input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Microsoft Remote Desktop Client for Mac 8.0.36 - Code Execution | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: CVS 1.11.x - Directory Request Double-Free Heap Corruption | This is a remote exploit for linux platform. Description: CVS 1.11.x - Directory Request Double-Free Heap Corruption. Author: Stefan Esser |
Analyze the security implications of: CVS 1.11.x - Directory Request Double-Free Heap Corruption | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: 6rbScript 3.3 - 'section.php' Local File Inclusion | This is a webapps exploit for php platform. Description: 6rbScript 3.3 - 'section.php' Local File Inclusion. Author: Stack |
Analyze the security implications of: 6rbScript 3.3 - 'section.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Herberlin BremsServer 1.2.4 - Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Herberlin BremsServer 1.2.4 - Cross-Site Scripting. Author: Donato Ferrante |
Analyze the security implications of: Herberlin BremsServer 1.2.4 - Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: UNA CMS 14.0.0-RC - PHP Object Injection | This is a webapps exploit for multiple platform. Description: UNA CMS 14.0.0-RC - PHP Object Injection. Author: Egidio Romano |
Analyze the security implications of: UNA CMS 14.0.0-RC - PHP Object Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Nginx 1.3.9/1.4.0 (x86) - Brute Force | This is a remote exploit for linux_x86 platform. Description: Nginx 1.3.9/1.4.0 (x86) - Brute Force. Author: kingcope |
Analyze the security implications of: Nginx 1.3.9/1.4.0 (x86) - Brute Force | This exploit targets linux_x86 systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux_x86 platform |
What is this exploit about: Hero Framework - users/login 'Username' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Hero Framework - users/login 'Username' Cross-Site Scripting. Author: Stefan Schurtz |
Analyze the security implications of: Hero Framework - users/login 'Username' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash Player 8.0.24 - '.SWF' File Handling Remote Code Execution | This is a remote exploit for multiple platform. Description: Adobe Flash Player 8.0.24 - '.SWF' File Handling Remote Code Execution. Author: Stefano DiPaola |
Analyze the security implications of: Adobe Flash Player 8.0.24 - '.SWF' File Handling Remote Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PHP 5.2 - Session.Save_Path() 'Safe_mode' / 'open_basedir' Restriction Bypass | This is a local exploit for php platform. Description: PHP 5.2 - Session.Save_Path() 'Safe_mode' / 'open_basedir' Restriction Bypass. Author: Maksymilian Arciemowicz |
Analyze the security implications of: PHP 5.2 - Session.Save_Path() 'Safe_mode' / 'open_basedir' Restriction Bypass | This exploit targets php systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Maxwebportal 1.3x - 'post.asp' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: Maxwebportal 1.3x - 'post.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: Zinho |
Analyze the security implications of: Maxwebportal 1.3x - 'post.asp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Kmita Mail 3.0 - 'file' Remote File Inclusion | This is a webapps exploit for php platform. Description: Kmita Mail 3.0 - 'file' Remote File Inclusion. Author: K-159 |
Analyze the security implications of: Kmita Mail 3.0 - 'file' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Openfire 3.10.2 - Privilege Escalation | This is a webapps exploit for jsp platform. Description: Openfire 3.10.2 - Privilege Escalation. Author: hyp3rlinx |
Analyze the security implications of: Openfire 3.10.2 - Privilege Escalation | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Apport 2.20 - Local Privilege Escalation | This is a local exploit for linux platform. Description: Apport 2.20 - Local Privilege Escalation. Author: Gr33nh4t |
Analyze the security implications of: Apport 2.20 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PHP 5.3.6 - Security Bypass | This is a remote exploit for php platform. Description: PHP 5.3.6 - Security Bypass. Author: Krzysztof Kotowicz |
Analyze the security implications of: PHP 5.3.6 - Security Bypass | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Remote Code Execution | This is a webapps exploit for hardware platform. Description: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Remote Code Execution. Author: LiquidWorm |
Analyze the security implications of: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Dompdf 1.2.1 - Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: Dompdf 1.2.1 - Remote Code Execution (RCE). Author: Ravindu Wickramasinghe |
Analyze the security implications of: Dompdf 1.2.1 - Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_zina - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_zina - SQL Injection. Author: Th3 RDX |
Analyze the security implications of: Joomla! Component com_zina - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle Java Runtime Environment - Heap Out-of-Bounds Read During OTF Font Rendering in glyph_CloseContour | This is a dos exploit for java platform. Description: Oracle Java Runtime Environment - Heap Out-of-Bounds Read During OTF Font Rendering in glyph_CloseContour. Author: Google Security Research |
Analyze the security implications of: Oracle Java Runtime Environment - Heap Out-of-Bounds Read During OTF Font Rendering in glyph_CloseContour | This exploit targets java systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Apache 2.4.17 < 2.4.38 - 'apache2ctl graceful' 'logrotate' Local Privilege Escalation | This is a local exploit for linux platform. Description: Apache 2.4.17 < 2.4.38 - 'apache2ctl graceful' 'logrotate' Local Privilege Escalation. Author: cfreal |
Analyze the security implications of: Apache 2.4.17 < 2.4.38 - 'apache2ctl graceful' 'logrotate' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Magic Photo Storage Website - '_config[site_path]' File Inclusion | This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '_config[site_path]' File Inclusion. Author: k1tk4t |
Analyze the security implications of: Magic Photo Storage Website - '_config[site_path]' File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Component MGM 0.95r2 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Component MGM 0.95r2 - Remote File Inclusion. Author: A-S-T TEAM |
Analyze the security implications of: Mambo Component MGM 0.95r2 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_expedition - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_expedition - 'id' SQL Injection. Author: BHG Security Center |
Analyze the security implications of: Joomla! Component com_expedition - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ChurchCRM 4.5.1 - Authenticated SQL Injection | This is a webapps exploit for php platform. Description: ChurchCRM 4.5.1 - Authenticated SQL Injection. Author: Arvandy |
Analyze the security implications of: ChurchCRM 4.5.1 - Authenticated SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jera Technology Flash Messaging Server 5.2 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Jera Technology Flash Messaging Server 5.2 - Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Jera Technology Flash Messaging Server 5.2 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: LanSweeper 6.0.100.75 - Cross-Site Scripting | This is a webapps exploit for aspx platform. Description: LanSweeper 6.0.100.75 - Cross-Site Scripting. Author: Miguel Mendez Z |
Analyze the security implications of: LanSweeper 6.0.100.75 - Cross-Site Scripting | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Duyuru Scripti - 'Goster.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Duyuru Scripti - 'Goster.asp' SQL Injection. Author: Cr@zy_King |
Analyze the security implications of: Duyuru Scripti - 'Goster.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: d.net CMS - Arbitrary Reinstall/Blind SQL Injection | This is a webapps exploit for php platform. Description: d.net CMS - Arbitrary Reinstall/Blind SQL Injection. Author: darkjoker |
Analyze the security implications of: d.net CMS - Arbitrary Reinstall/Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CentOS Web Panel 0.9.8.12 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: CentOS Web Panel 0.9.8.12 - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: CentOS Web Panel 0.9.8.12 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sonatype Nexus 3.21.1 - Remote Code Execution (Authenticated) | This is a webapps exploit for java platform. Description: Sonatype Nexus 3.21.1 - Remote Code Execution (Authenticated). Author: 1F98D |
Analyze the security implications of: Sonatype Nexus 3.21.1 - Remote Code Execution (Authenticated) | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: D-iscussion Board 3.01 - 'topic' Local File Inclusion | This is a webapps exploit for php platform. Description: D-iscussion Board 3.01 - 'topic' Local File Inclusion. Author: SirGod |
Analyze the security implications of: D-iscussion Board 3.01 - 'topic' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenSSH 2.x/3.x - Kerberos 4 TGT/AFS Token Buffer Overflow | This is a remote exploit for linux platform. Description: OpenSSH 2.x/3.x - Kerberos 4 TGT/AFS Token Buffer Overflow. Author: Marcell Fodor |
Analyze the security implications of: OpenSSH 2.x/3.x - Kerberos 4 TGT/AFS Token Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Plone CMS 5.2.3 - 'Title' Stored XSS | This is a webapps exploit for multiple platform. Description: Plone CMS 5.2.3 - 'Title' Stored XSS. Author: Piyush Patil |
Analyze the security implications of: Plone CMS 5.2.3 - 'Title' Stored XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BandSite CMS 1.1.1 - 'ROOT_PATH' Remote File Inclusion | This is a webapps exploit for php platform. Description: BandSite CMS 1.1.1 - 'ROOT_PATH' Remote File Inclusion. Author: Kw3[R]Ln |
Analyze the security implications of: BandSite CMS 1.1.1 - 'ROOT_PATH' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Magic Calendar Lite 1.02 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: Magic Calendar Lite 1.02 - 'index.php' SQL Injection. Author: Aliaksandr Hartsuyeu |
Analyze the security implications of: Magic Calendar Lite 1.02 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.