input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Connectix Boards 0.7 - 'p_skin' Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Connectix Boards 0.7 - 'p_skin' Multiple Vulnerabilities. Author: DarkFig |
Analyze the security implications of: Connectix Boards 0.7 - 'p_skin' Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LiveCart 1.0.1 - 'email' Cross-Site Scripting | This is a webapps exploit for php platform. Description: LiveCart 1.0.1 - 'email' Cross-Site Scripting. Author: Doz |
Analyze the security implications of: LiveCart 1.0.1 - 'email' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AMD / ARM / Intel - Speculative Execution Variant 4 Speculative Store Bypass | This is a dos exploit for hardware platform. Description: AMD / ARM / Intel - Speculative Execution Variant 4 Speculative Store Bypass. Author: Google Security Research |
Analyze the security implications of: AMD / ARM / Intel - Speculative Execution Variant 4 Speculative Store Bypass | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Hashicorp Consul v1.0 - Remote Command Execution (RCE) | This is a remote exploit for multiple platform. Description: Hashicorp Consul v1.0 - Remote Command Execution (RCE). Author: GatoGamer1155 |
Analyze the security implications of: Hashicorp Consul v1.0 - Remote Command Execution (RCE) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Hotel Booking Portal - SQL Injection | This is a webapps exploit for php platform. Description: Hotel Booking Portal - SQL Injection. Author: Mark Stanislav |
Analyze the security implications of: Hotel Booking Portal - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ingenium Learning Management System 5.1/6.1 - Reversible Password Hash | This is a remote exploit for multiple platform. Description: Ingenium Learning Management System 5.1/6.1 - Reversible Password Hash. Author: Brian Enigma |
Analyze the security implications of: Ingenium Learning Management System 5.1/6.1 - Reversible Password Hash | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Web TV 1.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Web TV 1.0 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Web TV 1.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Asterisk 1.4 SIP T.38 SDP - Parsing Remote Stack Buffer Overflow (PoC) (1) | This is a dos exploit for multiple platform. Description: Asterisk 1.4 SIP T.38 SDP - Parsing Remote Stack Buffer Overflow (PoC) (1). Author: Barrie Dempster |
Analyze the security implications of: Asterisk 1.4 SIP T.38 SDP - Parsing Remote Stack Buffer Overflow (PoC) (1) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ATutor 2.2.2 - Cross-Site Request Forgery (Add New Course) | This is a webapps exploit for php platform. Description: ATutor 2.2.2 - Cross-Site Request Forgery (Add New Course). Author: Saravana Kumar |
Analyze the security implications of: ATutor 2.2.2 - Cross-Site Request Forgery (Add New Course) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10.9 - Hard Link Memory Corruption | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.9 - Hard Link Memory Corruption. Author: Maksymilian Arciemowicz |
Analyze the security implications of: Apple Mac OSX 10.9 - Hard Link Memory Corruption | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Tenda A5s Router 3.02.05_CN - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Tenda A5s Router 3.02.05_CN - Authentication Bypass. Author: zixian |
Analyze the security implications of: Tenda A5s Router 3.02.05_CN - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PHP 5.3.1 - LCG Entropy Security | This is a dos exploit for php platform. Description: PHP 5.3.1 - LCG Entropy Security. Author: Rasmus |
Analyze the security implications of: PHP 5.3.1 - LCG Entropy Security | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LDAP Tool Box Self Service Password v1.5.2 - Account takeover | This is a webapps exploit for php platform. Description: LDAP Tool Box Self Service Password v1.5.2 - Account takeover. Author: Tahar BENNACEF |
Analyze the security implications of: LDAP Tool Box Self Service Password v1.5.2 - Account takeover | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ManageEngine EventLog Analyzer - Multiple Vulnerabilities (1) | This is a webapps exploit for jsp platform. Description: ManageEngine EventLog Analyzer - Multiple Vulnerabilities (1). Author: Hans-Martin Muench |
Analyze the security implications of: ManageEngine EventLog Analyzer - Multiple Vulnerabilities (1) | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: EasyPublish 3.0 - 'read' Multiple SQL Injections / Cross-Site Scripting | This is a webapps exploit for php platform. Description: EasyPublish 3.0 - 'read' Multiple SQL Injections / Cross-Site Scripting. Author: Dr.Crash |
Analyze the security implications of: EasyPublish 3.0 - 'read' Multiple SQL Injections / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux 4.18 - Arbitrary Kernel Read into dmesg via Missing Address Check in segfault Handler | This is a dos exploit for linux platform. Description: Linux 4.18 - Arbitrary Kernel Read into dmesg via Missing Address Check in segfault Handler. Author: Google Security Research |
Analyze the security implications of: Linux 4.18 - Arbitrary Kernel Read into dmesg via Missing Address Check in segfault Handler | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ABB Cylon Aspect 3.08.02 (deployStart.php) - Unauthenticated Command Execution | This is a hardware exploit for php platform. Description: ABB Cylon Aspect 3.08.02 (deployStart.php) - Unauthenticated Command Execution. Author: LiquidWorm |
Analyze the security implications of: ABB Cylon Aspect 3.08.02 (deployStart.php) - Unauthenticated Command Execution | This exploit targets php systems. Type: hardware. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Backdrop CMS 1.27.1 - Authenticated Remote Command Execution (RCE) | This is a webapps exploit for php platform. Description: Backdrop CMS 1.27.1 - Authenticated Remote Command Execution (RCE). Author: Ahmet Ümit BAYRAM |
Analyze the security implications of: Backdrop CMS 1.27.1 - Authenticated Remote Command Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Notex the best notes 6.4 - Denial of Service (PoC) | This is a dos exploit for ios platform. Description: Notex the best notes 6.4 - Denial of Service (PoC). Author: Geovanni Ruiz |
Analyze the security implications of: Notex the best notes 6.4 - Denial of Service (PoC) | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: OpenSSL 0.9.8c-1 < 0.9.8g-9 (Debian and Derivatives) - Predictable PRNG Brute Force SSH | This is a remote exploit for linux platform. Description: OpenSSL 0.9.8c-1 < 0.9.8g-9 (Debian and Derivatives) - Predictable PRNG Brute Force SSH. Author: WarCat team |
Analyze the security implications of: OpenSSL 0.9.8c-1 < 0.9.8g-9 (Debian and Derivatives) - Predictable PRNG Brute Force SSH | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_phocadownload - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_phocadownload - Local File Inclusion. Author: KedAns-Dz |
Analyze the security implications of: Joomla! Component com_phocadownload - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: pfsenseCE v2.6.0 - Anti-brute force protection bypass | This is a remote exploit for hardware platform. Description: pfsenseCE v2.6.0 - Anti-brute force protection bypass. Author: FabDotNET |
Analyze the security implications of: pfsenseCE v2.6.0 - Anti-brute force protection bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Blood Bank System 1.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: Blood Bank System 1.0 - Authentication Bypass. Author: Nitin Sharma |
Analyze the security implications of: Blood Bank System 1.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JE Story Submit - 'index.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component JE Story Submit - 'index.php' Arbitrary File Upload. Author: Robert Cooper |
Analyze the security implications of: Joomla! Component JE Story Submit - 'index.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple iOS 10.2 (14C92) - Remote Code Execution | This is a remote exploit for ios platform. Description: Apple iOS 10.2 (14C92) - Remote Code Execution. Author: Google Security Research |
Analyze the security implications of: Apple iOS 10.2 (14C92) - Remote Code Execution | This exploit targets ios systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Joomla! Component com_movm - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_movm - SQL Injection. Author: D4NB4R |
Analyze the security implications of: Joomla! Component com_movm - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ipswitch IMail 5.0/6.0 - Web Service Buffer Overflow (Denial of Service) (PoC) | This is a dos exploit for multiple platform. Description: Ipswitch IMail 5.0/6.0 - Web Service Buffer Overflow (Denial of Service) (PoC). Author: Marc of eEye |
Analyze the security implications of: Ipswitch IMail 5.0/6.0 - Web Service Buffer Overflow (Denial of Service) (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_qcontacts - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_qcontacts - SQL Injection. Author: _mlk_ |
Analyze the security implications of: Joomla! Component com_qcontacts - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 3.10.0 (CentOS / RHEL 7.1) - 'cypress_m8' Nullpointer Dereference | This is a dos exploit for linux platform. Description: Linux Kernel 3.10.0 (CentOS / RHEL 7.1) - 'cypress_m8' Nullpointer Dereference. Author: OpenSource Security |
Analyze the security implications of: Linux Kernel 3.10.0 (CentOS / RHEL 7.1) - 'cypress_m8' Nullpointer Dereference | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DMXReady Faqs Manager 1.1 - Remote Contents Change | This is a webapps exploit for asp platform. Description: DMXReady Faqs Manager 1.1 - Remote Contents Change. Author: ajann |
Analyze the security implications of: DMXReady Faqs Manager 1.1 - Remote Contents Change | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: BirdBlog 1.4 - '/admin/logs.php?page' Cross-Site Scripting | This is a webapps exploit for php platform. Description: BirdBlog 1.4 - '/admin/logs.php?page' Cross-Site Scripting. Author: the_Edit0r |
Analyze the security implications of: BirdBlog 1.4 - '/admin/logs.php?page' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Active NewsLetter 4.3 - 'ViewNewspapers.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Active NewsLetter 4.3 - 'ViewNewspapers.asp' SQL Injection. Author: ajann |
Analyze the security implications of: Active NewsLetter 4.3 - 'ViewNewspapers.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ActiveVotes 2.2 - 'AccountID' Blind SQL Injection | This is a webapps exploit for asp platform. Description: ActiveVotes 2.2 - 'AccountID' Blind SQL Injection. Author: R3d-D3V!L |
Analyze the security implications of: ActiveVotes 2.2 - 'AccountID' Blind SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ProductCart 1.5/1.6/2.0 - 'login.asp' SQL Injection | This is a webapps exploit for asp platform. Description: ProductCart 1.5/1.6/2.0 - 'login.asp' SQL Injection. Author: Bosen |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.