input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Splunk 4.1.6 Web Component - Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ELS Screen to Screen 1.0 - Multiple Password Vulnerabilities
|
This is a local exploit for osx platform. Description: ELS Screen to Screen 1.0 - Multiple Password Vulnerabilities. Author: Prozaq of mSec
|
Analyze the security implications of: ELS Screen to Screen 1.0 - Multiple Password Vulnerabilities
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Tri-PLC Nano-10 r81 - Denial of Service
|
This is a dos exploit for hardware platform. Description: Tri-PLC Nano-10 r81 - Denial of Service. Author: Sapling
|
Analyze the security implications of: Tri-PLC Nano-10 r81 - Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: NetGain Enterprise Manager 7.2.562 - 'Ping' Command Injection
|
This is a webapps exploit for jsp platform. Description: NetGain Enterprise Manager 7.2.562 - 'Ping' Command Injection. Author: MrChaZ
|
Analyze the security implications of: NetGain Enterprise Manager 7.2.562 - 'Ping' Command Injection
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: LoveCMS 1.6.2 Final - Remote Code Execution
|
This is a webapps exploit for php platform. Description: LoveCMS 1.6.2 Final - Remote Code Execution. Author: PoMdaPiMp
|
Analyze the security implications of: LoveCMS 1.6.2 Final - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dr.Web AntiVirus 4.33 - LHA long Directory name Local Overflow
|
This is a local exploit for linux platform. Description: Dr.Web AntiVirus 4.33 - LHA long Directory name Local Overflow. Author: Guay-Leroux
|
Analyze the security implications of: Dr.Web AntiVirus 4.33 - LHA long Directory name Local Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: MiniNuke 1.8.2b - 'pages.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: MiniNuke 1.8.2b - 'pages.asp' SQL Injection. Author: nukedx
|
Analyze the security implications of: MiniNuke 1.8.2b - 'pages.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Apple Mac OSX 10.4.x - Safari window.console.log Format String
|
This is a dos exploit for osx platform. Description: Apple Mac OSX 10.4.x - Safari window.console.log Format String. Author: LMH
|
Analyze the security implications of: Apple Mac OSX 10.4.x - Safari window.console.log Format String
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: macOS 10.13 (17A365) - Kernel Memory Disclosure due to Lack of Bounds Checking in 'AppleIntelCapriController::getDisplayPipeCapability'
|
This is a dos exploit for macos platform. Description: macOS 10.13 (17A365) - Kernel Memory Disclosure due to Lack of Bounds Checking in 'AppleIntelCapriController::getDisplayPipeCapability'. Author: Google Security Research
|
Analyze the security implications of: macOS 10.13 (17A365) - Kernel Memory Disclosure due to Lack of Bounds Checking in 'AppleIntelCapriController::getDisplayPipeCapability'
|
This exploit targets macos systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: OrientDB 2.2.2 < 2.2.22 - Remote Code Execution (Metasploit)
|
This is a remote exploit for multiple platform. Description: OrientDB 2.2.2 < 2.2.22 - Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: OrientDB 2.2.2 < 2.2.22 - Remote Code Execution (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: eGroupWare 1.6.002 and eGroupWare premium line 9.1 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: eGroupWare 1.6.002 and eGroupWare premium line 9.1 - Multiple Vulnerabilities. Author: Nahuel Grisolia
|
Analyze the security implications of: eGroupWare 1.6.002 and eGroupWare premium line 9.1 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jupiter CMS 1.1.5 - 'index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Jupiter CMS 1.1.5 - 'index.php' Cross-Site Scripting. Author: KaDaL-X
|
Analyze the security implications of: Jupiter CMS 1.1.5 - 'index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Webmin 0.9x / Usermin 0.9x/1.0 - Access Session ID Spoofing
|
This is a remote exploit for linux platform. Description: Webmin 0.9x / Usermin 0.9x/1.0 - Access Session ID Spoofing. Author: Carl Livitt
|
Analyze the security implications of: Webmin 0.9x / Usermin 0.9x/1.0 - Access Session ID Spoofing
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Blog System 1.2 - 'index.php?cat' SQL Injection
|
This is a webapps exploit for php platform. Description: Blog System 1.2 - 'index.php?cat' SQL Injection. Author: r0t3d3Vil
|
Analyze the security implications of: Blog System 1.2 - 'index.php?cat' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Samba 2.2.8 (BSD x86) - 'trans2open' Remote Overflow (Metasploit)
|
This is a remote exploit for bsd_x86 platform. Description: Samba 2.2.8 (BSD x86) - 'trans2open' Remote Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: Samba 2.2.8 (BSD x86) - 'trans2open' Remote Overflow (Metasploit)
|
This exploit targets bsd_x86 systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets bsd_x86 platform
|
What is this exploit about: Brightstation Muscat 1.0 - Full Path Disclosure
|
This is a remote exploit for cgi platform. Description: Brightstation Muscat 1.0 - Full Path Disclosure. Author: cuctema
|
Analyze the security implications of: Brightstation Muscat 1.0 - Full Path Disclosure
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Konqueror 4.7.3 - Memory Corruption
|
This is a dos exploit for linux platform. Description: Konqueror 4.7.3 - Memory Corruption. Author: Tim Brown
|
Analyze the security implications of: Konqueror 4.7.3 - Memory Corruption
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Witbe - Remote Code Execution
|
This is a webapps exploit for cgi platform. Description: Witbe - Remote Code Execution. Author: BeLmar
|
Analyze the security implications of: Witbe - Remote Code Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: PHP 3.0.13 - 'Safe_mode' Failure
|
This is a remote exploit for php platform. Description: PHP 3.0.13 - 'Safe_mode' Failure. Author: Kristian Koehntopp
|
Analyze the security implications of: PHP 3.0.13 - 'Safe_mode' Failure
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Postfix 1.1.x - Denial of Service (2)
|
This is a dos exploit for linux platform. Description: Postfix 1.1.x - Denial of Service (2). Author: daniels@legend.co.uk
|
Analyze the security implications of: Postfix 1.1.x - Denial of Service (2)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: id Software Quake 3 Arena Server 1.29 - Buffer Overflow
|
This is a dos exploit for multiple platform. Description: id Software Quake 3 Arena Server 1.29 - Buffer Overflow. Author: Coolest
|
Analyze the security implications of: id Software Quake 3 Arena Server 1.29 - Buffer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: AnnonceScriptHP 2.0 - '/admin/admin_membre/fiche_membre.php?idmembre' SQL Injection
|
This is a webapps exploit for php platform. Description: AnnonceScriptHP 2.0 - '/admin/admin_membre/fiche_membre.php?idmembre' SQL Injection. Author: Mr_KaLiMaN
|
Analyze the security implications of: AnnonceScriptHP 2.0 - '/admin/admin_membre/fiche_membre.php?idmembre' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dexter (CasinoLoader) - SQL Injection (Metasploit)
|
This is a remote exploit for php platform. Description: Dexter (CasinoLoader) - SQL Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: Dexter (CasinoLoader) - SQL Injection (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_hdflvplayer < 2.1.0.1 - Arbitrary File Download
|
This is a webapps exploit for php platform. Description: Joomla! Component com_hdflvplayer < 2.1.0.1 - Arbitrary File Download. Author: Claudio Viviani
|
Analyze the security implications of: Joomla! Component com_hdflvplayer < 2.1.0.1 - Arbitrary File Download
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Farsinews 3.0 - 'Tiny_mce_gzip.php' Directory Traversal
|
This is a webapps exploit for php platform. Description: Farsinews 3.0 - 'Tiny_mce_gzip.php' Directory Traversal. Author: armin390
|
Analyze the security implications of: Farsinews 3.0 - 'Tiny_mce_gzip.php' Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Comdev Vote Caster 3.1 - 'index.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Comdev Vote Caster 3.1 - 'index.php' SQL Injection. Author: r0t
|
Analyze the security implications of: Comdev Vote Caster 3.1 - 'index.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FreeBSD 6.0 - 'nfsd' Remote Kernel Panic (Denial of Service)
|
This is a dos exploit for bsd platform. Description: FreeBSD 6.0 - 'nfsd' Remote Kernel Panic (Denial of Service). Author: Evgeny Legerov
|
Analyze the security implications of: FreeBSD 6.0 - 'nfsd' Remote Kernel Panic (Denial of Service)
|
This exploit targets bsd systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets bsd platform
|
What is this exploit about: Fortify Software Security Center (SSC) 17.10/17.20/18.10 - Information Disclosure
|
This is a webapps exploit for multiple platform. Description: Fortify Software Security Center (SSC) 17.10/17.20/18.10 - Information Disclosure. Author: alt3kx
|
Analyze the security implications of: Fortify Software Security Center (SSC) 17.10/17.20/18.10 - Information Disclosure
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_teacher - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_teacher - SQL Injection. Author: DevilZ TM
|
Analyze the security implications of: Joomla! Component com_teacher - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: logrotten 3.15.1 - Privilege Escalation
|
This is a local exploit for linux platform. Description: logrotten 3.15.1 - Privilege Escalation. Author: Wolfgang Hotwagner
|
Analyze the security implications of: logrotten 3.15.1 - Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ChatLakTurk PHP Botlu Video - 'ara.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: ChatLakTurk PHP Botlu Video - 'ara.php' Cross-Site Scripting. Author: kurdish hackers team
|
Analyze the security implications of: ChatLakTurk PHP Botlu Video - 'ara.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EZContents 2.0 - 'gallery_summary.php?GLOBALS[admin_home]' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: EZContents 2.0 - 'gallery_summary.php?GLOBALS[admin_home]' Remote File Inclusion. Author: DarkFig
|
Analyze the security implications of: EZContents 2.0 - 'gallery_summary.php?GLOBALS[admin_home]' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JV2 Folder Gallery 3.1 - 'gallery.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: JV2 Folder Gallery 3.1 - 'gallery.php' Remote File Inclusion. Author: Sn!pEr.S!Te Hacker
|
Analyze the security implications of: JV2 Folder Gallery 3.1 - 'gallery.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Nagios3 - 'statuswml.cgi' 'Ping' Command Execution (Metasploit)
|
This is a webapps exploit for cgi platform. Description: Nagios3 - 'statuswml.cgi' 'Ping' Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Nagios3 - 'statuswml.cgi' 'Ping' Command Execution (Metasploit)
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.