input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux Kernel 2.4.x/2.6.x - Assembler Inline Function Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.4.x/2.6.x - Assembler Inline Function Local Denial of Service. Author: lorenzo |
Analyze the security implications of: Linux Kernel 2.4.x/2.6.x - Assembler Inline Function Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Adobe Flash Player 22.0.0.192 - SceneAndFrameData Memory Corruption | This is a dos exploit for multiple platform. Description: Adobe Flash Player 22.0.0.192 - SceneAndFrameData Memory Corruption. Author: COSIG |
Analyze the security implications of: Adobe Flash Player 22.0.0.192 - SceneAndFrameData Memory Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Google Android 4.2 Browser and WebView - 'addJavascriptInterface' Code Execution (Metasploit) | This is a local exploit for android platform. Description: Google Android 4.2 Browser and WebView - 'addJavascriptInterface' Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Google Android 4.2 Browser and WebView - 'addJavascriptInterface' Code Execution (Metasploit) | This exploit targets android systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Joomla! Component JEXTN Question And Answer 3.1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JEXTN Question And Answer 3.1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JEXTN Question And Answer 3.1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Splunk Enterprise - Information Disclosure | This is a webapps exploit for multiple platform. Description: Splunk Enterprise - Information Disclosure. Author: hyp3rlinx |
Analyze the security implications of: Splunk Enterprise - Information Disclosure | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: datawizard webxq 2.1.204 - Directory Traversal | This is a remote exploit for multiple platform. Description: datawizard webxq 2.1.204 - Directory Traversal. Author: joetesta |
Analyze the security implications of: datawizard webxq 2.1.204 - Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BLNews 2.1.3 - Remote File Inclusion | This is a webapps exploit for php platform. Description: BLNews 2.1.3 - Remote File Inclusion. Author: Over_G |
Analyze the security implications of: BLNews 2.1.3 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mitel mitel-cs018 - Call Data Information Disclosure | This is a remote exploit for linux platform. Description: Mitel mitel-cs018 - Call Data Information Disclosure. Author: Andrea Intilangelo |
Analyze the security implications of: Mitel mitel-cs018 - Call Data Information Disclosure | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! 1.5 < 3.4.5 - Object Injection Remote Command Execution | This is a webapps exploit for php platform. Description: Joomla! 1.5 < 3.4.5 - Object Injection Remote Command Execution. Author: Sec-1 |
Analyze the security implications of: Joomla! 1.5 < 3.4.5 - Object Injection Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sudo 1.6.x - Password Prompt Heap Overflow | This is a local exploit for linux platform. Description: Sudo 1.6.x - Password Prompt Heap Overflow. Author: MaXX |
Analyze the security implications of: Sudo 1.6.x - Password Prompt Heap Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: UoW Pine 4.0.4/4.10/4.21 - 'From:' Remote Buffer Overflow | This is a remote exploit for linux platform. Description: UoW Pine 4.0.4/4.10/4.21 - 'From:' Remote Buffer Overflow. Author: Arkane |
Analyze the security implications of: UoW Pine 4.0.4/4.10/4.21 - 'From:' Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Astaro Security Gateway 7 - Remote Code Execution | This is a remote exploit for hardware platform. Description: Astaro Security Gateway 7 - Remote Code Execution. Author: Jakub Palaczynski |
Analyze the security implications of: Astaro Security Gateway 7 - Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CMScout 2.09 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: CMScout 2.09 - Cross-Site Request Forgery. Author: High-Tech Bridge SA |
Analyze the security implications of: CMScout 2.09 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pete Stein GoScript 2.0 - Remote Command Execution | This is a webapps exploit for cgi platform. Description: Pete Stein GoScript 2.0 - Remote Command Execution. Author: Francisco Alisson |
Analyze the security implications of: Pete Stein GoScript 2.0 - Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! Component com_blog - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_blog - SQL Injection. Author: DevilZ TM |
Analyze the security implications of: Joomla! Component com_blog - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Joomloc-CAT 4.1.3 - 'ville' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Joomloc-CAT 4.1.3 - 'ville' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Joomloc-CAT 4.1.3 - 'ville' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dahua DVR 2.608.0000.0/2.608.GV00.0 - Authentication Bypass (Metasploit) | This is a webapps exploit for hardware platform. Description: Dahua DVR 2.608.0000.0/2.608.GV00.0 - Authentication Bypass (Metasploit). Author: Jake Reynolds |
Analyze the security implications of: Dahua DVR 2.608.0000.0/2.608.GV00.0 - Authentication Bypass (Metasploit) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Tor (Linux) - X11 Linux Sandbox Breakout | This is a local exploit for linux platform. Description: Tor (Linux) - X11 Linux Sandbox Breakout. Author: Google Security Research |
Analyze the security implications of: Tor (Linux) - X11 Linux Sandbox Breakout | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Extreme Corporate 6.0 - 'Extremesearch.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Extreme Corporate 6.0 - 'Extremesearch.php' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: Extreme Corporate 6.0 - 'Extremesearch.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LokiCMS 0.3.4 - 'admin.php' Create Local File Inclusion | This is a webapps exploit for php platform. Description: LokiCMS 0.3.4 - 'admin.php' Create Local File Inclusion. Author: JosS |
Analyze the security implications of: LokiCMS 0.3.4 - 'admin.php' Create Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Star Wars Battlefront II 1.1 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Star Wars Battlefront II 1.1 - Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Star Wars Battlefront II 1.1 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Getsimple CMS 2.01 - 'components.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Getsimple CMS 2.01 - 'components.php' Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: Getsimple CMS 2.01 - 'components.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: efront 3.5.4 - 'database.php?path' Remote File Inclusion | This is a webapps exploit for php platform. Description: efront 3.5.4 - 'database.php?path' Remote File Inclusion. Author: cr4wl3r |
Analyze the security implications of: efront 3.5.4 - 'database.php?path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NewsTraXor Website Management Script 2.9 Beta - Database Disclosure | This is a webapps exploit for asp platform. Description: NewsTraXor Website Management Script 2.9 Beta - Database Disclosure. Author: CyberTal0n |
Analyze the security implications of: NewsTraXor Website Management Script 2.9 Beta - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Comersus Cart 5.0 - SQL Injection | This is a webapps exploit for php platform. Description: Comersus Cart 5.0 - SQL Injection. Author: evol@ruiner.halo.nu |
Analyze the security implications of: Comersus Cart 5.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JE Poll - 'pollid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JE Poll - 'pollid' SQL Injection. Author: v3n0m |
Analyze the security implications of: Joomla! Component JE Poll - 'pollid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GoT.MY (Multiple Products) - 'theme_dir' Cross-Site Scripting | This is a webapps exploit for php platform. Description: GoT.MY (Multiple Products) - 'theme_dir' Cross-Site Scripting. Author: Hector.x90 |
Analyze the security implications of: GoT.MY (Multiple Products) - 'theme_dir' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Free Image Hosting 1.0 - 'forgot_pass.php' File Inclusion | This is a webapps exploit for php platform. Description: Free Image Hosting 1.0 - 'forgot_pass.php' File Inclusion. Author: Kacper |
Analyze the security implications of: Free Image Hosting 1.0 - 'forgot_pass.php' File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JContentSubscription 1.5.8 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Joomla! Component JContentSubscription 1.5.8 - Multiple Remote File Inclusions. Author: NoGe |
Analyze the security implications of: Joomla! Component JContentSubscription 1.5.8 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco IOS - 'cisco-bug-44020.c' IPv4 Packet Denial of Service | This is a dos exploit for hardware platform. Description: Cisco IOS - 'cisco-bug-44020.c' IPv4 Packet Denial of Service. Author: Martin Kluge |
Analyze the security implications of: Cisco IOS - 'cisco-bug-44020.c' IPv4 Packet Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apache Tomcat - Form Authentication 'Username' Enumeration | This is a remote exploit for multiple platform. Description: Apache Tomcat - Form Authentication 'Username' Enumeration. Author: D. Matscheko |
Analyze the security implications of: Apache Tomcat - Form Authentication 'Username' Enumeration | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux Kernel 2.6.32-642/3.16.0-4 - 'inode' Integer Overflow | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.32-642/3.16.0-4 - 'inode' Integer Overflow. Author: Todor Donev |
Analyze the security implications of: Linux Kernel 2.6.32-642/3.16.0-4 - 'inode' Integer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache CouchDB 2.3.1 - Cross-Site Request Forgery / Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Apache CouchDB 2.3.1 - Cross-Site Request Forgery / Cross-Site Scripting. Author: Ozer Goker |
Analyze the security implications of: Apache CouchDB 2.3.1 - Cross-Site Request Forgery / Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.