input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ettercap-NG 0.7.3 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Ettercap-NG 0.7.3 - Remote Denial of Service. Author: evilrabbi |
Analyze the security implications of: Ettercap-NG 0.7.3 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Wireless Tools 26 (IWConfig) - ARGV Local Command Line Buffer Overflow (3) | This is a local exploit for linux platform. Description: Wireless Tools 26 (IWConfig) - ARGV Local Command Line Buffer Overflow (3). Author: NrAziz |
Analyze the security implications of: Wireless Tools 26 (IWConfig) - ARGV Local Command Line Buffer Overflow (3) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Daniel Beckham The Finger Server 0.82 Beta - Pipe | This is a remote exploit for cgi platform. Description: Daniel Beckham The Finger Server 0.82 Beta - Pipe. Author: Iain Wade |
Analyze the security implications of: Daniel Beckham The Finger Server 0.82 Beta - Pipe | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: BlogPHP 2.0 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: BlogPHP 2.0 - Persistent Cross-Site Scripting. Author: Paulzz |
Analyze the security implications of: BlogPHP 2.0 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: elvin bts 1.2.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: elvin bts 1.2.0 - Multiple Vulnerabilities. Author: SirGod |
Analyze the security implications of: elvin bts 1.2.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel < 2.6.14.6 - 'procfs' Kernel Memory Disclosure | This is a local exploit for linux platform. Description: Linux Kernel < 2.6.14.6 - 'procfs' Kernel Memory Disclosure. Author: Jon Oberheide |
Analyze the security implications of: Linux Kernel < 2.6.14.6 - 'procfs' Kernel Memory Disclosure | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cisco AnyConnect 3.1.08009 - Local Privilege Escalation (via DMG Install Script) | This is a local exploit for osx platform. Description: Cisco AnyConnect 3.1.08009 - Local Privilege Escalation (via DMG Install Script). Author: Yorick Koster |
Analyze the security implications of: Cisco AnyConnect 3.1.08009 - Local Privilege Escalation (via DMG Install Script) | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Cisco RV110W/RV130(W)/RV215W Routers Management Interface - Remote Command Execution (Metasploit) | This is a remote exploit for hardware platform. Description: Cisco RV110W/RV130(W)/RV215W Routers Management Interface - Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Cisco RV110W/RV130(W)/RV215W Routers Management Interface - Remote Command Execution (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Cisco Wireless Controller 3.6.10E - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Cisco Wireless Controller 3.6.10E - Cross-Site Request Forgery. Author: Mehmet Onder |
Analyze the security implications of: Cisco Wireless Controller 3.6.10E - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Unreal Tournament 2004 - Null Pointer Remote Denial of Service | This is a dos exploit for multiple platform. Description: Unreal Tournament 2004 - Null Pointer Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Unreal Tournament 2004 - Null Pointer Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: VMWare Fusion - Local Privilege Escalation | This is a local exploit for macos platform. Description: VMWare Fusion - Local Privilege Escalation. Author: Grimm |
Analyze the security implications of: VMWare Fusion - Local Privilege Escalation | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Nukedit 4.9.x - 'login.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Nukedit 4.9.x - 'login.asp' Cross-Site Scripting. Author: d3hydr8 |
Analyze the security implications of: Nukedit 4.9.x - 'login.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Ek Rishta 2.10 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Ek Rishta 2.10 - SQL Injection. Author: Guilherme Assmann |
Analyze the security implications of: Joomla! Component Ek Rishta 2.10 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Auerswald COMpact 8.0B - Multiple Backdoors | This is a remote exploit for hardware platform. Description: Auerswald COMpact 8.0B - Multiple Backdoors. Author: RedTeam Pentesting GmbH |
Analyze the security implications of: Auerswald COMpact 8.0B - Multiple Backdoors | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: T-Soft E-Commerce 4 - change 'admin credentials' Cross-Site Request Forgery (CSRF) | This is a webapps exploit for multiple platform. Description: T-Soft E-Commerce 4 - change 'admin credentials' Cross-Site Request Forgery (CSRF). Author: Alperen Ergel |
Analyze the security implications of: T-Soft E-Commerce 4 - change 'admin credentials' Cross-Site Request Forgery (CSRF) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple iOS/macOS - Sandbox Escape due to Trusted Length Field in Shared Memory used by HID Event Subsystem | This is a dos exploit for multiple platform. Description: Apple iOS/macOS - Sandbox Escape due to Trusted Length Field in Shared Memory used by HID Event Subsystem. Author: Google Security Research |
Analyze the security implications of: Apple iOS/macOS - Sandbox Escape due to Trusted Length Field in Shared Memory used by HID Event Subsystem | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Time Returns 2.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Time Returns 2.0 - SQL Injection. Author: kaMtiEz |
Analyze the security implications of: Joomla! Component Time Returns 2.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Caucho Technology Resin 1.2/1.3 - JavaBean Disclosure | This is a remote exploit for multiple platform. Description: Caucho Technology Resin 1.2/1.3 - JavaBean Disclosure. Author: lovehacker |
Analyze the security implications of: Caucho Technology Resin 1.2/1.3 - JavaBean Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Citadel WebCit < 926 - Session Hijacking Exploit | This is a webapps exploit for multiple platform. Description: Citadel WebCit < 926 - Session Hijacking Exploit. Author: Simone Quatrini |
Analyze the security implications of: Citadel WebCit < 926 - Session Hijacking Exploit | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache Struts 2.3.x Showcase - Remote Code Execution | This is a webapps exploit for multiple platform. Description: Apache Struts 2.3.x Showcase - Remote Code Execution. Author: Vex Woo |
Analyze the security implications of: Apache Struts 2.3.x Showcase - Remote Code Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Maian Guestbook 3.2 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Maian Guestbook 3.2 - Insecure Cookie Handling. Author: S.W.A.T. |
Analyze the security implications of: Maian Guestbook 3.2 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: libtiff 4.0.9 - Decodes Arbitrarily Sized JBIG into a Target Buffer | This is a dos exploit for linux platform. Description: libtiff 4.0.9 - Decodes Arbitrarily Sized JBIG into a Target Buffer. Author: Google Security Research |
Analyze the security implications of: libtiff 4.0.9 - Decodes Arbitrarily Sized JBIG into a Target Buffer | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ac4p Mobile - 'MobileNews.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: ac4p Mobile - 'MobileNews.php' Multiple Cross-Site Scripting Vulnerabilities. Author: AL-garnei |
Analyze the security implications of: ac4p Mobile - 'MobileNews.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AvailScript Jobs Portal Script - 'jid' SQL Injection | This is a webapps exploit for php platform. Description: AvailScript Jobs Portal Script - 'jid' SQL Injection. Author: InjEctOr5 |
Analyze the security implications of: AvailScript Jobs Portal Script - 'jid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Guestex Guestbook 1.00 - 'email' Remote Code Execution | This is a webapps exploit for php platform. Description: Guestex Guestbook 1.00 - 'email' Remote Code Execution. Author: K-sPecial |
Analyze the security implications of: Guestex Guestbook 1.00 - 'email' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Horde Groupware Webmail 5.2.22 - Stored XSS | This is a webapps exploit for multiple platform. Description: Horde Groupware Webmail 5.2.22 - Stored XSS. Author: nu11secur1ty |
Analyze the security implications of: Horde Groupware Webmail 5.2.22 - Stored XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Eurologon CMS - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Eurologon CMS - Multiple SQL Injections. Author: KiNgOfThEwOrLd |
Analyze the security implications of: Eurologon CMS - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KnowledgeBuilder 2.0/2.1/3.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: KnowledgeBuilder 2.0/2.1/3.0 - Remote File Inclusion. Author: Zero X |
Analyze the security implications of: KnowledgeBuilder 2.0/2.1/3.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joovili 3.0 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Joovili 3.0 - Multiple SQL Injections. Author: ~!Dok_tOR!~ |
Analyze the security implications of: Joovili 3.0 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Acronis Cyber Backup 12.5 Build 16341 - Unauthenticated SSRF | This is a webapps exploit for multiple platform. Description: Acronis Cyber Backup 12.5 Build 16341 - Unauthenticated SSRF. Author: Julien Ahrens |
Analyze the security implications of: Acronis Cyber Backup 12.5 Build 16341 - Unauthenticated SSRF | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ATutor 1.4.3 - 'content.php?cid' Cross-Site Scripting | This is a webapps exploit for php platform. Description: ATutor 1.4.3 - 'content.php?cid' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: ATutor 1.4.3 - 'content.php?cid' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.2.6 - 'sleep()' Local Memory Exhaust | This is a dos exploit for multiple platform. Description: PHP 5.2.6 - 'sleep()' Local Memory Exhaust. Author: Gogulas |
Analyze the security implications of: PHP 5.2.6 - 'sleep()' Local Memory Exhaust | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: hplip - 'hpssd.py' From Address Arbitrary Command Execution (Metasploit) | This is a remote exploit for linux platform. Description: hplip - 'hpssd.py' From Address Arbitrary Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: hplip - 'hpssd.py' From Address Arbitrary Command Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.