input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: DNS Tools (PHP Digger) - Remote Command Execution
|
This is a webapps exploit for php platform. Description: DNS Tools (PHP Digger) - Remote Command Execution. Author: SirGod
|
Analyze the security implications of: DNS Tools (PHP Digger) - Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Snitz Forums 2000 < 3.4.0.3 - Multiple Vulnerabilities
|
This is a webapps exploit for multiple platform. Description: Snitz Forums 2000 < 3.4.0.3 - Multiple Vulnerabilities. Author: GulfTech Security
|
Analyze the security implications of: Snitz Forums 2000 < 3.4.0.3 - Multiple Vulnerabilities
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apache Roller - OGNL Injection (Metasploit)
|
This is a remote exploit for java platform. Description: Apache Roller - OGNL Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: Apache Roller - OGNL Injection (Metasploit)
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: CMS chainuk 1.2 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: CMS chainuk 1.2 - Multiple Vulnerabilities. Author: eLwaux
|
Analyze the security implications of: CMS chainuk 1.2 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple macOS Kernel 10.12.2 (16C67) - 'AppleIntelCapriController::GetLinkConfig' Code Execution Due to Lack of Bounds Checking
|
This is a dos exploit for macos platform. Description: Apple macOS Kernel 10.12.2 (16C67) - 'AppleIntelCapriController::GetLinkConfig' Code Execution Due to Lack of Bounds Checking. Author: Google Security Research
|
Analyze the security implications of: Apple macOS Kernel 10.12.2 (16C67) - 'AppleIntelCapriController::GetLinkConfig' Code Execution Due to Lack of Bounds Checking
|
This exploit targets macos systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: LIVE555 Media Server 2007.11.1 - ParseRTSPRequestString Remote Denial of Service
|
This is a dos exploit for linux platform. Description: LIVE555 Media Server 2007.11.1 - ParseRTSPRequestString Remote Denial of Service. Author: Luigi Auriemma
|
Analyze the security implications of: LIVE555 Media Server 2007.11.1 - ParseRTSPRequestString Remote Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Affix Bluetooth Protocol Stack 3.1/3.2 - Signed Buffer Index (1)
|
This is a dos exploit for linux platform. Description: Affix Bluetooth Protocol Stack 3.1/3.2 - Signed Buffer Index (1). Author: kf
|
Analyze the security implications of: Affix Bluetooth Protocol Stack 3.1/3.2 - Signed Buffer Index (1)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ATPhttpd 0.4b - Remote Buffer Overflow
|
This is a remote exploit for freebsd platform. Description: ATPhttpd 0.4b - Remote Buffer Overflow. Author: badc0ded
|
Analyze the security implications of: ATPhttpd 0.4b - Remote Buffer Overflow
|
This exploit targets freebsd systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: John O'Fallon Responder.cgi 1.0 - Denial of Service
|
This is a dos exploit for cgi platform. Description: John O'Fallon Responder.cgi 1.0 - Denial of Service. Author: Epic
|
Analyze the security implications of: John O'Fallon Responder.cgi 1.0 - Denial of Service
|
This exploit targets cgi systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: CMS-Bandits 2.5 - 'spaw_root' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: CMS-Bandits 2.5 - 'spaw_root' Remote File Inclusion. Author: Federico Fazzi
|
Analyze the security implications of: CMS-Bandits 2.5 - 'spaw_root' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bilboplanet 2.0 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Bilboplanet 2.0 - Multiple Cross-Site Scripting Vulnerabilities. Author: Vivek N
|
Analyze the security implications of: Bilboplanet 2.0 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.