input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Norton Core Secure WiFi Router - 'BLE' Command Injection (PoC) | This is a remote exploit for hardware platform. Description: Norton Core Secure WiFi Router - 'BLE' Command Injection (PoC). Author: embedi |
Analyze the security implications of: Norton Core Secure WiFi Router - 'BLE' Command Injection (PoC) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Fantastic Guestbook 2.0.1 - 'Guestbook.php' HTML Injection | This is a webapps exploit for php platform. Description: Fantastic Guestbook 2.0.1 - 'Guestbook.php' HTML Injection. Author: omnipresent |
Analyze the security implications of: Fantastic Guestbook 2.0.1 - 'Guestbook.php' HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ClamAV Daemon 0.65 - UUEncoded Message Denial of Service | This is a dos exploit for linux platform. Description: ClamAV Daemon 0.65 - UUEncoded Message Denial of Service. Author: Oliver Eikemeier |
Analyze the security implications of: ClamAV Daemon 0.65 - UUEncoded Message Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Libertas Enterprise CMS 3.0 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Libertas Enterprise CMS 3.0 - 'index.php' Cross-Site Scripting. Author: r0t3d3Vil |
Analyze the security implications of: Libertas Enterprise CMS 3.0 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wireless IP Camera (P2P) WIFICAM - Remote Code Execution | This is a remote exploit for hardware platform. Description: Wireless IP Camera (P2P) WIFICAM - Remote Code Execution. Author: PierreKimSec |
Analyze the security implications of: Wireless IP Camera (P2P) WIFICAM - Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: iFdate 2.0.3 - SQL Injection | This is a webapps exploit for php platform. Description: iFdate 2.0.3 - SQL Injection. Author: ~!Dok_tOR!~ |
Analyze the security implications of: iFdate 2.0.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Micronetsoft RV Dealer Website - SQL Injection | This is a webapps exploit for asp platform. Description: Micronetsoft RV Dealer Website - SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: Micronetsoft RV Dealer Website - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Flashcard Quiz App v1.0 - 'card' SQL Injection | This is a remote exploit for php platform. Description: Flashcard Quiz App v1.0 - 'card' SQL Injection. Author: SoSPiro |
Analyze the security implications of: Flashcard Quiz App v1.0 - 'card' SQL Injection | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Customer Paradigm PageDirector - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Customer Paradigm PageDirector - 'id' SQL Injection. Author: Tr0y-x |
Analyze the security implications of: Customer Paradigm PageDirector - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ClassifiedZONE 1.2 - 'Accountlogon.cfm' Cross-Site Scripting | This is a webapps exploit for cfm platform. Description: ClassifiedZONE 1.2 - 'Accountlogon.cfm' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: ClassifiedZONE 1.2 - 'Accountlogon.cfm' Cross-Site Scripting | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: AIX 4.3.3/5.1 - Invscoutd Symbolic Link | This is a local exploit for aix platform. Description: AIX 4.3.3/5.1 - Invscoutd Symbolic Link. Author: watercloud |
Analyze the security implications of: AIX 4.3.3/5.1 - Invscoutd Symbolic Link | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: (Tod Miller's) Sudo/SudoEdit 1.6.9p21/1.7.2p4 - Local Privilege Escalation | This is a local exploit for multiple platform. Description: (Tod Miller's) Sudo/SudoEdit 1.6.9p21/1.7.2p4 - Local Privilege Escalation. Author: kingcope |
Analyze the security implications of: (Tod Miller's) Sudo/SudoEdit 1.6.9p21/1.7.2p4 - Local Privilege Escalation | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: WISE-FTP 4.1/5.5.8 - FTP Client 'LIST' Directory Traversal | This is a remote exploit for multiple platform. Description: WISE-FTP 4.1/5.5.8 - FTP Client 'LIST' Directory Traversal. Author: Tan Chew Keong |
Analyze the security implications of: WISE-FTP 4.1/5.5.8 - FTP Client 'LIST' Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Phoenix Exploit Kit - Remote Code Execution (Metasploit) | This is a remote exploit for php platform. Description: Phoenix Exploit Kit - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Phoenix Exploit Kit - Remote Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: oracle Application server discussion forum portlet - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: oracle Application server discussion forum portlet - Multiple Vulnerabilities. Author: Johannes Greil |
Analyze the security implications of: oracle Application server discussion forum portlet - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Navetti PricePoint 4.6.0.0 - SQL Injection / Cross-Site Scripting / Cross-Site Request Forgery | This is a webapps exploit for multiple platform. Description: Navetti PricePoint 4.6.0.0 - SQL Injection / Cross-Site Scripting / Cross-Site Request Forgery. Author: SEC Consult |
Analyze the security implications of: Navetti PricePoint 4.6.0.0 - SQL Injection / Cross-Site Scripting / Cross-Site Request Forgery | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Feedback and Rating Script 1.0 - 'detail.php' SQL Injection | This is a webapps exploit for php platform. Description: Feedback and Rating Script 1.0 - 'detail.php' SQL Injection. Author: t0pP8uZz |
Analyze the security implications of: Feedback and Rating Script 1.0 - 'detail.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GoAutoDial CE 3.3 - Multiple SQL Injections / Command Injection | This is a webapps exploit for php platform. Description: GoAutoDial CE 3.3 - Multiple SQL Injections / Command Injection. Author: R-73eN |
Analyze the security implications of: GoAutoDial CE 3.3 - Multiple SQL Injections / Command Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jasmin Ransomware - Arbitrary File Download (Authenticated) | This is a webapps exploit for multiple platform. Description: Jasmin Ransomware - Arbitrary File Download (Authenticated). Author: bRpsd |
Analyze the security implications of: Jasmin Ransomware - Arbitrary File Download (Authenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: IBM Lotus Notes Traveler 8.5.1.x - Multiple Input Validation Vulnerabilities | This is a remote exploit for multiple platform. Description: IBM Lotus Notes Traveler 8.5.1.x - Multiple Input Validation Vulnerabilities. Author: MustLive |
Analyze the security implications of: IBM Lotus Notes Traveler 8.5.1.x - Multiple Input Validation Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ublog access version - Arbitrary Database Disclosure | This is a webapps exploit for asp platform. Description: Ublog access version - Arbitrary Database Disclosure. Author: Cyber-Zone |
Analyze the security implications of: Ublog access version - Arbitrary Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Alstrasoft Live Support 1.21 - Admin Credential Retrieve | This is a webapps exploit for php platform. Description: Alstrasoft Live Support 1.21 - Admin Credential Retrieve. Author: BlackHawk |
Analyze the security implications of: Alstrasoft Live Support 1.21 - Admin Credential Retrieve | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ibm informix Web Datablade 3.x/4.1 - Directory Traversal | This is a remote exploit for multiple platform. Description: ibm informix Web Datablade 3.x/4.1 - Directory Traversal. Author: Beck Mr.R |
Analyze the security implications of: ibm informix Web Datablade 3.x/4.1 - Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: TestLink Open Source Test Management < 1.9.16 - Remote Code Execution | This is a remote exploit for php platform. Description: TestLink Open Source Test Management < 1.9.16 - Remote Code Execution. Author: Manish Tanwar |
Analyze the security implications of: TestLink Open Source Test Management < 1.9.16 - Remote Code Execution | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CIMA DocuClass ECM - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: CIMA DocuClass ECM - Multiple Vulnerabilities. Author: Karn Ganeshen |
Analyze the security implications of: CIMA DocuClass ECM - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 3 < 5 - ZendEngine ECalloc Integer Overflow | This is a remote exploit for php platform. Description: PHP 3 < 5 - ZendEngine ECalloc Integer Overflow. Author: anonymous |
Analyze the security implications of: PHP 3 < 5 - ZendEngine ECalloc Integer Overflow | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ubiquiti airCam RTSP Service 1.1.5 - Buffer Overflow (PoC) | This is a dos exploit for hardware platform. Description: Ubiquiti airCam RTSP Service 1.1.5 - Buffer Overflow (PoC). Author: Core Security |
Analyze the security implications of: Ubiquiti airCam RTSP Service 1.1.5 - Buffer Overflow (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Virtual Programming VP-ASP 4.00/5.00 - 'shopsearch.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Virtual Programming VP-ASP 4.00/5.00 - 'shopsearch.asp' SQL Injection. Author: Nick Gudov |
Analyze the security implications of: Virtual Programming VP-ASP 4.00/5.00 - 'shopsearch.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Easy Scripts Answer and Question Script - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Easy Scripts Answer and Question Script - Multiple Vulnerabilities. Author: InjEctOr5 |
Analyze the security implications of: Easy Scripts Answer and Question Script - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component archaic binary Gallery 0.2 - Directory Traversal | This is a webapps exploit for php platform. Description: Joomla! Component archaic binary Gallery 0.2 - Directory Traversal. Author: H!tm@N |
Analyze the security implications of: Joomla! Component archaic binary Gallery 0.2 - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.4.20 - 'decode_fh' Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.4.20 - 'decode_fh' Denial of Service. Author: Jared Stanbrough |
Analyze the security implications of: Linux Kernel 2.4.20 - 'decode_fh' Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Orinoco OEM Residential Gateway - SNMP Community String Remote Configuration | This is a remote exploit for hardware platform. Description: Orinoco OEM Residential Gateway - SNMP Community String Remote Configuration. Author: Foundstone Inc. |
Analyze the security implications of: Orinoco OEM Residential Gateway - SNMP Community String Remote Configuration | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Oracle Java Runtime Environment - Heap Out-of-Bounds Read During TTF Font Rendering in AlternateSubstitutionSubtable::process | This is a dos exploit for java platform. Description: Oracle Java Runtime Environment - Heap Out-of-Bounds Read During TTF Font Rendering in AlternateSubstitutionSubtable::process. Author: Google Security Research |
Analyze the security implications of: Oracle Java Runtime Environment - Heap Out-of-Bounds Read During TTF Font Rendering in AlternateSubstitutionSubtable::process | This exploit targets java systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Google Chrome - open-vcdiff Out-of-Bounds Read in Browser Process Integer Overflow | This is a dos exploit for linux_x86 platform. Description: Google Chrome - open-vcdiff Out-of-Bounds Read in Browser Process Integer Overflow. Author: Google Security Research |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.