input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: SuSE Linux 6.4/7.0/7.1/7.2 Berkeley Parallel Make - Shell Definition Format String | This is a local exploit for linux platform. Description: SuSE Linux 6.4/7.0/7.1/7.2 Berkeley Parallel Make - Shell Definition Format String. Author: IhaQueR@IRCnet |
Analyze the security implications of: SuSE Linux 6.4/7.0/7.1/7.2 Berkeley Parallel Make - Shell Definition Format String | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Lanai Core 0.6 - Remote File Disclosure / Info Disclosure | This is a webapps exploit for php platform. Description: Lanai Core 0.6 - Remote File Disclosure / Info Disclosure. Author: Khashayar Fereidani |
Analyze the security implications of: Lanai Core 0.6 - Remote File Disclosure / Info Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: UPNPD M-SEARCH - ssdp:discover Reflection Denial of Service | This is a dos exploit for multiple platform. Description: UPNPD M-SEARCH - ssdp:discover Reflection Denial of Service. Author: Todor Donev |
Analyze the security implications of: UPNPD M-SEARCH - ssdp:discover Reflection Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: IPTBB 0.5.6 - 'act' Local File Inclusion | This is a webapps exploit for php platform. Description: IPTBB 0.5.6 - 'act' Local File Inclusion. Author: storm |
Analyze the security implications of: IPTBB 0.5.6 - 'act' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MPlayer 0.9/1.0 - Streaming ASX Header Parsing Buffer Overrun | This is a remote exploit for linux platform. Description: MPlayer 0.9/1.0 - Streaming ASX Header Parsing Buffer Overrun. Author: Otero Hernan |
Analyze the security implications of: MPlayer 0.9/1.0 - Streaming ASX Header Parsing Buffer Overrun | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: douran portal 3.9.0.23 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: douran portal 3.9.0.23 - Multiple Vulnerabilities. Author: Abysssec |
Analyze the security implications of: douran portal 3.9.0.23 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Planetmoon - Guestbook Clear Text Password Retrieval | This is a webapps exploit for cgi platform. Description: Planetmoon - Guestbook Clear Text Password Retrieval. Author: subj |
Analyze the security implications of: Planetmoon - Guestbook Clear Text Password Retrieval | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Linux - 'kvm_ioctl_create_device()' NULL Pointer Dereference | This is a dos exploit for linux platform. Description: Linux - 'kvm_ioctl_create_device()' NULL Pointer Dereference. Author: Google Security Research |
Analyze the security implications of: Linux - 'kvm_ioctl_create_device()' NULL Pointer Dereference | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Magento < 2.0.6 - Arbitrary Unserialize / Arbitrary Write File | This is a webapps exploit for php platform. Description: Magento < 2.0.6 - Arbitrary Unserialize / Arbitrary Write File. Author: agix |
Analyze the security implications of: Magento < 2.0.6 - Arbitrary Unserialize / Arbitrary Write File | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gafware CFXImage 1.6.4/1.6.6 - ShowTemp File Disclosure | This is a webapps exploit for cfm platform. Description: Gafware CFXImage 1.6.4/1.6.6 - ShowTemp File Disclosure. Author: Richard Brain |
Analyze the security implications of: Gafware CFXImage 1.6.4/1.6.6 - ShowTemp File Disclosure | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: AssoCIateD 1.4.4 - 'menu' Cross-Site Scripting | This is a webapps exploit for php platform. Description: AssoCIateD 1.4.4 - 'menu' Cross-Site Scripting. Author: CWH Underground |
Analyze the security implications of: AssoCIateD 1.4.4 - 'menu' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eCan 0.1 - Local File Disclosure | This is a webapps exploit for php platform. Description: eCan 0.1 - Local File Disclosure. Author: GoLd_M |
Analyze the security implications of: eCan 0.1 - Local File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sitekit CMS 6.6 - 'Request-call-back.html?ClickFrom' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Sitekit CMS 6.6 - 'Request-call-back.html?ClickFrom' Cross-Site Scripting. Author: r0t3d3Vil |
Analyze the security implications of: Sitekit CMS 6.6 - 'Request-call-back.html?ClickFrom' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: WebKit - 'WebCore::AccessibilityNodeObject::textUnderElement' Use-After-Free | This is a dos exploit for multiple platform. Description: WebKit - 'WebCore::AccessibilityNodeObject::textUnderElement' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: WebKit - 'WebCore::AccessibilityNodeObject::textUnderElement' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SGI IRIX 6.4 - 'suid_exec' Local Privilege Escalation | This is a local exploit for irix platform. Description: SGI IRIX 6.4 - 'suid_exec' Local Privilege Escalation. Author: Yuri Volobuev |
Analyze the security implications of: SGI IRIX 6.4 - 'suid_exec' Local Privilege Escalation | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: GNUEDU 1.3b2 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: GNUEDU 1.3b2 - Multiple Remote File Inclusions. Author: GoLd_M |
Analyze the security implications of: GNUEDU 1.3b2 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: vBulletin 5.x - 'cacheTemplates' Remote Arbitrary File Deletion | This is a webapps exploit for multiple platform. Description: vBulletin 5.x - 'cacheTemplates' Remote Arbitrary File Deletion. Author: SecuriTeam |
Analyze the security implications of: vBulletin 5.x - 'cacheTemplates' Remote Arbitrary File Deletion | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cosign 2.0.1/2.9.4a - CGI Register Command Remote Authentication Bypass | This is a webapps exploit for cgi platform. Description: Cosign 2.0.1/2.9.4a - CGI Register Command Remote Authentication Bypass. Author: Jon Oberheide |
Analyze the security implications of: Cosign 2.0.1/2.9.4a - CGI Register Command Remote Authentication Bypass | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: OProfile 0.9.6 - 'opcontrol' Utility 'set_event()' Local Privilege Escalation | This is a local exploit for linux platform. Description: OProfile 0.9.6 - 'opcontrol' Utility 'set_event()' Local Privilege Escalation. Author: Stephane Chauveau |
Analyze the security implications of: OProfile 0.9.6 - 'opcontrol' Utility 'set_event()' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Vifi Radio 1.0 - Cross-Site Request Forgery | This is a webapps exploit for asp platform. Description: Vifi Radio 1.0 - Cross-Site Request Forgery. Author: KnocKout |
Analyze the security implications of: Vifi Radio 1.0 - Cross-Site Request Forgery | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Comus 2.0 - 'Accept.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Comus 2.0 - 'Accept.php' Remote File Inclusion. Author: alijsb |
Analyze the security implications of: Comus 2.0 - 'Accept.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cray UNICOS /etc/nu - '-c' Option Filename Processing Local Overflow | This is a local exploit for linux platform. Description: Cray UNICOS /etc/nu - '-c' Option Filename Processing Local Overflow. Author: Micheal Turner |
Analyze the security implications of: Cray UNICOS /etc/nu - '-c' Option Filename Processing Local Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ABB Cylon Aspect 3.08.01 - Arbitrary File Delete | This is a webapps exploit for php platform. Description: ABB Cylon Aspect 3.08.01 - Arbitrary File Delete. Author: LiquidWorm |
Analyze the security implications of: ABB Cylon Aspect 3.08.01 - Arbitrary File Delete | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: YOPS - Web Server Remote Command Execution | This is a remote exploit for linux platform. Description: YOPS - Web Server Remote Command Execution. Author: Rodrigo Escobar |
Analyze the security implications of: YOPS - Web Server Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Xtreme ASP Photo Gallery 2.0 - 'displaypic.asp?catname' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Xtreme ASP Photo Gallery 2.0 - 'displaypic.asp?catname' Cross-Site Scripting. Author: Aria-Security Team |
Analyze the security implications of: Xtreme ASP Photo Gallery 2.0 - 'displaypic.asp?catname' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: MIVA Merchant 5 - Merchant.MVC Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: MIVA Merchant 5 - Merchant.MVC Cross-Site Scripting. Author: admin@hyperconx.com |
Analyze the security implications of: MIVA Merchant 5 - Merchant.MVC Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: EggBlog 4.0 - SQL Injection | This is a webapps exploit for php platform. Description: EggBlog 4.0 - SQL Injection. Author: girex |
Analyze the security implications of: EggBlog 4.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP Application Lifestyle Management 11 - 'GetInstalledPackages' Local Privilege Escalation | This is a local exploit for linux platform. Description: HP Application Lifestyle Management 11 - 'GetInstalledPackages' Local Privilege Escalation. Author: anonymous |
Analyze the security implications of: HP Application Lifestyle Management 11 - 'GetInstalledPackages' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: RICOH MP C6503 Plus Printer - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: RICOH MP C6503 Plus Printer - Cross-Site Scripting. Author: Ismail Tasdelen |
Analyze the security implications of: RICOH MP C6503 Plus Printer - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Chipmunk NewsLetter - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Chipmunk NewsLetter - Cross-Site Request Forgery. Author: Milos Zivanovic |
Analyze the security implications of: Chipmunk NewsLetter - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Module Calendar (Agenda) 1.5.5 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Module Calendar (Agenda) 1.5.5 - Remote File Inclusion. Author: Cold Zero |
Analyze the security implications of: Mambo Module Calendar (Agenda) 1.5.5 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Autodealers CMS AutOnline - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Autodealers CMS AutOnline - 'id' SQL Injection. Author: ZoRLu |
Analyze the security implications of: Autodealers CMS AutOnline - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HiveMaker Directory 1.0.2 - 'cid' SQL Injection | This is a webapps exploit for php platform. Description: HiveMaker Directory 1.0.2 - 'cid' SQL Injection. Author: security fears team |
Analyze the security implications of: HiveMaker Directory 1.0.2 - 'cid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.