input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple WebKit - 'RenderLayer' Use-After-Free
|
This is a dos exploit for multiple platform. Description: Apple WebKit - 'RenderLayer' Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: Apple WebKit - 'RenderLayer' Use-After-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Wireshark - dissect_zcl_pwr_prof_pwrprofstatersp Static Out-of-Bounds Read
|
This is a dos exploit for multiple platform. Description: Wireshark - dissect_zcl_pwr_prof_pwrprofstatersp Static Out-of-Bounds Read. Author: Google Security Research
|
Analyze the security implications of: Wireshark - dissect_zcl_pwr_prof_pwrprofstatersp Static Out-of-Bounds Read
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: PISG 0.54 - IRC Nick HTML Injection
|
This is a remote exploit for multiple platform. Description: PISG 0.54 - IRC Nick HTML Injection. Author: shr3kst3r
|
Analyze the security implications of: PISG 0.54 - IRC Nick HTML Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ISC BIND 4.9.7/8.x - Traffic Amplification and NS Route Discovery
|
This is a remote exploit for multiple platform. Description: ISC BIND 4.9.7/8.x - Traffic Amplification and NS Route Discovery. Author: Sebastian
|
Analyze the security implications of: ISC BIND 4.9.7/8.x - Traffic Amplification and NS Route Discovery
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: F5 Firepass 4100 SSL VPN - Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: F5 Firepass 4100 SSL VPN - Cross-Site Scripting. Author: ILION Research
|
Analyze the security implications of: F5 Firepass 4100 SSL VPN - Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Zlib 1.1.4 - Compression Library 'gzprintf()' Buffer Overrun (1)
|
This is a dos exploit for linux platform. Description: Zlib 1.1.4 - Compression Library 'gzprintf()' Buffer Overrun (1). Author: Richard Kettlewel
|
Analyze the security implications of: Zlib 1.1.4 - Compression Library 'gzprintf()' Buffer Overrun (1)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Justdial Clone Script - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Justdial Clone Script - Authentication Bypass. Author: Ihsan Sencan
|
Analyze the security implications of: Justdial Clone Script - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: wywo inout board 1.0 - Multiple Vulnerabilities
|
This is a webapps exploit for asp platform. Description: wywo inout board 1.0 - Multiple Vulnerabilities. Author: ajann
|
Analyze the security implications of: wywo inout board 1.0 - Multiple Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Apple Safari 1.x/3.0.x / Firefox 1.5.0.x/2.0.x - JavaScript Multiple Fields Key Filterings
|
This is a remote exploit for multiple platform. Description: Apple Safari 1.x/3.0.x / Firefox 1.5.0.x/2.0.x - JavaScript Multiple Fields Key Filterings. Author: Carl Hardwick
|
Analyze the security implications of: Apple Safari 1.x/3.0.x / Firefox 1.5.0.x/2.0.x - JavaScript Multiple Fields Key Filterings
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CMSimple 4.4/4.4.2 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: CMSimple 4.4/4.4.2 - Remote File Inclusion. Author: NoGe
|
Analyze the security implications of: CMSimple 4.4/4.4.2 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mozilla Firefox - Location Bar Spoofing
|
This is a local exploit for multiple platform. Description: Mozilla Firefox - Location Bar Spoofing. Author: Jordi Chancel
|
Analyze the security implications of: Mozilla Firefox - Location Bar Spoofing
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ISearch 2.16 - 'ISEARCH_PATH' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: ISearch 2.16 - 'ISEARCH_PATH' Remote File Inclusion. Author: MoHaNdKo
|
Analyze the security implications of: ISearch 2.16 - 'ISEARCH_PATH' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Realtyna RPL 8.9.2 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Joomla! Component Realtyna RPL 8.9.2 - Multiple SQL Injections. Author: Bikramaditya Guha
|
Analyze the security implications of: Joomla! Component Realtyna RPL 8.9.2 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LogWatch 2.1.1/2.5 - Insecure Temporary Directory Creation
|
This is a local exploit for linux platform. Description: LogWatch 2.1.1/2.5 - Insecure Temporary Directory Creation. Author: spybreak
|
Analyze the security implications of: LogWatch 2.1.1/2.5 - Insecure Temporary Directory Creation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Caucho Technology Resin 1.2 - JSP Source Disclosure
|
This is a remote exploit for jsp platform. Description: Caucho Technology Resin 1.2 - JSP Source Disclosure. Author: benjurry
|
Analyze the security implications of: Caucho Technology Resin 1.2 - JSP Source Disclosure
|
This exploit targets jsp systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: CommPort 1.01 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: CommPort 1.01 - Multiple Vulnerabilities. Author: Jean Pascal Pereira
|
Analyze the security implications of: CommPort 1.01 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Invision Power Board 2.1 < 2.1.6 - SQL Injection (2)
|
This is a webapps exploit for php platform. Description: Invision Power Board 2.1 < 2.1.6 - SQL Injection (2). Author: w4g.not null
|
Analyze the security implications of: Invision Power Board 2.1 < 2.1.6 - SQL Injection (2)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: teTeX 1.0.7 - Filters Temporary File Race Condition
|
This is a local exploit for linux platform. Description: teTeX 1.0.7 - Filters Temporary File Race Condition. Author: zen-parse
|
Analyze the security implications of: teTeX 1.0.7 - Filters Temporary File Race Condition
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ProFTPd 1.2.9 RC1 - 'mod_sql' SQL Injection
|
This is a remote exploit for linux platform. Description: ProFTPd 1.2.9 RC1 - 'mod_sql' SQL Injection. Author: Spaine
|
Analyze the security implications of: ProFTPd 1.2.9 RC1 - 'mod_sql' SQL Injection
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Alienvault Open Source SIEM (OSSIM) - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Alienvault Open Source SIEM (OSSIM) - Multiple Cross-Site Scripting Vulnerabilities. Author: xistence
|
Analyze the security implications of: Alienvault Open Source SIEM (OSSIM) - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: aWebNews 1.2 - 'visview.php?_GET['cid']' SQL Injection
|
This is a webapps exploit for php platform. Description: aWebNews 1.2 - 'visview.php?_GET['cid']' SQL Injection. Author: Aliaksandr Hartsuyeu
|
Analyze the security implications of: aWebNews 1.2 - 'visview.php?_GET['cid']' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FTP Client 0.17-19build1 ACCT (Ubuntu 10.04) - Buffer Overflow (PoC)
|
This is a dos exploit for linux platform. Description: FTP Client 0.17-19build1 ACCT (Ubuntu 10.04) - Buffer Overflow (PoC). Author: d0lc3
|
Analyze the security implications of: FTP Client 0.17-19build1 ACCT (Ubuntu 10.04) - Buffer Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: PHP Captcha Security Images - Denial of Service
|
This is a dos exploit for php platform. Description: PHP Captcha Security Images - Denial of Service. Author: cp77fk4r
|
Analyze the security implications of: PHP Captcha Security Images - Denial of Service
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: e107 < 0.75 - GLOBALS Overwrite Remote Code Execution
|
This is a webapps exploit for php platform. Description: e107 < 0.75 - GLOBALS Overwrite Remote Code Execution. Author: rgod
|
Analyze the security implications of: e107 < 0.75 - GLOBALS Overwrite Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link TFTP 1.0 - Transporting Mode Remote Buffer Overflow
|
This is a remote exploit for hardware platform. Description: D-Link TFTP 1.0 - Transporting Mode Remote Buffer Overflow. Author: LSO
|
Analyze the security implications of: D-Link TFTP 1.0 - Transporting Mode Remote Buffer Overflow
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Sysax MultiServer 6.90 - Reflected Cross Site Scripting
|
This is a webapps exploit for multiple platform. Description: Sysax MultiServer 6.90 - Reflected Cross Site Scripting. Author: Luca Epifanio
|
Analyze the security implications of: Sysax MultiServer 6.90 - Reflected Cross Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Centrinity FirstClass 5.77 - Intranet Server Long Header Denial of Service
|
This is a dos exploit for multiple platform. Description: Centrinity FirstClass 5.77 - Intranet Server Long Header Denial of Service. Author: Adam Prime
|
Analyze the security implications of: Centrinity FirstClass 5.77 - Intranet Server Long Header Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Sonicwall < 8.1.0.2-14sv - 'sitecustomization.cgi' Command Injection (Metasploit)
|
This is a webapps exploit for cgi platform. Description: Sonicwall < 8.1.0.2-14sv - 'sitecustomization.cgi' Command Injection (Metasploit). Author: xort
|
Analyze the security implications of: Sonicwall < 8.1.0.2-14sv - 'sitecustomization.cgi' Command Injection (Metasploit)
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Blogator-script 0.95 - Change User Password
|
This is a webapps exploit for php platform. Description: Blogator-script 0.95 - Change User Password. Author: Virangar Security
|
Analyze the security implications of: Blogator-script 0.95 - Change User Password
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Compface 1.5.2 - '.xbm' Local Buffer Overflow (PoC)
|
This is a dos exploit for linux platform. Description: Compface 1.5.2 - '.xbm' Local Buffer Overflow (PoC). Author: metalhoney
|
Analyze the security implications of: Compface 1.5.2 - '.xbm' Local Buffer Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Novell Groupwise 6.5 Webaccess - HTML Injection
|
This is a webapps exploit for java platform. Description: Novell Groupwise 6.5 Webaccess - HTML Injection. Author: Francisco Amato
|
Analyze the security implications of: Novell Groupwise 6.5 Webaccess - HTML Injection
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: bzexe (bzip2) - Race Condition
|
This is a local exploit for linux platform. Description: bzexe (bzip2) - Race Condition. Author: vladz
|
Analyze the security implications of: bzexe (bzip2) - Race Condition
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Entertainment Directory 1.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: Entertainment Directory 1.1 - SQL Injection. Author: t0pP8uZz
|
Analyze the security implications of: Entertainment Directory 1.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.