input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Apple Mac OSX Kernel - GeForce GPU Driver Stack Buffer Overflow
|
This is a dos exploit for osx platform. Description: Apple Mac OSX Kernel - GeForce GPU Driver Stack Buffer Overflow. Author: Google Security Research
|
Analyze the security implications of: Apple Mac OSX Kernel - GeForce GPU Driver Stack Buffer Overflow
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: HFS Http File Server 2.3m Build 300 - Buffer Overflow (PoC)
|
This is a remote exploit for multiple platform. Description: HFS Http File Server 2.3m Build 300 - Buffer Overflow (PoC). Author: hyp3rlinx
|
Analyze the security implications of: HFS Http File Server 2.3m Build 300 - Buffer Overflow (PoC)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Netwin SurgeFTP 2.3a1 - 'SurgeFTPMGR.cgi' Multiple Input Validation Vulnerabilities
|
This is a webapps exploit for cgi platform. Description: Netwin SurgeFTP 2.3a1 - 'SurgeFTPMGR.cgi' Multiple Input Validation Vulnerabilities. Author: Umesh Wanve
|
Analyze the security implications of: Netwin SurgeFTP 2.3a1 - 'SurgeFTPMGR.cgi' Multiple Input Validation Vulnerabilities
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (PoC)
|
This is a webapps exploit for php platform. Description: Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (PoC). Author: Vitalii Rudnykh
|
Analyze the security implications of: Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (PoC)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Multiple PDF Readers - Multiple Remote Buffer Overflows
|
This is a dos exploit for linux platform. Description: Multiple PDF Readers - Multiple Remote Buffer Overflows. Author: LMH
|
Analyze the security implications of: Multiple PDF Readers - Multiple Remote Buffer Overflows
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Alienvault Open Source SIEM (OSSIM) - SQL Injection / Remote Code Execution (Metasploit)
|
This is a remote exploit for php platform. Description: Alienvault Open Source SIEM (OSSIM) - SQL Injection / Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Alienvault Open Source SIEM (OSSIM) - SQL Injection / Remote Code Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Aerohive HiveOS 5.1r5 < 6.1r5 - Remote Code Execution
|
This is a webapps exploit for hardware platform. Description: Aerohive HiveOS 5.1r5 < 6.1r5 - Remote Code Execution. Author: Ike-Clinton
|
Analyze the security implications of: Aerohive HiveOS 5.1r5 < 6.1r5 - Remote Code Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component com_kunena - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_kunena - Blind SQL Injection. Author: B-HUNT3|2
|
Analyze the security implications of: Joomla! Component com_kunena - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Maian Uploader 4.0 - Insecure Cookie Handling
|
This is a webapps exploit for php platform. Description: Maian Uploader 4.0 - Insecure Cookie Handling. Author: S.W.A.T.
|
Analyze the security implications of: Maian Uploader 4.0 - Insecure Cookie Handling
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 2.6.32 - 'pipe.c' Local Privilege Escalation (4)
|
This is a local exploit for linux platform. Description: Linux Kernel 2.6.32 - 'pipe.c' Local Privilege Escalation (4). Author: Earl Chew
|
Analyze the security implications of: Linux Kernel 2.6.32 - 'pipe.c' Local Privilege Escalation (4)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apartment Search Script - Arbitrary File Upload / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Apartment Search Script - Arbitrary File Upload / Cross-Site Scripting. Author: ZoRLu
|
Analyze the security implications of: Apartment Search Script - Arbitrary File Upload / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bonita BPM 6.5.1 - Multiple Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: Bonita BPM 6.5.1 - Multiple Vulnerabilities. Author: High-Tech Bridge SA
|
Analyze the security implications of: Bonita BPM 6.5.1 - Multiple Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: AJ Dating 1.0 - 'view_profile.php' SQL Injection
|
This is a webapps exploit for php platform. Description: AJ Dating 1.0 - 'view_profile.php' SQL Injection. Author: ajann
|
Analyze the security implications of: AJ Dating 1.0 - 'view_profile.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jenkins Mailer Plugin < 1.20 - Cross-Site Request Forgery (Send Email)
|
This is a webapps exploit for linux platform. Description: Jenkins Mailer Plugin < 1.20 - Cross-Site Request Forgery (Send Email). Author: Kl3_GMjq6
|
Analyze the security implications of: Jenkins Mailer Plugin < 1.20 - Cross-Site Request Forgery (Send Email)
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Agora.CGI 3.x/4.0 - Debug Mode Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: Agora.CGI 3.x/4.0 - Debug Mode Cross-Site Scripting. Author: Tamer Sahin
|
Analyze the security implications of: Agora.CGI 3.x/4.0 - Debug Mode Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: soapbox 0.3.1 - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: soapbox 0.3.1 - Local Privilege Escalation. Author: Jean Pascal Pereira
|
Analyze the security implications of: soapbox 0.3.1 - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Cobalt Raq3 PopRelayD - Arbitrary SMTP Relay
|
This is a remote exploit for linux platform. Description: Cobalt Raq3 PopRelayD - Arbitrary SMTP Relay. Author: Andrea Barisani
|
Analyze the security implications of: Cobalt Raq3 PopRelayD - Arbitrary SMTP Relay
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Artifex MuPDF - Null Pointer Dereference
|
This is a dos exploit for linux platform. Description: Artifex MuPDF - Null Pointer Dereference. Author: Kamil Frankowicz
|
Analyze the security implications of: Artifex MuPDF - Null Pointer Dereference
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Royal TS/X - Information Disclosure
|
This is a webapps exploit for json platform. Description: Royal TS/X - Information Disclosure. Author: Jakub Palaczynski
|
Analyze the security implications of: Royal TS/X - Information Disclosure
|
This exploit targets json systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets json platform
|
What is this exploit about: Konqueror 3.5.5 - JavaScript Read of FTP Iframe Denial of Service
|
This is a dos exploit for linux platform. Description: Konqueror 3.5.5 - JavaScript Read of FTP Iframe Denial of Service. Author: mark
|
Analyze the security implications of: Konqueror 3.5.5 - JavaScript Read of FTP Iframe Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: EasyE-Cards 3.10 - SQL Injection / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: EasyE-Cards 3.10 - SQL Injection / Cross-Site Scripting. Author: Dr.Crash
|
Analyze the security implications of: EasyE-Cards 3.10 - SQL Injection / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Online Store Application Template - 'Sign_In.aspx' SQL Injection
|
This is a webapps exploit for asp platform. Description: Online Store Application Template - 'Sign_In.aspx' SQL Injection. Author: Aria-Security Team
|
Analyze the security implications of: Online Store Application Template - 'Sign_In.aspx' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: MVPower DVR TV-7104HE 1.8.4 115215B9 - Shell Command Execution (Metasploit)
|
This is a remote exploit for arm platform. Description: MVPower DVR TV-7104HE 1.8.4 115215B9 - Shell Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: MVPower DVR TV-7104HE 1.8.4 115215B9 - Shell Command Execution (Metasploit)
|
This exploit targets arm systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets arm platform
|
What is this exploit about: Exim ESMTP 4.80 - glibc gethostbyname Denial of Service
|
This is a dos exploit for linux platform. Description: Exim ESMTP 4.80 - glibc gethostbyname Denial of Service. Author: 1n3
|
Analyze the security implications of: Exim ESMTP 4.80 - glibc gethostbyname Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Laravel Administrator 4 - Unrestricted File Upload (Authenticated)
|
This is a webapps exploit for php platform. Description: Laravel Administrator 4 - Unrestricted File Upload (Authenticated). Author: Xavi Beltran
|
Analyze the security implications of: Laravel Administrator 4 - Unrestricted File Upload (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Global Centre Aplomb Poll 1.1 - 'admin.php?Madoa' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Global Centre Aplomb Poll 1.1 - 'admin.php?Madoa' Remote File Inclusion. Author: ilker Kandemir
|
Analyze the security implications of: Global Centre Aplomb Poll 1.1 - 'admin.php?Madoa' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Eaton Network Shutdown Module 3.21 - Remote PHP Code Injection
|
This is a webapps exploit for php platform. Description: Eaton Network Shutdown Module 3.21 - Remote PHP Code Injection. Author: Filip Waeytens
|
Analyze the security implications of: Eaton Network Shutdown Module 3.21 - Remote PHP Code Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Opera 10.63 - SVG Animation Element Denial of Service
|
This is a dos exploit for multiple platform. Description: Opera 10.63 - SVG Animation Element Denial of Service. Author: fla
|
Analyze the security implications of: Opera 10.63 - SVG Animation Element Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Cobbler 2.8.0 - (Authenticated) Remote Code Execution
|
This is a webapps exploit for linux platform. Description: Cobbler 2.8.0 - (Authenticated) Remote Code Execution. Author: Dolev Farhi
|
Analyze the security implications of: Cobbler 2.8.0 - (Authenticated) Remote Code Execution
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: OpManager 6/7 - reports/ReportViewAction.do Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for java platform. Description: OpManager 6/7 - reports/ReportViewAction.do Multiple Cross-Site Scripting Vulnerabilities. Author: Lostmon
|
Analyze the security implications of: OpManager 6/7 - reports/ReportViewAction.do Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: ClanSphere 2007.4.4 - 'install.php' Local File Inclusion
|
This is a webapps exploit for php platform. Description: ClanSphere 2007.4.4 - 'install.php' Local File Inclusion. Author: p4imi0
|
Analyze the security implications of: ClanSphere 2007.4.4 - 'install.php' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: A-FAQ 1.0 - 'faqDsp.asp?catcode' SQL Injection
|
This is a webapps exploit for asp platform. Description: A-FAQ 1.0 - 'faqDsp.asp?catcode' SQL Injection. Author: r0t
|
Analyze the security implications of: A-FAQ 1.0 - 'faqDsp.asp?catcode' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component MultiTier 3.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component MultiTier 3.1 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component MultiTier 3.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HP-UX 10.x - rs.F3000 Unauthorized Access
|
This is a local exploit for hp-ux platform. Description: HP-UX 10.x - rs.F3000 Unauthorized Access. Author: Last Stage of Delirium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.