input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: DMXReady Members Area Manager 1.2 - SQL Injection
|
This is a webapps exploit for asp platform. Description: DMXReady Members Area Manager 1.2 - SQL Injection. Author: ajann
|
Analyze the security implications of: DMXReady Members Area Manager 1.2 - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Trend Micro OfficeScan Corporate Edition 3.0/3.5/3.11/3.13 - Denial of Service
|
This is a dos exploit for multiple platform. Description: Trend Micro OfficeScan Corporate Edition 3.0/3.5/3.11/3.13 - Denial of Service. Author: Jeff Stevens
|
Analyze the security implications of: Trend Micro OfficeScan Corporate Edition 3.0/3.5/3.11/3.13 - Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Android 7 - 9 VideoPlayer - 'ihevcd_parse_pps' Out-of-Bounds Write
|
This is a dos exploit for android platform. Description: Android 7 - 9 VideoPlayer - 'ihevcd_parse_pps' Out-of-Bounds Write. Author: Marcin Kozlowski
|
Analyze the security implications of: Android 7 - 9 VideoPlayer - 'ihevcd_parse_pps' Out-of-Bounds Write
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: UFO: Alien Invasion 2.2.1 (OSX Snow Leopard) - IRC Client Remote Code Execution (ROP)
|
This is a remote exploit for osx platform. Description: UFO: Alien Invasion 2.2.1 (OSX Snow Leopard) - IRC Client Remote Code Execution (ROP). Author: d1dn0t
|
Analyze the security implications of: UFO: Alien Invasion 2.2.1 (OSX Snow Leopard) - IRC Client Remote Code Execution (ROP)
|
This exploit targets osx systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Experts 1.0.0 - 'answer.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Experts 1.0.0 - 'answer.php' SQL Injection. Author: CWH Underground
|
Analyze the security implications of: Experts 1.0.0 - 'answer.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: pdfium IsFlagSet (v8 memory management) - SIGSEGV
|
This is a dos exploit for multiple platform. Description: pdfium IsFlagSet (v8 memory management) - SIGSEGV. Author: Google Security Research
|
Analyze the security implications of: pdfium IsFlagSet (v8 memory management) - SIGSEGV
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: FreeSchool 1.1.0 - Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: FreeSchool 1.1.0 - Multiple Remote File Inclusions. Author: cr4wl3r
|
Analyze the security implications of: FreeSchool 1.1.0 - Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Discovery TorrentTrader 2.6 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Discovery TorrentTrader 2.6 - Multiple Vulnerabilities. Author: EsS4ndre
|
Analyze the security implications of: Discovery TorrentTrader 2.6 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Fuzzylime CMS 3.01 - Remote Command Execution
|
This is a webapps exploit for php platform. Description: Fuzzylime CMS 3.01 - Remote Command Execution. Author: Ams
|
Analyze the security implications of: Fuzzylime CMS 3.01 - Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gentoo-Specific MPG123 - URI Remote Buffer Overflow
|
This is a dos exploit for linux platform. Description: Gentoo-Specific MPG123 - URI Remote Buffer Overflow. Author: Horst Schirmeier
|
Analyze the security implications of: Gentoo-Specific MPG123 - URI Remote Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: gapicms 9.0.2 - 'dirDepth' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: gapicms 9.0.2 - 'dirDepth' Remote File Inclusion. Author: Ghost Hacker
|
Analyze the security implications of: gapicms 9.0.2 - 'dirDepth' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CSF Firewall - Buffer Overflow (PoC)
|
This is a dos exploit for linux platform. Description: CSF Firewall - Buffer Overflow (PoC). Author: FoX HaCkEr
|
Analyze the security implications of: CSF Firewall - Buffer Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Iris ID IrisAccess iCAM4000/iCAM7000 - Hard-Coded Credentials Remote Shell Access
|
This is a remote exploit for linux platform. Description: Iris ID IrisAccess iCAM4000/iCAM7000 - Hard-Coded Credentials Remote Shell Access. Author: LiquidWorm
|
Analyze the security implications of: Iris ID IrisAccess iCAM4000/iCAM7000 - Hard-Coded Credentials Remote Shell Access
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Clipbucket 2.5 - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: Clipbucket 2.5 - Cross-Site Request Forgery. Author: DaOne
|
Analyze the security implications of: Clipbucket 2.5 - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SePortal 2.5 - SQL Injection / Remote Code Execution (Metasploit)
|
This is a remote exploit for php platform. Description: SePortal 2.5 - SQL Injection / Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: SePortal 2.5 - SQL Injection / Remote Code Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Nvidia Graphics Driver 8774 - Local Buffer Overflow
|
This is a local exploit for linux platform. Description: Nvidia Graphics Driver 8774 - Local Buffer Overflow. Author: Rapid7 Security
|
Analyze the security implications of: Nvidia Graphics Driver 8774 - Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: 5 star Rating 1.2 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: 5 star Rating 1.2 - Authentication Bypass. Author: zer0day
|
Analyze the security implications of: 5 star Rating 1.2 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ProjectApp 3.3 - 'links.asp?keywords' Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: ProjectApp 3.3 - 'links.asp?keywords' Cross-Site Scripting. Author: r0t
|
Analyze the security implications of: ProjectApp 3.3 - 'links.asp?keywords' Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Apple iPhone 2.2.1 - Call Approval Dialog Security Bypass (3)
|
This is a remote exploit for hardware platform. Description: Apple iPhone 2.2.1 - Call Approval Dialog Security Bypass (3). Author: Collin Mulliner
|
Analyze the security implications of: Apple iPhone 2.2.1 - Call Approval Dialog Security Bypass (3)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: E-Xoopport Samsara 3.1 (eCal Module) - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: E-Xoopport Samsara 3.1 (eCal Module) - Blind SQL Injection. Author: _mRkZ_
|
Analyze the security implications of: E-Xoopport Samsara 3.1 (eCal Module) - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux 4.4.0 < 4.4.0-53 - 'AF_PACKET chocobo_root' Local Privilege Escalation (Metasploit)
|
This is a local exploit for linux platform. Description: Linux 4.4.0 < 4.4.0-53 - 'AF_PACKET chocobo_root' Local Privilege Escalation (Metasploit). Author: Metasploit
|
Analyze the security implications of: Linux 4.4.0 < 4.4.0-53 - 'AF_PACKET chocobo_root' Local Privilege Escalation (Metasploit)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: PerlDesk Language Variable - Server-Side Script Execution
|
This is a webapps exploit for cgi platform. Description: PerlDesk Language Variable - Server-Side Script Execution. Author: Nikyt0x Argentina
|
Analyze the security implications of: PerlDesk Language Variable - Server-Side Script Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: ktsuss 1.4 - suid Privilege Escalation (Metasploit)
|
This is a local exploit for linux platform. Description: ktsuss 1.4 - suid Privilege Escalation (Metasploit). Author: Metasploit
|
Analyze the security implications of: ktsuss 1.4 - suid Privilege Escalation (Metasploit)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: BTGrup Admin WebController - SQL Injection
|
This is a webapps exploit for php platform. Description: BTGrup Admin WebController - SQL Injection. Author: khc@bsdmail.org
|
Analyze the security implications of: BTGrup Admin WebController - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EyesOfNetwork 5.3 - RCE & PrivEsc
|
This is a webapps exploit for multiple platform. Description: EyesOfNetwork 5.3 - RCE & PrivEsc. Author: Audencia Business SCHOOL Red Team
|
Analyze the security implications of: EyesOfNetwork 5.3 - RCE & PrivEsc
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Land Down Under 800/801 - 'list.php' Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Land Down Under 800/801 - 'list.php' Multiple SQL Injections. Author: bl2k
|
Analyze the security implications of: Land Down Under 800/801 - 'list.php' Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_state_query.inc.php?base_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_state_query.inc.php?base_path' Remote File Inclusion. Author: indoushka
|
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_state_query.inc.php?base_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: evoBB 0.3 - 'path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: evoBB 0.3 - 'path' Remote File Inclusion. Author: SHiKaA
|
Analyze the security implications of: evoBB 0.3 - 'path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Activist Mobilization Platform (AMP) 3.2 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Activist Mobilization Platform (AMP) 3.2 - Remote File Inclusion. Author: the_day
|
Analyze the security implications of: Activist Mobilization Platform (AMP) 3.2 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Tea LaTex 1.0 - Remote Code Execution (Unauthenticated)
|
This is a webapps exploit for multiple platform. Description: Tea LaTex 1.0 - Remote Code Execution (Unauthenticated). Author: nepska
|
Analyze the security implications of: Tea LaTex 1.0 - Remote Code Execution (Unauthenticated)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Honeywell IP-Camera HICC-1100PT - Local File Disclosure
|
This is a webapps exploit for cgi platform. Description: Honeywell IP-Camera HICC-1100PT - Local File Disclosure. Author: Yakir Wizman
|
Analyze the security implications of: Honeywell IP-Camera HICC-1100PT - Local File Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Desi Short URL Script - (Authentication Bypass) Insecure Cookie Handling
|
This is a webapps exploit for php platform. Description: Desi Short URL Script - (Authentication Bypass) Insecure Cookie Handling. Author: N@bilX
|
Analyze the security implications of: Desi Short URL Script - (Authentication Bypass) Insecure Cookie Handling
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Compro Technology IP Camera - 'killps.cgi' Denial of Service (DoS)
|
This is a webapps exploit for hardware platform. Description: Compro Technology IP Camera - 'killps.cgi' Denial of Service (DoS). Author: icekam
|
Analyze the security implications of: Compro Technology IP Camera - 'killps.cgi' Denial of Service (DoS)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: TVT NVMS 1000 - Directory Traversal
|
This is a webapps exploit for hardware platform. Description: TVT NVMS 1000 - Directory Traversal. Author: Mohin Paramasivam
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.