input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Apple macOS/iOS Kernel 10.12.3 (16D32) - SIOCGIFORDER Socket ioctl Off-by-One Memory Corruption | This is a dos exploit for multiple platform. Description: Apple macOS/iOS Kernel 10.12.3 (16D32) - SIOCGIFORDER Socket ioctl Off-by-One Memory Corruption. Author: Google Security Research |
Analyze the security implications of: Apple macOS/iOS Kernel 10.12.3 (16D32) - SIOCGIFORDER Socket ioctl Off-by-One Memory Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ClickAuction - Authentication Bypass | This is a webapps exploit for php platform. Description: ClickAuction - Authentication Bypass. Author: R3d-D3V!L |
Analyze the security implications of: ClickAuction - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ametys CMS 4.0.2 - Password Reset | This is a webapps exploit for php platform. Description: Ametys CMS 4.0.2 - Password Reset. Author: SecuriTeam |
Analyze the security implications of: Ametys CMS 4.0.2 - Password Reset | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Xfinity Gateway (Technicolor DPC3941T) - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Xfinity Gateway (Technicolor DPC3941T) - Cross-Site Request Forgery. Author: Ayushman Dutta |
Analyze the security implications of: Xfinity Gateway (Technicolor DPC3941T) - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CoolForum 0.5/0.7/0.8 - 'register.php?login' SQL Injection | This is a webapps exploit for php platform. Description: CoolForum 0.5/0.7/0.8 - 'register.php?login' SQL Injection. Author: Romano |
Analyze the security implications of: CoolForum 0.5/0.7/0.8 - 'register.php?login' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CPG Dragonfly 9.0.2.0 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: CPG Dragonfly 9.0.2.0 - Multiple Cross-Site Scripting Vulnerabilities. Author: mircia |
Analyze the security implications of: CPG Dragonfly 9.0.2.0 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Eaton Xpert Meter 13.4.0.10 - SSH Private Key Disclosure | This is a remote exploit for hardware platform. Description: Eaton Xpert Meter 13.4.0.10 - SSH Private Key Disclosure. Author: BrianWGray |
Analyze the security implications of: Eaton Xpert Meter 13.4.0.10 - SSH Private Key Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Fortinet FortiOS 6.0.4 - Unauthenticated SSL VPN User Password Modification | This is a webapps exploit for hardware platform. Description: Fortinet FortiOS 6.0.4 - Unauthenticated SSL VPN User Password Modification. Author: Ricardo Longatto |
Analyze the security implications of: Fortinet FortiOS 6.0.4 - Unauthenticated SSL VPN User Password Modification | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Opera Web Browser 9.26 - Multiple Vulnerabilities | This is a dos exploit for linux platform. Description: Opera Web Browser 9.26 - Multiple Vulnerabilities. Author: Michal Zalewski |
Analyze the security implications of: Opera Web Browser 9.26 - Multiple Vulnerabilities | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FSphp 0.2.1 - Remote File Inclusion | This is a webapps exploit for php platform. Description: FSphp 0.2.1 - Remote File Inclusion. Author: NoGe |
Analyze the security implications of: FSphp 0.2.1 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zyxel VMG3312-B10B DSL-491HNU-B1B v2 Modem - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Zyxel VMG3312-B10B DSL-491HNU-B1B v2 Modem - Cross-Site Request Forgery. Author: Yusuf Furkan |
Analyze the security implications of: Zyxel VMG3312-B10B DSL-491HNU-B1B v2 Modem - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Free Monthly Websites 2.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Free Monthly Websites 2.0 - Multiple Vulnerabilities. Author: X-Cisadane |
Analyze the security implications of: Free Monthly Websites 2.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Artica Proxy 4.3.0 - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Artica Proxy 4.3.0 - Authentication Bypass. Author: Dan Duffy |
Analyze the security implications of: Artica Proxy 4.3.0 - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Sudo Perl 1.6.x - Environment Variable Handling Security Bypass | This is a local exploit for linux platform. Description: Sudo Perl 1.6.x - Environment Variable Handling Security Bypass. Author: Charles Morris |
Analyze the security implications of: Sudo Perl 1.6.x - Environment Variable Handling Security Bypass | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Google Appliance ProxyStyleSheet - Command Execution (Metasploit) | This is a webapps exploit for hardware platform. Description: Google Appliance ProxyStyleSheet - Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Google Appliance ProxyStyleSheet - Command Execution (Metasploit) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Netgear WiFi Router JWNR2010v5 / R6080 - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Netgear WiFi Router JWNR2010v5 / R6080 - Authentication Bypass. Author: Wadeek |
Analyze the security implications of: Netgear WiFi Router JWNR2010v5 / R6080 - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: iPlanet Web Server 4.1 - Search Module Cross-Site Scripting | This is a remote exploit for multiple platform. Description: iPlanet Web Server 4.1 - Search Module Cross-Site Scripting. Author: Khalsa |
Analyze the security implications of: iPlanet Web Server 4.1 - Search Module Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: W-Agora 4.2.1 - Multiple Vulnerabilities | This is a webapps exploit for multiple platform. Description: W-Agora 4.2.1 - Multiple Vulnerabilities. Author: indoushka |
Analyze the security implications of: W-Agora 4.2.1 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Blog Torrent 0.8 - Directory Traversal | This is a webapps exploit for php platform. Description: Blog Torrent 0.8 - Directory Traversal. Author: Steve Kemp |
Analyze the security implications of: Blog Torrent 0.8 - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: slocate 2.5/2.6 - Local Buffer Overrun | This is a dos exploit for linux platform. Description: slocate 2.5/2.6 - Local Buffer Overrun. Author: USG team |
Analyze the security implications of: slocate 2.5/2.6 - Local Buffer Overrun | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: eXtreme File Hosting - Arbitrary '.RAR' File Upload | This is a webapps exploit for php platform. Description: eXtreme File Hosting - Arbitrary '.RAR' File Upload. Author: hamed bazargani |
Analyze the security implications of: eXtreme File Hosting - Arbitrary '.RAR' File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Diafan CMS 6.0 - Reflected Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Diafan CMS 6.0 - Reflected Cross-Site Scripting (XSS). Author: tmrswrr |
Analyze the security implications of: Diafan CMS 6.0 - Reflected Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: e107 0.7.x - CAPTCHA Security Bypass / Cross-Site Scripting | This is a webapps exploit for php platform. Description: e107 0.7.x - CAPTCHA Security Bypass / Cross-Site Scripting. Author: MustLive |
Analyze the security implications of: e107 0.7.x - CAPTCHA Security Bypass / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mura CMS 5.1 - Root Path Disclosure | This is a webapps exploit for multiple platform. Description: Mura CMS 5.1 - Root Path Disclosure. Author: Vladimir Vorontsov |
Analyze the security implications of: Mura CMS 5.1 - Root Path Disclosure | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ubuntu 15.10 - 'USERNS ' Overlayfs Over Fuse Privilege Escalation | This is a local exploit for linux platform. Description: Ubuntu 15.10 - 'USERNS ' Overlayfs Over Fuse Privilege Escalation. Author: halfdog |
Analyze the security implications of: Ubuntu 15.10 - 'USERNS ' Overlayfs Over Fuse Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: D-Link VoIP Phone Adapter - Cross-Site Scripting / Cross-Site Request Forgery Remote Firmware Overwrite | This is a remote exploit for hardware platform. Description: D-Link VoIP Phone Adapter - Cross-Site Scripting / Cross-Site Request Forgery Remote Firmware Overwrite. Author: Michael Brooks |
Analyze the security implications of: D-Link VoIP Phone Adapter - Cross-Site Scripting / Cross-Site Request Forgery Remote Firmware Overwrite | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Digital Interchange Document Library - SQL Injection | This is a webapps exploit for asp platform. Description: Digital Interchange Document Library - SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: Digital Interchange Document Library - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FTPRush 1.0.610 - Host Field Local Buffer Overflow | This is a dos exploit for multiple platform. Description: FTPRush 1.0.610 - Host Field Local Buffer Overflow. Author: Umesh Wanve |
Analyze the security implications of: FTPRush 1.0.610 - Host Field Local Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Active Business Directory 2 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Active Business Directory 2 - Blind SQL Injection. Author: AlpHaNiX |
Analyze the security implications of: Active Business Directory 2 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Indexu 5.0 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Indexu 5.0 - Multiple Remote File Inclusions. Author: SnIpEr_SA |
Analyze the security implications of: Indexu 5.0 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Easycms 0.4.2 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Easycms 0.4.2 - Multiple Vulnerabilities. Author: t0pP8uZz |
Analyze the security implications of: Easycms 0.4.2 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gallery 2.0 - 'main.php' Directory Traversal | This is a webapps exploit for php platform. Description: Gallery 2.0 - 'main.php' Directory Traversal. Author: Michael Dipper |
Analyze the security implications of: Gallery 2.0 - 'main.php' Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Campsite 2.6.1 - 'ArticleTypeField.php?g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'ArticleTypeField.php?g_documentRoot' Remote File Inclusion. Author: anonymous |
Analyze the security implications of: Campsite 2.6.1 - 'ArticleTypeField.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RedHat CloudForms Management Engine 5.1 - agent/linuxpkgs Directory Traversal (Metasploit) | This is a remote exploit for linux platform. Description: RedHat CloudForms Management Engine 5.1 - agent/linuxpkgs Directory Traversal (Metasploit). Author: Metasploit |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.