input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: JPegToAvi 1.5 - File List Buffer Overflow | This is a remote exploit for multiple platform. Description: JPegToAvi 1.5 - File List Buffer Overflow. Author: James Longstreet |
Analyze the security implications of: JPegToAvi 1.5 - File List Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Free Blog 1.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Free Blog 1.0 - Multiple Vulnerabilities. Author: cr4wl3r |
Analyze the security implications of: Free Blog 1.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DSL-G624T - Information Disclosure | This is a remote exploit for hardware platform. Description: D-Link DSL-G624T - Information Disclosure. Author: jose.palanco |
Analyze the security implications of: D-Link DSL-G624T - Information Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ACGVAnnu 1.3 - 'acgv.php?rubrik' Local File Inclusion | This is a webapps exploit for php platform. Description: ACGVAnnu 1.3 - 'acgv.php?rubrik' Local File Inclusion. Author: BeyazKurt |
Analyze the security implications of: ACGVAnnu 1.3 - 'acgv.php?rubrik' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nagios XI - 'tfPassword' SQL Injection | This is a remote exploit for php platform. Description: Nagios XI - 'tfPassword' SQL Injection. Author: Denis Andzakovic |
Analyze the security implications of: Nagios XI - 'tfPassword' SQL Injection | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nokia N97 - '.m3u' Playlist Crash (PoC) | This is a dos exploit for hardware platform. Description: Nokia N97 - '.m3u' Playlist Crash (PoC). Author: KedAns-Dz |
Analyze the security implications of: Nokia N97 - '.m3u' Playlist Crash (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Mida eFramework 2.9.0 - Remote Code Execution | This is a webapps exploit for multiple platform. Description: Mida eFramework 2.9.0 - Remote Code Execution. Author: elbae |
Analyze the security implications of: Mida eFramework 2.9.0 - Remote Code Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BeContent 031 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: BeContent 031 - 'id' SQL Injection. Author: Cr@zy_King |
Analyze the security implications of: BeContent 031 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NPMJS gitlabhook 0.0.17 - 'repository' Remote Command Execution | This is a webapps exploit for json platform. Description: NPMJS gitlabhook 0.0.17 - 'repository' Remote Command Execution. Author: Semen Alexandrovich Lyhin |
Analyze the security implications of: NPMJS gitlabhook 0.0.17 - 'repository' Remote Command Execution | This exploit targets json systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets json platform |
What is this exploit about: Atlassian Confluence 7.12.2 - Pre-Authorization Arbitrary File Read | This is a webapps exploit for java platform. Description: Atlassian Confluence 7.12.2 - Pre-Authorization Arbitrary File Read. Author: Mayank Deshmukh |
Analyze the security implications of: Atlassian Confluence 7.12.2 - Pre-Authorization Arbitrary File Read | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: 2WIRE Gateway - Authentication Bypass / Password Reset (1) | This is a remote exploit for hardware platform. Description: 2WIRE Gateway - Authentication Bypass / Password Reset (1). Author: hkm |
Analyze the security implications of: 2WIRE Gateway - Authentication Bypass / Password Reset (1) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Zenoss 3.2.1 - Multiple Vulnerabilities | This is a webapps exploit for multiple platform. Description: Zenoss 3.2.1 - Multiple Vulnerabilities. Author: Brendan Coles |
Analyze the security implications of: Zenoss 3.2.1 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GestioIP 3.5.7 - Remote Command Execution (RCE) | This is a remote exploit for multiple platform. Description: GestioIP 3.5.7 - Remote Command Execution (RCE). Author: Maximiliano Belino |
Analyze the security implications of: GestioIP 3.5.7 - Remote Command Execution (RCE) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_comp - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_comp - SQL Injection. Author: DevilZ TM |
Analyze the security implications of: Joomla! Component com_comp - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Magic Photo Storage Website - '/user/delete_category.php?_config[site_path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/user/delete_category.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina |
Analyze the security implications of: Magic Photo Storage Website - '/user/delete_category.php?_config[site_path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Eduha Meeting - 'index.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: Eduha Meeting - 'index.php' Arbitrary File Upload. Author: Liz0ziM |
Analyze the security implications of: Eduha Meeting - 'index.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zyxel USG FLEX 5.21 - OS Command Injection | This is a remote exploit for hardware platform. Description: Zyxel USG FLEX 5.21 - OS Command Injection. Author: Valentin Lobstein |
Analyze the security implications of: Zyxel USG FLEX 5.21 - OS Command Injection | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apple Mac OSX Install.Framework - Arbitrary mkdir / unlink and chown to Admin Group | This is a local exploit for osx platform. Description: Apple Mac OSX Install.Framework - Arbitrary mkdir / unlink and chown to Admin Group. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX Install.Framework - Arbitrary mkdir / unlink and chown to Admin Group | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Mozilla Firefox 3.0.11 and Thunderbird 2.0.9 - RDF File Handling Remote Memory Corruption | This is a dos exploit for linux platform. Description: Mozilla Firefox 3.0.11 and Thunderbird 2.0.9 - RDF File Handling Remote Memory Corruption. Author: Christophe Charron |
Analyze the security implications of: Mozilla Firefox 3.0.11 and Thunderbird 2.0.9 - RDF File Handling Remote Memory Corruption | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Nagios XI 5.5.6 - Magpie_debug.php Root Remote Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: Nagios XI 5.5.6 - Magpie_debug.php Root Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Nagios XI 5.5.6 - Magpie_debug.php Root Remote Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: MongoDB - 'conn' Mongo Object Remote Code Execution | This is a remote exploit for multiple platform. Description: MongoDB - 'conn' Mongo Object Remote Code Execution. Author: SCRT Security |
Analyze the security implications of: MongoDB - 'conn' Mongo Object Remote Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Technicolor TD5130.2 - Remote Command Execution | This is a webapps exploit for hardware platform. Description: Technicolor TD5130.2 - Remote Command Execution. Author: João Teles |
Analyze the security implications of: Technicolor TD5130.2 - Remote Command Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Campsite 2.6.1 - 'Log.php?g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'Log.php?g_documentRoot' Remote File Inclusion. Author: anonymous |
Analyze the security implications of: Campsite 2.6.1 - 'Log.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX / iOS - Multiple Kernel Uninitialized Variable Bugs Leading to Code Execution Vulnerabilities | This is a dos exploit for multiple platform. Description: Apple Mac OSX / iOS - Multiple Kernel Uninitialized Variable Bugs Leading to Code Execution Vulnerabilities. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX / iOS - Multiple Kernel Uninitialized Variable Bugs Leading to Code Execution Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Atomic Photo Album 0.x/1.0 - 'Apa_PHPInclude.INC.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Atomic Photo Album 0.x/1.0 - 'Apa_PHPInclude.INC.php' Remote File Inclusion. Author: lwdz |
Analyze the security implications of: Atomic Photo Album 0.x/1.0 - 'Apa_PHPInclude.INC.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Texas Rankem - 'selPlayer' SQL Injection | This is a webapps exploit for asp platform. Description: Texas Rankem - 'selPlayer' SQL Injection. Author: Aria-Security Team |
Analyze the security implications of: Texas Rankem - 'selPlayer' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: SX Design sipd 0.1.2 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: SX Design sipd 0.1.2 - Remote Denial of Service. Author: storm |
Analyze the security implications of: SX Design sipd 0.1.2 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component jDownloads 1.0 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component jDownloads 1.0 - Arbitrary File Upload. Author: Al-Ghamdi |
Analyze the security implications of: Joomla! Component jDownloads 1.0 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Extcalendar 2 - 'calendar.php' SQL Injection | This is a webapps exploit for php platform. Description: Extcalendar 2 - 'calendar.php' SQL Injection. Author: Lagripe-Dz & Mca-Crb |
Analyze the security implications of: Extcalendar 2 - 'calendar.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ManageEngine Desktop Central - Java Deserialization (Metasploit) | This is a remote exploit for multiple platform. Description: ManageEngine Desktop Central - Java Deserialization (Metasploit). Author: Metasploit |
Analyze the security implications of: ManageEngine Desktop Central - Java Deserialization (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DomainMOD 4.11.01 - 'raid' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DomainMOD 4.11.01 - 'raid' Cross-Site Scripting. Author: Dawood Ansar |
Analyze the security implications of: DomainMOD 4.11.01 - 'raid' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CBAS-Web 19.0.0 - Username Enumeration | This is a webapps exploit for hardware platform. Description: CBAS-Web 19.0.0 - Username Enumeration. Author: LiquidWorm |
Analyze the security implications of: CBAS-Web 19.0.0 - Username Enumeration | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BuilderEngine 3.5.0 - Arbitrary File Upload and Execution (Metasploit) | This is a remote exploit for php platform. Description: BuilderEngine 3.5.0 - Arbitrary File Upload and Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: BuilderEngine 3.5.0 - Arbitrary File Upload and Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MySQL 4.1/5.0 - Authentication Bypass | This is a remote exploit for multiple platform. Description: MySQL 4.1/5.0 - Authentication Bypass. Author: Eli Kara |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.