input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple Mac OSX 10.3.7 - 'mRouter' Local Privilege Escalation | This is a local exploit for osx platform. Description: Apple Mac OSX 10.3.7 - 'mRouter' Local Privilege Escalation. Author: nemo |
Analyze the security implications of: Apple Mac OSX 10.3.7 - 'mRouter' Local Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Coppermine 1.4.4 - 'index.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Coppermine 1.4.4 - 'index.php' Local File Inclusion. Author: imei |
Analyze the security implications of: Coppermine 1.4.4 - 'index.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FlashGameScript 1.7 - 'user' SQL Injection | This is a webapps exploit for php platform. Description: FlashGameScript 1.7 - 'user' SQL Injection. Author: Xenduer77 |
Analyze the security implications of: FlashGameScript 1.7 - 'user' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ISP Site Man - 'admin_login.asp' SQL Injection | This is a webapps exploit for asp platform. Description: ISP Site Man - 'admin_login.asp' SQL Injection. Author: s3rv3r_hack3r |
Analyze the security implications of: ISP Site Man - 'admin_login.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Artmedic Links 5.0 - 'index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Artmedic Links 5.0 - 'index.php' Remote File Inclusion. Author: botan |
Analyze the security implications of: Artmedic Links 5.0 - 'index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AJchat 0.10 - 'unse' SQL Injection | This is a webapps exploit for php platform. Description: AJchat 0.10 - 'unse' SQL Injection. Author: Eugene Minaev |
Analyze the security implications of: AJchat 0.10 - 'unse' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ILIAS Lms 3.9.9/3.10.7 - Arbitrary Edition / Information Disclosure | This is a webapps exploit for php platform. Description: ILIAS Lms 3.9.9/3.10.7 - Arbitrary Edition / Information Disclosure. Author: YEnH4ckEr |
Analyze the security implications of: ILIAS Lms 3.9.9/3.10.7 - Arbitrary Edition / Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ZeroShell 'cgi-bin/kerbynet' - Local File Disclosure | This is a webapps exploit for linux platform. Description: ZeroShell 'cgi-bin/kerbynet' - Local File Disclosure. Author: Yann CAM |
Analyze the security implications of: ZeroShell 'cgi-bin/kerbynet' - Local File Disclosure | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GLLCTS2 - 'sort' Blind SQL Injection | This is a webapps exploit for php platform. Description: GLLCTS2 - 'sort' Blind SQL Injection. Author: anonymous |
Analyze the security implications of: GLLCTS2 - 'sort' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Trendnet Camera (Multiple Products) - Remote Security Bypass | This is a remote exploit for hardware platform. Description: Trendnet Camera (Multiple Products) - Remote Security Bypass. Author: console-cowboys |
Analyze the security implications of: Trendnet Camera (Multiple Products) - Remote Security Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Hostel Management System 2.0 - 'id' SQL Injection (Unauthenticated) | This is a webapps exploit for php platform. Description: Hostel Management System 2.0 - 'id' SQL Injection (Unauthenticated). Author: Enesdex |
Analyze the security implications of: Hostel Management System 2.0 - 'id' SQL Injection (Unauthenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel - 'mincore()' Uninitialized Kernel Heap Page Disclosure | This is a dos exploit for linux platform. Description: Linux Kernel - 'mincore()' Uninitialized Kernel Heap Page Disclosure. Author: Google Security Research |
Analyze the security implications of: Linux Kernel - 'mincore()' Uninitialized Kernel Heap Page Disclosure | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ReQuest Serious Play Media Player 3.0 - Directory Traversal File Disclosure | This is a webapps exploit for hardware platform. Description: ReQuest Serious Play Media Player 3.0 - Directory Traversal File Disclosure. Author: LiquidWorm |
Analyze the security implications of: ReQuest Serious Play Media Player 3.0 - Directory Traversal File Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Aero CMS v0.0.1 - SQL Injection (no auth) | This is a webapps exploit for php platform. Description: Aero CMS v0.0.1 - SQL Injection (no auth). Author: Hubert Wojciechowski |
Analyze the security implications of: Aero CMS v0.0.1 - SQL Injection (no auth) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RedHat Directory Server 7.1 - Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for linux platform. Description: RedHat Directory Server 7.1 - Multiple Cross-Site Scripting Vulnerabilities. Author: Kaushal Desai |
Analyze the security implications of: RedHat Directory Server 7.1 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SurfControl SuperScout Email Filter 3.5 - 'MsgError.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: SurfControl SuperScout Email Filter 3.5 - 'MsgError.asp' Cross-Site Scripting. Author: ken@FTU |
Analyze the security implications of: SurfControl SuperScout Email Filter 3.5 - 'MsgError.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Mambo Component 'com_fq' - 'listid' SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component 'com_fq' - 'listid' SQL Injection. Author: S@BUN |
Analyze the security implications of: Mambo Component 'com_fq' - 'listid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linksys Devices 1.42/1.43 - 'GET' Buffer Overflow (PoC) | This is a dos exploit for hardware platform. Description: Linksys Devices 1.42/1.43 - 'GET' Buffer Overflow (PoC). Author: Core Security |
Analyze the security implications of: Linksys Devices 1.42/1.43 - 'GET' Buffer Overflow (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AneCMS 1.3 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: AneCMS 1.3 - Persistent Cross-Site Scripting. Author: Penguin |
Analyze the security implications of: AneCMS 1.3 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: gf-3xplorer 2.4 - Cross-Site Scripting / Local File Inclusion | This is a webapps exploit for php platform. Description: gf-3xplorer 2.4 - Cross-Site Scripting / Local File Inclusion. Author: MhZ91 |
Analyze the security implications of: gf-3xplorer 2.4 - Cross-Site Scripting / Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco IOS 10/11/12 - UDP Echo Service Memory Disclosure | This is a dos exploit for hardware platform. Description: Cisco IOS 10/11/12 - UDP Echo Service Memory Disclosure. Author: FX |
Analyze the security implications of: Cisco IOS 10/11/12 - UDP Echo Service Memory Disclosure | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Consumer Review Script 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Consumer Review Script 1.0 - SQL Injection. Author: 8bitsec |
Analyze the security implications of: Consumer Review Script 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component VirtueMart Joomla! eCommerce Edition 1.0.11 - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component VirtueMart Joomla! eCommerce Edition 1.0.11 - Multiple Input Validation Vulnerabilities. Author: Adrian Castro |
Analyze the security implications of: Joomla! Component VirtueMart Joomla! eCommerce Edition 1.0.11 - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Axigen 5.0.2 - AXIMilter Remote Format String | This is a remote exploit for linux platform. Description: Axigen 5.0.2 - AXIMilter Remote Format String. Author: hempel |
Analyze the security implications of: Axigen 5.0.2 - AXIMilter Remote Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Ubuntu 6.06 - DHCPd Remote Denial of Service | This is a dos exploit for multiple platform. Description: Ubuntu 6.06 - DHCPd Remote Denial of Service. Author: RoMaNSoFt |
Analyze the security implications of: Ubuntu 6.06 - DHCPd Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Monkey HTTP Daemon 0.4/0.5/0.6 - Excessive POST Data Buffer Overflow | This is a dos exploit for linux platform. Description: Monkey HTTP Daemon 0.4/0.5/0.6 - Excessive POST Data Buffer Overflow. Author: Matthew Murphy |
Analyze the security implications of: Monkey HTTP Daemon 0.4/0.5/0.6 - Excessive POST Data Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: D-Link DIR-615 - Privilege Escalation | This is a webapps exploit for hardware platform. Description: D-Link DIR-615 - Privilege Escalation. Author: Sanyam Chawla |
Analyze the security implications of: D-Link DIR-615 - Privilege Escalation | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PuTTY < 0.68 - 'ssh_agent_channel_data' Integer Overflow Heap Corruption | This is a dos exploit for linux platform. Description: PuTTY < 0.68 - 'ssh_agent_channel_data' Integer Overflow Heap Corruption. Author: Tim Kosse |
Analyze the security implications of: PuTTY < 0.68 - 'ssh_agent_channel_data' Integer Overflow Heap Corruption | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: College Management System 1.0 - 'course_code' SQL Injection (Authenticated) | This is a webapps exploit for php platform. Description: College Management System 1.0 - 'course_code' SQL Injection (Authenticated). Author: Eren Gozaydin |
Analyze the security implications of: College Management System 1.0 - 'course_code' SQL Injection (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP JetAdmin 6.0 - Printing Denial of Service | This is a dos exploit for multiple platform. Description: HP JetAdmin 6.0 - Printing Denial of Service. Author: Ussr Labs |
Analyze the security implications of: HP JetAdmin 6.0 - Printing Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache Struts - 'ParametersInterceptor' Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Apache Struts - 'ParametersInterceptor' Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Apache Struts - 'ParametersInterceptor' Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cyberoam UTM 10 - 'tableid' SQL Injection | This is a webapps exploit for php platform. Description: Cyberoam UTM 10 - 'tableid' SQL Injection. Author: Benjamin Kunz Mejri |
Analyze the security implications of: Cyberoam UTM 10 - 'tableid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component OneVote! 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component OneVote! 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component OneVote! 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.