input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: pdfresurrect 0.15 - Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Cisco ASA and FTD 9.6.4.42 - Path Traversal
|
This is a webapps exploit for hardware platform. Description: Cisco ASA and FTD 9.6.4.42 - Path Traversal. Author: 3ndG4me
|
Analyze the security implications of: Cisco ASA and FTD 9.6.4.42 - Path Traversal
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: GeoVision Camera GV-ADR2701 - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: GeoVision Camera GV-ADR2701 - Authentication Bypass. Author: Chan Nyein Wai
|
Analyze the security implications of: GeoVision Camera GV-ADR2701 - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component Jphone 1.0 Alpha 3 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Jphone 1.0 Alpha 3 - Local File Inclusion. Author: Chip d3 bi0s
|
Analyze the security implications of: Joomla! Component Jphone 1.0 Alpha 3 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: TestBox CFML Test Framework 4.1.0 - Directory Traversal
|
This is a webapps exploit for multiple platform. Description: TestBox CFML Test Framework 4.1.0 - Directory Traversal. Author: Darren King
|
Analyze the security implications of: TestBox CFML Test Framework 4.1.0 - Directory Traversal
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Google Chrome V8 - 'Genesis::InitializeGlobal' Out-of-Bounds Read/Write
|
This is a dos exploit for multiple platform. Description: Google Chrome V8 - 'Genesis::InitializeGlobal' Out-of-Bounds Read/Write. Author: Google Security Research
|
Analyze the security implications of: Google Chrome V8 - 'Genesis::InitializeGlobal' Out-of-Bounds Read/Write
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ActivePerl 5.6.1 - 'perlIIS.dll' Remote Buffer Overflow (3)
|
This is a remote exploit for multiple platform. Description: ActivePerl 5.6.1 - 'perlIIS.dll' Remote Buffer Overflow (3). Author: Sapient2003
|
Analyze the security implications of: ActivePerl 5.6.1 - 'perlIIS.dll' Remote Buffer Overflow (3)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: LibVC - '.VCard' 003 Processing Buffer Overflow
|
This is a dos exploit for multiple platform. Description: LibVC - '.VCard' 003 Processing Buffer Overflow. Author: trew
|
Analyze the security implications of: LibVC - '.VCard' 003 Processing Buffer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Usermin 2.100 - Username Enumeration
|
This is a webapps exploit for multiple platform. Description: Usermin 2.100 - Username Enumeration. Author: Kjesper
|
Analyze the security implications of: Usermin 2.100 - Username Enumeration
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: LinkLogger 2.4.10.15 - 'syslog' Denial of Service
|
This is a dos exploit for linux platform. Description: LinkLogger 2.4.10.15 - 'syslog' Denial of Service. Author: h00die
|
Analyze the security implications of: LinkLogger 2.4.10.15 - 'syslog' Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Mozilla Suite/Firefox/Thunderbird - Nested Anchor Tag Status Bar Spoofing
|
This is a remote exploit for linux platform. Description: Mozilla Suite/Firefox/Thunderbird - Nested Anchor Tag Status Bar Spoofing. Author: bitlance winter
|
Analyze the security implications of: Mozilla Suite/Firefox/Thunderbird - Nested Anchor Tag Status Bar Spoofing
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AFCommerce - 'adminpassword.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: AFCommerce - 'adminpassword.php' Remote File Inclusion. Author: NoGe
|
Analyze the security implications of: AFCommerce - 'adminpassword.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Daily Inspirational Quotes Script - SQL Injection
|
This is a webapps exploit for php platform. Description: Daily Inspirational Quotes Script - SQL Injection. Author: Valentin
|
Analyze the security implications of: Daily Inspirational Quotes Script - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: QNX PPPoEd 2.4/4.25/6.2 - Path Environment Variable Local Command Execution
|
This is a local exploit for linux platform. Description: QNX PPPoEd 2.4/4.25/6.2 - Path Environment Variable Local Command Execution. Author: Julio Cesar Fort
|
Analyze the security implications of: QNX PPPoEd 2.4/4.25/6.2 - Path Environment Variable Local Command Execution
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Clinic Management System - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Clinic Management System - Blind SQL Injection. Author: Yakir Wizman
|
Analyze the security implications of: Clinic Management System - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CentOS Web Panel 0.9.8.793 (Free) / 0.9.8.753 (Pro) - Cross-Site Scripting
|
This is a webapps exploit for linux platform. Description: CentOS Web Panel 0.9.8.793 (Free) / 0.9.8.753 (Pro) - Cross-Site Scripting. Author: DKM
|
Analyze the security implications of: CentOS Web Panel 0.9.8.793 (Free) / 0.9.8.753 (Pro) - Cross-Site Scripting
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Buttercup WFM - 'Title' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Buttercup WFM - 'Title' Cross-Site Scripting. Author: John Martinelli
|
Analyze the security implications of: Buttercup WFM - 'Title' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BoutikOne - 'rss_news.php?lang' SQL Injection
|
This is a webapps exploit for php platform. Description: BoutikOne - 'rss_news.php?lang' SQL Injection. Author: cdx.security
|
Analyze the security implications of: BoutikOne - 'rss_news.php?lang' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JamWiki 1.1.5 - 'num' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: JamWiki 1.1.5 - 'num' Cross-Site Scripting. Author: Sooraj K.S
|
Analyze the security implications of: JamWiki 1.1.5 - 'num' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DirectAdmin 1.28/1.29 - 'CMD_EMAIL_FORWARDER_MODIFY' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DirectAdmin 1.28/1.29 - 'CMD_EMAIL_FORWARDER_MODIFY' Cross-Site Scripting. Author: Aria-Security Team
|
Analyze the security implications of: DirectAdmin 1.28/1.29 - 'CMD_EMAIL_FORWARDER_MODIFY' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Chevereto 3.17.1 - Cross Site Scripting (Stored)
|
This is a webapps exploit for multiple platform. Description: Chevereto 3.17.1 - Cross Site Scripting (Stored). Author: Akıner Kısa
|
Analyze the security implications of: Chevereto 3.17.1 - Cross Site Scripting (Stored)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: DNS Recursion Bandwidth Amplification - Denial of Service (PoC)
|
This is a dos exploit for multiple platform. Description: DNS Recursion Bandwidth Amplification - Denial of Service (PoC). Author: ShadowHatesYou
|
Analyze the security implications of: DNS Recursion Bandwidth Amplification - Denial of Service (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apple iOS < 10.3.1 - Kernel
|
This is a local exploit for ios platform. Description: Apple iOS < 10.3.1 - Kernel. Author: Zimperium zLabs Team
|
Analyze the security implications of: Apple iOS < 10.3.1 - Kernel
|
This exploit targets ios systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Jarida 1.0 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Jarida 1.0 - Multiple Vulnerabilities. Author: Ptrace Security
|
Analyze the security implications of: Jarida 1.0 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mambo Component com_serverstat 0.4.4 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Mambo Component com_serverstat 0.4.4 - Remote File Inclusion. Author: Mehmet Ince
|
Analyze the security implications of: Mambo Component com_serverstat 0.4.4 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gollos 2.8 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Gollos 2.8 - Multiple Cross-Site Scripting Vulnerabilities. Author: High-Tech Bridge SA
|
Analyze the security implications of: Gollos 2.8 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Blood Bank & Donor Management System using v2.2 - Stored XSS
|
This is a remote exploit for php platform. Description: Blood Bank & Donor Management System using v2.2 - Stored XSS. Author: SoSPiro
|
Analyze the security implications of: Blood Bank & Donor Management System using v2.2 - Stored XSS
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BlazeBoard 1.0 - Information Disclosure
|
This is a webapps exploit for php platform. Description: BlazeBoard 1.0 - Information Disclosure. Author: JackDaniels
|
Analyze the security implications of: BlazeBoard 1.0 - Information Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ExpressionEngine 1.2.1 - HTTP Response Splitting / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: ExpressionEngine 1.2.1 - HTTP Response Splitting / Cross-Site Scripting. Author: MustLive
|
Analyze the security implications of: ExpressionEngine 1.2.1 - HTTP Response Splitting / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple iCal 3.0.1 - 'ATTACH' Denial of Service
|
This is a dos exploit for osx platform. Description: Apple iCal 3.0.1 - 'ATTACH' Denial of Service. Author: Core Security Technologies
|
Analyze the security implications of: Apple iCal 3.0.1 - 'ATTACH' Denial of Service
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Kasseler CMS 1.3.0 - Local File Inclusion / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Kasseler CMS 1.3.0 - Local File Inclusion / Cross-Site Scripting. Author: Cr@zy_King
|
Analyze the security implications of: Kasseler CMS 1.3.0 - Local File Inclusion / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GNU groff 1.1x - xploitation Via LPD
|
This is a remote exploit for linux platform. Description: GNU groff 1.1x - xploitation Via LPD. Author: zen-parse
|
Analyze the security implications of: GNU groff 1.1x - xploitation Via LPD
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ManageEngine Applications Manager - Multiple Cross-Site Scripting / SQL Injections
|
This is a webapps exploit for java platform. Description: ManageEngine Applications Manager - Multiple Cross-Site Scripting / SQL Injections. Author: Ibrahim El-Sayed
|
Analyze the security implications of: ManageEngine Applications Manager - Multiple Cross-Site Scripting / SQL Injections
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: BSD / Linux - 'umount' Local Privilege Escalation
|
This is a local exploit for multiple platform. Description: BSD / Linux - 'umount' Local Privilege Escalation. Author: bloodmask
|
Analyze the security implications of: BSD / Linux - 'umount' Local Privilege Escalation
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.