input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Inout Webmail Script - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Inout Webmail Script - Persistent Cross-Site Scripting. Author: Sid3^effects |
Analyze the security implications of: Inout Webmail Script - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX Kernel - Hypervisor Driver Use-After-Free | This is a dos exploit for osx platform. Description: Apple Mac OSX Kernel - Hypervisor Driver Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX Kernel - Hypervisor Driver Use-After-Free | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Adobe Flash - FileReference Class Type Confusion | This is a dos exploit for multiple platform. Description: Adobe Flash - FileReference Class Type Confusion. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - FileReference Class Type Confusion | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Sagem F@st 3304 Routers - PPPoE Credentials Information Disclosure | This is a remote exploit for hardware platform. Description: Sagem F@st 3304 Routers - PPPoE Credentials Information Disclosure. Author: securititracker |
Analyze the security implications of: Sagem F@st 3304 Routers - PPPoE Credentials Information Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: TP-Link TL-WR841N / TL-WR841ND - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: TP-Link TL-WR841N / TL-WR841ND - Multiple Vulnerabilities. Author: smash |
Analyze the security implications of: TP-Link TL-WR841N / TL-WR841ND - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Umbraco v8.14.1 - 'baseUrl' SSRF | This is a webapps exploit for aspx platform. Description: Umbraco v8.14.1 - 'baseUrl' SSRF. Author: NgoAnhDuc |
Analyze the security implications of: Umbraco v8.14.1 - 'baseUrl' SSRF | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Koha 3.20.1 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Koha 3.20.1 - Multiple SQL Injections. Author: Raschin Tavakoli_ Bernhard Garn_ Peter Aufner & Dimitris Simos |
Analyze the security implications of: Koha 3.20.1 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hanterm 3.3 - Local Buffer Overflow (2) | This is a local exploit for linux platform. Description: Hanterm 3.3 - Local Buffer Overflow (2). Author: xperc |
Analyze the security implications of: Hanterm 3.3 - Local Buffer Overflow (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Clain_TIger_CMS - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Clain_TIger_CMS - Cross-Site Request Forgery. Author: pratul agrawal |
Analyze the security implications of: Clain_TIger_CMS - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Foxit WAC Remote Access Server 2.0 Build 3503 - Heap Buffer Overflow | This is a dos exploit for multiple platform. Description: Foxit WAC Remote Access Server 2.0 Build 3503 - Heap Buffer Overflow. Author: Luigi Auriemma |
Analyze the security implications of: Foxit WAC Remote Access Server 2.0 Build 3503 - Heap Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: LoveCMS 1.6.2 Final - Arbitrary File Delete | This is a webapps exploit for php platform. Description: LoveCMS 1.6.2 Final - Arbitrary File Delete. Author: cOndemned |
Analyze the security implications of: LoveCMS 1.6.2 Final - Arbitrary File Delete | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hasbani-WindWeb/2.0 - GET Remote Denial of Service | This is a dos exploit for hardware platform. Description: Hasbani-WindWeb/2.0 - GET Remote Denial of Service. Author: Expanders |
Analyze the security implications of: Hasbani-WindWeb/2.0 - GET Remote Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Oracle NoSQL 11g 1.1.100 R2 - 'log' Directory Traversal | This is a webapps exploit for java platform. Description: Oracle NoSQL 11g 1.1.100 R2 - 'log' Directory Traversal. Author: Buherátor |
Analyze the security implications of: Oracle NoSQL 11g 1.1.100 R2 - 'log' Directory Traversal | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Comersus ASP Shopping Cart - File Disclosure / Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Comersus ASP Shopping Cart - File Disclosure / Cross-Site Scripting. Author: Bl@ckbe@rD |
Analyze the security implications of: Comersus ASP Shopping Cart - File Disclosure / Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: doop CMS 1.4.0b - Cross-Site Request Forgery / Arbitrary File Upload | This is a webapps exploit for php platform. Description: doop CMS 1.4.0b - Cross-Site Request Forgery / Arbitrary File Upload. Author: x0r |
Analyze the security implications of: doop CMS 1.4.0b - Cross-Site Request Forgery / Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASPBB 0.4 - 'profile.asp?PROFILE_ID' SQL Injection | This is a webapps exploit for asp platform. Description: ASPBB 0.4 - 'profile.asp?PROFILE_ID' SQL Injection. Author: Dj_Eyes |
Analyze the security implications of: ASPBB 0.4 - 'profile.asp?PROFILE_ID' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linux Kernel 2.6.x - SCSI ProcFS Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - SCSI ProcFS Denial of Service. Author: anonymous |
Analyze the security implications of: Linux Kernel 2.6.x - SCSI ProcFS Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Guppy CMS 5.0.9/5.00.10 - Authentication Bypass/Change Email | This is a webapps exploit for php platform. Description: Guppy CMS 5.0.9/5.00.10 - Authentication Bypass/Change Email. Author: Brandon Murphy |
Analyze the security implications of: Guppy CMS 5.0.9/5.00.10 - Authentication Bypass/Change Email | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TalentSoft Web+ 4.x - Directory Traversal | This is a remote exploit for cgi platform. Description: TalentSoft Web+ 4.x - Directory Traversal. Author: John P. McNeely |
Analyze the security implications of: TalentSoft Web+ 4.x - Directory Traversal | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Kyocera Printer d-COPIA253MF - Directory Traversal (PoC) | This is a webapps exploit for hardware platform. Description: Kyocera Printer d-COPIA253MF - Directory Traversal (PoC). Author: Hakan Eren ŞAN |
Analyze the security implications of: Kyocera Printer d-COPIA253MF - Directory Traversal (PoC) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component JE Messanger - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JE Messanger - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JE Messanger - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gadu-Gadu Instant Messenger 6.0 - File Transfer Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Gadu-Gadu Instant Messenger 6.0 - File Transfer Cross-Site Scripting. Author: Kacper Szczesniak |
Analyze the security implications of: Gadu-Gadu Instant Messenger 6.0 - File Transfer Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Everfocus 1.4 - EDSR Remote Authentication Bypass | This is a webapps exploit for multiple platform. Description: Everfocus 1.4 - EDSR Remote Authentication Bypass. Author: Andrea Fabrizi |
Analyze the security implications of: Everfocus 1.4 - EDSR Remote Authentication Bypass | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) | This is a remote exploit for linux platform. Description: Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: jspwiki 2.4.104/2.5.139 - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: jspwiki 2.4.104/2.5.139 - Multiple Vulnerabilities. Author: BugSec LTD |
Analyze the security implications of: jspwiki 2.4.104/2.5.139 - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: 4Site CMS 2.6 - 'cat' SQL Injection | This is a webapps exploit for php platform. Description: 4Site CMS 2.6 - 'cat' SQL Injection. Author: High-Tech Bridge SA |
Analyze the security implications of: 4Site CMS 2.6 - 'cat' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Libra PHP File Manager 1.18/2.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Libra PHP File Manager 1.18/2.0 - Local File Inclusion. Author: Pepelux |
Analyze the security implications of: Libra PHP File Manager 1.18/2.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RubyGems fastreader - 'entry_controller.rb' Remote Command Execution | This is a remote exploit for multiple platform. Description: RubyGems fastreader - 'entry_controller.rb' Remote Command Execution. Author: Larry W. Cashdollar |
Analyze the security implications of: RubyGems fastreader - 'entry_controller.rb' Remote Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Exponent CMS 2.0.0 Beta 1.1 - Local File Inclusion / Arbitrary File Upload | This is a webapps exploit for php platform. Description: Exponent CMS 2.0.0 Beta 1.1 - Local File Inclusion / Arbitrary File Upload. Author: AutoSec Tools |
Analyze the security implications of: Exponent CMS 2.0.0 Beta 1.1 - Local File Inclusion / Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cPanel 11 - PassWDMySQL Cross-Site Scripting | This is a webapps exploit for php platform. Description: cPanel 11 - PassWDMySQL Cross-Site Scripting. Author: s3rv3r_hack3r |
Analyze the security implications of: cPanel 11 - PassWDMySQL Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebRTC - VP9 Frame Processing Out-of-Bounds Memory Access | This is a dos exploit for multiple platform. Description: WebRTC - VP9 Frame Processing Out-of-Bounds Memory Access. Author: Google Security Research |
Analyze the security implications of: WebRTC - VP9 Frame Processing Out-of-Bounds Memory Access | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Zend Server Java Bridge - Arbitrary Java Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Zend Server Java Bridge - Arbitrary Java Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Zend Server Java Bridge - Arbitrary Java Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AllWeb Search 3.0 - SQL Injection | This is a webapps exploit for php platform. Description: AllWeb Search 3.0 - SQL Injection. Author: r0t |
Analyze the security implications of: AllWeb Search 3.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: I-RATER Platinum - 'Config_settings.TPL.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: I-RATER Platinum - 'Config_settings.TPL.php' Remote File Inclusion. Author: O.U.T.L.A.W |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.