input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Joomla! Component com_xgallery 1.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bochs 2.3 - Buffer Overflow (Denial of Service) (PoC) | This is a dos exploit for linux platform. Description: Bochs 2.3 - Buffer Overflow (Denial of Service) (PoC). Author: Tavis Ormandy |
Analyze the security implications of: Bochs 2.3 - Buffer Overflow (Denial of Service) (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Fortinet Fortigate 2.x/3.0 - URL Filtering Bypass | This is a remote exploit for hardware platform. Description: Fortinet Fortigate 2.x/3.0 - URL Filtering Bypass. Author: Mathieu Dessus |
Analyze the security implications of: Fortinet Fortigate 2.x/3.0 - URL Filtering Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Flat Calendar 1.1 - 'add.php' HTML Injection | This is a webapps exploit for php platform. Description: Flat Calendar 1.1 - 'add.php' HTML Injection. Author: ZoRLu |
Analyze the security implications of: Flat Calendar 1.1 - 'add.php' HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ManageEngine Applications Manager 13.5 - Remote Code Execution (Metasploit) | This is a webapps exploit for java platform. Description: ManageEngine Applications Manager 13.5 - Remote Code Execution (Metasploit). Author: Mehmet Ince |
Analyze the security implications of: ManageEngine Applications Manager 13.5 - Remote Code Execution (Metasploit) | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: IGeneric Free Shopping Cart 1.4 - SQL Injection | This is a webapps exploit for php platform. Description: IGeneric Free Shopping Cart 1.4 - SQL Injection. Author: David Sopas Ferreira |
Analyze the security implications of: IGeneric Free Shopping Cart 1.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bild Flirt System 2.0 - 'index.php?id' SQL Injection | This is a webapps exploit for php platform. Description: Bild Flirt System 2.0 - 'index.php?id' SQL Injection. Author: Easy Laster |
Analyze the security implications of: Bild Flirt System 2.0 - 'index.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FusionPBX 4.5.29 - Remote Code Execution (RCE) (Authenticated) | This is a webapps exploit for php platform. Description: FusionPBX 4.5.29 - Remote Code Execution (RCE) (Authenticated). Author: Luska |
Analyze the security implications of: FusionPBX 4.5.29 - Remote Code Execution (RCE) (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CHIYU BF430 TCP IP Converter - Stored Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: CHIYU BF430 TCP IP Converter - Stored Cross-Site Scripting. Author: Luca.Chiou |
Analyze the security implications of: CHIYU BF430 TCP IP Converter - Stored Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Al Sat Scripti - Database Disclosure | This is a webapps exploit for asp platform. Description: Al Sat Scripti - Database Disclosure. Author: indoushka |
Analyze the security implications of: Al Sat Scripti - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: IBM solidDB 6.5.0.3 - Denial of Service | This is a dos exploit for multiple platform. Description: IBM solidDB 6.5.0.3 - Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: IBM solidDB 6.5.0.3 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BoutikOne - 'categorie.php?path' SQL Injection | This is a webapps exploit for php platform. Description: BoutikOne - 'categorie.php?path' SQL Injection. Author: cdx.security |
Analyze the security implications of: BoutikOne - 'categorie.php?path' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eMerge E3 Access Controller 4.6.07 - Remote Code Execution | This is a remote exploit for hardware platform. Description: eMerge E3 Access Controller 4.6.07 - Remote Code Execution. Author: LiquidWorm |
Analyze the security implications of: eMerge E3 Access Controller 4.6.07 - Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Blogs manager 1.101 - SQL Injection | This is a webapps exploit for php platform. Description: Blogs manager 1.101 - SQL Injection. Author: muuratsalo |
Analyze the security implications of: Blogs manager 1.101 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ClipBucket 2.8.3 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: ClipBucket 2.8.3 - Multiple Vulnerabilities. Author: bRpsd |
Analyze the security implications of: ClipBucket 2.8.3 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pserv 2.0 - User-Agent HTTP Header Buffer Overflow (1) | This is a remote exploit for linux platform. Description: Pserv 2.0 - User-Agent HTTP Header Buffer Overflow (1). Author: Sapient2003 |
Analyze the security implications of: Pserv 2.0 - User-Agent HTTP Header Buffer Overflow (1) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Chrome V8 JIT - Simplified-lowererer IrOpcode::kStoreField_ IrOpcode::kStoreElement Optimization Bug | This is a dos exploit for multiple platform. Description: Chrome V8 JIT - Simplified-lowererer IrOpcode::kStoreField_ IrOpcode::kStoreElement Optimization Bug. Author: Google Security Research |
Analyze the security implications of: Chrome V8 JIT - Simplified-lowererer IrOpcode::kStoreField_ IrOpcode::kStoreElement Optimization Bug | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Brecht Claerhout Sniffit 0.3.6 HIP/0.3.7 Beta - Mail Logging Buffer Overflow (2) | This is a remote exploit for multiple platform. Description: Brecht Claerhout Sniffit 0.3.6 HIP/0.3.7 Beta - Mail Logging Buffer Overflow (2). Author: MaXX |
Analyze the security implications of: Brecht Claerhout Sniffit 0.3.6 HIP/0.3.7 Beta - Mail Logging Buffer Overflow (2) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Hikvision IP Cameras 4.1.0 b130111 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Hikvision IP Cameras 4.1.0 b130111 - Multiple Vulnerabilities. Author: Core Security |
Analyze the security implications of: Hikvision IP Cameras 4.1.0 b130111 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Oracle 10g - 'SYS.LT.COMPRESSWORKSPACETREE' SQL Injection (1) | This is a local exploit for multiple platform. Description: Oracle 10g - 'SYS.LT.COMPRESSWORKSPACETREE' SQL Injection (1). Author: sh2kerr |
Analyze the security implications of: Oracle 10g - 'SYS.LT.COMPRESSWORKSPACETREE' SQL Injection (1) | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Xine-Lib 0.9/1 - Remote Client-Side Buffer Overflow | This is a remote exploit for linux platform. Description: Xine-Lib 0.9/1 - Remote Client-Side Buffer Overflow. Author: Ariel Berkman |
Analyze the security implications of: Xine-Lib 0.9/1 - Remote Client-Side Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Battlefield 2/2142 - Packet Null Pointer Dereference Remote Denial of Service | This is a dos exploit for multiple platform. Description: Battlefield 2/2142 - Packet Null Pointer Dereference Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Battlefield 2/2142 - Packet Null Pointer Dereference Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple macOS < 10.14.5 / iOS < 12.3 XNU - Wild-read due to bad cast in stf_ioctl | This is a dos exploit for multiple platform. Description: Apple macOS < 10.14.5 / iOS < 12.3 XNU - Wild-read due to bad cast in stf_ioctl. Author: Google Security Research |
Analyze the security implications of: Apple macOS < 10.14.5 / iOS < 12.3 XNU - Wild-read due to bad cast in stf_ioctl | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CuteNews 2.1.2 - 'avatar' Remote Code Execution (Metasploit) | This is a remote exploit for php platform. Description: CuteNews 2.1.2 - 'avatar' Remote Code Execution (Metasploit). Author: AkkuS |
Analyze the security implications of: CuteNews 2.1.2 - 'avatar' Remote Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Imperva SecureSphere 5.0 - Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Imperva SecureSphere 5.0 - Cross-Site Scripting. Author: Berezniski |
Analyze the security implications of: Imperva SecureSphere 5.0 - Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Lucent Ascend MAX 5.0/Pipeline 6.0/TNT 1.0/2.0 Router - MAX UDP Port 9 (1) | This is a remote exploit for hardware platform. Description: Lucent Ascend MAX 5.0/Pipeline 6.0/TNT 1.0/2.0 Router - MAX UDP Port 9 (1). Author: Rootshell |
Analyze the security implications of: Lucent Ascend MAX 5.0/Pipeline 6.0/TNT 1.0/2.0 Router - MAX UDP Port 9 (1) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Asterisk chan_pjsip 15.2.0 - 'SDP' Denial of Service | This is a dos exploit for linux platform. Description: Asterisk chan_pjsip 15.2.0 - 'SDP' Denial of Service. Author: EnableSecurity |
Analyze the security implications of: Asterisk chan_pjsip 15.2.0 - 'SDP' Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ASP PORTAL - Remote Database Disclosure | This is a webapps exploit for asp platform. Description: ASP PORTAL - Remote Database Disclosure. Author: ZoRLu |
Analyze the security implications of: ASP PORTAL - Remote Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: DBPower C300 HD Camera - Remote Configuration Disclosure | This is a webapps exploit for hardware platform. Description: DBPower C300 HD Camera - Remote Configuration Disclosure. Author: Todor Donev |
Analyze the security implications of: DBPower C300 HD Camera - Remote Configuration Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Adobe Flash - JXR Processing Double-Free | This is a dos exploit for multiple platform. Description: Adobe Flash - JXR Processing Double-Free. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - JXR Processing Double-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FLIP 0.9.0.1029 - 'forum.php?frame' Cross-Site Scripting | This is a webapps exploit for php platform. Description: FLIP 0.9.0.1029 - 'forum.php?frame' Cross-Site Scripting. Author: r0t3d3Vil |
Analyze the security implications of: FLIP 0.9.0.1029 - 'forum.php?frame' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RAD SecFlow-1v SF_0290_2.3.01.26 - Cross-Site Request Forgery (Reboot) | This is a webapps exploit for hardware platform. Description: RAD SecFlow-1v SF_0290_2.3.01.26 - Cross-Site Request Forgery (Reboot). Author: Jonatan Schor |
Analyze the security implications of: RAD SecFlow-1v SF_0290_2.3.01.26 - Cross-Site Request Forgery (Reboot) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: e-vision CMS 2.02 - SQL Injection / Arbitrary File Upload / Information Gathering | This is a webapps exploit for php platform. Description: e-vision CMS 2.02 - SQL Injection / Arbitrary File Upload / Information Gathering. Author: Khashayar Fereidani |
Analyze the security implications of: e-vision CMS 2.02 - SQL Injection / Arbitrary File Upload / Information Gathering | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 4.x/5.0 Shared Memory Module - Offset Memory Corruption | This is a local exploit for php platform. Description: PHP 4.x/5.0 Shared Memory Module - Offset Memory Corruption. Author: Stefano Di Paola |
Analyze the security implications of: PHP 4.x/5.0 Shared Memory Module - Offset Memory Corruption | This exploit targets php systems. Type: local. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.