input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Adobe Flash - Video Decompression Memory Corruption | This is a dos exploit for multiple platform. Description: Adobe Flash - Video Decompression Memory Corruption. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Video Decompression Memory Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Huawei Router HG532e - Command Execution | This is a webapps exploit for hardware platform. Description: Huawei Router HG532e - Command Execution. Author: Rebellion |
Analyze the security implications of: Huawei Router HG532e - Command Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: pfSense UTM Platform 2.0.1 - Cross-Site Scripting | This is a webapps exploit for freebsd platform. Description: pfSense UTM Platform 2.0.1 - Cross-Site Scripting. Author: Dimitris Strevinas |
Analyze the security implications of: pfSense UTM Platform 2.0.1 - Cross-Site Scripting | This exploit targets freebsd systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Daily Deals Script 1.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Daily Deals Script 1.0 - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Daily Deals Script 1.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache 1.x/2.0.x - Chunked-Encoding Memory Corruption (1) | This is a remote exploit for multiple platform. Description: Apache 1.x/2.0.x - Chunked-Encoding Memory Corruption (1). Author: Gobbles Security |
Analyze the security implications of: Apache 1.x/2.0.x - Chunked-Encoding Memory Corruption (1) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Arab Portal 2.2 - 'mod.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Arab Portal 2.2 - 'mod.php' Local File Inclusion. Author: Qabandi |
Analyze the security implications of: Arab Portal 2.2 - 'mod.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 5 star review - Cross-Site Scripting / SQL Injection | This is a webapps exploit for php platform. Description: 5 star review - Cross-Site Scripting / SQL Injection. Author: Mr.SQL |
Analyze the security implications of: 5 star review - Cross-Site Scripting / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash - ATF Planar Decompression Heap Overflow | This is a dos exploit for multiple platform. Description: Adobe Flash - ATF Planar Decompression Heap Overflow. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - ATF Planar Decompression Heap Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Digileave 1.2 - Cross-Site Request Forgery (Update Admin) | This is a webapps exploit for asp platform. Description: Digileave 1.2 - Cross-Site Request Forgery (Update Admin). Author: Ihsan Sencan |
Analyze the security implications of: Digileave 1.2 - Cross-Site Request Forgery (Update Admin) | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Datemill - 'photo_search.php?st' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Datemill - 'photo_search.php?st' Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: Datemill - 'photo_search.php?st' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Verity Search97 2.1 - Security | This is a remote exploit for multiple platform. Description: Verity Search97 2.1 - Security. Author: Stefan Arentz |
Analyze the security implications of: Verity Search97 2.1 - Security | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BoastMachine 3.1 - 'admin.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: BoastMachine 3.1 - 'admin.php' Cross-Site Scripting. Author: Yunus Emre Yilmaz |
Analyze the security implications of: BoastMachine 3.1 - 'admin.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 1WebCalendar 4.0 - 'viewEvent.cfm?EventID' SQL Injection | This is a webapps exploit for cfm platform. Description: 1WebCalendar 4.0 - 'viewEvent.cfm?EventID' SQL Injection. Author: r0t3d3Vil |
Analyze the security implications of: 1WebCalendar 4.0 - 'viewEvent.cfm?EventID' SQL Injection | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: AMX Mod 0.9.2 - Remote 'amx_say' Format String | This is a remote exploit for linux platform. Description: AMX Mod 0.9.2 - Remote 'amx_say' Format String. Author: greuff |
Analyze the security implications of: AMX Mod 0.9.2 - Remote 'amx_say' Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Navis Webaccess - SQL Injection | This is a webapps exploit for jsp platform. Description: Navis Webaccess - SQL Injection. Author: bRpsd |
Analyze the security implications of: Navis Webaccess - SQL Injection | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Ivanti vADC 9.9 - Authentication Bypass | This is a webapps exploit for multiple platform. Description: Ivanti vADC 9.9 - Authentication Bypass. Author: ohnoisploited |
Analyze the security implications of: Ivanti vADC 9.9 - Authentication Bypass | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache CouchDB - Arbitrary Command Execution (Metasploit) | This is a remote exploit for linux platform. Description: Apache CouchDB - Arbitrary Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Apache CouchDB - Arbitrary Command Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: D-Link - OS-Command Injection via UPnP Interface | This is a webapps exploit for hardware platform. Description: D-Link - OS-Command Injection via UPnP Interface. Author: m-1-k-3 |
Analyze the security implications of: D-Link - OS-Command Injection via UPnP Interface | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Elastic Path 4.1 - '/manager/FileManager.jsp?dir' Traversal Arbitrary Directory Listing | This is a webapps exploit for jsp platform. Description: Elastic Path 4.1 - '/manager/FileManager.jsp?dir' Traversal Arbitrary Directory Listing. Author: Daniel Martin Gomez |
Analyze the security implications of: Elastic Path 4.1 - '/manager/FileManager.jsp?dir' Traversal Arbitrary Directory Listing | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: KDE LibkHTML 4.2 - NodeType Function Denial of Service | This is a dos exploit for linux platform. Description: KDE LibkHTML 4.2 - NodeType Function Denial of Service. Author: Federico L. Bossi Bonin |
Analyze the security implications of: KDE LibkHTML 4.2 - NodeType Function Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FreeBSD 6.1 - 'kqueue()' Null Pointer Dereference Privilege Escalation | This is a local exploit for freebsd platform. Description: FreeBSD 6.1 - 'kqueue()' Null Pointer Dereference Privilege Escalation. Author: Przemyslaw Frasunek |
Analyze the security implications of: FreeBSD 6.1 - 'kqueue()' Null Pointer Dereference Privilege Escalation | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: BoatScripts Classifieds - 'type' SQL Injection | This is a webapps exploit for php platform. Description: BoatScripts Classifieds - 'type' SQL Injection. Author: Stack |
Analyze the security implications of: BoatScripts Classifieds - 'type' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AfterLogic MailBee WebMail Pro 3.x - 'login.php?mode' Cross-Site Scripting | This is a webapps exploit for php platform. Description: AfterLogic MailBee WebMail Pro 3.x - 'login.php?mode' Cross-Site Scripting. Author: Ivan Sanchez |
Analyze the security implications of: AfterLogic MailBee WebMail Pro 3.x - 'login.php?mode' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Photo Manager Pro 4.4.0 iOS - Code Execution | This is a webapps exploit for ios platform. Description: Photo Manager Pro 4.4.0 iOS - Code Execution. Author: Vulnerability-Lab |
Analyze the security implications of: Photo Manager Pro 4.4.0 iOS - Code Execution | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Shopware - createInstanceFromNamedArguments PHP Object Instantiation Remote Code Execution (Metasploit) | This is a remote exploit for php platform. Description: Shopware - createInstanceFromNamedArguments PHP Object Instantiation Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Shopware - createInstanceFromNamedArguments PHP Object Instantiation Remote Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Centreon 19.10.5 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Centreon 19.10.5 - 'id' SQL Injection. Author: Basim Alabdullah |
Analyze the security implications of: Centreon 19.10.5 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ECommerceMajor - 'productdtl.php?prodid' SQL Injection | This is a webapps exploit for php platform. Description: ECommerceMajor - 'productdtl.php?prodid' SQL Injection. Author: Rahul Pratap Singh |
Analyze the security implications of: ECommerceMajor - 'productdtl.php?prodid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CHIYU IoT Devices - Denial of Service (DoS) | This is a webapps exploit for hardware platform. Description: CHIYU IoT Devices - Denial of Service (DoS). Author: sirpedrotavares |
Analyze the security implications of: CHIYU IoT Devices - Denial of Service (DoS) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linux Kernel 3.16.3 - Associative Array Garbage Collection Crash (PoC) | This is a dos exploit for linux platform. Description: Linux Kernel 3.16.3 - Associative Array Garbage Collection Crash (PoC). Author: Emeric Nasi |
Analyze the security implications of: Linux Kernel 3.16.3 - Associative Array Garbage Collection Crash (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Adobe IndesignServer 5.5 - SOAP Server Arbitrary Script Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Adobe IndesignServer 5.5 - SOAP Server Arbitrary Script Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Adobe IndesignServer 5.5 - SOAP Server Arbitrary Script Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CubeCart 6.0.10 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: CubeCart 6.0.10 - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: CubeCart 6.0.10 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla Firefox 3.5 - escape Memory Corruption (Metasploit) | This is a remote exploit for multiple platform. Description: Mozilla Firefox 3.5 - escape Memory Corruption (Metasploit). Author: H D Moore |
Analyze the security implications of: Mozilla Firefox 3.5 - escape Memory Corruption (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Soldat 1.4.2 - Multiple Remote Denial of Service Vulnerabilities | This is a dos exploit for multiple platform. Description: Soldat 1.4.2 - Multiple Remote Denial of Service Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: Soldat 1.4.2 - Multiple Remote Denial of Service Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: course registration management system 2.1 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: course registration management system 2.1 - Multiple Vulnerabilities. Author: AutoSec Tools |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.