input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Easynet4u Link Host - 'cat_id' SQL Injection | This is a webapps exploit for php platform. Description: Easynet4u Link Host - 'cat_id' SQL Injection. Author: BeyazKurt |
Analyze the security implications of: Easynet4u Link Host - 'cat_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kyocera Command Center RX ECOSYS M2035dn - Directory Traversal File Disclosure (Unauthenticated) | This is a webapps exploit for hardware platform. Description: Kyocera Command Center RX ECOSYS M2035dn - Directory Traversal File Disclosure (Unauthenticated). Author: Luis Martínez |
Analyze the security implications of: Kyocera Command Center RX ECOSYS M2035dn - Directory Traversal File Disclosure (Unauthenticated) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Cisco UCS Manager 2.2(1d) - Remote Command Execution | This is a webapps exploit for hardware platform. Description: Cisco UCS Manager 2.2(1d) - Remote Command Execution. Author: liquidsky |
Analyze the security implications of: Cisco UCS Manager 2.2(1d) - Remote Command Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Oracle 9i/10g Database - Remote Network Authentication | This is a remote exploit for multiple platform. Description: Oracle 9i/10g Database - Remote Network Authentication. Author: Dennis Yurichev |
Analyze the security implications of: Oracle 9i/10g Database - Remote Network Authentication | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Java Applet - Reflection Type Confusion Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Java Applet - Reflection Type Confusion Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Java Applet - Reflection Type Confusion Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mozilla Browser/Firefox - Arbitrary Command Execution | This is a remote exploit for linux platform. Description: Mozilla Browser/Firefox - Arbitrary Command Execution. Author: eter Zelezny |
Analyze the security implications of: Mozilla Browser/Firefox - Arbitrary Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ALPHA CMS - Local File Inclusion | This is a webapps exploit for php platform. Description: ALPHA CMS - Local File Inclusion. Author: eidelweiss |
Analyze the security implications of: ALPHA CMS - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeType 2.6.1 - TrueType tt_cmap14_validate Parsing Heap Out-of-Bounds Reads | This is a dos exploit for linux platform. Description: FreeType 2.6.1 - TrueType tt_cmap14_validate Parsing Heap Out-of-Bounds Reads. Author: Google Security Research |
Analyze the security implications of: FreeType 2.6.1 - TrueType tt_cmap14_validate Parsing Heap Out-of-Bounds Reads | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple QuickTime 6/7 - '.FLC' Movie COLOR_64 Chunk Overflow | This is a dos exploit for osx platform. Description: Apple QuickTime 6/7 - '.FLC' Movie COLOR_64 Chunk Overflow. Author: Sowhat |
Analyze the security implications of: Apple QuickTime 6/7 - '.FLC' Movie COLOR_64 Chunk Overflow | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Foxit PDF Reader 1.0.1.0925 - kdu_core::kdu_codestream::get_subsampling Memory Corruption | This is a dos exploit for linux platform. Description: Foxit PDF Reader 1.0.1.0925 - kdu_core::kdu_codestream::get_subsampling Memory Corruption. Author: Google Security Research |
Analyze the security implications of: Foxit PDF Reader 1.0.1.0925 - kdu_core::kdu_codestream::get_subsampling Memory Corruption | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: KLINK - SQL Injection | This is a webapps exploit for php platform. Description: KLINK - SQL Injection. Author: Mauro Rossi & Andres Gomez |
Analyze the security implications of: KLINK - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Balero CMS 0.7.2 - Multiple JS/HTML Injection Vulnerabilities | This is a webapps exploit for php platform. Description: Balero CMS 0.7.2 - Multiple JS/HTML Injection Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: Balero CMS 0.7.2 - Multiple JS/HTML Injection Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EveryBuddy 0.4.3 - Long Message Denial of Service | This is a dos exploit for multiple platform. Description: EveryBuddy 0.4.3 - Long Message Denial of Service. Author: Noam Rathaus |
Analyze the security implications of: EveryBuddy 0.4.3 - Long Message Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PHP 5.2 - EXT/Filter Function Remote Buffer Overflow | This is a remote exploit for php platform. Description: PHP 5.2 - EXT/Filter Function Remote Buffer Overflow. Author: Stefan Esser |
Analyze the security implications of: PHP 5.2 - EXT/Filter Function Remote Buffer Overflow | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iOS FTP On The Go 2.1.2 - HTTP Remote Denial of Service | This is a dos exploit for ios platform. Description: iOS FTP On The Go 2.1.2 - HTTP Remote Denial of Service. Author: TecR0c |
Analyze the security implications of: iOS FTP On The Go 2.1.2 - HTTP Remote Denial of Service | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: CustomCMS 3.1 - 'vars.php' SQL Injection | This is a webapps exploit for php platform. Description: CustomCMS 3.1 - 'vars.php' SQL Injection. Author: Pr0metheuS |
Analyze the security implications of: CustomCMS 3.1 - 'vars.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Component com_registration_detailed 4.1 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Component com_registration_detailed 4.1 - Remote File Inclusion. Author: k1tk4t |
Analyze the security implications of: Mambo Component com_registration_detailed 4.1 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DotNetNuke 6.1.x - Cross-Site Scripting | This is a webapps exploit for asp platform. Description: DotNetNuke 6.1.x - Cross-Site Scripting. Author: Sajjad Pourali |
Analyze the security implications of: DotNetNuke 6.1.x - Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: 724CMS 4.01 Enterprise - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: 724CMS 4.01 Enterprise - 'index.php' SQL Injection. Author: Lidloses_Auge |
Analyze the security implications of: 724CMS 4.01 Enterprise - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco RV320 Dual Gigabit WAN VPN Router 1.4.2.15 - Command Injection | This is a webapps exploit for hardware platform. Description: Cisco RV320 Dual Gigabit WAN VPN Router 1.4.2.15 - Command Injection. Author: RedTeam Pentesting |
Analyze the security implications of: Cisco RV320 Dual Gigabit WAN VPN Router 1.4.2.15 - Command Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Zeroshell 3.6.0/3.7.0 Net Services - Remote Code Execution | This is a webapps exploit for linux platform. Description: Zeroshell 3.6.0/3.7.0 Net Services - Remote Code Execution. Author: Ozer Goker |
Analyze the security implications of: Zeroshell 3.6.0/3.7.0 Net Services - Remote Code Execution | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: libxml2 - xmlDictAddString Heap Buffer Overread | This is a dos exploit for linux platform. Description: libxml2 - xmlDictAddString Heap Buffer Overread. Author: Google Security Research |
Analyze the security implications of: libxml2 - xmlDictAddString Heap Buffer Overread | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BuzzyWall 1.3.1 - 'id' Remote File Disclosure | This is a webapps exploit for php platform. Description: BuzzyWall 1.3.1 - 'id' Remote File Disclosure. Author: b3hz4d |
Analyze the security implications of: BuzzyWall 1.3.1 - 'id' Remote File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_graph_display.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_graph_display.php?base_path' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_graph_display.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel (Ubuntu 14.04.3) - 'perf_event_open()' Can Race with execve() (Access /etc/shadow) | This is a local exploit for linux platform. Description: Linux Kernel (Ubuntu 14.04.3) - 'perf_event_open()' Can Race with execve() (Access /etc/shadow). Author: Google Security Research |
Analyze the security implications of: Linux Kernel (Ubuntu 14.04.3) - 'perf_event_open()' Can Race with execve() (Access /etc/shadow) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Biometric Shift Employee Management System 3.0 - Local File Disclosure | This is a webapps exploit for php platform. Description: Biometric Shift Employee Management System 3.0 - Local File Disclosure. Author: Ihsan Sencan |
Analyze the security implications of: Biometric Shift Employee Management System 3.0 - Local File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pure-FTPd - External Authentication Bash Environment Variable Code Injection (Metasploit) | This is a remote exploit for linux platform. Description: Pure-FTPd - External Authentication Bash Environment Variable Code Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Pure-FTPd - External Authentication Bash Environment Variable Code Injection (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WiFi HD 8.1 - Directory Traversal / Denial of Service | This is a webapps exploit for ios platform. Description: WiFi HD 8.1 - Directory Traversal / Denial of Service. Author: Wh1t3Rh1n0 (Michael Allen) |
Analyze the security implications of: WiFi HD 8.1 - Directory Traversal / Denial of Service | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: tcpdump 4.6.2 - Geonet Decoder Denial of Service | This is a dos exploit for multiple platform. Description: tcpdump 4.6.2 - Geonet Decoder Denial of Service. Author: Steffen Bauch |
Analyze the security implications of: tcpdump 4.6.2 - Geonet Decoder Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: NopCommerce 4.2.0 - Privilege Escalation | This is a webapps exploit for aspx platform. Description: NopCommerce 4.2.0 - Privilege Escalation. Author: Alessandro Magnosi |
Analyze the security implications of: NopCommerce 4.2.0 - Privilege Escalation | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Chrome V8 - 'PropertyArray' Integer Overflow | This is a dos exploit for multiple platform. Description: Chrome V8 - 'PropertyArray' Integer Overflow. Author: Google Security Research |
Analyze the security implications of: Chrome V8 - 'PropertyArray' Integer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ghostscript - Multiple Vulnerabilities | This is a local exploit for linux platform. Description: Ghostscript - Multiple Vulnerabilities. Author: Google Security Research |
Analyze the security implications of: Ghostscript - Multiple Vulnerabilities | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: NethServer 7.3.1611 - Cross-Site Request Forgery / Cross-Site Scripting | This is a webapps exploit for json platform. Description: NethServer 7.3.1611 - Cross-Site Request Forgery / Cross-Site Scripting. Author: LiquidWorm |
Analyze the security implications of: NethServer 7.3.1611 - Cross-Site Request Forgery / Cross-Site Scripting | This exploit targets json systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets json platform |
What is this exploit about: Global Centre Aplomb Poll 1.1 - 'vote.php?Madoa' Remote File Inclusion | This is a webapps exploit for php platform. Description: Global Centre Aplomb Poll 1.1 - 'vote.php?Madoa' Remote File Inclusion. Author: ilker Kandemir |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.