input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Collabtive 3.1 - 'address' Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MagicISO 5.4 (build239) - '.cue' Heap Overflow (PoC) | This is a dos exploit for linux platform. Description: MagicISO 5.4 (build239) - '.cue' Heap Overflow (PoC). Author: n00b |
Analyze the security implications of: MagicISO 5.4 (build239) - '.cue' Heap Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: F5 BIG-IP 9.4.3 - Web Management Interface Console HTML Injection | This is a remote exploit for hardware platform. Description: F5 BIG-IP 9.4.3 - Web Management Interface Console HTML Injection. Author: nnposter |
Analyze the security implications of: F5 BIG-IP 9.4.3 - Web Management Interface Console HTML Injection | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component Huge-IT Portfolio Gallery Plugin 1.0.7 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Huge-IT Portfolio Gallery Plugin 1.0.7 - SQL Injection. Author: Larry W. Cashdollar |
Analyze the security implications of: Joomla! Component Huge-IT Portfolio Gallery Plugin 1.0.7 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BestSafe Browser - Man In The Middle Remote Code Execution | This is a remote exploit for android platform. Description: BestSafe Browser - Man In The Middle Remote Code Execution. Author: intern0t |
Analyze the security implications of: BestSafe Browser - Man In The Middle Remote Code Execution | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Adobe Flash - Out-of-Bounds Read when Placing Object | This is a dos exploit for multiple platform. Description: Adobe Flash - Out-of-Bounds Read when Placing Object. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Out-of-Bounds Read when Placing Object | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache APISIX 2.12.1 - Remote Code Execution (RCE) | This is a remote exploit for multiple platform. Description: Apache APISIX 2.12.1 - Remote Code Execution (RCE). Author: Ven3xy |
Analyze the security implications of: Apache APISIX 2.12.1 - Remote Code Execution (RCE) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_sectionex 2.5.96 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_sectionex 2.5.96 - SQL Injection. Author: Matias Fontanini |
Analyze the security implications of: Joomla! Component com_sectionex 2.5.96 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SWSoft ASPSeek 1.0 - 's.cgi' Remote Buffer Overflow | This is a remote exploit for cgi platform. Description: SWSoft ASPSeek 1.0 - 's.cgi' Remote Buffer Overflow. Author: teleh0r |
Analyze the security implications of: SWSoft ASPSeek 1.0 - 's.cgi' Remote Buffer Overflow | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Mozilla Firefox 2.0.0.7 - Malformed XBL Constructor Remote Denial of Service | This is a dos exploit for multiple platform. Description: Mozilla Firefox 2.0.0.7 - Malformed XBL Constructor Remote Denial of Service. Author: Soroush Dalili |
Analyze the security implications of: Mozilla Firefox 2.0.0.7 - Malformed XBL Constructor Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AIX 4.3.3/5.x - Getlvcb Command Line Argument Buffer Overflow (1) | This is a local exploit for aix platform. Description: AIX 4.3.3/5.x - Getlvcb Command Line Argument Buffer Overflow (1). Author: watercloud |
Analyze the security implications of: AIX 4.3.3/5.x - Getlvcb Command Line Argument Buffer Overflow (1) | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: ISC BIND 8.2.x - 'TSIG' Remote Stack Overflow (1) | This is a remote exploit for linux platform. Description: ISC BIND 8.2.x - 'TSIG' Remote Stack Overflow (1). Author: Gneisenau |
Analyze the security implications of: ISC BIND 8.2.x - 'TSIG' Remote Stack Overflow (1) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Aptana Jaxer 1.0.3.4547 - Local File inclusion | This is a webapps exploit for multiple platform. Description: Aptana Jaxer 1.0.3.4547 - Local File inclusion. Author: Steph Jensen |
Analyze the security implications of: Aptana Jaxer 1.0.3.4547 - Local File inclusion | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Oracle VM VirtualBox - 3D Acceleration Multiple Vulnerabilities | This is a dos exploit for multiple platform. Description: Oracle VM VirtualBox - 3D Acceleration Multiple Vulnerabilities. Author: Core Security |
Analyze the security implications of: Oracle VM VirtualBox - 3D Acceleration Multiple Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ImpressPages CMS 3.6 - 'manage()' Remote Code Execution | This is a webapps exploit for php platform. Description: ImpressPages CMS 3.6 - 'manage()' Remote Code Execution. Author: LiquidWorm |
Analyze the security implications of: ImpressPages CMS 3.6 - 'manage()' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Platinum SDK Library - POST UPnP 'sscanf' Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: Platinum SDK Library - POST UPnP 'sscanf' Buffer Overflow (PoC). Author: n00b |
Analyze the security implications of: Platinum SDK Library - POST UPnP 'sscanf' Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FreeSMS 2.1.2 - SQL Injection (Authentication Bypass) | This is a webapps exploit for php platform. Description: FreeSMS 2.1.2 - SQL Injection (Authentication Bypass). Author: Yilmaz Degirmenci |
Analyze the security implications of: FreeSMS 2.1.2 - SQL Injection (Authentication Bypass) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kubio AI Page Builder 2.5.1 - Local File Inclusion (LFI) | This is a webapps exploit for multiple platform. Description: Kubio AI Page Builder 2.5.1 - Local File Inclusion (LFI). Author: 4m3rr0r |
Analyze the security implications of: Kubio AI Page Builder 2.5.1 - Local File Inclusion (LFI) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: e107 module 123 flash chat 6.8.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: e107 module 123 flash chat 6.8.0 - Remote File Inclusion. Author: by_casper41 |
Analyze the security implications of: e107 module 123 flash chat 6.8.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Microchip TimeProvider 4100 Grandmaster (Data plot modules) 2.4.6 - SQL Injection | This is a remote exploit for hardware platform. Description: Microchip TimeProvider 4100 Grandmaster (Data plot modules) 2.4.6 - SQL Injection. Author: Armando Huesca Prida |
Analyze the security implications of: Microchip TimeProvider 4100 Grandmaster (Data plot modules) 2.4.6 - SQL Injection | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Mozilla Firefox 1.5.0.1 / Camino 1.0 - Null Pointer Dereference Crash | This is a dos exploit for multiple platform. Description: Mozilla Firefox 1.5.0.1 / Camino 1.0 - Null Pointer Dereference Crash. Author: BuHa |
Analyze the security implications of: Mozilla Firefox 1.5.0.1 / Camino 1.0 - Null Pointer Dereference Crash | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Best Dating Script - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Best Dating Script - Arbitrary File Upload. Author: jetli007 |
Analyze the security implications of: Best Dating Script - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Instant Photo Gallery 1.0 - 'content.php?cid' SQL Injection | This is a webapps exploit for php platform. Description: Instant Photo Gallery 1.0 - 'content.php?cid' SQL Injection. Author: r0t |
Analyze the security implications of: Instant Photo Gallery 1.0 - 'content.php?cid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SurgeFTP 23b6 - Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for cgi platform. Description: SurgeFTP 23b6 - Multiple Cross-Site Scripting Vulnerabilities. Author: Houssam Sahli |
Analyze the security implications of: SurgeFTP 23b6 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: AntiBoard 0.6/0.7 - 'antiboard.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: AntiBoard 0.6/0.7 - 'antiboard.php' Multiple SQL Injections. Author: Josh Gilmour |
Analyze the security implications of: AntiBoard 0.6/0.7 - 'antiboard.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zoidcom 0.6.x - Malformed Packet Denial of Service | This is a dos exploit for multiple platform. Description: Zoidcom 0.6.x - Malformed Packet Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Zoidcom 0.6.x - Malformed Packet Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Oracle WebLogic Server 10.3.6.0.0 / 12.x - Remote Command Execution | This is a remote exploit for multiple platform. Description: Oracle WebLogic Server 10.3.6.0.0 / 12.x - Remote Command Execution. Author: 1337g |
Analyze the security implications of: Oracle WebLogic Server 10.3.6.0.0 / 12.x - Remote Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FS Monster Clone - 'id' SQL Injection | This is a webapps exploit for php platform. Description: FS Monster Clone - 'id' SQL Injection. Author: 8bitsec |
Analyze the security implications of: FS Monster Clone - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache MyFaces - 'ln' Information Disclosure | This is a remote exploit for multiple platform. Description: Apache MyFaces - 'ln' Information Disclosure. Author: Paul Nicolucci |
Analyze the security implications of: Apache MyFaces - 'ln' Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache Struts - REST Plugin With Dynamic Method Invocation Remote Code Execution | This is a remote exploit for multiple platform. Description: Apache Struts - REST Plugin With Dynamic Method Invocation Remote Code Execution. Author: nixawk |
Analyze the security implications of: Apache Struts - REST Plugin With Dynamic Method Invocation Remote Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Synology DiskStation Manager - smart.cgi Remote Command Execution (Metasploit) | This is a remote exploit for hardware platform. Description: Synology DiskStation Manager - smart.cgi Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Synology DiskStation Manager - smart.cgi Remote Command Execution (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AuraCMS Forum Module - SQL Injection | This is a webapps exploit for php platform. Description: AuraCMS Forum Module - SQL Injection. Author: k1tk4t |
Analyze the security implications of: AuraCMS Forum Module - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Novell ZENworks Configuration Management - Arbitrary File Upload (Metasploit) | This is a remote exploit for java platform. Description: Novell ZENworks Configuration Management - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: Novell ZENworks Configuration Management - Arbitrary File Upload (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Cedric Email Reader 0.4 - Global Configuration Script Remote File Inclusion | This is a webapps exploit for php platform. Description: Cedric Email Reader 0.4 - Global Configuration Script Remote File Inclusion. Author: MGhz |
Analyze the security implications of: Cedric Email Reader 0.4 - Global Configuration Script Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.