input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Apple macOS/iOS Kernel 10.12.3 (16D32) - SIOCGIFORDER Socket ioctl Off-by-One Memory Corruption
|
This is a dos exploit for multiple platform. Description: Apple macOS/iOS Kernel 10.12.3 (16D32) - SIOCGIFORDER Socket ioctl Off-by-One Memory Corruption. Author: Google Security Research
|
Analyze the security implications of: Apple macOS/iOS Kernel 10.12.3 (16D32) - SIOCGIFORDER Socket ioctl Off-by-One Memory Corruption
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ClickAuction - Authentication Bypass
|
This is a webapps exploit for php platform. Description: ClickAuction - Authentication Bypass. Author: R3d-D3V!L
|
Analyze the security implications of: ClickAuction - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ametys CMS 4.0.2 - Password Reset
|
This is a webapps exploit for php platform. Description: Ametys CMS 4.0.2 - Password Reset. Author: SecuriTeam
|
Analyze the security implications of: Ametys CMS 4.0.2 - Password Reset
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Xfinity Gateway (Technicolor DPC3941T) - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: Xfinity Gateway (Technicolor DPC3941T) - Cross-Site Request Forgery. Author: Ayushman Dutta
|
Analyze the security implications of: Xfinity Gateway (Technicolor DPC3941T) - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CoolForum 0.5/0.7/0.8 - 'register.php?login' SQL Injection
|
This is a webapps exploit for php platform. Description: CoolForum 0.5/0.7/0.8 - 'register.php?login' SQL Injection. Author: Romano
|
Analyze the security implications of: CoolForum 0.5/0.7/0.8 - 'register.php?login' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CPG Dragonfly 9.0.2.0 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: CPG Dragonfly 9.0.2.0 - Multiple Cross-Site Scripting Vulnerabilities. Author: mircia
|
Analyze the security implications of: CPG Dragonfly 9.0.2.0 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Eaton Xpert Meter 13.4.0.10 - SSH Private Key Disclosure
|
This is a remote exploit for hardware platform. Description: Eaton Xpert Meter 13.4.0.10 - SSH Private Key Disclosure. Author: BrianWGray
|
Analyze the security implications of: Eaton Xpert Meter 13.4.0.10 - SSH Private Key Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Fortinet FortiOS 6.0.4 - Unauthenticated SSL VPN User Password Modification
|
This is a webapps exploit for hardware platform. Description: Fortinet FortiOS 6.0.4 - Unauthenticated SSL VPN User Password Modification. Author: Ricardo Longatto
|
Analyze the security implications of: Fortinet FortiOS 6.0.4 - Unauthenticated SSL VPN User Password Modification
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Opera Web Browser 9.26 - Multiple Vulnerabilities
|
This is a dos exploit for linux platform. Description: Opera Web Browser 9.26 - Multiple Vulnerabilities. Author: Michal Zalewski
|
Analyze the security implications of: Opera Web Browser 9.26 - Multiple Vulnerabilities
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: FSphp 0.2.1 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: FSphp 0.2.1 - Remote File Inclusion. Author: NoGe
|
Analyze the security implications of: FSphp 0.2.1 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Zyxel VMG3312-B10B DSL-491HNU-B1B v2 Modem - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: Zyxel VMG3312-B10B DSL-491HNU-B1B v2 Modem - Cross-Site Request Forgery. Author: Yusuf Furkan
|
Analyze the security implications of: Zyxel VMG3312-B10B DSL-491HNU-B1B v2 Modem - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Free Monthly Websites 2.0 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Free Monthly Websites 2.0 - Multiple Vulnerabilities. Author: X-Cisadane
|
Analyze the security implications of: Free Monthly Websites 2.0 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Artica Proxy 4.3.0 - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Artica Proxy 4.3.0 - Authentication Bypass. Author: Dan Duffy
|
Analyze the security implications of: Artica Proxy 4.3.0 - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Sudo Perl 1.6.x - Environment Variable Handling Security Bypass
|
This is a local exploit for linux platform. Description: Sudo Perl 1.6.x - Environment Variable Handling Security Bypass. Author: Charles Morris
|
Analyze the security implications of: Sudo Perl 1.6.x - Environment Variable Handling Security Bypass
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Google Appliance ProxyStyleSheet - Command Execution (Metasploit)
|
This is a webapps exploit for hardware platform. Description: Google Appliance ProxyStyleSheet - Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Google Appliance ProxyStyleSheet - Command Execution (Metasploit)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Netgear WiFi Router JWNR2010v5 / R6080 - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Netgear WiFi Router JWNR2010v5 / R6080 - Authentication Bypass. Author: Wadeek
|
Analyze the security implications of: Netgear WiFi Router JWNR2010v5 / R6080 - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: iPlanet Web Server 4.1 - Search Module Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: iPlanet Web Server 4.1 - Search Module Cross-Site Scripting. Author: Khalsa
|
Analyze the security implications of: iPlanet Web Server 4.1 - Search Module Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: W-Agora 4.2.1 - Multiple Vulnerabilities
|
This is a webapps exploit for multiple platform. Description: W-Agora 4.2.1 - Multiple Vulnerabilities. Author: indoushka
|
Analyze the security implications of: W-Agora 4.2.1 - Multiple Vulnerabilities
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Blog Torrent 0.8 - Directory Traversal
|
This is a webapps exploit for php platform. Description: Blog Torrent 0.8 - Directory Traversal. Author: Steve Kemp
|
Analyze the security implications of: Blog Torrent 0.8 - Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: slocate 2.5/2.6 - Local Buffer Overrun
|
This is a dos exploit for linux platform. Description: slocate 2.5/2.6 - Local Buffer Overrun. Author: USG team
|
Analyze the security implications of: slocate 2.5/2.6 - Local Buffer Overrun
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: eXtreme File Hosting - Arbitrary '.RAR' File Upload
|
This is a webapps exploit for php platform. Description: eXtreme File Hosting - Arbitrary '.RAR' File Upload. Author: hamed bazargani
|
Analyze the security implications of: eXtreme File Hosting - Arbitrary '.RAR' File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Diafan CMS 6.0 - Reflected Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Diafan CMS 6.0 - Reflected Cross-Site Scripting (XSS). Author: tmrswrr
|
Analyze the security implications of: Diafan CMS 6.0 - Reflected Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: e107 0.7.x - CAPTCHA Security Bypass / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: e107 0.7.x - CAPTCHA Security Bypass / Cross-Site Scripting. Author: MustLive
|
Analyze the security implications of: e107 0.7.x - CAPTCHA Security Bypass / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mura CMS 5.1 - Root Path Disclosure
|
This is a webapps exploit for multiple platform. Description: Mura CMS 5.1 - Root Path Disclosure. Author: Vladimir Vorontsov
|
Analyze the security implications of: Mura CMS 5.1 - Root Path Disclosure
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Ubuntu 15.10 - 'USERNS ' Overlayfs Over Fuse Privilege Escalation
|
This is a local exploit for linux platform. Description: Ubuntu 15.10 - 'USERNS ' Overlayfs Over Fuse Privilege Escalation. Author: halfdog
|
Analyze the security implications of: Ubuntu 15.10 - 'USERNS ' Overlayfs Over Fuse Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: D-Link VoIP Phone Adapter - Cross-Site Scripting / Cross-Site Request Forgery Remote Firmware Overwrite
|
This is a remote exploit for hardware platform. Description: D-Link VoIP Phone Adapter - Cross-Site Scripting / Cross-Site Request Forgery Remote Firmware Overwrite. Author: Michael Brooks
|
Analyze the security implications of: D-Link VoIP Phone Adapter - Cross-Site Scripting / Cross-Site Request Forgery Remote Firmware Overwrite
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Digital Interchange Document Library - SQL Injection
|
This is a webapps exploit for asp platform. Description: Digital Interchange Document Library - SQL Injection. Author: L0rd CrusAd3r
|
Analyze the security implications of: Digital Interchange Document Library - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: FTPRush 1.0.610 - Host Field Local Buffer Overflow
|
This is a dos exploit for multiple platform. Description: FTPRush 1.0.610 - Host Field Local Buffer Overflow. Author: Umesh Wanve
|
Analyze the security implications of: FTPRush 1.0.610 - Host Field Local Buffer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Active Business Directory 2 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Active Business Directory 2 - Blind SQL Injection. Author: AlpHaNiX
|
Analyze the security implications of: Active Business Directory 2 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Indexu 5.0 - Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: Indexu 5.0 - Multiple Remote File Inclusions. Author: SnIpEr_SA
|
Analyze the security implications of: Indexu 5.0 - Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Easycms 0.4.2 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Easycms 0.4.2 - Multiple Vulnerabilities. Author: t0pP8uZz
|
Analyze the security implications of: Easycms 0.4.2 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gallery 2.0 - 'main.php' Directory Traversal
|
This is a webapps exploit for php platform. Description: Gallery 2.0 - 'main.php' Directory Traversal. Author: Michael Dipper
|
Analyze the security implications of: Gallery 2.0 - 'main.php' Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Campsite 2.6.1 - 'ArticleTypeField.php?g_documentRoot' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'ArticleTypeField.php?g_documentRoot' Remote File Inclusion. Author: anonymous
|
Analyze the security implications of: Campsite 2.6.1 - 'ArticleTypeField.php?g_documentRoot' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: RedHat CloudForms Management Engine 5.1 - agent/linuxpkgs Directory Traversal (Metasploit)
|
This is a remote exploit for linux platform. Description: RedHat CloudForms Management Engine 5.1 - agent/linuxpkgs Directory Traversal (Metasploit). Author: Metasploit
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.