input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ImagePro Lazygirls Clone Script - SQL Injection
|
This is a webapps exploit for php platform. Description: ImagePro Lazygirls Clone Script - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: ImagePro Lazygirls Clone Script - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP < 5.3.6 'OpenSSL' Extension - 'openssl_decrypt' Ciphertext Data Memory Leak Denial of Service
|
This is a dos exploit for php platform. Description: PHP < 5.3.6 'OpenSSL' Extension - 'openssl_decrypt' Ciphertext Data Memory Leak Denial of Service. Author: dovbysh
|
Analyze the security implications of: PHP < 5.3.6 'OpenSSL' Extension - 'openssl_decrypt' Ciphertext Data Memory Leak Denial of Service
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OpenSSH/PAM 3.6.1p1 - Remote Users Discovery Tool
|
This is a remote exploit for linux platform. Description: OpenSSH/PAM 3.6.1p1 - Remote Users Discovery Tool. Author: Maurizio Agazzini
|
Analyze the security implications of: OpenSSH/PAM 3.6.1p1 - Remote Users Discovery Tool
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: TeamCity Agent - XML-RPC Command Execution (Metasploit)
|
This is a remote exploit for multiple platform. Description: TeamCity Agent - XML-RPC Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: TeamCity Agent - XML-RPC Command Execution (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ADP Forum 2.0.x - 'Subject' HTML Injection
|
This is a webapps exploit for php platform. Description: ADP Forum 2.0.x - 'Subject' HTML Injection. Author: liz0
|
Analyze the security implications of: ADP Forum 2.0.x - 'Subject' HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alwjeez Script - Database Backup
|
This is a webapps exploit for php platform. Description: Alwjeez Script - Database Backup. Author: alnjm33
|
Analyze the security implications of: Alwjeez Script - Database Backup
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 2.2/2.3 (Debian Linux 2.1 / RedHat Linux 6.0 / SuSE Linux 6.1) - IP Options
|
This is a dos exploit for linux platform. Description: Linux Kernel 2.2/2.3 (Debian Linux 2.1 / RedHat Linux 6.0 / SuSE Linux 6.1) - IP Options. Author: Piotr Wilkin
|
Analyze the security implications of: Linux Kernel 2.2/2.3 (Debian Linux 2.1 / RedHat Linux 6.0 / SuSE Linux 6.1) - IP Options
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Foxmail Email Client 6.5 - 'mailto' Buffer Overflow (PoC)
|
This is a dos exploit for multiple platform. Description: Foxmail Email Client 6.5 - 'mailto' Buffer Overflow (PoC). Author: sebug
|
Analyze the security implications of: Foxmail Email Client 6.5 - 'mailto' Buffer Overflow (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Zabbix 1.1.4/1.4.2 - 'daemon_start' Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Zabbix 1.1.4/1.4.2 - 'daemon_start' Local Privilege Escalation. Author: Bas van Schaik
|
Analyze the security implications of: Zabbix 1.1.4/1.4.2 - 'daemon_start' Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: compop.ca 3.5.3 - Arbitrary code Execution
|
This is a webapps exploit for multiple platform. Description: compop.ca 3.5.3 - Arbitrary code Execution. Author: dmlino
|
Analyze the security implications of: compop.ca 3.5.3 - Arbitrary code Execution
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: VMware Player 1.0.1 Build 19317 - '.VMX' File Denial of Service
|
This is a dos exploit for multiple platform. Description: VMware Player 1.0.1 Build 19317 - '.VMX' File Denial of Service. Author: n00b
|
Analyze the security implications of: VMware Player 1.0.1 Build 19317 - '.VMX' File Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CMS-BRD - 'menuclick' SQL Injection
|
This is a webapps exploit for php platform. Description: CMS-BRD - 'menuclick' SQL Injection. Author: dun
|
Analyze the security implications of: CMS-BRD - 'menuclick' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BMC BladeLogic 8.3.00.64 - Remote Command Execution
|
This is a remote exploit for multiple platform. Description: BMC BladeLogic 8.3.00.64 - Remote Command Execution. Author: Paul Taylor
|
Analyze the security implications of: BMC BladeLogic 8.3.00.64 - Remote Command Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ICE Hrm 29.0.0.OS - 'Account Takeover' Cross-Site Request Forgery (CSRF)
|
This is a webapps exploit for php platform. Description: ICE Hrm 29.0.0.OS - 'Account Takeover' Cross-Site Request Forgery (CSRF). Author: Piyush Patil
|
Analyze the security implications of: ICE Hrm 29.0.0.OS - 'Account Takeover' Cross-Site Request Forgery (CSRF)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Glossword 1.8.3 - SQL Injection
|
This is a webapps exploit for php platform. Description: Glossword 1.8.3 - SQL Injection. Author: AkaStep
|
Analyze the security implications of: Glossword 1.8.3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MySQL 4.x/5.0 (Linux) - User-Defined Function (UDF) Dynamic Library (2)
|
This is a local exploit for linux platform. Description: MySQL 4.x/5.0 (Linux) - User-Defined Function (UDF) Dynamic Library (2). Author: Marco Ivaldi
|
Analyze the security implications of: MySQL 4.x/5.0 (Linux) - User-Defined Function (UDF) Dynamic Library (2)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Samsung Galaxy S6 - 'android.media.process' 'MdConvertLine' Face Recognition Memory Corruption
|
This is a dos exploit for android platform. Description: Samsung Galaxy S6 - 'android.media.process' 'MdConvertLine' Face Recognition Memory Corruption. Author: Google Security Research
|
Analyze the security implications of: Samsung Galaxy S6 - 'android.media.process' 'MdConvertLine' Face Recognition Memory Corruption
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Microsoft Xbox One 10.0.14393.2152 - Code Execution (PoC)
|
This is a local exploit for hardware platform. Description: Microsoft Xbox One 10.0.14393.2152 - Code Execution (PoC). Author: unknownv2
|
Analyze the security implications of: Microsoft Xbox One 10.0.14393.2152 - Code Execution (PoC)
|
This exploit targets hardware systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: PHP 5.2.1 - 'session_regenerate_id()' Double-Free
|
This is a local exploit for linux platform. Description: PHP 5.2.1 - 'session_regenerate_id()' Double-Free. Author: Stefan Esser
|
Analyze the security implications of: PHP 5.2.1 - 'session_regenerate_id()' Double-Free
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Online Work Order System (OWOS) Professional Edition - Authentication Bypass
|
This is a webapps exploit for asp platform. Description: Online Work Order System (OWOS) Professional Edition - Authentication Bypass. Author: L0rd CrusAd3r
|
Analyze the security implications of: Online Work Order System (OWOS) Professional Edition - Authentication Bypass
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: QEMU - Floppy Disk Controller (FDC) (PoC)
|
This is a dos exploit for multiple platform. Description: QEMU - Floppy Disk Controller (FDC) (PoC). Author: Marcus Meissner
|
Analyze the security implications of: QEMU - Floppy Disk Controller (FDC) (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: W1L3D4 philboard 1.0 - 'philboard_reply.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: W1L3D4 philboard 1.0 - 'philboard_reply.asp' SQL Injection. Author: U238
|
Analyze the security implications of: W1L3D4 philboard 1.0 - 'philboard_reply.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Openswan 2.4.12/2.6.16 - Insecure Temp File Creation Privilege Escalation
|
This is a local exploit for linux platform. Description: Openswan 2.4.12/2.6.16 - Insecure Temp File Creation Privilege Escalation. Author: nofame
|
Analyze the security implications of: Openswan 2.4.12/2.6.16 - Insecure Temp File Creation Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Zoom Linux Client 2.0.106600.0904 - Stack-Based Buffer Overflow (PoC)
|
This is a dos exploit for linux platform. Description: Zoom Linux Client 2.0.106600.0904 - Stack-Based Buffer Overflow (PoC). Author: Conviso
|
Analyze the security implications of: Zoom Linux Client 2.0.106600.0904 - Stack-Based Buffer Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AdMan 1.0.20051221 - 'ViewStatement.php' SQL Injection
|
This is a webapps exploit for php platform. Description: AdMan 1.0.20051221 - 'ViewStatement.php' SQL Injection. Author: r0t
|
Analyze the security implications of: AdMan 1.0.20051221 - 'ViewStatement.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SAP HANA 1.00.095 - hdbindexserver Memory Corruption
|
This is a webapps exploit for multiple platform. Description: SAP HANA 1.00.095 - hdbindexserver Memory Corruption. Author: ERPScan
|
Analyze the security implications of: SAP HANA 1.00.095 - hdbindexserver Memory Corruption
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: FlexNet License Server Manager - Stack Overflow In lmgrd
|
This is a dos exploit for multiple platform. Description: FlexNet License Server Manager - Stack Overflow In lmgrd. Author: Luigi Auriemma
|
Analyze the security implications of: FlexNet License Server Manager - Stack Overflow In lmgrd
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Aj Classifieds - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Aj Classifieds - Authentication Bypass. Author: G4N0K
|
Analyze the security implications of: Aj Classifieds - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CMS WebBlizzard - 'index.php' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: CMS WebBlizzard - 'index.php' Blind SQL Injection. Author: Bl@ckbe@rD
|
Analyze the security implications of: CMS WebBlizzard - 'index.php' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ManageEngine ServiceDesk Plus 9.3 - User Enumeration
|
This is a webapps exploit for java platform. Description: ManageEngine ServiceDesk Plus 9.3 - User Enumeration. Author: Operat0r
|
Analyze the security implications of: ManageEngine ServiceDesk Plus 9.3 - User Enumeration
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: HP-UX 10.20/11.0 - man '/tmp' Symlink
|
This is a local exploit for hp-ux platform. Description: HP-UX 10.20/11.0 - man '/tmp' Symlink. Author: Jason Axley
|
Analyze the security implications of: HP-UX 10.20/11.0 - man '/tmp' Symlink
|
This exploit targets hp-ux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hp-ux platform
|
What is this exploit about: F5 FirePass 7.0 - SQL Injection
|
This is a remote exploit for hardware platform. Description: F5 FirePass 7.0 - SQL Injection. Author: anonymous
|
Analyze the security implications of: F5 FirePass 7.0 - SQL Injection
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: A-Blog 2.0 - 'menu.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: A-Blog 2.0 - 'menu.php' Remote File Inclusion. Author: Drago84
|
Analyze the security implications of: A-Blog 2.0 - 'menu.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.