input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ImagePro Lazygirls Clone Script - SQL Injection | This is a webapps exploit for php platform. Description: ImagePro Lazygirls Clone Script - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: ImagePro Lazygirls Clone Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP < 5.3.6 'OpenSSL' Extension - 'openssl_decrypt' Ciphertext Data Memory Leak Denial of Service | This is a dos exploit for php platform. Description: PHP < 5.3.6 'OpenSSL' Extension - 'openssl_decrypt' Ciphertext Data Memory Leak Denial of Service. Author: dovbysh |
Analyze the security implications of: PHP < 5.3.6 'OpenSSL' Extension - 'openssl_decrypt' Ciphertext Data Memory Leak Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenSSH/PAM 3.6.1p1 - Remote Users Discovery Tool | This is a remote exploit for linux platform. Description: OpenSSH/PAM 3.6.1p1 - Remote Users Discovery Tool. Author: Maurizio Agazzini |
Analyze the security implications of: OpenSSH/PAM 3.6.1p1 - Remote Users Discovery Tool | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: TeamCity Agent - XML-RPC Command Execution (Metasploit) | This is a remote exploit for multiple platform. Description: TeamCity Agent - XML-RPC Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: TeamCity Agent - XML-RPC Command Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ADP Forum 2.0.x - 'Subject' HTML Injection | This is a webapps exploit for php platform. Description: ADP Forum 2.0.x - 'Subject' HTML Injection. Author: liz0 |
Analyze the security implications of: ADP Forum 2.0.x - 'Subject' HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alwjeez Script - Database Backup | This is a webapps exploit for php platform. Description: Alwjeez Script - Database Backup. Author: alnjm33 |
Analyze the security implications of: Alwjeez Script - Database Backup | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.2/2.3 (Debian Linux 2.1 / RedHat Linux 6.0 / SuSE Linux 6.1) - IP Options | This is a dos exploit for linux platform. Description: Linux Kernel 2.2/2.3 (Debian Linux 2.1 / RedHat Linux 6.0 / SuSE Linux 6.1) - IP Options. Author: Piotr Wilkin |
Analyze the security implications of: Linux Kernel 2.2/2.3 (Debian Linux 2.1 / RedHat Linux 6.0 / SuSE Linux 6.1) - IP Options | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Foxmail Email Client 6.5 - 'mailto' Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: Foxmail Email Client 6.5 - 'mailto' Buffer Overflow (PoC). Author: sebug |
Analyze the security implications of: Foxmail Email Client 6.5 - 'mailto' Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Zabbix 1.1.4/1.4.2 - 'daemon_start' Local Privilege Escalation | This is a local exploit for linux platform. Description: Zabbix 1.1.4/1.4.2 - 'daemon_start' Local Privilege Escalation. Author: Bas van Schaik |
Analyze the security implications of: Zabbix 1.1.4/1.4.2 - 'daemon_start' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: compop.ca 3.5.3 - Arbitrary code Execution | This is a webapps exploit for multiple platform. Description: compop.ca 3.5.3 - Arbitrary code Execution. Author: dmlino |
Analyze the security implications of: compop.ca 3.5.3 - Arbitrary code Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: VMware Player 1.0.1 Build 19317 - '.VMX' File Denial of Service | This is a dos exploit for multiple platform. Description: VMware Player 1.0.1 Build 19317 - '.VMX' File Denial of Service. Author: n00b |
Analyze the security implications of: VMware Player 1.0.1 Build 19317 - '.VMX' File Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CMS-BRD - 'menuclick' SQL Injection | This is a webapps exploit for php platform. Description: CMS-BRD - 'menuclick' SQL Injection. Author: dun |
Analyze the security implications of: CMS-BRD - 'menuclick' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BMC BladeLogic 8.3.00.64 - Remote Command Execution | This is a remote exploit for multiple platform. Description: BMC BladeLogic 8.3.00.64 - Remote Command Execution. Author: Paul Taylor |
Analyze the security implications of: BMC BladeLogic 8.3.00.64 - Remote Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ICE Hrm 29.0.0.OS - 'Account Takeover' Cross-Site Request Forgery (CSRF) | This is a webapps exploit for php platform. Description: ICE Hrm 29.0.0.OS - 'Account Takeover' Cross-Site Request Forgery (CSRF). Author: Piyush Patil |
Analyze the security implications of: ICE Hrm 29.0.0.OS - 'Account Takeover' Cross-Site Request Forgery (CSRF) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Glossword 1.8.3 - SQL Injection | This is a webapps exploit for php platform. Description: Glossword 1.8.3 - SQL Injection. Author: AkaStep |
Analyze the security implications of: Glossword 1.8.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MySQL 4.x/5.0 (Linux) - User-Defined Function (UDF) Dynamic Library (2) | This is a local exploit for linux platform. Description: MySQL 4.x/5.0 (Linux) - User-Defined Function (UDF) Dynamic Library (2). Author: Marco Ivaldi |
Analyze the security implications of: MySQL 4.x/5.0 (Linux) - User-Defined Function (UDF) Dynamic Library (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Samsung Galaxy S6 - 'android.media.process' 'MdConvertLine' Face Recognition Memory Corruption | This is a dos exploit for android platform. Description: Samsung Galaxy S6 - 'android.media.process' 'MdConvertLine' Face Recognition Memory Corruption. Author: Google Security Research |
Analyze the security implications of: Samsung Galaxy S6 - 'android.media.process' 'MdConvertLine' Face Recognition Memory Corruption | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Microsoft Xbox One 10.0.14393.2152 - Code Execution (PoC) | This is a local exploit for hardware platform. Description: Microsoft Xbox One 10.0.14393.2152 - Code Execution (PoC). Author: unknownv2 |
Analyze the security implications of: Microsoft Xbox One 10.0.14393.2152 - Code Execution (PoC) | This exploit targets hardware systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PHP 5.2.1 - 'session_regenerate_id()' Double-Free | This is a local exploit for linux platform. Description: PHP 5.2.1 - 'session_regenerate_id()' Double-Free. Author: Stefan Esser |
Analyze the security implications of: PHP 5.2.1 - 'session_regenerate_id()' Double-Free | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Online Work Order System (OWOS) Professional Edition - Authentication Bypass | This is a webapps exploit for asp platform. Description: Online Work Order System (OWOS) Professional Edition - Authentication Bypass. Author: L0rd CrusAd3r |
Analyze the security implications of: Online Work Order System (OWOS) Professional Edition - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: QEMU - Floppy Disk Controller (FDC) (PoC) | This is a dos exploit for multiple platform. Description: QEMU - Floppy Disk Controller (FDC) (PoC). Author: Marcus Meissner |
Analyze the security implications of: QEMU - Floppy Disk Controller (FDC) (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: W1L3D4 philboard 1.0 - 'philboard_reply.asp' SQL Injection | This is a webapps exploit for asp platform. Description: W1L3D4 philboard 1.0 - 'philboard_reply.asp' SQL Injection. Author: U238 |
Analyze the security implications of: W1L3D4 philboard 1.0 - 'philboard_reply.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Openswan 2.4.12/2.6.16 - Insecure Temp File Creation Privilege Escalation | This is a local exploit for linux platform. Description: Openswan 2.4.12/2.6.16 - Insecure Temp File Creation Privilege Escalation. Author: nofame |
Analyze the security implications of: Openswan 2.4.12/2.6.16 - Insecure Temp File Creation Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Zoom Linux Client 2.0.106600.0904 - Stack-Based Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: Zoom Linux Client 2.0.106600.0904 - Stack-Based Buffer Overflow (PoC). Author: Conviso |
Analyze the security implications of: Zoom Linux Client 2.0.106600.0904 - Stack-Based Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AdMan 1.0.20051221 - 'ViewStatement.php' SQL Injection | This is a webapps exploit for php platform. Description: AdMan 1.0.20051221 - 'ViewStatement.php' SQL Injection. Author: r0t |
Analyze the security implications of: AdMan 1.0.20051221 - 'ViewStatement.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SAP HANA 1.00.095 - hdbindexserver Memory Corruption | This is a webapps exploit for multiple platform. Description: SAP HANA 1.00.095 - hdbindexserver Memory Corruption. Author: ERPScan |
Analyze the security implications of: SAP HANA 1.00.095 - hdbindexserver Memory Corruption | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FlexNet License Server Manager - Stack Overflow In lmgrd | This is a dos exploit for multiple platform. Description: FlexNet License Server Manager - Stack Overflow In lmgrd. Author: Luigi Auriemma |
Analyze the security implications of: FlexNet License Server Manager - Stack Overflow In lmgrd | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Aj Classifieds - Authentication Bypass | This is a webapps exploit for php platform. Description: Aj Classifieds - Authentication Bypass. Author: G4N0K |
Analyze the security implications of: Aj Classifieds - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS WebBlizzard - 'index.php' Blind SQL Injection | This is a webapps exploit for php platform. Description: CMS WebBlizzard - 'index.php' Blind SQL Injection. Author: Bl@ckbe@rD |
Analyze the security implications of: CMS WebBlizzard - 'index.php' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ManageEngine ServiceDesk Plus 9.3 - User Enumeration | This is a webapps exploit for java platform. Description: ManageEngine ServiceDesk Plus 9.3 - User Enumeration. Author: Operat0r |
Analyze the security implications of: ManageEngine ServiceDesk Plus 9.3 - User Enumeration | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: HP-UX 10.20/11.0 - man '/tmp' Symlink | This is a local exploit for hp-ux platform. Description: HP-UX 10.20/11.0 - man '/tmp' Symlink. Author: Jason Axley |
Analyze the security implications of: HP-UX 10.20/11.0 - man '/tmp' Symlink | This exploit targets hp-ux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: F5 FirePass 7.0 - SQL Injection | This is a remote exploit for hardware platform. Description: F5 FirePass 7.0 - SQL Injection. Author: anonymous |
Analyze the security implications of: F5 FirePass 7.0 - SQL Injection | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: A-Blog 2.0 - 'menu.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: A-Blog 2.0 - 'menu.php' Remote File Inclusion. Author: Drago84 |
Analyze the security implications of: A-Blog 2.0 - 'menu.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.