input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: KnowledgeBuilder 2.2 - 'visEdit_Control.Class.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle 9i/10g - 'read/write/execute' ation Suite | This is a remote exploit for multiple platform. Description: Oracle 9i/10g - 'read/write/execute' ation Suite. Author: Marco Ivaldi |
Analyze the security implications of: Oracle 9i/10g - 'read/write/execute' ation Suite | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache Tomcat 10.1 - Denial Of Service | This is a dos exploit for multiple platform. Description: Apache Tomcat 10.1 - Denial Of Service. Author: Cristian Giustini |
Analyze the security implications of: Apache Tomcat 10.1 - Denial Of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: WebKitGTK 2.1.2 (Ubuntu 14.04) - Heap based Buffer Overflow | This is a local exploit for linux platform. Description: WebKitGTK 2.1.2 (Ubuntu 14.04) - Heap based Buffer Overflow. Author: Ren Kimura |
Analyze the security implications of: WebKitGTK 2.1.2 (Ubuntu 14.04) - Heap based Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component JSupport 1.5.6 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component JSupport 1.5.6 - Cross-Site Scripting. Author: Valentin |
Analyze the security implications of: Joomla! Component JSupport 1.5.6 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_janews - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_janews - Local File Inclusion. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Joomla! Component com_janews - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Employees Daily Task Management System 1.0 - 'multiple' Cross Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Employees Daily Task Management System 1.0 - 'multiple' Cross Site Scripting (XSS). Author: able403 |
Analyze the security implications of: Employees Daily Task Management System 1.0 - 'multiple' Cross Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Advanced Poll 2.0.2 - 'common.inc.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Advanced Poll 2.0.2 - 'common.inc.php' Remote File Inclusion. Author: Solpot |
Analyze the security implications of: Advanced Poll 2.0.2 - 'common.inc.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mirabilis ICQ 0.99/98.0 a/2000.0 A/99a - Remote Denial of Service | This is a dos exploit for cgi platform. Description: Mirabilis ICQ 0.99/98.0 a/2000.0 A/99a - Remote Denial of Service. Author: Charles Chear |
Analyze the security implications of: Mirabilis ICQ 0.99/98.0 a/2000.0 A/99a - Remote Denial of Service | This exploit targets cgi systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Apple Mac OSX Server - DirectoryService Buffer Overflow | This is a dos exploit for osx platform. Description: Apple Mac OSX Server - DirectoryService Buffer Overflow. Author: Core Security |
Analyze the security implications of: Apple Mac OSX Server - DirectoryService Buffer Overflow | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: appRain CMF 0.1.5 - Multiple Web Vulnerabilities | This is a webapps exploit for php platform. Description: appRain CMF 0.1.5 - Multiple Web Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: appRain CMF 0.1.5 - Multiple Web Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: VMware Tools - Update OS Command Injection | This is a remote exploit for multiple platform. Description: VMware Tools - Update OS Command Injection. Author: Nahuel Grisolia |
Analyze the security implications of: VMware Tools - Update OS Command Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ASP.NET jVideo Kit - 'query' SQL Injection | This is a webapps exploit for asp platform. Description: ASP.NET jVideo Kit - 'query' SQL Injection. Author: AkkuS |
Analyze the security implications of: ASP.NET jVideo Kit - 'query' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: CoolShot E-Lite POS 1.0 - Login SQL Injection | This is a webapps exploit for php platform. Description: CoolShot E-Lite POS 1.0 - Login SQL Injection. Author: Aria-Security Team |
Analyze the security implications of: CoolShot E-Lite POS 1.0 - Login SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Vilistextum 2.6.6 - HTML Attribute Parsing Buffer Overflow | This is a remote exploit for multiple platform. Description: Vilistextum 2.6.6 - HTML Attribute Parsing Buffer Overflow. Author: Ariel Berkman |
Analyze the security implications of: Vilistextum 2.6.6 - HTML Attribute Parsing Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: RedHat Piranha - Remote Security Bypass | This is a remote exploit for linux platform. Description: RedHat Piranha - Remote Security Bypass. Author: Andreas Schiermeier |
Analyze the security implications of: RedHat Piranha - Remote Security Bypass | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: TP-LINK TDDP - Multiple Vulnerabilities | This is a dos exploit for hardware platform. Description: TP-LINK TDDP - Multiple Vulnerabilities. Author: Core Security |
Analyze the security implications of: TP-LINK TDDP - Multiple Vulnerabilities | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BoutikOne 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: BoutikOne 1.0 - SQL Injection. Author: BrOx-Dz |
Analyze the security implications of: BoutikOne 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AJ Auction Pro OOPD 2.x - 'id' SQL Injection | This is a webapps exploit for php platform. Description: AJ Auction Pro OOPD 2.x - 'id' SQL Injection. Author: NoGe |
Analyze the security implications of: AJ Auction Pro OOPD 2.x - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeBSD / OpenBSD - 'ftpd' Null Pointer Dereference Denial of Service | This is a dos exploit for multiple platform. Description: FreeBSD / OpenBSD - 'ftpd' Null Pointer Dereference Denial of Service. Author: kingcope |
Analyze the security implications of: FreeBSD / OpenBSD - 'ftpd' Null Pointer Dereference Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mambo Component Rssxt 1.0 - 'MosConfig_absolute_path' Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Mambo Component Rssxt 1.0 - 'MosConfig_absolute_path' Multiple Remote File Inclusions. Author: Crackers_Child |
Analyze the security implications of: Mambo Component Rssxt 1.0 - 'MosConfig_absolute_path' Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ISPConfig 3.0.54p1 - (Authenticated) Admin Privilege Escalation | This is a webapps exploit for linux platform. Description: ISPConfig 3.0.54p1 - (Authenticated) Admin Privilege Escalation. Author: mra |
Analyze the security implications of: ISPConfig 3.0.54p1 - (Authenticated) Admin Privilege Escalation | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Papenmeier WiFi Baby Monitor Free & Lite < 2.02.2 - Remote Audio Record | This is a remote exploit for android platform. Description: Papenmeier WiFi Baby Monitor Free & Lite < 2.02.2 - Remote Audio Record. Author: iamrastating |
Analyze the security implications of: Papenmeier WiFi Baby Monitor Free & Lite < 2.02.2 - Remote Audio Record | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Samba 3.0.4 - SWAT Authorisation Buffer Overflow | This is a remote exploit for linux platform. Description: Samba 3.0.4 - SWAT Authorisation Buffer Overflow. Author: Noam Rathaus |
Analyze the security implications of: Samba 3.0.4 - SWAT Authorisation Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Ubuntu 19.10 - ubuntu-aufs-modified mmap_region() Breaks Refcounting in overlayfs/shiftfs Error Path | This is a dos exploit for linux platform. Description: Ubuntu 19.10 - ubuntu-aufs-modified mmap_region() Breaks Refcounting in overlayfs/shiftfs Error Path. Author: Google Security Research |
Analyze the security implications of: Ubuntu 19.10 - ubuntu-aufs-modified mmap_region() Breaks Refcounting in overlayfs/shiftfs Error Path | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Critical Path InJoin Directory Server 4.0 - File Disclosure | This is a remote exploit for multiple platform. Description: Critical Path InJoin Directory Server 4.0 - File Disclosure. Author: Nomad Mobile Research Centre |
Analyze the security implications of: Critical Path InJoin Directory Server 4.0 - File Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: 0verkill 0.16 - ASCII-ART Game Remote Integer Overflow Crash (PoC) | This is a dos exploit for linux platform. Description: 0verkill 0.16 - ASCII-ART Game Remote Integer Overflow Crash (PoC). Author: Federico Fazzi |
Analyze the security implications of: 0verkill 0.16 - ASCII-ART Game Remote Integer Overflow Crash (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Invision Power Board (IP.Board) 3.0.3 - '.txt' MIME-Type Cross-Site Scripting | This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) 3.0.3 - '.txt' MIME-Type Cross-Site Scripting. Author: Xacker |
Analyze the security implications of: Invision Power Board (IP.Board) 3.0.3 - '.txt' MIME-Type Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: symantec Web gateway 5.0.2.8 - Multiple Vulnerabilities | This is a webapps exploit for linux platform. Description: symantec Web gateway 5.0.2.8 - Multiple Vulnerabilities. Author: S2 Crew |
Analyze the security implications of: symantec Web gateway 5.0.2.8 - Multiple Vulnerabilities | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: D-Link Routers - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: D-Link Routers - Multiple Vulnerabilities. Author: Kyle Lovett |
Analyze the security implications of: D-Link Routers - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Cisco Router - HTTP Administration Cross-Site Request Forgery / Command Execution (2) | This is a remote exploit for hardware platform. Description: Cisco Router - HTTP Administration Cross-Site Request Forgery / Command Execution (2). Author: Jeremy Brown |
Analyze the security implications of: Cisco Router - HTTP Administration Cross-Site Request Forgery / Command Execution (2) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Glossaire 2.0 - 'glossaire.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Glossaire 2.0 - 'glossaire.php' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: Glossaire 2.0 - 'glossaire.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASP Smiley 1.0 - 'default.asp' Authentication Bypass / SQL Injection | This is a webapps exploit for asp platform. Description: ASP Smiley 1.0 - 'default.asp' Authentication Bypass / SQL Injection. Author: ajann |
Analyze the security implications of: ASP Smiley 1.0 - 'default.asp' Authentication Bypass / SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Jenkins Plugin Script Security < 1.50/Declarative < 1.3.4.1/Groovy < 2.61.1 - Remote Code Execution (PoC) | This is a webapps exploit for java platform. Description: Jenkins Plugin Script Security < 1.50/Declarative < 1.3.4.1/Groovy < 2.61.1 - Remote Code Execution (PoC). Author: orange |
Analyze the security implications of: Jenkins Plugin Script Security < 1.50/Declarative < 1.3.4.1/Groovy < 2.61.1 - Remote Code Execution (PoC) | This exploit targets java systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.