input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bayanno Hospital Management System 4.0 - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Bayanno Hospital Management System 4.0 - Cross-Site Scripting. Author: Gokhan Sagoglu
|
Analyze the security implications of: Bayanno Hospital Management System 4.0 - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adobe Flash Player 10.0.22 / AIR - URI Parsing Heap Buffer Overflow (PoC)
|
This is a dos exploit for multiple platform. Description: Adobe Flash Player 10.0.22 / AIR - URI Parsing Heap Buffer Overflow (PoC). Author: iDefense
|
Analyze the security implications of: Adobe Flash Player 10.0.22 / AIR - URI Parsing Heap Buffer Overflow (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Technicolor TC7337 - 'SSID' Persistent Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: Technicolor TC7337 - 'SSID' Persistent Cross-Site Scripting. Author: Geolado giolado
|
Analyze the security implications of: Technicolor TC7337 - 'SSID' Persistent Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Apple macOS < 10.12.2 / iOS < 10.2 Kernel - ipc_port_t Reference Count Leak Due to Incorrect externalMethod Overrides Use-After-Free
|
This is a dos exploit for multiple platform. Description: Apple macOS < 10.12.2 / iOS < 10.2 Kernel - ipc_port_t Reference Count Leak Due to Incorrect externalMethod Overrides Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: Apple macOS < 10.12.2 / iOS < 10.2 Kernel - ipc_port_t Reference Count Leak Due to Incorrect externalMethod Overrides Use-After-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Go SSH servers 0.0.2 - Denial of Service (PoC)
|
This is a dos exploit for linux platform. Description: Go SSH servers 0.0.2 - Denial of Service (PoC). Author: Mark Adams
|
Analyze the security implications of: Go SSH servers 0.0.2 - Denial of Service (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_cartikads 1.0 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Joomla! Component com_cartikads 1.0 - Arbitrary File Upload. Author: kaMtiEz
|
Analyze the security implications of: Joomla! Component com_cartikads 1.0 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Broadcom Wi-Fi SoC - Heap Overflow 'wlc_tdls_cal_mic_chk' Due to Large RSN IE in TDLS Setup Confirm Frame
|
This is a dos exploit for hardware platform. Description: Broadcom Wi-Fi SoC - Heap Overflow 'wlc_tdls_cal_mic_chk' Due to Large RSN IE in TDLS Setup Confirm Frame. Author: Google Security Research
|
Analyze the security implications of: Broadcom Wi-Fi SoC - Heap Overflow 'wlc_tdls_cal_mic_chk' Due to Large RSN IE in TDLS Setup Confirm Frame
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Arcadwy Arcade Script - 'Username' Static Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Arcadwy Arcade Script - 'Username' Static Cross-Site Scripting. Author: Anarchy Angel
|
Analyze the security implications of: Arcadwy Arcade Script - 'Username' Static Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link DIR-645 - Multiple UPNP Vulnerabilities
|
This is a remote exploit for hardware platform. Description: D-Link DIR-645 - Multiple UPNP Vulnerabilities. Author: Samuel Huntley
|
Analyze the security implications of: D-Link DIR-645 - Multiple UPNP Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: IFOBS - 'regclientprint.jsp' Multiple HTML Injection Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: IFOBS - 'regclientprint.jsp' Multiple HTML Injection Vulnerabilities. Author: MustLive
|
Analyze the security implications of: IFOBS - 'regclientprint.jsp' Multiple HTML Injection Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Evince 3.24.0 - Command Injection
|
This is a dos exploit for linux platform. Description: Evince 3.24.0 - Command Injection. Author: Matlink
|
Analyze the security implications of: Evince 3.24.0 - Command Injection
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Kojoney 0.0.4.1 - 'urllib.urlopen()' Remote Denial of Service
|
This is a dos exploit for linux platform. Description: Kojoney 0.0.4.1 - 'urllib.urlopen()' Remote Denial of Service. Author: Nicob
|
Analyze the security implications of: Kojoney 0.0.4.1 - 'urllib.urlopen()' Remote Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: DoceboLms 4.0.4 - 'index.php' Multiple HTML Injection Vulnerabilities
|
This is a webapps exploit for php platform. Description: DoceboLms 4.0.4 - 'index.php' Multiple HTML Injection Vulnerabilities. Author: LiquidWorm
|
Analyze the security implications of: DoceboLms 4.0.4 - 'index.php' Multiple HTML Injection Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Zeroo HTTP Server 1.5 - Directory Traversal (1)
|
This is a remote exploit for linux platform. Description: Zeroo HTTP Server 1.5 - Directory Traversal (1). Author: mikecc
|
Analyze the security implications of: Zeroo HTTP Server 1.5 - Directory Traversal (1)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Artworks Gallery Management System 1.0 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Artworks Gallery Management System 1.0 - 'id' SQL Injection. Author: Vijay Sachdeva
|
Analyze the security implications of: Artworks Gallery Management System 1.0 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 3.10.0-229.x (CentOS / RHEL 7.1) - 'iowarrior' Driver Crash (PoC)
|
This is a dos exploit for linux platform. Description: Linux Kernel 3.10.0-229.x (CentOS / RHEL 7.1) - 'iowarrior' Driver Crash (PoC). Author: OpenSource Security
|
Analyze the security implications of: Linux Kernel 3.10.0-229.x (CentOS / RHEL 7.1) - 'iowarrior' Driver Crash (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Novell eDirectory 8.x - iMonitor HTTPSTK Buffer Overflow (2)
|
This is a remote exploit for novell platform. Description: Novell eDirectory 8.x - iMonitor HTTPSTK Buffer Overflow (2). Author: Expanders
|
Analyze the security implications of: Novell eDirectory 8.x - iMonitor HTTPSTK Buffer Overflow (2)
|
This exploit targets novell systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets novell platform
|
What is this exploit about: Lucee Scheduled Job v1.0 - Command Execution
|
This is a local exploit for multiple platform. Description: Lucee Scheduled Job v1.0 - Command Execution. Author: Alexander Philiotis
|
Analyze the security implications of: Lucee Scheduled Job v1.0 - Command Execution
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_jsjobs 1.0.5.6 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_jsjobs 1.0.5.6 - SQL Injection. Author: kaMtiEz
|
Analyze the security implications of: Joomla! Component com_jsjobs 1.0.5.6 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Netgear WNR2000 - Multiple Information Disclosure Vulnerabilities
|
This is a remote exploit for hardware platform. Description: Netgear WNR2000 - Multiple Information Disclosure Vulnerabilities. Author: Jean Trolleur
|
Analyze the security implications of: Netgear WNR2000 - Multiple Information Disclosure Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: IBM AIX 4.3.2 - 'ftpd' Remote Buffer Overflow
|
This is a remote exploit for aix platform. Description: IBM AIX 4.3.2 - 'ftpd' Remote Buffer Overflow. Author: Gerrie
|
Analyze the security implications of: IBM AIX 4.3.2 - 'ftpd' Remote Buffer Overflow
|
This exploit targets aix systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: Tenda N11 Wireless Router 5.07.43_en_NEX01 - Remote DNS Change
|
This is a webapps exploit for hardware platform. Description: Tenda N11 Wireless Router 5.07.43_en_NEX01 - Remote DNS Change. Author: Todor Donev
|
Analyze the security implications of: Tenda N11 Wireless Router 5.07.43_en_NEX01 - Remote DNS Change
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: webdesproxy 0.0.1 - 'exec-shield' GET Remote Code Execution
|
This is a remote exploit for linux platform. Description: webdesproxy 0.0.1 - 'exec-shield' GET Remote Code Execution. Author: Xpl017Elz
|
Analyze the security implications of: webdesproxy 0.0.1 - 'exec-shield' GET Remote Code Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: VMware View 3.1.x - URL Processing Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: VMware View 3.1.x - URL Processing Cross-Site Scripting. Author: Alexey Sintsov
|
Analyze the security implications of: VMware View 3.1.x - URL Processing Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: e107 website system 0.7.5 - 'contact.php?Query String (PATH_INFO)' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: e107 website system 0.7.5 - 'contact.php?Query String (PATH_INFO)' Cross-Site Scripting. Author: zark0vac
|
Analyze the security implications of: e107 website system 0.7.5 - 'contact.php?Query String (PATH_INFO)' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: QNAP QTS < 4.2.4 - Domain Privilege Escalation
|
This is a local exploit for hardware platform. Description: QNAP QTS < 4.2.4 - Domain Privilege Escalation. Author: Pasquale Fiorillo
|
Analyze the security implications of: QNAP QTS < 4.2.4 - Domain Privilege Escalation
|
This exploit targets hardware systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CA Arcserve D2D GWT RPC - Credential Information Disclosure (Metasploit)
|
This is a webapps exploit for jsp platform. Description: CA Arcserve D2D GWT RPC - Credential Information Disclosure (Metasploit). Author: Metasploit
|
Analyze the security implications of: CA Arcserve D2D GWT RPC - Credential Information Disclosure (Metasploit)
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: INFINICART - 'sendpassword.asp?email' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: INFINICART - 'sendpassword.asp?email' Cross-Site Scripting. Author: laurent gaffie
|
Analyze the security implications of: INFINICART - 'sendpassword.asp?email' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Novell Client 4.91.5 - ActiveX Control 'nwsetup.dll' Remote Denial of Service (1)
|
This is a dos exploit for novell platform. Description: Novell Client 4.91.5 - ActiveX Control 'nwsetup.dll' Remote Denial of Service (1). Author: Francis Provencher
|
Analyze the security implications of: Novell Client 4.91.5 - ActiveX Control 'nwsetup.dll' Remote Denial of Service (1)
|
This exploit targets novell systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets novell platform
|
What is this exploit about: Selenium 3.141.59 - Remote Code Execution (Firefox/geckodriver)
|
This is a webapps exploit for linux platform. Description: Selenium 3.141.59 - Remote Code Execution (Firefox/geckodriver). Author: Jon Stratton
|
Analyze the security implications of: Selenium 3.141.59 - Remote Code Execution (Firefox/geckodriver)
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Exim - 'perl_startup' Local Privilege Escalation (Metasploit)
|
This is a local exploit for linux platform. Description: Exim - 'perl_startup' Local Privilege Escalation (Metasploit). Author: Metasploit
|
Analyze the security implications of: Exim - 'perl_startup' Local Privilege Escalation (Metasploit)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: LearnPress WordPress LMS Plugin 4.2.7 - SQL Injection
|
This is a webapps exploit for php platform. Description: LearnPress WordPress LMS Plugin 4.2.7 - SQL Injection. Author: Francisco Moraga (BTshell)
|
Analyze the security implications of: LearnPress WordPress LMS Plugin 4.2.7 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Job Search Script - SQL Injection
|
This is a webapps exploit for php platform. Description: Job Search Script - SQL Injection. Author: L0rd CrusAd3r
|
Analyze the security implications of: Job Search Script - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.