input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Splunk 4.1.6 Web Component - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ELS Screen to Screen 1.0 - Multiple Password Vulnerabilities | This is a local exploit for osx platform. Description: ELS Screen to Screen 1.0 - Multiple Password Vulnerabilities. Author: Prozaq of mSec |
Analyze the security implications of: ELS Screen to Screen 1.0 - Multiple Password Vulnerabilities | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Tri-PLC Nano-10 r81 - Denial of Service | This is a dos exploit for hardware platform. Description: Tri-PLC Nano-10 r81 - Denial of Service. Author: Sapling |
Analyze the security implications of: Tri-PLC Nano-10 r81 - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: NetGain Enterprise Manager 7.2.562 - 'Ping' Command Injection | This is a webapps exploit for jsp platform. Description: NetGain Enterprise Manager 7.2.562 - 'Ping' Command Injection. Author: MrChaZ |
Analyze the security implications of: NetGain Enterprise Manager 7.2.562 - 'Ping' Command Injection | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: LoveCMS 1.6.2 Final - Remote Code Execution | This is a webapps exploit for php platform. Description: LoveCMS 1.6.2 Final - Remote Code Execution. Author: PoMdaPiMp |
Analyze the security implications of: LoveCMS 1.6.2 Final - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dr.Web AntiVirus 4.33 - LHA long Directory name Local Overflow | This is a local exploit for linux platform. Description: Dr.Web AntiVirus 4.33 - LHA long Directory name Local Overflow. Author: Guay-Leroux |
Analyze the security implications of: Dr.Web AntiVirus 4.33 - LHA long Directory name Local Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: MiniNuke 1.8.2b - 'pages.asp' SQL Injection | This is a webapps exploit for asp platform. Description: MiniNuke 1.8.2b - 'pages.asp' SQL Injection. Author: nukedx |
Analyze the security implications of: MiniNuke 1.8.2b - 'pages.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apple Mac OSX 10.4.x - Safari window.console.log Format String | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.4.x - Safari window.console.log Format String. Author: LMH |
Analyze the security implications of: Apple Mac OSX 10.4.x - Safari window.console.log Format String | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: macOS 10.13 (17A365) - Kernel Memory Disclosure due to Lack of Bounds Checking in 'AppleIntelCapriController::getDisplayPipeCapability' | This is a dos exploit for macos platform. Description: macOS 10.13 (17A365) - Kernel Memory Disclosure due to Lack of Bounds Checking in 'AppleIntelCapriController::getDisplayPipeCapability'. Author: Google Security Research |
Analyze the security implications of: macOS 10.13 (17A365) - Kernel Memory Disclosure due to Lack of Bounds Checking in 'AppleIntelCapriController::getDisplayPipeCapability' | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: OrientDB 2.2.2 < 2.2.22 - Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: OrientDB 2.2.2 < 2.2.22 - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: OrientDB 2.2.2 < 2.2.22 - Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: eGroupWare 1.6.002 and eGroupWare premium line 9.1 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: eGroupWare 1.6.002 and eGroupWare premium line 9.1 - Multiple Vulnerabilities. Author: Nahuel Grisolia |
Analyze the security implications of: eGroupWare 1.6.002 and eGroupWare premium line 9.1 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jupiter CMS 1.1.5 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Jupiter CMS 1.1.5 - 'index.php' Cross-Site Scripting. Author: KaDaL-X |
Analyze the security implications of: Jupiter CMS 1.1.5 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Webmin 0.9x / Usermin 0.9x/1.0 - Access Session ID Spoofing | This is a remote exploit for linux platform. Description: Webmin 0.9x / Usermin 0.9x/1.0 - Access Session ID Spoofing. Author: Carl Livitt |
Analyze the security implications of: Webmin 0.9x / Usermin 0.9x/1.0 - Access Session ID Spoofing | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Blog System 1.2 - 'index.php?cat' SQL Injection | This is a webapps exploit for php platform. Description: Blog System 1.2 - 'index.php?cat' SQL Injection. Author: r0t3d3Vil |
Analyze the security implications of: Blog System 1.2 - 'index.php?cat' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Samba 2.2.8 (BSD x86) - 'trans2open' Remote Overflow (Metasploit) | This is a remote exploit for bsd_x86 platform. Description: Samba 2.2.8 (BSD x86) - 'trans2open' Remote Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Samba 2.2.8 (BSD x86) - 'trans2open' Remote Overflow (Metasploit) | This exploit targets bsd_x86 systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets bsd_x86 platform |
What is this exploit about: Brightstation Muscat 1.0 - Full Path Disclosure | This is a remote exploit for cgi platform. Description: Brightstation Muscat 1.0 - Full Path Disclosure. Author: cuctema |
Analyze the security implications of: Brightstation Muscat 1.0 - Full Path Disclosure | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Konqueror 4.7.3 - Memory Corruption | This is a dos exploit for linux platform. Description: Konqueror 4.7.3 - Memory Corruption. Author: Tim Brown |
Analyze the security implications of: Konqueror 4.7.3 - Memory Corruption | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Witbe - Remote Code Execution | This is a webapps exploit for cgi platform. Description: Witbe - Remote Code Execution. Author: BeLmar |
Analyze the security implications of: Witbe - Remote Code Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: PHP 3.0.13 - 'Safe_mode' Failure | This is a remote exploit for php platform. Description: PHP 3.0.13 - 'Safe_mode' Failure. Author: Kristian Koehntopp |
Analyze the security implications of: PHP 3.0.13 - 'Safe_mode' Failure | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Postfix 1.1.x - Denial of Service (2) | This is a dos exploit for linux platform. Description: Postfix 1.1.x - Denial of Service (2). Author: daniels@legend.co.uk |
Analyze the security implications of: Postfix 1.1.x - Denial of Service (2) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: id Software Quake 3 Arena Server 1.29 - Buffer Overflow | This is a dos exploit for multiple platform. Description: id Software Quake 3 Arena Server 1.29 - Buffer Overflow. Author: Coolest |
Analyze the security implications of: id Software Quake 3 Arena Server 1.29 - Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AnnonceScriptHP 2.0 - '/admin/admin_membre/fiche_membre.php?idmembre' SQL Injection | This is a webapps exploit for php platform. Description: AnnonceScriptHP 2.0 - '/admin/admin_membre/fiche_membre.php?idmembre' SQL Injection. Author: Mr_KaLiMaN |
Analyze the security implications of: AnnonceScriptHP 2.0 - '/admin/admin_membre/fiche_membre.php?idmembre' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dexter (CasinoLoader) - SQL Injection (Metasploit) | This is a remote exploit for php platform. Description: Dexter (CasinoLoader) - SQL Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Dexter (CasinoLoader) - SQL Injection (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_hdflvplayer < 2.1.0.1 - Arbitrary File Download | This is a webapps exploit for php platform. Description: Joomla! Component com_hdflvplayer < 2.1.0.1 - Arbitrary File Download. Author: Claudio Viviani |
Analyze the security implications of: Joomla! Component com_hdflvplayer < 2.1.0.1 - Arbitrary File Download | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Farsinews 3.0 - 'Tiny_mce_gzip.php' Directory Traversal | This is a webapps exploit for php platform. Description: Farsinews 3.0 - 'Tiny_mce_gzip.php' Directory Traversal. Author: armin390 |
Analyze the security implications of: Farsinews 3.0 - 'Tiny_mce_gzip.php' Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Comdev Vote Caster 3.1 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: Comdev Vote Caster 3.1 - 'index.php' SQL Injection. Author: r0t |
Analyze the security implications of: Comdev Vote Caster 3.1 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeBSD 6.0 - 'nfsd' Remote Kernel Panic (Denial of Service) | This is a dos exploit for bsd platform. Description: FreeBSD 6.0 - 'nfsd' Remote Kernel Panic (Denial of Service). Author: Evgeny Legerov |
Analyze the security implications of: FreeBSD 6.0 - 'nfsd' Remote Kernel Panic (Denial of Service) | This exploit targets bsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Fortify Software Security Center (SSC) 17.10/17.20/18.10 - Information Disclosure | This is a webapps exploit for multiple platform. Description: Fortify Software Security Center (SSC) 17.10/17.20/18.10 - Information Disclosure. Author: alt3kx |
Analyze the security implications of: Fortify Software Security Center (SSC) 17.10/17.20/18.10 - Information Disclosure | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_teacher - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_teacher - SQL Injection. Author: DevilZ TM |
Analyze the security implications of: Joomla! Component com_teacher - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: logrotten 3.15.1 - Privilege Escalation | This is a local exploit for linux platform. Description: logrotten 3.15.1 - Privilege Escalation. Author: Wolfgang Hotwagner |
Analyze the security implications of: logrotten 3.15.1 - Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ChatLakTurk PHP Botlu Video - 'ara.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: ChatLakTurk PHP Botlu Video - 'ara.php' Cross-Site Scripting. Author: kurdish hackers team |
Analyze the security implications of: ChatLakTurk PHP Botlu Video - 'ara.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EZContents 2.0 - 'gallery_summary.php?GLOBALS[admin_home]' Remote File Inclusion | This is a webapps exploit for php platform. Description: EZContents 2.0 - 'gallery_summary.php?GLOBALS[admin_home]' Remote File Inclusion. Author: DarkFig |
Analyze the security implications of: EZContents 2.0 - 'gallery_summary.php?GLOBALS[admin_home]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JV2 Folder Gallery 3.1 - 'gallery.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: JV2 Folder Gallery 3.1 - 'gallery.php' Remote File Inclusion. Author: Sn!pEr.S!Te Hacker |
Analyze the security implications of: JV2 Folder Gallery 3.1 - 'gallery.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nagios3 - 'statuswml.cgi' 'Ping' Command Execution (Metasploit) | This is a webapps exploit for cgi platform. Description: Nagios3 - 'statuswml.cgi' 'Ping' Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Nagios3 - 'statuswml.cgi' 'Ping' Command Execution (Metasploit) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.