input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 3.0.0 - 'perf_count_sw_cpu_clock' event Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 3.0.0 - 'perf_count_sw_cpu_clock' event Denial of Service. Author: Vince Weaver |
Analyze the security implications of: Linux Kernel 3.0.0 - 'perf_count_sw_cpu_clock' event Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_acteammember - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_acteammember - SQL Injection. Author: ALTBTA |
Analyze the security implications of: Joomla! Component com_acteammember - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jenkins - XStream Groovy classpath Deserialization (Metasploit) | This is a remote exploit for multiple platform. Description: Jenkins - XStream Groovy classpath Deserialization (Metasploit). Author: Metasploit |
Analyze the security implications of: Jenkins - XStream Groovy classpath Deserialization (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Novell Groupwise Internet Agent - IMAP 'LIST' Remote Code Execution | This is a dos exploit for linux platform. Description: Novell Groupwise Internet Agent - IMAP 'LIST' Remote Code Execution. Author: Francis Provencher |
Analyze the security implications of: Novell Groupwise Internet Agent - IMAP 'LIST' Remote Code Execution | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: TP-Link TL-WR840N - Denial of Service | This is a dos exploit for hardware platform. Description: TP-Link TL-WR840N - Denial of Service. Author: Aniket Dinda |
Analyze the security implications of: TP-Link TL-WR840N - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Firebook - 'index.html' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Firebook - 'index.html' Cross-Site Scripting. Author: MustLive |
Analyze the security implications of: Firebook - 'index.html' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Liferay Portal Enterprise 3.6.1 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Liferay Portal Enterprise 3.6.1 - Multiple Cross-Site Scripting Vulnerabilities. Author: r0t3d3Vil |
Analyze the security implications of: Liferay Portal Enterprise 3.6.1 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: In-portal 4.3.1 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: In-portal 4.3.1 - Arbitrary File Upload. Author: Mr.tro0oqy |
Analyze the security implications of: In-portal 4.3.1 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Roxio Toast 7 - DejaVu Component PATH Variable Privilege Escalation | This is a local exploit for linux platform. Description: Roxio Toast 7 - DejaVu Component PATH Variable Privilege Escalation. Author: Netragard |
Analyze the security implications of: Roxio Toast 7 - DejaVu Component PATH Variable Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Delta Controls enteliTOUCH 3.40.3935 - Cross-Site Request Forgery (CSRF) | This is a remote exploit for hardware platform. Description: Delta Controls enteliTOUCH 3.40.3935 - Cross-Site Request Forgery (CSRF). Author: LiquidWorm |
Analyze the security implications of: Delta Controls enteliTOUCH 3.40.3935 - Cross-Site Request Forgery (CSRF) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Banner Ad Management Script - SQL Injection | This is a webapps exploit for php platform. Description: Banner Ad Management Script - SQL Injection. Author: Egyptian.H4x0rz |
Analyze the security implications of: Banner Ad Management Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: presto! pagemanager 9.01 - Multiple Vulnerabilities | This is a dos exploit for multiple platform. Description: presto! pagemanager 9.01 - Multiple Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: presto! pagemanager 9.01 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SmbClientParser 2.7 Perl Module - Remote Command Execution | This is a remote exploit for multiple platform. Description: SmbClientParser 2.7 Perl Module - Remote Command Execution. Author: Jesus Olmos Gonzalez |
Analyze the security implications of: SmbClientParser 2.7 Perl Module - Remote Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Digital Scribe 1.4.1 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Digital Scribe 1.4.1 - Multiple SQL Injections. Author: Salvatore Fresta |
Analyze the security implications of: Digital Scribe 1.4.1 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wireless Drive 1.1.0 iOS - Multiple Web Vulnerabilities | This is a webapps exploit for ios platform. Description: Wireless Drive 1.1.0 iOS - Multiple Web Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Wireless Drive 1.1.0 iOS - Multiple Web Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: ABRT - 'raceabrt' Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: ABRT - 'raceabrt' Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: ABRT - 'raceabrt' Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BlackNova Traders - 'news.php' SQL Injection | This is a webapps exploit for php platform. Description: BlackNova Traders - 'news.php' SQL Injection. Author: ITTIHACK |
Analyze the security implications of: BlackNova Traders - 'news.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ClanSphere 2007.4 - 'cat_id' SQL Injection | This is a webapps exploit for php platform. Description: ClanSphere 2007.4 - 'cat_id' SQL Injection. Author: IHTeam |
Analyze the security implications of: ClanSphere 2007.4 - 'cat_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Smart Survey 1.0 - 'surveyresults.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Smart Survey 1.0 - 'surveyresults.asp' Cross-Site Scripting. Author: Bug Researchers Group |
Analyze the security implications of: Smart Survey 1.0 - 'surveyresults.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: xweblog 2.1 - 'kategori.asp' SQL Injection | This is a webapps exploit for asp platform. Description: xweblog 2.1 - 'kategori.asp' SQL Injection. Author: Muhacir |
Analyze the security implications of: xweblog 2.1 - 'kategori.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Loftek Nexus 543 IP Cameras - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Loftek Nexus 543 IP Cameras - Multiple Vulnerabilities. Author: Craig Young |
Analyze the security implications of: Loftek Nexus 543 IP Cameras - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: EasyGuppy 4.5.4/4.5.5 - 'Printfaq.php' Directory Traversal | This is a webapps exploit for php platform. Description: EasyGuppy 4.5.4/4.5.5 - 'Printfaq.php' Directory Traversal. Author: Josh Zlatin-Amishav |
Analyze the security implications of: EasyGuppy 4.5.4/4.5.5 - 'Printfaq.php' Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ProductCart 1.x/2.x - 'Custva.asp?redirectUrl' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: ProductCart 1.x/2.x - 'Custva.asp?redirectUrl' Cross-Site Scripting. Author: Nick Gudov |
Analyze the security implications of: ProductCart 1.x/2.x - 'Custva.asp?redirectUrl' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Windowmaker wmmon 1.0 b2 - Command Execution | This is a local exploit for freebsd platform. Description: Windowmaker wmmon 1.0 b2 - Command Execution. Author: Steve Reid |
Analyze the security implications of: Windowmaker wmmon 1.0 b2 - Command Execution | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Fotoshow PRO - 'category' SQL Injection | This is a webapps exploit for php platform. Description: Fotoshow PRO - 'category' SQL Injection. Author: darkmasking |
Analyze the security implications of: Fotoshow PRO - 'category' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flatnux 2010-06.09 - 'find' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Flatnux 2010-06.09 - 'find' Cross-Site Scripting. Author: ITSecTeam |
Analyze the security implications of: Flatnux 2010-06.09 - 'find' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM AIX 4.2.1 - 'snap' Insecure Temporary File Creation | This is a local exploit for aix platform. Description: IBM AIX 4.2.1 - 'snap' Insecure Temporary File Creation. Author: Larry W. Cashdollar |
Analyze the security implications of: IBM AIX 4.2.1 - 'snap' Insecure Temporary File Creation | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Back-End CMS 0.7.2.1 - 'jpcache.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Back-End CMS 0.7.2.1 - 'jpcache.php' Remote File Inclusion. Author: Federico Fazzi |
Analyze the security implications of: Back-End CMS 0.7.2.1 - 'jpcache.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Etoshop B2B Vertical Marketplace Creator - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Etoshop B2B Vertical Marketplace Creator - Multiple SQL Injections. Author: R3d-D3V!L |
Analyze the security implications of: Etoshop B2B Vertical Marketplace Creator - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: @Mail 6.1.9 - 'MailType' Cross-Site Scripting | This is a webapps exploit for php platform. Description: @Mail 6.1.9 - 'MailType' Cross-Site Scripting. Author: Vicente Aguilera Diaz |
Analyze the security implications of: @Mail 6.1.9 - 'MailType' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Power Board Dragoran Portal Mod 1.3 - SQL Injection | This is a webapps exploit for php platform. Description: Invision Power Board Dragoran Portal Mod 1.3 - SQL Injection. Author: SkOd |
Analyze the security implications of: Invision Power Board Dragoran Portal Mod 1.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: gSOAP 2.8 - Directory Traversal | This is a webapps exploit for php platform. Description: gSOAP 2.8 - Directory Traversal. Author: numan türle |
Analyze the security implications of: gSOAP 2.8 - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PSArt 1.2 - SQL Injection | This is a webapps exploit for asp platform. Description: PSArt 1.2 - SQL Injection. Author: Securitylab Research |
Analyze the security implications of: PSArt 1.2 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.