input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Dell SonicWALL EMail Security Appliance Application 7.4.5 - Multiple Vulnerabilities | This is a webapps exploit for multiple platform. Description: Dell SonicWALL EMail Security Appliance Application 7.4.5 - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Dell SonicWALL EMail Security Appliance Application 7.4.5 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ACC IMoveis 4.0 - SQL Injection | This is a webapps exploit for php platform. Description: ACC IMoveis 4.0 - SQL Injection. Author: EraGoN |
Analyze the security implications of: ACC IMoveis 4.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eNdonesia 8.4 - 'mod.php?viewarticle Action artid' SQL Injection | This is a webapps exploit for php platform. Description: eNdonesia 8.4 - 'mod.php?viewarticle Action artid' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: eNdonesia 8.4 - 'mod.php?viewarticle Action artid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gin Markdown Editor v0.7.4 (Electron) - Arbitrary Code Execution | This is a local exploit for multiple platform. Description: Gin Markdown Editor v0.7.4 (Electron) - Arbitrary Code Execution. Author: 8bitsec |
Analyze the security implications of: Gin Markdown Editor v0.7.4 (Electron) - Arbitrary Code Execution | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: EZContents 2.0.3 - 'search.php?GLOBALS[language_home]' Remote File Inclusion | This is a webapps exploit for php platform. Description: EZContents 2.0.3 - 'search.php?GLOBALS[language_home]' Remote File Inclusion. Author: DarkFig |
Analyze the security implications of: EZContents 2.0.3 - 'search.php?GLOBALS[language_home]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Maelstrom Server 3.0.x - Argument Buffer Overflow (3) | This is a local exploit for freebsd platform. Description: Maelstrom Server 3.0.x - Argument Buffer Overflow (3). Author: CMN |
Analyze the security implications of: Maelstrom Server 3.0.x - Argument Buffer Overflow (3) | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Apple Mac OSX 10.10.3 (Yosemite) Safari 8.0.x - Crash (PoC) | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.10.3 (Yosemite) Safari 8.0.x - Crash (PoC). Author: Mohammad Reza Espargham |
Analyze the security implications of: Apple Mac OSX 10.10.3 (Yosemite) Safari 8.0.x - Crash (PoC) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: CubeCart 4 - Session Management Bypass | This is a webapps exploit for php platform. Description: CubeCart 4 - Session Management Bypass. Author: Bogdan Calin |
Analyze the security implications of: CubeCart 4 - Session Management Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache Olingo OData 4.0 - XML External Entity Injection | This is a webapps exploit for java platform. Description: Apache Olingo OData 4.0 - XML External Entity Injection. Author: Compass Security |
Analyze the security implications of: Apache Olingo OData 4.0 - XML External Entity Injection | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Joomla! Component Camelcitydb2 2.2 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Camelcitydb2 2.2 - SQL Injection. Author: H!tm@N |
Analyze the security implications of: Joomla! Component Camelcitydb2 2.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Asura Engine Challenge B Query - Remote Stack Buffer Overflow | This is a dos exploit for multiple platform. Description: Asura Engine Challenge B Query - Remote Stack Buffer Overflow. Author: Luigi Auriemma |
Analyze the security implications of: Asura Engine Challenge B Query - Remote Stack Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Icinga - cgi/config.c process_cgivars Function Off-by-One Read Remote Denial of Service | This is a dos exploit for cgi platform. Description: Icinga - cgi/config.c process_cgivars Function Off-by-One Read Remote Denial of Service. Author: DTAG Group Information Security |
Analyze the security implications of: Icinga - cgi/config.c process_cgivars Function Off-by-One Read Remote Denial of Service | This exploit targets cgi systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Gnew 2018.1 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Gnew 2018.1 - Cross-Site Request Forgery. Author: Cyril Vallicari |
Analyze the security implications of: Gnew 2018.1 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hyena Cart - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: Hyena Cart - 'index.php' SQL Injection. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Hyena Cart - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Campsite 2.6.1 - 'ArticleComment.php?g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'ArticleComment.php?g_documentRoot' Remote File Inclusion. Author: anonymous |
Analyze the security implications of: Campsite 2.6.1 - 'ArticleComment.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel < 2.6.36-rc1 (Ubuntu 10.04 / 2.6.32) - 'CAN BCM' Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel < 2.6.36-rc1 (Ubuntu 10.04 / 2.6.32) - 'CAN BCM' Local Privilege Escalation. Author: Jon Oberheide |
Analyze the security implications of: Linux Kernel < 2.6.36-rc1 (Ubuntu 10.04 / 2.6.32) - 'CAN BCM' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: gelato CMS 0.95 - 'img' Remote File Disclosure | This is a webapps exploit for php platform. Description: gelato CMS 0.95 - 'img' Remote File Disclosure. Author: JIKO |
Analyze the security implications of: gelato CMS 0.95 - 'img' Remote File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Qt 4.6.3 - 'QSslSocketBackendPrivate::transmit()' Denial of Service | This is a dos exploit for multiple platform. Description: Qt 4.6.3 - 'QSslSocketBackendPrivate::transmit()' Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Qt 4.6.3 - 'QSslSocketBackendPrivate::transmit()' Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Click N Print Coupons 2006.01 - 'key' SQL Injection | This is a webapps exploit for asp platform. Description: Click N Print Coupons 2006.01 - 'key' SQL Injection. Author: ajann |
Analyze the security implications of: Click N Print Coupons 2006.01 - 'key' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Scientific Atlanta DPX2100 Cable Modem - LanD Packet Denial of Service | This is a dos exploit for hardware platform. Description: Scientific Atlanta DPX2100 Cable Modem - LanD Packet Denial of Service. Author: Justin M. Wray |
Analyze the security implications of: Scientific Atlanta DPX2100 Cable Modem - LanD Packet Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: EZDatabase 2.0 - 'db_id' Remote Command Execution | This is a webapps exploit for php platform. Description: EZDatabase 2.0 - 'db_id' Remote Command Execution. Author: cijfer |
Analyze the security implications of: EZDatabase 2.0 - 'db_id' Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Magic Photo Storage Website - '/admin/add_templates.php?_config[site_path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/admin/add_templates.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina |
Analyze the security implications of: Magic Photo Storage Website - '/admin/add_templates.php?_config[site_path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: rpcbind - CALLIT procedure UDP Crash (PoC) | This is a dos exploit for linux platform. Description: rpcbind - CALLIT procedure UDP Crash (PoC). Author: Sean Verity |
Analyze the security implications of: rpcbind - CALLIT procedure UDP Crash (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Wireshark - ZigBee ZCL Dissector Infinite Loop Denial of Service | This is a dos exploit for multiple platform. Description: Wireshark - ZigBee ZCL Dissector Infinite Loop Denial of Service. Author: Fred Fierling |
Analyze the security implications of: Wireshark - ZigBee ZCL Dissector Infinite Loop Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: LG G4 - Touchscreen Driver write_log Kernel Read/Write | This is a dos exploit for android platform. Description: LG G4 - Touchscreen Driver write_log Kernel Read/Write. Author: Google Security Research |
Analyze the security implications of: LG G4 - Touchscreen Driver write_log Kernel Read/Write | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: 3Com 3CRADSL72 ADSL Wireless Router - Information Disclosure / Authentication Bypass | This is a remote exploit for hardware platform. Description: 3Com 3CRADSL72 ADSL Wireless Router - Information Disclosure / Authentication Bypass. Author: Karb0nOxyde |
Analyze the security implications of: 3Com 3CRADSL72 ADSL Wireless Router - Information Disclosure / Authentication Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DigiDomain 2.2 - 'lookup_result.asp?domain' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: DigiDomain 2.2 - 'lookup_result.asp?domain' Cross-Site Scripting. Author: Linux_Drox |
Analyze the security implications of: DigiDomain 2.2 - 'lookup_result.asp?domain' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Wireshark - ENTTEC DMX Data RLE Buffer Overflow | This is a dos exploit for multiple platform. Description: Wireshark - ENTTEC DMX Data RLE Buffer Overflow. Author: non-customers crew |
Analyze the security implications of: Wireshark - ENTTEC DMX Data RLE Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cisco ASA / PIX - 'EPICBANANA' Local Privilege Escalation | This is a local exploit for hardware platform. Description: Cisco ASA / PIX - 'EPICBANANA' Local Privilege Escalation. Author: Shadow Brokers |
Analyze the security implications of: Cisco ASA / PIX - 'EPICBANANA' Local Privilege Escalation | This exploit targets hardware systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: LimeSurvey < 3.16 - Remote Code Execution | This is a webapps exploit for php platform. Description: LimeSurvey < 3.16 - Remote Code Execution. Author: q3rv0 |
Analyze the security implications of: LimeSurvey < 3.16 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AlsaPlayer 0.99.71 - Local Buffer Overflow | This is a local exploit for linux platform. Description: AlsaPlayer 0.99.71 - Local Buffer Overflow. Author: zillion |
Analyze the security implications of: AlsaPlayer 0.99.71 - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ZilekPortal 1.0 - 'Haberdetay.asp' SQL Injection | This is a webapps exploit for asp platform. Description: ZilekPortal 1.0 - 'Haberdetay.asp' SQL Injection. Author: chernobiLe |
Analyze the security implications of: ZilekPortal 1.0 - 'Haberdetay.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Hospital Management System 4.0 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Hospital Management System 4.0 - Persistent Cross-Site Scripting. Author: FULLSHADE |
Analyze the security implications of: Hospital Management System 4.0 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Easy2Pilot 7 - Cross-Site Request Forgery (Add User) | This is a webapps exploit for php platform. Description: Easy2Pilot 7 - Cross-Site Request Forgery (Add User). Author: indoushka |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.