input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: TCPDump 3.x - Malformed ISAKMP Packet Denial of Service | This is a dos exploit for linux platform. Description: TCPDump 3.x - Malformed ISAKMP Packet Denial of Service. Author: The Salvia Twist |
Analyze the security implications of: TCPDump 3.x - Malformed ISAKMP Packet Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple Mac OSX 10.9.x - sysmond XPC Privilege Escalation | This is a local exploit for osx platform. Description: Apple Mac OSX 10.9.x - sysmond XPC Privilege Escalation. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX 10.9.x - sysmond XPC Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Cisco Small Business 220 Series - Multiple Vulnerabilities | This is a remote exploit for hardware platform. Description: Cisco Small Business 220 Series - Multiple Vulnerabilities. Author: bashis |
Analyze the security implications of: Cisco Small Business 220 Series - Multiple Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: MySQL - yaSSL CertDecoder::GetName Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: MySQL - yaSSL CertDecoder::GetName Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: MySQL - yaSSL CertDecoder::GetName Buffer Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: JRuby Sandbox 0.2.2 - Sandbox Escape | This is a local exploit for linux platform. Description: JRuby Sandbox 0.2.2 - Sandbox Escape. Author: joernchen |
Analyze the security implications of: JRuby Sandbox 0.2.2 - Sandbox Escape | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: EZ Publish 2.2.7/3.0 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: EZ Publish 2.2.7/3.0 - Multiple Cross-Site Scripting Vulnerabilities. Author: gregory Le Bras |
Analyze the security implications of: EZ Publish 2.2.7/3.0 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GraphicsClone Script - 'term' Cross-Site Scripting | This is a webapps exploit for php platform. Description: GraphicsClone Script - 'term' Cross-Site Scripting. Author: Mr.PaPaRoSSe |
Analyze the security implications of: GraphicsClone Script - 'term' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: INNEO Startup TOOLS 2018 M040 13.0.70.3804 - Remote Code Execution | This is a webapps exploit for multiple platform. Description: INNEO Startup TOOLS 2018 M040 13.0.70.3804 - Remote Code Execution. Author: Patrick Hener |
Analyze the security implications of: INNEO Startup TOOLS 2018 M040 13.0.70.3804 - Remote Code Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: dm FileManager 3.9.4 - Remote File Inclusion | This is a webapps exploit for php platform. Description: dm FileManager 3.9.4 - Remote File Inclusion. Author: Septemb0x |
Analyze the security implications of: dm FileManager 3.9.4 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alstrasoft Forum - 'cat' SQL Injection | This is a webapps exploit for php platform. Description: Alstrasoft Forum - 'cat' SQL Injection. Author: r45c4l |
Analyze the security implications of: Alstrasoft Forum - 'cat' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kartli Alisveris Sistemi 1.0 - SQL Injection | This is a webapps exploit for asp platform. Description: Kartli Alisveris Sistemi 1.0 - SQL Injection. Author: kerem125 |
Analyze the security implications of: Kartli Alisveris Sistemi 1.0 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: QK SMTP Server - Malformed Commands Multiple Remote Denial of Service Vulnerabilities | This is a dos exploit for multiple platform. Description: QK SMTP Server - Malformed Commands Multiple Remote Denial of Service Vulnerabilities. Author: Juan Pablo Lopez Yacubian |
Analyze the security implications of: QK SMTP Server - Malformed Commands Multiple Remote Denial of Service Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DCP-Portal 3.7/4.x/5.x - 'announcement.php?cid' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DCP-Portal 3.7/4.x/5.x - 'announcement.php?cid' Cross-Site Scripting. Author: Alexander Antipov |
Analyze the security implications of: DCP-Portal 3.7/4.x/5.x - 'announcement.php?cid' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_avosbillets - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_avosbillets - Blind SQL Injection. Author: Pyske |
Analyze the security implications of: Joomla! Component com_avosbillets - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BT-sondage 1.12 - 'gestion_sondage.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: BT-sondage 1.12 - 'gestion_sondage.php' Remote File Inclusion. Author: Crackers_Child |
Analyze the security implications of: BT-sondage 1.12 - 'gestion_sondage.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gravity Board X 1.1 - 'csscontent' Remote Code Execution | This is a webapps exploit for php platform. Description: Gravity Board X 1.1 - 'csscontent' Remote Code Execution. Author: RusH |
Analyze the security implications of: Gravity Board X 1.1 - 'csscontent' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Liquid-Silver CMS 0.1 - 'update' Local File Inclusion | This is a webapps exploit for php platform. Description: Liquid-Silver CMS 0.1 - 'update' Local File Inclusion. Author: Stack |
Analyze the security implications of: Liquid-Silver CMS 0.1 - 'update' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash - ATF Processing Heap Overflow | This is a dos exploit for multiple platform. Description: Adobe Flash - ATF Processing Heap Overflow. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - ATF Processing Heap Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: JW Player - 'logo.link' Cross-Site Scripting | This is a webapps exploit for php platform. Description: JW Player - 'logo.link' Cross-Site Scripting. Author: MustLive |
Analyze the security implications of: JW Player - 'logo.link' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Forum 5 - 'pm.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Forum 5 - 'pm.php' Local File Inclusion. Author: rgod |
Analyze the security implications of: Forum 5 - 'pm.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Itech Job Portal Script 9.11 - Authentication Bypass | This is a webapps exploit for php platform. Description: Itech Job Portal Script 9.11 - Authentication Bypass. Author: Dawid Morawski |
Analyze the security implications of: Itech Job Portal Script 9.11 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sun JRE/SDK 1.x - Untrusted Applet Java Security Model Violation | This is a local exploit for multiple platform. Description: Sun JRE/SDK 1.x - Untrusted Applet Java Security Model Violation. Author: Marc Schoenefeld |
Analyze the security implications of: Sun JRE/SDK 1.x - Untrusted Applet Java Security Model Violation | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: phpBB 2.0.13 - 'admin_styles.php' Remote Command Execution | This is a remote exploit for linux platform. Description: phpBB 2.0.13 - 'admin_styles.php' Remote Command Execution. Author: RusH |
Analyze the security implications of: phpBB 2.0.13 - 'admin_styles.php' Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Development Site Professional Liberal - Company Institutional SQL Injection | This is a webapps exploit for php platform. Description: Development Site Professional Liberal - Company Institutional SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: Development Site Professional Liberal - Company Institutional SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Safari - 'DateTimeFormat.format' Type Confusion | This is a dos exploit for multiple platform. Description: Apple Safari - 'DateTimeFormat.format' Type Confusion. Author: Google Security Research |
Analyze the security implications of: Apple Safari - 'DateTimeFormat.format' Type Confusion | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: OpenSSL 1.1.0 - Remote Client Denial of Service | This is a dos exploit for multiple platform. Description: OpenSSL 1.1.0 - Remote Client Denial of Service. Author: Guido Vranken |
Analyze the security implications of: OpenSSL 1.1.0 - Remote Client Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cisco Catalyst 2900 12.0 - '5.2'XU SNMP Empty UDP Packet Denial of Service | This is a dos exploit for hardware platform. Description: Cisco Catalyst 2900 12.0 - '5.2'XU SNMP Empty UDP Packet Denial of Service. Author: bashis |
Analyze the security implications of: Cisco Catalyst 2900 12.0 - '5.2'XU SNMP Empty UDP Packet Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CuteNews 1.4.6 - 'from_date_day' Full Path Disclosure | This is a webapps exploit for php platform. Description: CuteNews 1.4.6 - 'from_date_day' Full Path Disclosure. Author: Andrew Horton |
Analyze the security implications of: CuteNews 1.4.6 - 'from_date_day' Full Path Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Shutter 0.93.1 - Code Execution | This is a local exploit for linux platform. Description: Shutter 0.93.1 - Code Execution. Author: Prajith |
Analyze the security implications of: Shutter 0.93.1 - Code Execution | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ESPG (Enhanced Simple PHP Gallery) 1.72 - File Disclosure | This is a webapps exploit for php platform. Description: ESPG (Enhanced Simple PHP Gallery) 1.72 - File Disclosure. Author: bd0rk |
Analyze the security implications of: ESPG (Enhanced Simple PHP Gallery) 1.72 - File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Simple Traffic Offense System 1.0 - Stored Cross Site Scripting (XSS) | This is a webapps exploit for multiple platform. Description: Simple Traffic Offense System 1.0 - Stored Cross Site Scripting (XSS). Author: Barış Yıldızoğlu |
Analyze the security implications of: Simple Traffic Offense System 1.0 - Stored Cross Site Scripting (XSS) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: LibEXIF 0.6.x - Exif_Data_Load_Data_Entry Remote Integer Overflow | This is a dos exploit for linux platform. Description: LibEXIF 0.6.x - Exif_Data_Load_Data_Entry Remote Integer Overflow. Author: Victor Stinner |
Analyze the security implications of: LibEXIF 0.6.x - Exif_Data_Load_Data_Entry Remote Integer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: MariaDB Client 10.1.26 - Denial of Service (PoC) | This is a dos exploit for linux platform. Description: MariaDB Client 10.1.26 - Denial of Service (PoC). Author: strider |
Analyze the security implications of: MariaDB Client 10.1.26 - Denial of Service (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.