input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Novell Client 4.91.5 - ActiveX Control 'nwsetup.dll' Remote Denial of Service (2) | This is a dos exploit for novell platform. Description: Novell Client 4.91.5 - ActiveX Control 'nwsetup.dll' Remote Denial of Service (2). Author: Francis Provencher |
Analyze the security implications of: Novell Client 4.91.5 - ActiveX Control 'nwsetup.dll' Remote Denial of Service (2) | This exploit targets novell systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: Moodle - Remote Command Execution (Metasploit) | This is a remote exploit for linux platform. Description: Moodle - Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Moodle - Remote Command Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PeerCast 0.1216 - Remote Stack Overflow (Metasploit) | This is a remote exploit for linux platform. Description: PeerCast 0.1216 - Remote Stack Overflow (Metasploit). Author: MC |
Analyze the security implications of: PeerCast 0.1216 - Remote Stack Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cloisterblog 1.2.2 - Journal.pl Directory Traversal | This is a webapps exploit for cgi platform. Description: Cloisterblog 1.2.2 - Journal.pl Directory Traversal. Author: Dotho |
Analyze the security implications of: Cloisterblog 1.2.2 - Journal.pl Directory Traversal | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: QEMU - Programmable Interrupt Timer Controller Heap Overflow | This is a dos exploit for multiple platform. Description: QEMU - Programmable Interrupt Timer Controller Heap Overflow. Author: Google Security Research |
Analyze the security implications of: QEMU - Programmable Interrupt Timer Controller Heap Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PHP 4.x/5.0.x - Arbitrary File Upload GLOBAL Variable Overwrite | This is a remote exploit for php platform. Description: PHP 4.x/5.0.x - Arbitrary File Upload GLOBAL Variable Overwrite. Author: rgod |
Analyze the security implications of: PHP 4.x/5.0.x - Arbitrary File Upload GLOBAL Variable Overwrite | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco Prime Data Center Network Manager - Arbitrary File Upload (Metasploit) | This is a remote exploit for java platform. Description: Cisco Prime Data Center Network Manager - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: Cisco Prime Data Center Network Manager - Arbitrary File Upload (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Joomla! Component EventList 0.8 - 'did' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component EventList 0.8 - 'did' SQL Injection. Author: ajann |
Analyze the security implications of: Joomla! Component EventList 0.8 - 'did' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DotClear 1.2.1/1.2.2 - 'Session.php' SQL Injection | This is a webapps exploit for php platform. Description: DotClear 1.2.1/1.2.2 - 'Session.php' SQL Injection. Author: Siegfried |
Analyze the security implications of: DotClear 1.2.1/1.2.2 - 'Session.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TELSAT marKoni FM Transmitter 1.9.5 - Backdoor Account Information Disclosure | This is a remote exploit for hardware platform. Description: TELSAT marKoni FM Transmitter 1.9.5 - Backdoor Account Information Disclosure. Author: LiquidWorm |
Analyze the security implications of: TELSAT marKoni FM Transmitter 1.9.5 - Backdoor Account Information Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Lgames LTris 1.0.1 - Local Memory Corruption | This is a local exploit for freebsd platform. Description: Lgames LTris 1.0.1 - Local Memory Corruption. Author: Knud Erik Hojgaard |
Analyze the security implications of: Lgames LTris 1.0.1 - Local Memory Corruption | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: OpenSSL - 'ssl3_get_key_exchange()' Use-After-Free Memory Corruption | This is a dos exploit for linux platform. Description: OpenSSL - 'ssl3_get_key_exchange()' Use-After-Free Memory Corruption. Author: Georgi Guninski |
Analyze the security implications of: OpenSSL - 'ssl3_get_key_exchange()' Use-After-Free Memory Corruption | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Skype 5.3 - 'Mobile Phone' HTML Injection | This is a remote exploit for multiple platform. Description: Skype 5.3 - 'Mobile Phone' HTML Injection. Author: noptrix |
Analyze the security implications of: Skype 5.3 - 'Mobile Phone' HTML Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BPLawyerCaseDocuments - SQL Injection | This is a webapps exploit for asp platform. Description: BPLawyerCaseDocuments - SQL Injection. Author: OoN Boy |
Analyze the security implications of: BPLawyerCaseDocuments - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Qualcomm WorldMail Server 3.0 - Directory Traversal | This is a remote exploit for linux platform. Description: Qualcomm WorldMail Server 3.0 - Directory Traversal. Author: FistFuXXer |
Analyze the security implications of: Qualcomm WorldMail Server 3.0 - Directory Traversal | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cisco Prime Infrastructure Health Monitor HA TarArchive - Directory Traversal / Remote Code Execution | This is a remote exploit for linux platform. Description: Cisco Prime Infrastructure Health Monitor HA TarArchive - Directory Traversal / Remote Code Execution. Author: mr_me |
Analyze the security implications of: Cisco Prime Infrastructure Health Monitor HA TarArchive - Directory Traversal / Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Oracle Application Testing Suite (ATS) 12.4.0.2.0 - Authentication Bypass / Arbitrary File Upload | This is a webapps exploit for jsp platform. Description: Oracle Application Testing Suite (ATS) 12.4.0.2.0 - Authentication Bypass / Arbitrary File Upload. Author: Zhou Yu |
Analyze the security implications of: Oracle Application Testing Suite (ATS) 12.4.0.2.0 - Authentication Bypass / Arbitrary File Upload | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Elite Gaming Ladders 3.2 - 'platform' SQL Injection | This is a webapps exploit for php platform. Description: Elite Gaming Ladders 3.2 - 'platform' SQL Injection. Author: snakespc |
Analyze the security implications of: Elite Gaming Ladders 3.2 - 'platform' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CentOS Web Panel 0.9.8.1081 - Stored Cross-Site Scripting (XSS) | This is a webapps exploit for linux platform. Description: CentOS Web Panel 0.9.8.1081 - Stored Cross-Site Scripting (XSS). Author: Dinesh Mohanty |
Analyze the security implications of: CentOS Web Panel 0.9.8.1081 - Stored Cross-Site Scripting (XSS) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla JLex Review 6.0.1 - Reflected XSS | This is a webapps exploit for php platform. Description: Joomla JLex Review 6.0.1 - Reflected XSS. Author: CraCkEr |
Analyze the security implications of: Joomla JLex Review 6.0.1 - Reflected XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GONiCUS System Administrator 1.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: GONiCUS System Administrator 1.0 - Remote File Inclusion. Author: Karol Wiesek |
Analyze the security implications of: GONiCUS System Administrator 1.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cline Communications - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Cline Communications - Multiple SQL Injections. Author: Liz0ziM |
Analyze the security implications of: Cline Communications - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Opera 9.10 - Configuration Overwrite (Metasploit) | This is a remote exploit for multiple platform. Description: Opera 9.10 - Configuration Overwrite (Metasploit). Author: egypt |
Analyze the security implications of: Opera 9.10 - Configuration Overwrite (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_jbpublishdownfp - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_jbpublishdownfp - SQL Injection. Author: B-HUNT3|2 |
Analyze the security implications of: Joomla! Component com_jbpublishdownfp - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NetBSD 1.4 / OpenBSD 2.5 / Solaris 7.0 - 'profil(2)' Modify The Internal Data Space | This is a local exploit for multiple platform. Description: NetBSD 1.4 / OpenBSD 2.5 / Solaris 7.0 - 'profil(2)' Modify The Internal Data Space. Author: Ross Harvey |
Analyze the security implications of: NetBSD 1.4 / OpenBSD 2.5 / Solaris 7.0 - 'profil(2)' Modify The Internal Data Space | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Community CMS 0.5 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Community CMS 0.5 - Multiple SQL Injections. Author: Salvatore Fresta |
Analyze the security implications of: Community CMS 0.5 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux - Missing Locking in Siemens R3964 Line Discipline Race Condition | This is a dos exploit for linux platform. Description: Linux - Missing Locking in Siemens R3964 Line Discipline Race Condition. Author: Google Security Research |
Analyze the security implications of: Linux - Missing Locking in Siemens R3964 Line Discipline Race Condition | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Basic-CMS - Blind SQL Injection | This is a webapps exploit for php platform. Description: Basic-CMS - Blind SQL Injection. Author: CWH Underground |
Analyze the security implications of: Basic-CMS - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ghostscript 9.21 - Type Confusion Arbitrary Command Execution (Metasploit) | This is a local exploit for linux platform. Description: Ghostscript 9.21 - Type Confusion Arbitrary Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Ghostscript 9.21 - Type Confusion Arbitrary Command Execution (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joovili 3.1.4 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Joovili 3.1.4 - Insecure Cookie Handling. Author: ZoRLu |
Analyze the security implications of: Joovili 3.1.4 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iDS6 DSSPro Digital Signage System 6.2 - Improper Access Control Privilege Escalation | This is a webapps exploit for hardware platform. Description: iDS6 DSSPro Digital Signage System 6.2 - Improper Access Control Privilege Escalation. Author: LiquidWorm |
Analyze the security implications of: iDS6 DSSPro Digital Signage System 6.2 - Improper Access Control Privilege Escalation | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component Gift Exchange com_giftexchange 1.0 Beta - 'pkg' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Gift Exchange com_giftexchange 1.0 Beta - 'pkg' SQL Injection. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component Gift Exchange com_giftexchange 1.0 Beta - 'pkg' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Atomy Maxsite - 'index.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: Atomy Maxsite - 'index.php' Arbitrary File Upload. Author: Iranian_Dark_Coders_Team |
Analyze the security implications of: Atomy Maxsite - 'index.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jurpopage 0.2.0 - SQL Injection | This is a webapps exploit for php platform. Description: Jurpopage 0.2.0 - SQL Injection. Author: Sudden_death |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.