input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Opera Web Browser 11.00 - 'option' HTML Element Integer Overflow
|
This is a remote exploit for multiple platform. Description: Opera Web Browser 11.00 - 'option' HTML Element Integer Overflow. Author: C4SS!0 G0M3S
|
Analyze the security implications of: Opera Web Browser 11.00 - 'option' HTML Element Integer Overflow
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CiMe Citas Médicas - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: CiMe Citas Médicas - Multiple Vulnerabilities. Author: vinicius777
|
Analyze the security implications of: CiMe Citas Médicas - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Freenews 1.1 - 'moteur.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Freenews 1.1 - 'moteur.php' Remote File Inclusion. Author: Mehmet Ince
|
Analyze the security implications of: Freenews 1.1 - 'moteur.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MiniDVBLinux 5.4 - Unauthenticated Stream Disclosure
|
This is a remote exploit for hardware platform. Description: MiniDVBLinux 5.4 - Unauthenticated Stream Disclosure. Author: LiquidWorm
|
Analyze the security implications of: MiniDVBLinux 5.4 - Unauthenticated Stream Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Apache Tomcat < 5.5.17 - Remote Directory Listing
|
This is a remote exploit for multiple platform. Description: Apache Tomcat < 5.5.17 - Remote Directory Listing. Author: ScanAlert Security
|
Analyze the security implications of: Apache Tomcat < 5.5.17 - Remote Directory Listing
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Maxwebportal 1.3 - 'pic_popular.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: Maxwebportal 1.3 - 'pic_popular.asp' SQL Injection. Author: s-dalili
|
Analyze the security implications of: Maxwebportal 1.3 - 'pic_popular.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Zabbix Server - Multiple Vulnerabilities
|
This is a webapps exploit for multiple platform. Description: Zabbix Server - Multiple Vulnerabilities. Author: Nicob
|
Analyze the security implications of: Zabbix Server - Multiple Vulnerabilities
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: IBM OmniFind - Cross-Site Request Forgery
|
This is a webapps exploit for multiple platform. Description: IBM OmniFind - Cross-Site Request Forgery. Author: Fatih Kilic
|
Analyze the security implications of: IBM OmniFind - Cross-Site Request Forgery
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Kamailio 5.1.1 / 5.1.0 / 5.0.0 - Off-by-One Heap Overflow
|
This is a dos exploit for linux platform. Description: Kamailio 5.1.1 / 5.1.0 / 5.0.0 - Off-by-One Heap Overflow. Author: EnableSecurity
|
Analyze the security implications of: Kamailio 5.1.1 / 5.1.0 / 5.0.0 - Off-by-One Heap Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Max Network Technology BBSMAX 4.2 - 'post.aspx' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Max Network Technology BBSMAX 4.2 - 'post.aspx' Cross-Site Scripting. Author: Liscker
|
Analyze the security implications of: Max Network Technology BBSMAX 4.2 - 'post.aspx' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: IBM Net.Data 7.0/7.2 - db2www Error Message Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: IBM Net.Data 7.0/7.2 - db2www Error Message Cross-Site Scripting. Author: Carsten Eiram
|
Analyze the security implications of: IBM Net.Data 7.0/7.2 - db2www Error Message Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Android FTPServer 1.9.0 - Remote Denial of Service
|
This is a dos exploit for android platform. Description: Android FTPServer 1.9.0 - Remote Denial of Service. Author: G13
|
Analyze the security implications of: Android FTPServer 1.9.0 - Remote Denial of Service
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: APC UPS 3.7.2 - 'apcupsd' Local Denial of Service
|
This is a dos exploit for linux platform. Description: APC UPS 3.7.2 - 'apcupsd' Local Denial of Service. Author: the itch
|
Analyze the security implications of: APC UPS 3.7.2 - 'apcupsd' Local Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_juliaportfolio - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_juliaportfolio - Local File Inclusion. Author: DevilZ TM
|
Analyze the security implications of: Joomla! Component com_juliaportfolio - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple WebKit - 'ComposedTreeIterator::traverseNextInShadowTree' Use-After-Free
|
This is a dos exploit for multiple platform. Description: Apple WebKit - 'ComposedTreeIterator::traverseNextInShadowTree' Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: Apple WebKit - 'ComposedTreeIterator::traverseNextInShadowTree' Use-After-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Expinion.net Member Management System 2.1 - 'news_view.asp?ID' SQL Injection
|
This is a webapps exploit for asp platform. Description: Expinion.net Member Management System 2.1 - 'news_view.asp?ID' SQL Injection. Author: Manuel Lopez
|
Analyze the security implications of: Expinion.net Member Management System 2.1 - 'news_view.asp?ID' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Microsoft Word (Windows/OSX) - Crash (PoC)
|
This is a dos exploit for multiple platform. Description: Microsoft Word (Windows/OSX) - Crash (PoC). Author: halsten
|
Analyze the security implications of: Microsoft Word (Windows/OSX) - Crash (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Linux Kernel 2.0.37 - Segment Limit Privilege Escalation
|
This is a local exploit for linux platform. Description: Linux Kernel 2.0.37 - Segment Limit Privilege Escalation. Author: Solar
|
Analyze the security implications of: Linux Kernel 2.0.37 - Segment Limit Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: CMSmelborp Beta - 'user_standard.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: CMSmelborp Beta - 'user_standard.php' Remote File Inclusion. Author: DeltahackingTEAM
|
Analyze the security implications of: CMSmelborp Beta - 'user_standard.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Debian bsdmainutils 6.0.14 - Calendar Information Disclosure
|
This is a local exploit for linux platform. Description: Debian bsdmainutils 6.0.14 - Calendar Information Disclosure. Author: Steven Van Acker
|
Analyze the security implications of: Debian bsdmainutils 6.0.14 - Calendar Information Disclosure
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ImageVue 0.16.1 - 'index.php?bgcol' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: ImageVue 0.16.1 - 'index.php?bgcol' Cross-Site Scripting. Author: zjieb
|
Analyze the security implications of: ImageVue 0.16.1 - 'index.php?bgcol' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LSH 1.x - Remote Buffer Overflow (2)
|
This is a remote exploit for linux platform. Description: LSH 1.x - Remote Buffer Overflow (2). Author: m00 security
|
Analyze the security implications of: LSH 1.x - Remote Buffer Overflow (2)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: CBAS-Web 19.0.0 - Remote Code Execution
|
This is a webapps exploit for hardware platform. Description: CBAS-Web 19.0.0 - Remote Code Execution. Author: LiquidWorm
|
Analyze the security implications of: CBAS-Web 19.0.0 - Remote Code Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Azuresites CMS - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Azuresites CMS - Multiple Vulnerabilities. Author: Lidloses_Auge
|
Analyze the security implications of: Azuresites CMS - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Automne.ws CMS 4.0.0rc2 - Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: Automne.ws CMS 4.0.0rc2 - Multiple Remote File Inclusions. Author: 1nd0n3s14n l4m3r
|
Analyze the security implications of: Automne.ws CMS 4.0.0rc2 - Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Nintendo Switch - WebKit Code Execution (PoC)
|
This is a dos exploit for hardware platform. Description: Nintendo Switch - WebKit Code Execution (PoC). Author: qwertyoruiop
|
Analyze the security implications of: Nintendo Switch - WebKit Code Execution (PoC)
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: BestCrypt 0.6/0.7/0.8 - BCTool UMount Buffer Overflow
|
This is a local exploit for linux platform. Description: BestCrypt 0.6/0.7/0.8 - BCTool UMount Buffer Overflow. Author: Carl Livitt
|
Analyze the security implications of: BestCrypt 0.6/0.7/0.8 - BCTool UMount Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Genium CMS 2012/Q2 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Genium CMS 2012/Q2 - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: Genium CMS 2012/Q2 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ARMBot Botnet - Arbitrary Code Execution
|
This is a remote exploit for multiple platform. Description: ARMBot Botnet - Arbitrary Code Execution. Author: prsecurity
|
Analyze the security implications of: ARMBot Botnet - Arbitrary Code Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: cPanel 11.x - '/scripts2/changeip?user' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: cPanel 11.x - '/scripts2/changeip?user' Cross-Site Scripting. Author: Matteo Carli
|
Analyze the security implications of: cPanel 11.x - '/scripts2/changeip?user' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: axdcms-0.1.1 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: axdcms-0.1.1 - Local File Inclusion. Author: n0n0x
|
Analyze the security implications of: axdcms-0.1.1 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adobe Flash - Drawing Methods 'this' Use-After-Free
|
This is a dos exploit for multiple platform. Description: Adobe Flash - Drawing Methods 'this' Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - Drawing Methods 'this' Use-After-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Sun Java System Application Server 7.0/8.0 - Remote Installation Full Path Disclosure
|
This is a remote exploit for multiple platform. Description: Sun Java System Application Server 7.0/8.0 - Remote Installation Full Path Disclosure. Author: Marc Schoenefeld
|
Analyze the security implications of: Sun Java System Application Server 7.0/8.0 - Remote Installation Full Path Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: RedHat Linux - Stickiness of /tmp
|
This is a dos exploit for linux platform. Description: RedHat Linux - Stickiness of /tmp. Author: Tavis Ormandy
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.