input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mod_NTLM 0.x - Authorisation Heap Overflow | This is a dos exploit for multiple platform. Description: Mod_NTLM 0.x - Authorisation Heap Overflow. Author: Matthew Murphy |
Analyze the security implications of: Mod_NTLM 0.x - Authorisation Heap Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Oops! 1.4.6 - one russi4n proxy-server Heap Buffer Overflow | This is a remote exploit for bsd platform. Description: Oops! 1.4.6 - one russi4n proxy-server Heap Buffer Overflow. Author: diman |
Analyze the security implications of: Oops! 1.4.6 - one russi4n proxy-server Heap Buffer Overflow | This exploit targets bsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: CDRecord's ReadCD - Local Privilege Escalation | This is a local exploit for linux platform. Description: CDRecord's ReadCD - Local Privilege Escalation. Author: Max Vozeler |
Analyze the security implications of: CDRecord's ReadCD - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mango Automation 2.6.0 - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: Mango Automation 2.6.0 - Multiple Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: Mango Automation 2.6.0 - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Joomla! Component JE auction 1.6 - 'eid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JE auction 1.6 - 'eid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JE auction 1.6 - 'eid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Opera 9.10 - '.jpg' Image DHT Marker Heap Corruption | This is a dos exploit for multiple platform. Description: Opera 9.10 - '.jpg' Image DHT Marker Heap Corruption. Author: posidron |
Analyze the security implications of: Opera 9.10 - '.jpg' Image DHT Marker Heap Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cerberus FTP Web Service 11 - 'svg' Stored Cross-Site Scripting (XSS) | This is a webapps exploit for multiple platform. Description: Cerberus FTP Web Service 11 - 'svg' Stored Cross-Site Scripting (XSS). Author: Mohammad Hossein Kaviyany |
Analyze the security implications of: Cerberus FTP Web Service 11 - 'svg' Stored Cross-Site Scripting (XSS) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Google Chrome 74.0.3729.0 / 76.0.3789.0 - Heap Use-After-Free in blink::PresentationAvailabilityState::UpdateAvailability | This is a dos exploit for multiple platform. Description: Google Chrome 74.0.3729.0 / 76.0.3789.0 - Heap Use-After-Free in blink::PresentationAvailabilityState::UpdateAvailability. Author: Google Security Research |
Analyze the security implications of: Google Chrome 74.0.3729.0 / 76.0.3789.0 - Heap Use-After-Free in blink::PresentationAvailabilityState::UpdateAvailability | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Achievo 1.3.4 - SQL Injection | This is a webapps exploit for php platform. Description: Achievo 1.3.4 - SQL Injection. Author: Ryan Dewhurst |
Analyze the security implications of: Achievo 1.3.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle Portal 9.0.2 - Calendar.jsp Multiple HTTP Response Splitting Vulnerabilities | This is a webapps exploit for jsp platform. Description: Oracle Portal 9.0.2 - Calendar.jsp Multiple HTTP Response Splitting Vulnerabilities. Author: putosoft softputo |
Analyze the security implications of: Oracle Portal 9.0.2 - Calendar.jsp Multiple HTTP Response Splitting Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: LineageOS 14.1 Blueborne - Remote Code Execution | This is a remote exploit for android platform. Description: LineageOS 14.1 Blueborne - Remote Code Execution. Author: Marcin Kozlowski |
Analyze the security implications of: LineageOS 14.1 Blueborne - Remote Code Execution | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: IBM TM1 / Planning Analytics - Unauthenticated Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: IBM TM1 / Planning Analytics - Unauthenticated Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: IBM TM1 / Planning Analytics - Unauthenticated Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DeluxeBB 1.1 - 'attachments_header.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DeluxeBB 1.1 - 'attachments_header.php' Cross-Site Scripting. Author: NBBN |
Analyze the security implications of: DeluxeBB 1.1 - 'attachments_header.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - '/admin/base_useradmin.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - '/admin/base_useradmin.php?base_path' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - '/admin/base_useradmin.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: XSOK 1.0 2 - 'LANG Environment' Local Buffer Overrun | This is a local exploit for linux platform. Description: XSOK 1.0 2 - 'LANG Environment' Local Buffer Overrun. Author: N2n-Hacker |
Analyze the security implications of: XSOK 1.0 2 - 'LANG Environment' Local Buffer Overrun | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ZYXEL P-660HW-T1 3 Wireless Router - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: ZYXEL P-660HW-T1 3 Wireless Router - Cross-Site Request Forgery. Author: Mustafa ALTINKAYNAK |
Analyze the security implications of: ZYXEL P-660HW-T1 3 Wireless Router - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: LifeType 1.0.4 - SQL Injection | This is a webapps exploit for php platform. Description: LifeType 1.0.4 - SQL Injection. Author: rgod |
Analyze the security implications of: LifeType 1.0.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sendfile 1.x/2.1 - Forced Privilege Lowering Failure | This is a local exploit for linux platform. Description: Sendfile 1.x/2.1 - Forced Privilege Lowering Failure. Author: Cade Cairns |
Analyze the security implications of: Sendfile 1.x/2.1 - Forced Privilege Lowering Failure | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cisco Virtual Central Office 4000 (VCO/4K) 5.1.3 - Remote Username / Password Retrieval | This is a remote exploit for hardware platform. Description: Cisco Virtual Central Office 4000 (VCO/4K) 5.1.3 - Remote Username / Password Retrieval. Author: @stake |
Analyze the security implications of: Cisco Virtual Central Office 4000 (VCO/4K) 5.1.3 - Remote Username / Password Retrieval | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component ProofReader 1.0 RC9 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component ProofReader 1.0 RC9 - Cross-Site Scripting. Author: MustLive |
Analyze the security implications of: Joomla! Component ProofReader 1.0 RC9 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10.3.8 - 'CF_CHARSET_PATH' Local Buffer Overflow (2) | This is a local exploit for osx platform. Description: Apple Mac OSX 10.3.8 - 'CF_CHARSET_PATH' Local Buffer Overflow (2). Author: Kevin Finisterre |
Analyze the security implications of: Apple Mac OSX 10.3.8 - 'CF_CHARSET_PATH' Local Buffer Overflow (2) | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: CuteNews 1.4.6 - 'index.php' Cross-Site Request Forgery (New User Creation) | This is a webapps exploit for php platform. Description: CuteNews 1.4.6 - 'index.php' Cross-Site Request Forgery (New User Creation). Author: Andrew Horton |
Analyze the security implications of: CuteNews 1.4.6 - 'index.php' Cross-Site Request Forgery (New User Creation) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco ASA 8.x - VPN SSL Module Clientless URL-list control Bypass | This is a remote exploit for hardware platform. Description: Cisco ASA 8.x - VPN SSL Module Clientless URL-list control Bypass. Author: David Eduardo Acosta Rodriguez |
Analyze the security implications of: Cisco ASA 8.x - VPN SSL Module Clientless URL-list control Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BSD (Multiple Distributions) - 'setusercontext()' Multiple Vulnerabilities | This is a local exploit for multiple platform. Description: BSD (Multiple Distributions) - 'setusercontext()' Multiple Vulnerabilities. Author: kingcope |
Analyze the security implications of: BSD (Multiple Distributions) - 'setusercontext()' Multiple Vulnerabilities | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache 1.3/2.0.x - Server Side Include Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Apache 1.3/2.0.x - Server Side Include Cross-Site Scripting. Author: mattmurphy |
Analyze the security implications of: Apache 1.3/2.0.x - Server Side Include Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Adobe Flash - AVC Deblocking Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: Adobe Flash - AVC Deblocking Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - AVC Deblocking Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: 1-Script 1-Search 1.8 - '1search.CGI' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: 1-Script 1-Search 1.8 - '1search.CGI' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: 1-Script 1-Search 1.8 - '1search.CGI' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Responsive Filemanager 9.13.1 - Server-Side Request Forgery | This is a webapps exploit for linux platform. Description: Responsive Filemanager 9.13.1 - Server-Side Request Forgery. Author: GUIA BRAHIM FOUAD |
Analyze the security implications of: Responsive Filemanager 9.13.1 - Server-Side Request Forgery | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: eFront 3.6.15 - PHP Object Injection | This is a webapps exploit for php platform. Description: eFront 3.6.15 - PHP Object Injection. Author: Filippo Roncari |
Analyze the security implications of: eFront 3.6.15 - PHP Object Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dexter (CasinoLoader) Panel - SQL Injection | This is a webapps exploit for multiple platform. Description: Dexter (CasinoLoader) Panel - SQL Injection. Author: bwall |
Analyze the security implications of: Dexter (CasinoLoader) Panel - SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component mosDirectory 2.3.2 - 'catid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component mosDirectory 2.3.2 - 'catid' SQL Injection. Author: GoLd_M |
Analyze the security implications of: Joomla! Component mosDirectory 2.3.2 - 'catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TaskTracker 1.5 - 'Customize.asp' Remote Add Administrator | This is a webapps exploit for asp platform. Description: TaskTracker 1.5 - 'Customize.asp' Remote Add Administrator. Author: ajann |
Analyze the security implications of: TaskTracker 1.5 - 'Customize.asp' Remote Add Administrator | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Mozilla Firefox 29.0 - Null Pointer Dereference | This is a dos exploit for multiple platform. Description: Mozilla Firefox 29.0 - Null Pointer Dereference. Author: Mr.XHat |
Analyze the security implications of: Mozilla Firefox 29.0 - Null Pointer Dereference | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.