input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ettercap-NG 0.7.3 - Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Ettercap-NG 0.7.3 - Remote Denial of Service. Author: evilrabbi
|
Analyze the security implications of: Ettercap-NG 0.7.3 - Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Wireless Tools 26 (IWConfig) - ARGV Local Command Line Buffer Overflow (3)
|
This is a local exploit for linux platform. Description: Wireless Tools 26 (IWConfig) - ARGV Local Command Line Buffer Overflow (3). Author: NrAziz
|
Analyze the security implications of: Wireless Tools 26 (IWConfig) - ARGV Local Command Line Buffer Overflow (3)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Daniel Beckham The Finger Server 0.82 Beta - Pipe
|
This is a remote exploit for cgi platform. Description: Daniel Beckham The Finger Server 0.82 Beta - Pipe. Author: Iain Wade
|
Analyze the security implications of: Daniel Beckham The Finger Server 0.82 Beta - Pipe
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: BlogPHP 2.0 - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: BlogPHP 2.0 - Persistent Cross-Site Scripting. Author: Paulzz
|
Analyze the security implications of: BlogPHP 2.0 - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: elvin bts 1.2.0 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: elvin bts 1.2.0 - Multiple Vulnerabilities. Author: SirGod
|
Analyze the security implications of: elvin bts 1.2.0 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel < 2.6.14.6 - 'procfs' Kernel Memory Disclosure
|
This is a local exploit for linux platform. Description: Linux Kernel < 2.6.14.6 - 'procfs' Kernel Memory Disclosure. Author: Jon Oberheide
|
Analyze the security implications of: Linux Kernel < 2.6.14.6 - 'procfs' Kernel Memory Disclosure
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Cisco AnyConnect 3.1.08009 - Local Privilege Escalation (via DMG Install Script)
|
This is a local exploit for osx platform. Description: Cisco AnyConnect 3.1.08009 - Local Privilege Escalation (via DMG Install Script). Author: Yorick Koster
|
Analyze the security implications of: Cisco AnyConnect 3.1.08009 - Local Privilege Escalation (via DMG Install Script)
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Cisco RV110W/RV130(W)/RV215W Routers Management Interface - Remote Command Execution (Metasploit)
|
This is a remote exploit for hardware platform. Description: Cisco RV110W/RV130(W)/RV215W Routers Management Interface - Remote Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Cisco RV110W/RV130(W)/RV215W Routers Management Interface - Remote Command Execution (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Cisco Wireless Controller 3.6.10E - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: Cisco Wireless Controller 3.6.10E - Cross-Site Request Forgery. Author: Mehmet Onder
|
Analyze the security implications of: Cisco Wireless Controller 3.6.10E - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Unreal Tournament 2004 - Null Pointer Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Unreal Tournament 2004 - Null Pointer Remote Denial of Service. Author: Luigi Auriemma
|
Analyze the security implications of: Unreal Tournament 2004 - Null Pointer Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: VMWare Fusion - Local Privilege Escalation
|
This is a local exploit for macos platform. Description: VMWare Fusion - Local Privilege Escalation. Author: Grimm
|
Analyze the security implications of: VMWare Fusion - Local Privilege Escalation
|
This exploit targets macos systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: Nukedit 4.9.x - 'login.asp' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Nukedit 4.9.x - 'login.asp' Cross-Site Scripting. Author: d3hydr8
|
Analyze the security implications of: Nukedit 4.9.x - 'login.asp' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component Ek Rishta 2.10 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Ek Rishta 2.10 - SQL Injection. Author: Guilherme Assmann
|
Analyze the security implications of: Joomla! Component Ek Rishta 2.10 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Auerswald COMpact 8.0B - Multiple Backdoors
|
This is a remote exploit for hardware platform. Description: Auerswald COMpact 8.0B - Multiple Backdoors. Author: RedTeam Pentesting GmbH
|
Analyze the security implications of: Auerswald COMpact 8.0B - Multiple Backdoors
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: T-Soft E-Commerce 4 - change 'admin credentials' Cross-Site Request Forgery (CSRF)
|
This is a webapps exploit for multiple platform. Description: T-Soft E-Commerce 4 - change 'admin credentials' Cross-Site Request Forgery (CSRF). Author: Alperen Ergel
|
Analyze the security implications of: T-Soft E-Commerce 4 - change 'admin credentials' Cross-Site Request Forgery (CSRF)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apple iOS/macOS - Sandbox Escape due to Trusted Length Field in Shared Memory used by HID Event Subsystem
|
This is a dos exploit for multiple platform. Description: Apple iOS/macOS - Sandbox Escape due to Trusted Length Field in Shared Memory used by HID Event Subsystem. Author: Google Security Research
|
Analyze the security implications of: Apple iOS/macOS - Sandbox Escape due to Trusted Length Field in Shared Memory used by HID Event Subsystem
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component Time Returns 2.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Time Returns 2.0 - SQL Injection. Author: kaMtiEz
|
Analyze the security implications of: Joomla! Component Time Returns 2.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Caucho Technology Resin 1.2/1.3 - JavaBean Disclosure
|
This is a remote exploit for multiple platform. Description: Caucho Technology Resin 1.2/1.3 - JavaBean Disclosure. Author: lovehacker
|
Analyze the security implications of: Caucho Technology Resin 1.2/1.3 - JavaBean Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Citadel WebCit < 926 - Session Hijacking Exploit
|
This is a webapps exploit for multiple platform. Description: Citadel WebCit < 926 - Session Hijacking Exploit. Author: Simone Quatrini
|
Analyze the security implications of: Citadel WebCit < 926 - Session Hijacking Exploit
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apache Struts 2.3.x Showcase - Remote Code Execution
|
This is a webapps exploit for multiple platform. Description: Apache Struts 2.3.x Showcase - Remote Code Execution. Author: Vex Woo
|
Analyze the security implications of: Apache Struts 2.3.x Showcase - Remote Code Execution
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Maian Guestbook 3.2 - Insecure Cookie Handling
|
This is a webapps exploit for php platform. Description: Maian Guestbook 3.2 - Insecure Cookie Handling. Author: S.W.A.T.
|
Analyze the security implications of: Maian Guestbook 3.2 - Insecure Cookie Handling
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: libtiff 4.0.9 - Decodes Arbitrarily Sized JBIG into a Target Buffer
|
This is a dos exploit for linux platform. Description: libtiff 4.0.9 - Decodes Arbitrarily Sized JBIG into a Target Buffer. Author: Google Security Research
|
Analyze the security implications of: libtiff 4.0.9 - Decodes Arbitrarily Sized JBIG into a Target Buffer
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ac4p Mobile - 'MobileNews.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: ac4p Mobile - 'MobileNews.php' Multiple Cross-Site Scripting Vulnerabilities. Author: AL-garnei
|
Analyze the security implications of: ac4p Mobile - 'MobileNews.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AvailScript Jobs Portal Script - 'jid' SQL Injection
|
This is a webapps exploit for php platform. Description: AvailScript Jobs Portal Script - 'jid' SQL Injection. Author: InjEctOr5
|
Analyze the security implications of: AvailScript Jobs Portal Script - 'jid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Guestex Guestbook 1.00 - 'email' Remote Code Execution
|
This is a webapps exploit for php platform. Description: Guestex Guestbook 1.00 - 'email' Remote Code Execution. Author: K-sPecial
|
Analyze the security implications of: Guestex Guestbook 1.00 - 'email' Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Horde Groupware Webmail 5.2.22 - Stored XSS
|
This is a webapps exploit for multiple platform. Description: Horde Groupware Webmail 5.2.22 - Stored XSS. Author: nu11secur1ty
|
Analyze the security implications of: Horde Groupware Webmail 5.2.22 - Stored XSS
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Eurologon CMS - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Eurologon CMS - Multiple SQL Injections. Author: KiNgOfThEwOrLd
|
Analyze the security implications of: Eurologon CMS - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: KnowledgeBuilder 2.0/2.1/3.0 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: KnowledgeBuilder 2.0/2.1/3.0 - Remote File Inclusion. Author: Zero X
|
Analyze the security implications of: KnowledgeBuilder 2.0/2.1/3.0 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joovili 3.0 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Joovili 3.0 - Multiple SQL Injections. Author: ~!Dok_tOR!~
|
Analyze the security implications of: Joovili 3.0 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Acronis Cyber Backup 12.5 Build 16341 - Unauthenticated SSRF
|
This is a webapps exploit for multiple platform. Description: Acronis Cyber Backup 12.5 Build 16341 - Unauthenticated SSRF. Author: Julien Ahrens
|
Analyze the security implications of: Acronis Cyber Backup 12.5 Build 16341 - Unauthenticated SSRF
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ATutor 1.4.3 - 'content.php?cid' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: ATutor 1.4.3 - 'content.php?cid' Cross-Site Scripting. Author: Lostmon
|
Analyze the security implications of: ATutor 1.4.3 - 'content.php?cid' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP 5.2.6 - 'sleep()' Local Memory Exhaust
|
This is a dos exploit for multiple platform. Description: PHP 5.2.6 - 'sleep()' Local Memory Exhaust. Author: Gogulas
|
Analyze the security implications of: PHP 5.2.6 - 'sleep()' Local Memory Exhaust
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: hplip - 'hpssd.py' From Address Arbitrary Command Execution (Metasploit)
|
This is a remote exploit for linux platform. Description: hplip - 'hpssd.py' From Address Arbitrary Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: hplip - 'hpssd.py' From Address Arbitrary Command Execution (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.