input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Sony Playstation 4 (PS4) 5.1 - Kernel (PoC)
|
This is a local exploit for hardware platform. Description: Sony Playstation 4 (PS4) 5.1 - Kernel (PoC). Author: qwertyoruiop
|
Analyze the security implications of: Sony Playstation 4 (PS4) 5.1 - Kernel (PoC)
|
This exploit targets hardware systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Yelp 2.23.1 - Invalid URI Format String
|
This is a dos exploit for linux platform. Description: Yelp 2.23.1 - Invalid URI Format String. Author: Aaron Grattafiori
|
Analyze the security implications of: Yelp 2.23.1 - Invalid URI Format String
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apple Safari 10.0.3(12602.4.8) / WebKit - 'HTMLObjectElement::updateWidget' Universal Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: Apple Safari 10.0.3(12602.4.8) / WebKit - 'HTMLObjectElement::updateWidget' Universal Cross-Site Scripting. Author: Google Security Research
|
Analyze the security implications of: Apple Safari 10.0.3(12602.4.8) / WebKit - 'HTMLObjectElement::updateWidget' Universal Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: 6kbbs - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: 6kbbs - Multiple Vulnerabilities. Author: labs insight
|
Analyze the security implications of: 6kbbs - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LibreNMS - addhost Command Injection (Metasploit)
|
This is a remote exploit for linux platform. Description: LibreNMS - addhost Command Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: LibreNMS - addhost Command Injection (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Lama Software 14.12.2007 - Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: Lama Software 14.12.2007 - Multiple Remote File Inclusions. Author: QTRinux
|
Analyze the security implications of: Lama Software 14.12.2007 - Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Hasura GraphQL 2.2.0 - Information Disclosure
|
This is a webapps exploit for multiple platform. Description: Hasura GraphQL 2.2.0 - Information Disclosure. Author: Dolev Farhi
|
Analyze the security implications of: Hasura GraphQL 2.2.0 - Information Disclosure
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: RedHat Linux 5.0/5.1/5.2 / Slackware Linux 3.5 - 'klogd' Local Buffer Overflow (1)
|
This is a local exploit for linux platform. Description: RedHat Linux 5.0/5.1/5.2 / Slackware Linux 3.5 - 'klogd' Local Buffer Overflow (1). Author: Michal Zalewski
|
Analyze the security implications of: RedHat Linux 5.0/5.1/5.2 / Slackware Linux 3.5 - 'klogd' Local Buffer Overflow (1)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: GEDCOM_TO_MYSQL - '/PHP/prenom.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: GEDCOM_TO_MYSQL - '/PHP/prenom.php' Multiple Cross-Site Scripting Vulnerabilities. Author: ZoRLu
|
Analyze the security implications of: GEDCOM_TO_MYSQL - '/PHP/prenom.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CeleronDude Uploader 6.1 - 'account.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: CeleronDude Uploader 6.1 - 'account.php' Cross-Site Scripting. Author: Xc0re
|
Analyze the security implications of: CeleronDude Uploader 6.1 - 'account.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DropTeam 1.3.3 - Multiple Remote Vulnerabilities
|
This is a remote exploit for multiple platform. Description: DropTeam 1.3.3 - Multiple Remote Vulnerabilities. Author: Luigi Auriemma
|
Analyze the security implications of: DropTeam 1.3.3 - Multiple Remote Vulnerabilities
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Mambo Component nfnaddressbook 0.4 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Mambo Component nfnaddressbook 0.4 - Remote File Inclusion. Author: Cold Zero
|
Analyze the security implications of: Mambo Component nfnaddressbook 0.4 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Lc Flickr Carousel 1.0 - Local File Disclosure
|
This is a webapps exploit for php platform. Description: Lc Flickr Carousel 1.0 - Local File Disclosure. Author: GoLd_M
|
Analyze the security implications of: Lc Flickr Carousel 1.0 - Local File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link DIR-605L < 2.08 - Denial of Service
|
This is a dos exploit for hardware platform. Description: D-Link DIR-605L < 2.08 - Denial of Service. Author: Enrique Castillo
|
Analyze the security implications of: D-Link DIR-605L < 2.08 - Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: FLV Players 8 - 'popup.php?url' Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: FLV Players 8 - 'popup.php?url' Cross-Site Scripting. Author: xzerox
|
Analyze the security implications of: FLV Players 8 - 'popup.php?url' Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CyberArk Password Vault Web Access < 9.9.5 / < 9.10 / 10.1 - Remote Code Execution
|
This is a webapps exploit for json platform. Description: CyberArk Password Vault Web Access < 9.9.5 / < 9.10 / 10.1 - Remote Code Execution. Author: RedTeam Pentesting
|
Analyze the security implications of: CyberArk Password Vault Web Access < 9.9.5 / < 9.10 / 10.1 - Remote Code Execution
|
This exploit targets json systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets json platform
|
What is this exploit about: Lyrist - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Lyrist - 'id' SQL Injection. Author: Meisam Monsef
|
Analyze the security implications of: Lyrist - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP 5.5.33/7.0.4 - SNMP Format String
|
This is a remote exploit for multiple platform. Description: PHP 5.5.33/7.0.4 - SNMP Format String. Author: Andrew Kramer
|
Analyze the security implications of: PHP 5.5.33/7.0.4 - SNMP Format String
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Hobosworld HobSR - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Hobosworld HobSR - Multiple SQL Injections. Author: r0t3d3Vil
|
Analyze the security implications of: Hobosworld HobSR - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Texas Instrument Emulator 3.03 - Local Buffer Overflow
|
This is a local exploit for linux platform. Description: Texas Instrument Emulator 3.03 - Local Buffer Overflow. Author: Juan Sacco
|
Analyze the security implications of: Texas Instrument Emulator 3.03 - Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Mayasan Portal 2.0 - 'haberdetay.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: Mayasan Portal 2.0 - 'haberdetay.asp' SQL Injection. Author: CoBRa_21
|
Analyze the security implications of: Mayasan Portal 2.0 - 'haberdetay.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Live For Speed S1/S2 - Multiple Vulnerabilities
|
This is a dos exploit for multiple platform. Description: Live For Speed S1/S2 - Multiple Vulnerabilities. Author: Luigi Auriemma
|
Analyze the security implications of: Live For Speed S1/S2 - Multiple Vulnerabilities
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Enomaly ECP / Enomalism < 2.2.1 - Multiple Local Vulnerabilities
|
This is a local exploit for multiple platform. Description: Enomaly ECP / Enomalism < 2.2.1 - Multiple Local Vulnerabilities. Author: Sam Johnston
|
Analyze the security implications of: Enomaly ECP / Enomalism < 2.2.1 - Multiple Local Vulnerabilities
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Fortigate Firewalls - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: Fortigate Firewalls - Cross-Site Request Forgery. Author: Sven Wurth
|
Analyze the security implications of: Fortigate Firewalls - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component flash fun! 1.0 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component flash fun! 1.0 - Remote File Inclusion. Author: Morgan
|
Analyze the security implications of: Joomla! Component flash fun! 1.0 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WordPress Plugin InfusionSoft - Arbitrary File Upload (Metasploit)
|
This is a remote exploit for php platform. Description: WordPress Plugin InfusionSoft - Arbitrary File Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: WordPress Plugin InfusionSoft - Arbitrary File Upload (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Blog Torrent 0.80 - 'BTDownload.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Blog Torrent 0.80 - 'BTDownload.php' Cross-Site Scripting. Author: Lostmon
|
Analyze the security implications of: Blog Torrent 0.80 - 'BTDownload.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Zendesk App SweetHawk Survey 1.6 - Persistent Cross-Site Scripting
|
This is a webapps exploit for java platform. Description: Zendesk App SweetHawk Survey 1.6 - Persistent Cross-Site Scripting. Author: MTK
|
Analyze the security implications of: Zendesk App SweetHawk Survey 1.6 - Persistent Cross-Site Scripting
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Ocean12 Technologies Calendar Manager Pro 1.0 1 - '/admin/edit.asp?ID' SQL Injection
|
This is a webapps exploit for asp platform. Description: Ocean12 Technologies Calendar Manager Pro 1.0 1 - '/admin/edit.asp?ID' SQL Injection. Author: dj_eyes2005
|
Analyze the security implications of: Ocean12 Technologies Calendar Manager Pro 1.0 1 - '/admin/edit.asp?ID' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Apple macOS XNU Kernel - Memory Disclosure due to bug in Kernel API for Detecting Kernel Memory Disclosures
|
This is a dos exploit for macos platform. Description: Apple macOS XNU Kernel - Memory Disclosure due to bug in Kernel API for Detecting Kernel Memory Disclosures. Author: Google Security Research
|
Analyze the security implications of: Apple macOS XNU Kernel - Memory Disclosure due to bug in Kernel API for Detecting Kernel Memory Disclosures
|
This exploit targets macos systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: Novell Netware Enterprise Web Server 5.1/6.0 - snoop.jsp Information Disclosure
|
This is a remote exploit for netware platform. Description: Novell Netware Enterprise Web Server 5.1/6.0 - snoop.jsp Information Disclosure. Author: Rafel Ivgi The-Insider
|
Analyze the security implications of: Novell Netware Enterprise Web Server 5.1/6.0 - snoop.jsp Information Disclosure
|
This exploit targets netware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets netware platform
|
What is this exploit about: Jara 1.6 - SQL Injection
|
This is a webapps exploit for php platform. Description: Jara 1.6 - SQL Injection. Author: muuratsalo
|
Analyze the security implications of: Jara 1.6 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Codiad 2.8.4 - Remote Code Execution (Authenticated)
|
This is a webapps exploit for multiple platform. Description: Codiad 2.8.4 - Remote Code Execution (Authenticated). Author: WangYihang
|
Analyze the security implications of: Codiad 2.8.4 - Remote Code Execution (Authenticated)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: lighttpd 1.4.31 - Denial of Service (PoC)
|
This is a dos exploit for linux platform. Description: lighttpd 1.4.31 - Denial of Service (PoC). Author: t4c
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.