input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: TCPDump 3.x - Malformed ISAKMP Packet Denial of Service
|
This is a dos exploit for linux platform. Description: TCPDump 3.x - Malformed ISAKMP Packet Denial of Service. Author: The Salvia Twist
|
Analyze the security implications of: TCPDump 3.x - Malformed ISAKMP Packet Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apple Mac OSX 10.9.x - sysmond XPC Privilege Escalation
|
This is a local exploit for osx platform. Description: Apple Mac OSX 10.9.x - sysmond XPC Privilege Escalation. Author: Google Security Research
|
Analyze the security implications of: Apple Mac OSX 10.9.x - sysmond XPC Privilege Escalation
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Cisco Small Business 220 Series - Multiple Vulnerabilities
|
This is a remote exploit for hardware platform. Description: Cisco Small Business 220 Series - Multiple Vulnerabilities. Author: bashis
|
Analyze the security implications of: Cisco Small Business 220 Series - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: MySQL - yaSSL CertDecoder::GetName Buffer Overflow (Metasploit)
|
This is a remote exploit for linux platform. Description: MySQL - yaSSL CertDecoder::GetName Buffer Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: MySQL - yaSSL CertDecoder::GetName Buffer Overflow (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: JRuby Sandbox 0.2.2 - Sandbox Escape
|
This is a local exploit for linux platform. Description: JRuby Sandbox 0.2.2 - Sandbox Escape. Author: joernchen
|
Analyze the security implications of: JRuby Sandbox 0.2.2 - Sandbox Escape
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: EZ Publish 2.2.7/3.0 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: EZ Publish 2.2.7/3.0 - Multiple Cross-Site Scripting Vulnerabilities. Author: gregory Le Bras
|
Analyze the security implications of: EZ Publish 2.2.7/3.0 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GraphicsClone Script - 'term' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: GraphicsClone Script - 'term' Cross-Site Scripting. Author: Mr.PaPaRoSSe
|
Analyze the security implications of: GraphicsClone Script - 'term' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: INNEO Startup TOOLS 2018 M040 13.0.70.3804 - Remote Code Execution
|
This is a webapps exploit for multiple platform. Description: INNEO Startup TOOLS 2018 M040 13.0.70.3804 - Remote Code Execution. Author: Patrick Hener
|
Analyze the security implications of: INNEO Startup TOOLS 2018 M040 13.0.70.3804 - Remote Code Execution
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: dm FileManager 3.9.4 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: dm FileManager 3.9.4 - Remote File Inclusion. Author: Septemb0x
|
Analyze the security implications of: dm FileManager 3.9.4 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alstrasoft Forum - 'cat' SQL Injection
|
This is a webapps exploit for php platform. Description: Alstrasoft Forum - 'cat' SQL Injection. Author: r45c4l
|
Analyze the security implications of: Alstrasoft Forum - 'cat' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Kartli Alisveris Sistemi 1.0 - SQL Injection
|
This is a webapps exploit for asp platform. Description: Kartli Alisveris Sistemi 1.0 - SQL Injection. Author: kerem125
|
Analyze the security implications of: Kartli Alisveris Sistemi 1.0 - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: QK SMTP Server - Malformed Commands Multiple Remote Denial of Service Vulnerabilities
|
This is a dos exploit for multiple platform. Description: QK SMTP Server - Malformed Commands Multiple Remote Denial of Service Vulnerabilities. Author: Juan Pablo Lopez Yacubian
|
Analyze the security implications of: QK SMTP Server - Malformed Commands Multiple Remote Denial of Service Vulnerabilities
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: DCP-Portal 3.7/4.x/5.x - 'announcement.php?cid' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DCP-Portal 3.7/4.x/5.x - 'announcement.php?cid' Cross-Site Scripting. Author: Alexander Antipov
|
Analyze the security implications of: DCP-Portal 3.7/4.x/5.x - 'announcement.php?cid' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_avosbillets - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_avosbillets - Blind SQL Injection. Author: Pyske
|
Analyze the security implications of: Joomla! Component com_avosbillets - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BT-sondage 1.12 - 'gestion_sondage.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: BT-sondage 1.12 - 'gestion_sondage.php' Remote File Inclusion. Author: Crackers_Child
|
Analyze the security implications of: BT-sondage 1.12 - 'gestion_sondage.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gravity Board X 1.1 - 'csscontent' Remote Code Execution
|
This is a webapps exploit for php platform. Description: Gravity Board X 1.1 - 'csscontent' Remote Code Execution. Author: RusH
|
Analyze the security implications of: Gravity Board X 1.1 - 'csscontent' Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Liquid-Silver CMS 0.1 - 'update' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Liquid-Silver CMS 0.1 - 'update' Local File Inclusion. Author: Stack
|
Analyze the security implications of: Liquid-Silver CMS 0.1 - 'update' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adobe Flash - ATF Processing Heap Overflow
|
This is a dos exploit for multiple platform. Description: Adobe Flash - ATF Processing Heap Overflow. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - ATF Processing Heap Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: JW Player - 'logo.link' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: JW Player - 'logo.link' Cross-Site Scripting. Author: MustLive
|
Analyze the security implications of: JW Player - 'logo.link' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Forum 5 - 'pm.php' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Forum 5 - 'pm.php' Local File Inclusion. Author: rgod
|
Analyze the security implications of: Forum 5 - 'pm.php' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Itech Job Portal Script 9.11 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Itech Job Portal Script 9.11 - Authentication Bypass. Author: Dawid Morawski
|
Analyze the security implications of: Itech Job Portal Script 9.11 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sun JRE/SDK 1.x - Untrusted Applet Java Security Model Violation
|
This is a local exploit for multiple platform. Description: Sun JRE/SDK 1.x - Untrusted Applet Java Security Model Violation. Author: Marc Schoenefeld
|
Analyze the security implications of: Sun JRE/SDK 1.x - Untrusted Applet Java Security Model Violation
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: phpBB 2.0.13 - 'admin_styles.php' Remote Command Execution
|
This is a remote exploit for linux platform. Description: phpBB 2.0.13 - 'admin_styles.php' Remote Command Execution. Author: RusH
|
Analyze the security implications of: phpBB 2.0.13 - 'admin_styles.php' Remote Command Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Development Site Professional Liberal - Company Institutional SQL Injection
|
This is a webapps exploit for php platform. Description: Development Site Professional Liberal - Company Institutional SQL Injection. Author: L0rd CrusAd3r
|
Analyze the security implications of: Development Site Professional Liberal - Company Institutional SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Safari - 'DateTimeFormat.format' Type Confusion
|
This is a dos exploit for multiple platform. Description: Apple Safari - 'DateTimeFormat.format' Type Confusion. Author: Google Security Research
|
Analyze the security implications of: Apple Safari - 'DateTimeFormat.format' Type Confusion
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: OpenSSL 1.1.0 - Remote Client Denial of Service
|
This is a dos exploit for multiple platform. Description: OpenSSL 1.1.0 - Remote Client Denial of Service. Author: Guido Vranken
|
Analyze the security implications of: OpenSSL 1.1.0 - Remote Client Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Cisco Catalyst 2900 12.0 - '5.2'XU SNMP Empty UDP Packet Denial of Service
|
This is a dos exploit for hardware platform. Description: Cisco Catalyst 2900 12.0 - '5.2'XU SNMP Empty UDP Packet Denial of Service. Author: bashis
|
Analyze the security implications of: Cisco Catalyst 2900 12.0 - '5.2'XU SNMP Empty UDP Packet Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CuteNews 1.4.6 - 'from_date_day' Full Path Disclosure
|
This is a webapps exploit for php platform. Description: CuteNews 1.4.6 - 'from_date_day' Full Path Disclosure. Author: Andrew Horton
|
Analyze the security implications of: CuteNews 1.4.6 - 'from_date_day' Full Path Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Shutter 0.93.1 - Code Execution
|
This is a local exploit for linux platform. Description: Shutter 0.93.1 - Code Execution. Author: Prajith
|
Analyze the security implications of: Shutter 0.93.1 - Code Execution
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ESPG (Enhanced Simple PHP Gallery) 1.72 - File Disclosure
|
This is a webapps exploit for php platform. Description: ESPG (Enhanced Simple PHP Gallery) 1.72 - File Disclosure. Author: bd0rk
|
Analyze the security implications of: ESPG (Enhanced Simple PHP Gallery) 1.72 - File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Simple Traffic Offense System 1.0 - Stored Cross Site Scripting (XSS)
|
This is a webapps exploit for multiple platform. Description: Simple Traffic Offense System 1.0 - Stored Cross Site Scripting (XSS). Author: Barış Yıldızoğlu
|
Analyze the security implications of: Simple Traffic Offense System 1.0 - Stored Cross Site Scripting (XSS)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: LibEXIF 0.6.x - Exif_Data_Load_Data_Entry Remote Integer Overflow
|
This is a dos exploit for linux platform. Description: LibEXIF 0.6.x - Exif_Data_Load_Data_Entry Remote Integer Overflow. Author: Victor Stinner
|
Analyze the security implications of: LibEXIF 0.6.x - Exif_Data_Load_Data_Entry Remote Integer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: MariaDB Client 10.1.26 - Denial of Service (PoC)
|
This is a dos exploit for linux platform. Description: MariaDB Client 10.1.26 - Denial of Service (PoC). Author: strider
|
Analyze the security implications of: MariaDB Client 10.1.26 - Denial of Service (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.