input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: DNS Tools (PHP Digger) - Remote Command Execution | This is a webapps exploit for php platform. Description: DNS Tools (PHP Digger) - Remote Command Execution. Author: SirGod |
Analyze the security implications of: DNS Tools (PHP Digger) - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Snitz Forums 2000 < 3.4.0.3 - Multiple Vulnerabilities | This is a webapps exploit for multiple platform. Description: Snitz Forums 2000 < 3.4.0.3 - Multiple Vulnerabilities. Author: GulfTech Security |
Analyze the security implications of: Snitz Forums 2000 < 3.4.0.3 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache Roller - OGNL Injection (Metasploit) | This is a remote exploit for java platform. Description: Apache Roller - OGNL Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Apache Roller - OGNL Injection (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: CMS chainuk 1.2 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: CMS chainuk 1.2 - Multiple Vulnerabilities. Author: eLwaux |
Analyze the security implications of: CMS chainuk 1.2 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple macOS Kernel 10.12.2 (16C67) - 'AppleIntelCapriController::GetLinkConfig' Code Execution Due to Lack of Bounds Checking | This is a dos exploit for macos platform. Description: Apple macOS Kernel 10.12.2 (16C67) - 'AppleIntelCapriController::GetLinkConfig' Code Execution Due to Lack of Bounds Checking. Author: Google Security Research |
Analyze the security implications of: Apple macOS Kernel 10.12.2 (16C67) - 'AppleIntelCapriController::GetLinkConfig' Code Execution Due to Lack of Bounds Checking | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: LIVE555 Media Server 2007.11.1 - ParseRTSPRequestString Remote Denial of Service | This is a dos exploit for linux platform. Description: LIVE555 Media Server 2007.11.1 - ParseRTSPRequestString Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: LIVE555 Media Server 2007.11.1 - ParseRTSPRequestString Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Affix Bluetooth Protocol Stack 3.1/3.2 - Signed Buffer Index (1) | This is a dos exploit for linux platform. Description: Affix Bluetooth Protocol Stack 3.1/3.2 - Signed Buffer Index (1). Author: kf |
Analyze the security implications of: Affix Bluetooth Protocol Stack 3.1/3.2 - Signed Buffer Index (1) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ATPhttpd 0.4b - Remote Buffer Overflow | This is a remote exploit for freebsd platform. Description: ATPhttpd 0.4b - Remote Buffer Overflow. Author: badc0ded |
Analyze the security implications of: ATPhttpd 0.4b - Remote Buffer Overflow | This exploit targets freebsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: John O'Fallon Responder.cgi 1.0 - Denial of Service | This is a dos exploit for cgi platform. Description: John O'Fallon Responder.cgi 1.0 - Denial of Service. Author: Epic |
Analyze the security implications of: John O'Fallon Responder.cgi 1.0 - Denial of Service | This exploit targets cgi systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: CMS-Bandits 2.5 - 'spaw_root' Remote File Inclusion | This is a webapps exploit for php platform. Description: CMS-Bandits 2.5 - 'spaw_root' Remote File Inclusion. Author: Federico Fazzi |
Analyze the security implications of: CMS-Bandits 2.5 - 'spaw_root' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bilboplanet 2.0 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Bilboplanet 2.0 - Multiple Cross-Site Scripting Vulnerabilities. Author: Vivek N |
Analyze the security implications of: Bilboplanet 2.0 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.