input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TCP Connection Reset - Remote Denial of Service | This is a dos exploit for linux platform. Description: TCP Connection Reset - Remote Denial of Service. Author: Paul A. Watson |
Analyze the security implications of: TCP Connection Reset - Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ClickHeat 1.14 - Cross-Site Request Forgery (Change Admin Password) | This is a webapps exploit for php platform. Description: ClickHeat 1.14 - Cross-Site Request Forgery (Change Admin Password). Author: David Shanahan |
Analyze the security implications of: ClickHeat 1.14 - Cross-Site Request Forgery (Change Admin Password) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Picasm 1.10/1.12 - Error Generation Remote Buffer Overflow | This is a remote exploit for freebsd platform. Description: Picasm 1.10/1.12 - Error Generation Remote Buffer Overflow. Author: Shaun Colley |
Analyze the security implications of: Picasm 1.10/1.12 - Error Generation Remote Buffer Overflow | This exploit targets freebsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: unzip-stream 0.3.1 - Arbitrary File Write | This is a local exploit for nodejs platform. Description: unzip-stream 0.3.1 - Arbitrary File Write. Author: cybersploit |
Analyze the security implications of: unzip-stream 0.3.1 - Arbitrary File Write | This exploit targets nodejs systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets nodejs platform |
What is this exploit about: Joomla! Component com_newsfeeds 1.0 - 'feedid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_newsfeeds 1.0 - 'feedid' SQL Injection. Author: Milad karimi |
Analyze the security implications of: Joomla! Component com_newsfeeds 1.0 - 'feedid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Exam Reviewer Management System 1.0 - ‘id’ SQL Injection | This is a webapps exploit for php platform. Description: Exam Reviewer Management System 1.0 - ‘id’ SQL Injection. Author: Juli Agarwal |
Analyze the security implications of: Exam Reviewer Management System 1.0 - ‘id’ SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CreateVision CMS - 'id' SQL Injection | This is a webapps exploit for php platform. Description: CreateVision CMS - 'id' SQL Injection. Author: Zwierzchowski Oskar |
Analyze the security implications of: CreateVision CMS - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SOOP Portal 2.0 - Arbitrary File Upload | This is a webapps exploit for asp platform. Description: SOOP Portal 2.0 - Arbitrary File Upload. Author: Net.Edit0r |
Analyze the security implications of: SOOP Portal 2.0 - Arbitrary File Upload | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component vWishlist 1.0.1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component vWishlist 1.0.1 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component vWishlist 1.0.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeBSD 6.0/6.1 - Ftrucante Local Denial of Service | This is a dos exploit for freebsd platform. Description: FreeBSD 6.0/6.1 - Ftrucante Local Denial of Service. Author: Kirk Russell |
Analyze the security implications of: FreeBSD 6.0/6.1 - Ftrucante Local Denial of Service | This exploit targets freebsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: freediscussionforums 1.0 - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: freediscussionforums 1.0 - Multiple Vulnerabilities. Author: Abysssec |
Analyze the security implications of: freediscussionforums 1.0 - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linux Kernel 3.10.0 (CentOS / RHEL 7.1) - 'cdc_acm' Nullpointer Dereference | This is a dos exploit for linux platform. Description: Linux Kernel 3.10.0 (CentOS / RHEL 7.1) - 'cdc_acm' Nullpointer Dereference. Author: OpenSource Security |
Analyze the security implications of: Linux Kernel 3.10.0 (CentOS / RHEL 7.1) - 'cdc_acm' Nullpointer Dereference | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Isode M-Vault Server 11.3 - LDAP Memory Corruption | This is a dos exploit for multiple platform. Description: Isode M-Vault Server 11.3 - LDAP Memory Corruption. Author: Evgeny Legerov |
Analyze the security implications of: Isode M-Vault Server 11.3 - LDAP Memory Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Joomlaradio 5.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Joomlaradio 5.0 - Remote File Inclusion. Author: Morgan |
Analyze the security implications of: Joomla! Component Joomlaradio 5.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BoZoN 2.4 - Remote Code Execution | This is a webapps exploit for php platform. Description: BoZoN 2.4 - Remote Code Execution. Author: hyp3rlinx |
Analyze the security implications of: BoZoN 2.4 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Goople CMS 1.7 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Goople CMS 1.7 - Insecure Cookie Handling. Author: BeyazKurt |
Analyze the security implications of: Goople CMS 1.7 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Campsite 2.6.1 - 'Language.php?g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'Language.php?g_documentRoot' Remote File Inclusion. Author: anonymous |
Analyze the security implications of: Campsite 2.6.1 - 'Language.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Snort 2.4.0 - SACK TCP Option Error Handling Denial of Service | This is a dos exploit for multiple platform. Description: Snort 2.4.0 - SACK TCP Option Error Handling Denial of Service. Author: nitr0us |
Analyze the security implications of: Snort 2.4.0 - SACK TCP Option Error Handling Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Freelancer Calendar 1.01 - SQL Injection | This is a webapps exploit for php platform. Description: Freelancer Calendar 1.01 - SQL Injection. Author: muuratsalo |
Analyze the security implications of: Freelancer Calendar 1.01 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: mnoGoSearch 3.1.20 - Remote Command Execution | This is a remote exploit for linux platform. Description: mnoGoSearch 3.1.20 - Remote Command Execution. Author: pokleyzz |
Analyze the security implications of: mnoGoSearch 3.1.20 - Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ECOA Building Automation System - Path Traversal Arbitrary File Upload | This is a webapps exploit for hardware platform. Description: ECOA Building Automation System - Path Traversal Arbitrary File Upload. Author: Neurogenesia |
Analyze the security implications of: ECOA Building Automation System - Path Traversal Arbitrary File Upload | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AuraCMS 1.5rc - Multiple SQL Injections | This is a webapps exploit for php platform. Description: AuraCMS 1.5rc - Multiple SQL Injections. Author: k1tk4t |
Analyze the security implications of: AuraCMS 1.5rc - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BMC Service Desk Express 10.2.1.95 - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: BMC Service Desk Express 10.2.1.95 - Multiple Vulnerabilities. Author: Nuri Fattah |
Analyze the security implications of: BMC Service Desk Express 10.2.1.95 - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: GameScript 3.0 - SQL Injection | This is a webapps exploit for php platform. Description: GameScript 3.0 - SQL Injection. Author: FormatXformat |
Analyze the security implications of: GameScript 3.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10.2 - Terminal.APP Telnet Link Command Execution | This is a local exploit for osx platform. Description: Apple Mac OSX 10.2 - Terminal.APP Telnet Link Command Execution. Author: Taiyo Fujii |
Analyze the security implications of: Apple Mac OSX 10.2 - Terminal.APP Telnet Link Command Execution | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: ClipBucket < 4.0.0 - Release 4902 - Command Injection / File Upload / SQL Injection | This is a webapps exploit for php platform. Description: ClipBucket < 4.0.0 - Release 4902 - Command Injection / File Upload / SQL Injection. Author: SEC Consult |
Analyze the security implications of: ClipBucket < 4.0.0 - Release 4902 - Command Injection / File Upload / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Visites 1.1 - MosConfig_absolute_path Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Visites 1.1 - MosConfig_absolute_path Remote File Inclusion. Author: NoGe |
Analyze the security implications of: Joomla! Component Visites 1.1 - MosConfig_absolute_path Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Prozilla 1.3.7.3 - Remote Format String | This is a remote exploit for linux platform. Description: Prozilla 1.3.7.3 - Remote Format String. Author: Serkan Akpolat |
Analyze the security implications of: Prozilla 1.3.7.3 - Remote Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: EPay Pro 2.0 - 'index.php' Directory Traversal | This is a webapps exploit for php platform. Description: EPay Pro 2.0 - 'index.php' Directory Traversal. Author: h4cky0u |
Analyze the security implications of: EPay Pro 2.0 - 'index.php' Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Berta CMS - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Berta CMS - Arbitrary File Upload. Author: Simon Waters |
Analyze the security implications of: Berta CMS - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DragDropCart - '/assets/js/ddcart.php?sid' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DragDropCart - '/assets/js/ddcart.php?sid' Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: DragDropCart - '/assets/js/ddcart.php?sid' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco IOS 11.x - TFTP Server Long File Name Buffer Overflow | This is a dos exploit for hardware platform. Description: Cisco IOS 11.x - TFTP Server Long File Name Buffer Overflow. Author: FX |
Analyze the security implications of: Cisco IOS 11.x - TFTP Server Long File Name Buffer Overflow | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ncpfs < 2.2.6 (Gentoo / Linux) - Local Privilege Escalation | This is a local exploit for linux platform. Description: ncpfs < 2.2.6 (Gentoo / Linux) - Local Privilege Escalation. Author: super |
Analyze the security implications of: ncpfs < 2.2.6 (Gentoo / Linux) - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.