input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Avast! - Out-of-Bounds Write Decrypting PEncrypt Packed executables
|
This is a dos exploit for multiple platform. Description: Avast! - Out-of-Bounds Write Decrypting PEncrypt Packed executables. Author: Google Security Research
|
Analyze the security implications of: Avast! - Out-of-Bounds Write Decrypting PEncrypt Packed executables
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: LibTIFF 3.9.4 - Out-Of-Order Tag Type Mismatch Remote Denial of Service
|
This is a dos exploit for linux platform. Description: LibTIFF 3.9.4 - Out-Of-Order Tag Type Mismatch Remote Denial of Service. Author: Tom Lane
|
Analyze the security implications of: LibTIFF 3.9.4 - Out-Of-Order Tag Type Mismatch Remote Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Netbus 2.0 Pro - Directory Listings Disclosure / Arbitrary File Upload
|
This is a remote exploit for multiple platform. Description: Netbus 2.0 Pro - Directory Listings Disclosure / Arbitrary File Upload. Author: Rafel Ivgi The-Insider
|
Analyze the security implications of: Netbus 2.0 Pro - Directory Listings Disclosure / Arbitrary File Upload
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Just Dial Clone Script - 'srch' SQL Injection
|
This is a webapps exploit for php platform. Description: Just Dial Clone Script - 'srch' SQL Injection. Author: Arbin Godar
|
Analyze the security implications of: Just Dial Clone Script - 'srch' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Macromedia Sitespring 1.2 - Default Error Page Cross-Site Scripting
|
This is a webapps exploit for jsp platform. Description: Macromedia Sitespring 1.2 - Default Error Page Cross-Site Scripting. Author: Peter Gründl
|
Analyze the security implications of: Macromedia Sitespring 1.2 - Default Error Page Cross-Site Scripting
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Joomla! Component Timetable Schedule 3.6.8 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Timetable Schedule 3.6.8 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Timetable Schedule 3.6.8 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Boat Classifieds - 'printdetail.asp?Id' SQL Injection
|
This is a webapps exploit for asp platform. Description: Boat Classifieds - 'printdetail.asp?Id' SQL Injection. Author: CoBRa_21
|
Analyze the security implications of: Boat Classifieds - 'printdetail.asp?Id' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Oracle 8.1.x/9.0/9.2 - TNS Listener Service_CurLoad Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Oracle 8.1.x/9.0/9.2 - TNS Listener Service_CurLoad Remote Denial of Service. Author: Rapid 7
|
Analyze the security implications of: Oracle 8.1.x/9.0/9.2 - TNS Listener Service_CurLoad Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: EZDatabase 2.1.1 - 'index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: EZDatabase 2.1.1 - 'index.php' Cross-Site Scripting. Author: Josh Zlatin-Amishav
|
Analyze the security implications of: EZDatabase 2.1.1 - 'index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: TP-Link TL-WR740N 111130 - 'ping_addr' HTML Injection
|
This is a remote exploit for hardware platform. Description: TP-Link TL-WR740N 111130 - 'ping_addr' HTML Injection. Author: l20ot
|
Analyze the security implications of: TP-Link TL-WR740N 111130 - 'ping_addr' HTML Injection
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Trend Micro Control Manager - ImportFile Directory Traversal Remote Code Execution (Metasploit)
|
This is a remote exploit for php platform. Description: Trend Micro Control Manager - ImportFile Directory Traversal Remote Code Execution (Metasploit). Author: James Fitts
|
Analyze the security implications of: Trend Micro Control Manager - ImportFile Directory Traversal Remote Code Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Fastpublish CMS 1.9999 - config[fsBase] Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Fastpublish CMS 1.9999 - config[fsBase] Remote File Inclusion. Author: RoMaNcYxHaCkEr
|
Analyze the security implications of: Fastpublish CMS 1.9999 - config[fsBase] Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Invision Power Board (IP.Board) 3.3.4 - Unserialize Regex Bypass
|
This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) 3.3.4 - Unserialize Regex Bypass. Author: webDEViL
|
Analyze the security implications of: Invision Power Board (IP.Board) 3.3.4 - Unserialize Regex Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ZHONE < S3.0.501 - Multiple Remote Code Execution Vulnerabilities
|
This is a dos exploit for hardware platform. Description: ZHONE < S3.0.501 - Multiple Remote Code Execution Vulnerabilities. Author: Lyon Yang
|
Analyze the security implications of: ZHONE < S3.0.501 - Multiple Remote Code Execution Vulnerabilities
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution
|
This is a webapps exploit for linux platform. Description: Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution. Author: Vex Woo
|
Analyze the security implications of: Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Cambium ePMP1000 - 'get_chart' Shell via Command Injection (Metasploit)
|
This is a remote exploit for cgi platform. Description: Cambium ePMP1000 - 'get_chart' Shell via Command Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: Cambium ePMP1000 - 'get_chart' Shell via Command Injection (Metasploit)
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Joomla! Component EXP Shop 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component EXP Shop 1.0 - SQL Injection. Author: His0k4
|
Analyze the security implications of: Joomla! Component EXP Shop 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: icblogger 2.0 - 'YID' SQL Injection
|
This is a webapps exploit for asp platform. Description: icblogger 2.0 - 'YID' SQL Injection. Author: Chironex Fleckeri
|
Analyze the security implications of: icblogger 2.0 - 'YID' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Sielco Analog FM Transmitter 2.12 - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: Sielco Analog FM Transmitter 2.12 - Cross-Site Request Forgery. Author: LiquidWorm
|
Analyze the security implications of: Sielco Analog FM Transmitter 2.12 - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CoMoblog 1.0 - 'Img.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: CoMoblog 1.0 - 'Img.php' Cross-Site Scripting. Author: FarhadKey
|
Analyze the security implications of: CoMoblog 1.0 - 'Img.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ASPNuke 0.80 - 'register.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: ASPNuke 0.80 - 'register.asp' SQL Injection. Author: ajann
|
Analyze the security implications of: ASPNuke 0.80 - 'register.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: DotA OpenStats 1.3.9 - SQL Injection
|
This is a webapps exploit for php platform. Description: DotA OpenStats 1.3.9 - SQL Injection. Author: HvM17
|
Analyze the security implications of: DotA OpenStats 1.3.9 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Horde Webmail 5.2.22 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Horde Webmail 5.2.22 - Multiple Vulnerabilities. Author: InfinitumIT
|
Analyze the security implications of: Horde Webmail 5.2.22 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iLife iPhoto Photocast - XML Title Remote Format String (PoC)
|
This is a dos exploit for osx platform. Description: iLife iPhoto Photocast - XML Title Remote Format String (PoC). Author: MoAB
|
Analyze the security implications of: iLife iPhoto Photocast - XML Title Remote Format String (PoC)
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Struts 2.0.11 - Multiple Directory Traversal Vulnerabilities
|
This is a remote exploit for multiple platform. Description: Struts 2.0.11 - Multiple Directory Traversal Vulnerabilities. Author: Csaba Barta
|
Analyze the security implications of: Struts 2.0.11 - Multiple Directory Traversal Vulnerabilities
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Linux NTP query client 4.2.6p1 - Heap Overflow
|
This is a dos exploit for linux platform. Description: Linux NTP query client 4.2.6p1 - Heap Overflow. Author: mr_me
|
Analyze the security implications of: Linux NTP query client 4.2.6p1 - Heap Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Jaws 0.x - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Jaws 0.x - Remote File Inclusion. Author: Stefan Esser
|
Analyze the security implications of: Jaws 0.x - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mutiny 5 - Arbitrary File Upload (Metasploit)
|
This is a remote exploit for linux platform. Description: Mutiny 5 - Arbitrary File Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: Mutiny 5 - Arbitrary File Upload (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: chCounter - indirect SQL Injection / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: chCounter - indirect SQL Injection / Cross-Site Scripting. Author: Valentin
|
Analyze the security implications of: chCounter - indirect SQL Injection / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HT Editor 2.0.18 - File Opening Stack Overflow
|
This is a local exploit for linux platform. Description: HT Editor 2.0.18 - File Opening Stack Overflow. Author: ZadYree
|
Analyze the security implications of: HT Editor 2.0.18 - File Opening Stack Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Linux Kernel 3.4 < 3.13.2 - recvmmsg x32 compat (PoC)
|
This is a dos exploit for linux platform. Description: Linux Kernel 3.4 < 3.13.2 - recvmmsg x32 compat (PoC). Author: Kees Cook
|
Analyze the security implications of: Linux Kernel 3.4 < 3.13.2 - recvmmsg x32 compat (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 - Authentication Bypass. Author: LiquidWorm
|
Analyze the security implications of: Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ManageEngine Security Manager Plus 5.5 build 5505 - Directory Traversal
|
This is a webapps exploit for multiple platform. Description: ManageEngine Security Manager Plus 5.5 build 5505 - Directory Traversal. Author: xistence
|
Analyze the security implications of: ManageEngine Security Manager Plus 5.5 build 5505 - Directory Traversal
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Habari Blog - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Habari Blog - Multiple Vulnerabilities. Author: High-Tech Bridge SA
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.