. Description: FS Indiamart Clone - 'keywords' SQL Injection. Author: 8bitsec
|
Analyze the security implications of: FS Indiamart Clone - 'keywords' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CF Image Hosting Script 1.3 - 'settings.cdb' Information Disclosure
|
This is a webapps exploit for php platform. Description: CF Image Hosting Script 1.3 - 'settings.cdb' Information Disclosure. Author: Dr.$audi
|
Analyze the security implications of: CF Image Hosting Script 1.3 - 'settings.cdb' Information Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Connect Daily 3.2.8/3.2.9 - 'ViewYear.html' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Connect Daily 3.2.8/3.2.9 - 'ViewYear.html' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t
|
Analyze the security implications of: Connect Daily 3.2.8/3.2.9 - 'ViewYear.html' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: McAfee Email Gateway (formerly IronMail) - Local Privilege Escalation
|
This is a local exploit for freebsd platform. Description: McAfee Email Gateway (formerly IronMail) - Local Privilege Escalation. Author: Nahuel Grisolia
|
Analyze the security implications of: McAfee Email Gateway (formerly IronMail) - Local Privilege Escalation
|
This exploit targets freebsd systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: Barracuda IMFirewall 620 - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Barracuda IMFirewall 620 - Multiple Vulnerabilities. Author: Global-Evolution
|
Analyze the security implications of: Barracuda IMFirewall 620 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Itech Job Portal Script 9.13 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Itech Job Portal Script 9.13 - Multiple Vulnerabilities. Author: Th3GundY
|
Analyze the security implications of: Itech Job Portal Script 9.13 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: fipsForum 2.6 - Remote Database Disclosure
|
This is a webapps exploit for asp platform. Description: fipsForum 2.6 - Remote Database Disclosure. Author: ViRuSMaN
|
Analyze the security implications of: fipsForum 2.6 - Remote Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Barracuda CudaTel - Multiple Cross-Site Scripting Vulnerabilities
|
This is a remote exploit for hardware platform. Description: Barracuda CudaTel - Multiple Cross-Site Scripting Vulnerabilities. Author: Benjamin Kunz Mejri
|
Analyze the security implications of: Barracuda CudaTel - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: AM4SS 1.2 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for php platform. Description: AM4SS 1.2 - Cross-Site Request Forgery (Add Admin). Author: red virus
|
Analyze the security implications of: AM4SS 1.2 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EDUMOD Pro 1.3 - SQL Injection
|
This is a webapps exploit for php platform. Description: EDUMOD Pro 1.3 - SQL Injection. Author: Kaan KAMIS
|
Analyze the security implications of: EDUMOD Pro 1.3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP 5.2.3 - EXT/Session HTTP Response Header Injection
|
This is a remote exploit for php platform. Description: PHP 5.2.3 - EXT/Session HTTP Response Header Injection. Author: Stefan Esser
|
Analyze the security implications of: PHP 5.2.3 - EXT/Session HTTP Response Header Injection
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.