input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Linux kernel < 4.10.15 - Race Condition Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: QNAP Photo Station 5.7.0 - Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: QNAP Photo Station 5.7.0 - Cross-Site Scripting. Author: Mitsuaki Shiraishi
|
Analyze the security implications of: QNAP Photo Station 5.7.0 - Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Barracuda Web Application Firewall 8.0.1.008 - (Authenticated) Remote Command Execution (Metasploit)
|
This is a remote exploit for linux platform. Description: Barracuda Web Application Firewall 8.0.1.008 - (Authenticated) Remote Command Execution (Metasploit). Author: xort
|
Analyze the security implications of: Barracuda Web Application Firewall 8.0.1.008 - (Authenticated) Remote Command Execution (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Lanius CMS 1.2.14 GALLERY Module - 'gid' SQL Injection
|
This is a webapps exploit for php platform. Description: Lanius CMS 1.2.14 GALLERY Module - 'gid' SQL Injection. Author: k1tk4t
|
Analyze the security implications of: Lanius CMS 1.2.14 GALLERY Module - 'gid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 3Com SuperStack 3 Firewall - Content Filter Bypassing
|
This is a remote exploit for multiple platform. Description: 3Com SuperStack 3 Firewall - Content Filter Bypassing. Author: bit_logic
|
Analyze the security implications of: 3Com SuperStack 3 Firewall - Content Filter Bypassing
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Talkie Bluetooth Video iFiles 2.0 iOS - Multiple Vulnerabilities
|
This is a webapps exploit for ios platform. Description: Talkie Bluetooth Video iFiles 2.0 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: Talkie Bluetooth Video iFiles 2.0 iOS - Multiple Vulnerabilities
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Firefox 67.0.4 - Denial of Service
|
This is a dos exploit for multiple platform. Description: Firefox 67.0.4 - Denial of Service. Author: Tejas Ajay Naik
|
Analyze the security implications of: Firefox 67.0.4 - Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component Auction Factory 4.5.5 - 'filter_order' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Auction Factory 4.5.5 - 'filter_order' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Auction Factory 4.5.5 - 'filter_order' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Blursoft Blur6ex 0.3.462 - 'index.php' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Blursoft Blur6ex 0.3.462 - 'index.php' Local File Inclusion. Author: Hamid Ebadi
|
Analyze the security implications of: Blursoft Blur6ex 0.3.462 - 'index.php' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OpenFTPd 0.30.1 - message system Remote Shell
|
This is a remote exploit for linux platform. Description: OpenFTPd 0.30.1 - message system Remote Shell. Author: infamous41md
|
Analyze the security implications of: OpenFTPd 0.30.1 - message system Remote Shell
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow
|
This is a remote exploit for hardware platform. Description: Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow. Author: Artem Metla
|
Analyze the security implications of: Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: MySQL < 5.6.35 / < 5.7.17 - Integer Overflow
|
This is a dos exploit for multiple platform. Description: MySQL < 5.6.35 / < 5.7.17 - Integer Overflow. Author: Rodrigo Marcos
|
Analyze the security implications of: MySQL < 5.6.35 / < 5.7.17 - Integer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Mambo Component MMP 1.2 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Mambo Component MMP 1.2 - Remote File Inclusion. Author: mdx
|
Analyze the security implications of: Mambo Component MMP 1.2 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Realtyna Translator 1.0.15 - Local File Inclusion (2)
|
This is a webapps exploit for php platform. Description: Joomla! Component Realtyna Translator 1.0.15 - Local File Inclusion (2). Author: MISTERFRIBO
|
Analyze the security implications of: Joomla! Component Realtyna Translator 1.0.15 - Local File Inclusion (2)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Drupal 5.21/6.16 - Denial of Service
|
This is a dos exploit for php platform. Description: Drupal 5.21/6.16 - Denial of Service. Author: emgent
|
Analyze the security implications of: Drupal 5.21/6.16 - Denial of Service
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: xWPE 1.5.30a-2.1 - Local Buffer Overflow
|
This is a local exploit for linux platform. Description: xWPE 1.5.30a-2.1 - Local Buffer Overflow. Author: Juan Sacco
|
Analyze the security implications of: xWPE 1.5.30a-2.1 - Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: TEM Opera Plus FM Family Transmitter 35.45 - Remote Code Execution
|
This is a remote exploit for hardware platform. Description: TEM Opera Plus FM Family Transmitter 35.45 - Remote Code Execution. Author: LiquidWorm
|
Analyze the security implications of: TEM Opera Plus FM Family Transmitter 35.45 - Remote Code Execution
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Google Android - '/system/bin/sdcard' Stack Buffer Overflow (PoC)
|
This is a dos exploit for android platform. Description: Google Android - '/system/bin/sdcard' Stack Buffer Overflow (PoC). Author: Google Security Research
|
Analyze the security implications of: Google Android - '/system/bin/sdcard' Stack Buffer Overflow (PoC)
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: DynPG CMS 4.1.0 - 'popup.php' / 'counter.php' Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: DynPG CMS 4.1.0 - 'popup.php' / 'counter.php' Multiple Vulnerabilities. Author: eidelweiss
|
Analyze the security implications of: DynPG CMS 4.1.0 - 'popup.php' / 'counter.php' Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adobe Flash - Object.unwatch Use-After-Free
|
This is a remote exploit for multiple platform. Description: Adobe Flash - Object.unwatch Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - Object.unwatch Use-After-Free
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: PCRE 6.2 - Regular Expression Compiling Workspace Buffer Overflow
|
This is a remote exploit for linux platform. Description: PCRE 6.2 - Regular Expression Compiling Workspace Buffer Overflow. Author: Michael Santos
|
Analyze the security implications of: PCRE 6.2 - Regular Expression Compiling Workspace Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Netscape Enterprise Server 3.0/4.0 - 'Index' Disclosure
|
This is a remote exploit for multiple platform. Description: Netscape Enterprise Server 3.0/4.0 - 'Index' Disclosure. Author: Security Research Team
|
Analyze the security implications of: Netscape Enterprise Server 3.0/4.0 - 'Index' Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Hot Scripts Clone - 'subctid' SQL Injection
|
This is a webapps exploit for php platform. Description: Hot Scripts Clone - 'subctid' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Hot Scripts Clone - 'subctid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link DSL-2740B ADSL Router - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: D-Link DSL-2740B ADSL Router - Authentication Bypass. Author: Ivano Binetti
|
Analyze the security implications of: D-Link DSL-2740B ADSL Router - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Invision Power Board (IP.Board) 4.x - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) 4.x - Persistent Cross-Site Scripting. Author: snop
|
Analyze the security implications of: Invision Power Board (IP.Board) 4.x - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BlackCat CMS 1.3.6 - 'Multiple' Stored Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: BlackCat CMS 1.3.6 - 'Multiple' Stored Cross-Site Scripting (XSS). Author: Ömer Hasan Durmuş
|
Analyze the security implications of: BlackCat CMS 1.3.6 - 'Multiple' Stored Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component JotLoader 2.2.1 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component JotLoader 2.2.1 - Local File Inclusion. Author: v3n0m
|
Analyze the security implications of: Joomla! Component JotLoader 2.2.1 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Picasa2Gallery 1.2.8 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Picasa2Gallery 1.2.8 - Local File Inclusion. Author: kaMtiEz
|
Analyze the security implications of: Joomla! Component Picasa2Gallery 1.2.8 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple iOS 1.1.4/2.0 / iPod 1.1.4/2.0 touch Safari WebKit - 'alert()' Remote Denial of Service
|
This is a dos exploit for hardware platform. Description: Apple iOS 1.1.4/2.0 / iPod 1.1.4/2.0 touch Safari WebKit - 'alert()' Remote Denial of Service. Author: Nicolas Economou
|
Analyze the security implications of: Apple iOS 1.1.4/2.0 / iPod 1.1.4/2.0 touch Safari WebKit - 'alert()' Remote Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CA ARCserve D2D r15 GWT RPC - Multiple Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: CA ARCserve D2D r15 GWT RPC - Multiple Vulnerabilities. Author: rgod
|
Analyze the security implications of: CA ARCserve D2D r15 GWT RPC - Multiple Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Oracle JD Edwards EnterpriseOne 8.9x Tools Web Runtime SEC - '/jde/E1Menu_Menu.mafService?e1.namespace' Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: Oracle JD Edwards EnterpriseOne 8.9x Tools Web Runtime SEC - '/jde/E1Menu_Menu.mafService?e1.namespace' Cross-Site Scripting. Author: Juan Manuel Garcia
|
Analyze the security implications of: Oracle JD Edwards EnterpriseOne 8.9x Tools Web Runtime SEC - '/jde/E1Menu_Menu.mafService?e1.namespace' Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Evaria Content Management System 1.1 - File Disclosure
|
This is a webapps exploit for php platform. Description: Evaria Content Management System 1.1 - File Disclosure. Author: khayeye shotor
|
Analyze the security implications of: Evaria Content Management System 1.1 - File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Firebird 2.0.3 Relational Database - 'protocol.cpp' XDR Protocol Remote Memory Corruption
|
This is a remote exploit for multiple platform. Description: Firebird 2.0.3 Relational Database - 'protocol.cpp' XDR Protocol Remote Memory Corruption. Author: Damian Frizza
|
Analyze the security implications of: Firebird 2.0.3 Relational Database - 'protocol.cpp' XDR Protocol Remote Memory Corruption
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apache 2.0.45 - 'APR' Crash
|
This is a dos exploit for linux platform. Description: Apache 2.0.45 - 'APR' Crash. Author: Matthew Murphy
|
Analyze the security implications of: Apache 2.0.45 - 'APR' Crash
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.