input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: MapInfo Discovery 1.0/1.1 - 'MapFrame.asp?mapname' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: MapInfo Discovery 1.0/1.1 - 'MapFrame.asp?mapname' Cross-Site Scripting. Author: anonymous |
Analyze the security implications of: MapInfo Discovery 1.0/1.1 - 'MapFrame.asp?mapname' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: HP Operations Manager - Default Manager 8.1 Account Remote Security | This is a remote exploit for multiple platform. Description: HP Operations Manager - Default Manager 8.1 Account Remote Security. Author: Intevydis |
Analyze the security implications of: HP Operations Manager - Default Manager 8.1 Account Remote Security | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Batalla Naval 1.0 4 - Remote Buffer Overflow (2) | This is a remote exploit for linux platform. Description: Batalla Naval 1.0 4 - Remote Buffer Overflow (2). Author: jsk |
Analyze the security implications of: Batalla Naval 1.0 4 - Remote Buffer Overflow (2) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple WebKit - 'FormSubmission::create' Use-After-Free | This is a dos exploit for multiple platform. Description: Apple WebKit - 'FormSubmission::create' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Apple WebKit - 'FormSubmission::create' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cute Editor ASP.NET - Remote File Disclosure | This is a webapps exploit for asp platform. Description: Cute Editor ASP.NET - Remote File Disclosure. Author: Securitylab.ir |
Analyze the security implications of: Cute Editor ASP.NET - Remote File Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Oracle 11g - Multiple Privilege Escalation Vulnerabilities | This is a remote exploit for multiple platform. Description: Oracle 11g - Multiple Privilege Escalation Vulnerabilities. Author: David Litchfield |
Analyze the security implications of: Oracle 11g - Multiple Privilege Escalation Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DRBGuestbook 1.1.13 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DRBGuestbook 1.1.13 - 'index.php' Cross-Site Scripting. Author: Gokhan |
Analyze the security implications of: DRBGuestbook 1.1.13 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AMC Master - Arbitrary File Upload | This is a webapps exploit for php platform. Description: AMC Master - Arbitrary File Upload. Author: Ihsan Sencan |
Analyze the security implications of: AMC Master - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AIOCP 1.3.x - 'load_page' Remote File Inclusion | This is a webapps exploit for php platform. Description: AIOCP 1.3.x - 'load_page' Remote File Inclusion. Author: laurent gaffie |
Analyze the security implications of: AIOCP 1.3.x - 'load_page' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: wget 1.9 - Directory Traversal | This is a remote exploit for multiple platform. Description: wget 1.9 - Directory Traversal. Author: jjminar |
Analyze the security implications of: wget 1.9 - Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: systemd (systemd-tmpfiles) < 236 - 'fs.protected_hardlinks=0' Local Privilege Escalation | This is a local exploit for linux platform. Description: systemd (systemd-tmpfiles) < 236 - 'fs.protected_hardlinks=0' Local Privilege Escalation. Author: Michael Orlitzky |
Analyze the security implications of: systemd (systemd-tmpfiles) < 236 - 'fs.protected_hardlinks=0' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Multiple Browsers - 'history.go()' Denial of Service | This is a dos exploit for osx platform. Description: Multiple Browsers - 'history.go()' Denial of Service. Author: Dr_IDE |
Analyze the security implications of: Multiple Browsers - 'history.go()' Denial of Service | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Absolute FAQ Manager 6.0 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Absolute FAQ Manager 6.0 - Insecure Cookie Handling. Author: Hakxer |
Analyze the security implications of: Absolute FAQ Manager 6.0 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cacheflow CacheOS 4.1.10016 - HTTP HOST Proxy | This is a remote exploit for multiple platform. Description: Cacheflow CacheOS 4.1.10016 - HTTP HOST Proxy. Author: Tim Kennedy |
Analyze the security implications of: Cacheflow CacheOS 4.1.10016 - HTTP HOST Proxy | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Drake CMS 0.3.7 - '404.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Drake CMS 0.3.7 - '404.php' Local File Inclusion. Author: HACKERS PAL |
Analyze the security implications of: Drake CMS 0.3.7 - '404.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DokuWiki 2006-03-09b - 'dwpage.php' System Disclosure | This is a webapps exploit for php platform. Description: DokuWiki 2006-03-09b - 'dwpage.php' System Disclosure. Author: rgod |
Analyze the security implications of: DokuWiki 2006-03-09b - 'dwpage.php' System Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco ASA 9.14.1.10 and FTD 6.6.0.1 - Path Traversal (2) | This is a webapps exploit for hardware platform. Description: Cisco ASA 9.14.1.10 and FTD 6.6.0.1 - Path Traversal (2). Author: Freakyclown |
Analyze the security implications of: Cisco ASA 9.14.1.10 and FTD 6.6.0.1 - Path Traversal (2) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: IPFire - CGI Web Interface (Authenticated) Bash Environment Variable Code Injection | This is a webapps exploit for cgi platform. Description: IPFire - CGI Web Interface (Authenticated) Bash Environment Variable Code Injection. Author: Claudio Viviani |
Analyze the security implications of: IPFire - CGI Web Interface (Authenticated) Bash Environment Variable Code Injection | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! Component Nice Talk 0.9.3 - 'tagid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Nice Talk 0.9.3 - 'tagid' SQL Injection. Author: ajann |
Analyze the security implications of: Joomla! Component Nice Talk 0.9.3 - 'tagid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CodeBlocks 12.11 (OSX) - Crash (PoC) | This is a dos exploit for osx platform. Description: CodeBlocks 12.11 (OSX) - Crash (PoC). Author: ariarat |
Analyze the security implications of: CodeBlocks 12.11 (OSX) - Crash (PoC) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: A2CMS - 'index.php' Local File Disclosure | This is a webapps exploit for php platform. Description: A2CMS - 'index.php' Local File Disclosure. Author: St493r |
Analyze the security implications of: A2CMS - 'index.php' Local File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Winace UnAce 2.2 - Command Line Argument Buffer Overflow (1) | This is a remote exploit for linux platform. Description: Winace UnAce 2.2 - Command Line Argument Buffer Overflow (1). Author: demz |
Analyze the security implications of: Winace UnAce 2.2 - Command Line Argument Buffer Overflow (1) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Google Android - Inter-process munmap in android.util.MemoryIntArray | This is a dos exploit for android platform. Description: Google Android - Inter-process munmap in android.util.MemoryIntArray. Author: Google Security Research |
Analyze the security implications of: Google Android - Inter-process munmap in android.util.MemoryIntArray | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: S.u.S.E Linux 5.2 - 'lpc' Local Privilege Escalation | This is a local exploit for linux platform. Description: S.u.S.E Linux 5.2 - 'lpc' Local Privilege Escalation. Author: xnec |
Analyze the security implications of: S.u.S.E Linux 5.2 - 'lpc' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple Mac OSX 10.4.8 - UDIF Disk Image Remote Denial of Service | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.4.8 - UDIF Disk Image Remote Denial of Service. Author: LMH |
Analyze the security implications of: Apple Mac OSX 10.4.8 - UDIF Disk Image Remote Denial of Service | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Active Auction Pro 7.1 - 'default.asp?catid' SQL Injection | This is a webapps exploit for asp platform. Description: Active Auction Pro 7.1 - 'default.asp?catid' SQL Injection. Author: CyberGhost |
Analyze the security implications of: Active Auction Pro 7.1 - 'default.asp?catid' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Polycom ViaVideo 2.2/3.0 - Denial of Service | This is a dos exploit for hardware platform. Description: Polycom ViaVideo 2.2/3.0 - Denial of Service. Author: prophecy.net.nz |
Analyze the security implications of: Polycom ViaVideo 2.2/3.0 - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: EasyService Billing 1.0 - 'p1' SQL Injection | This is a webapps exploit for php platform. Description: EasyService Billing 1.0 - 'p1' SQL Injection. Author: AkkuS |
Analyze the security implications of: EasyService Billing 1.0 - 'p1' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Blog:CMS 4.1 - 'Thumb.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Blog:CMS 4.1 - 'Thumb.php' Remote File Inclusion. Author: EllipSiS Security |
Analyze the security implications of: Blog:CMS 4.1 - 'Thumb.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EZsneezyCal CMS 95.1-95.2 - Remote File Inclusion | This is a webapps exploit for php platform. Description: EZsneezyCal CMS 95.1-95.2 - Remote File Inclusion. Author: kaMtiEz |
Analyze the security implications of: EZsneezyCal CMS 95.1-95.2 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASPMForum - 'kullanicilistesi.asp?harf' SQL Injection | This is a webapps exploit for asp platform. Description: ASPMForum - 'kullanicilistesi.asp?harf' SQL Injection. Author: dj_eyes2005 |
Analyze the security implications of: ASPMForum - 'kullanicilistesi.asp?harf' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: LibTIFF - 'td_stripbytecount' Null Pointer Dereference Remote Denial of Service | This is a dos exploit for linux platform. Description: LibTIFF - 'td_stripbytecount' Null Pointer Dereference Remote Denial of Service. Author: Tomas Hoger |
Analyze the security implications of: LibTIFF - 'td_stripbytecount' Null Pointer Dereference Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BigTree CMS 4.0 RC2 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: BigTree CMS 4.0 RC2 - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: BigTree CMS 4.0 RC2 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.