input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: DMXReady Members Area Manager 1.2 - SQL Injection | This is a webapps exploit for asp platform. Description: DMXReady Members Area Manager 1.2 - SQL Injection. Author: ajann |
Analyze the security implications of: DMXReady Members Area Manager 1.2 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Trend Micro OfficeScan Corporate Edition 3.0/3.5/3.11/3.13 - Denial of Service | This is a dos exploit for multiple platform. Description: Trend Micro OfficeScan Corporate Edition 3.0/3.5/3.11/3.13 - Denial of Service. Author: Jeff Stevens |
Analyze the security implications of: Trend Micro OfficeScan Corporate Edition 3.0/3.5/3.11/3.13 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Android 7 - 9 VideoPlayer - 'ihevcd_parse_pps' Out-of-Bounds Write | This is a dos exploit for android platform. Description: Android 7 - 9 VideoPlayer - 'ihevcd_parse_pps' Out-of-Bounds Write. Author: Marcin Kozlowski |
Analyze the security implications of: Android 7 - 9 VideoPlayer - 'ihevcd_parse_pps' Out-of-Bounds Write | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: UFO: Alien Invasion 2.2.1 (OSX Snow Leopard) - IRC Client Remote Code Execution (ROP) | This is a remote exploit for osx platform. Description: UFO: Alien Invasion 2.2.1 (OSX Snow Leopard) - IRC Client Remote Code Execution (ROP). Author: d1dn0t |
Analyze the security implications of: UFO: Alien Invasion 2.2.1 (OSX Snow Leopard) - IRC Client Remote Code Execution (ROP) | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Experts 1.0.0 - 'answer.php' SQL Injection | This is a webapps exploit for php platform. Description: Experts 1.0.0 - 'answer.php' SQL Injection. Author: CWH Underground |
Analyze the security implications of: Experts 1.0.0 - 'answer.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: pdfium IsFlagSet (v8 memory management) - SIGSEGV | This is a dos exploit for multiple platform. Description: pdfium IsFlagSet (v8 memory management) - SIGSEGV. Author: Google Security Research |
Analyze the security implications of: pdfium IsFlagSet (v8 memory management) - SIGSEGV | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FreeSchool 1.1.0 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: FreeSchool 1.1.0 - Multiple Remote File Inclusions. Author: cr4wl3r |
Analyze the security implications of: FreeSchool 1.1.0 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Discovery TorrentTrader 2.6 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Discovery TorrentTrader 2.6 - Multiple Vulnerabilities. Author: EsS4ndre |
Analyze the security implications of: Discovery TorrentTrader 2.6 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fuzzylime CMS 3.01 - Remote Command Execution | This is a webapps exploit for php platform. Description: Fuzzylime CMS 3.01 - Remote Command Execution. Author: Ams |
Analyze the security implications of: Fuzzylime CMS 3.01 - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gentoo-Specific MPG123 - URI Remote Buffer Overflow | This is a dos exploit for linux platform. Description: Gentoo-Specific MPG123 - URI Remote Buffer Overflow. Author: Horst Schirmeier |
Analyze the security implications of: Gentoo-Specific MPG123 - URI Remote Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: gapicms 9.0.2 - 'dirDepth' Remote File Inclusion | This is a webapps exploit for php platform. Description: gapicms 9.0.2 - 'dirDepth' Remote File Inclusion. Author: Ghost Hacker |
Analyze the security implications of: gapicms 9.0.2 - 'dirDepth' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CSF Firewall - Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: CSF Firewall - Buffer Overflow (PoC). Author: FoX HaCkEr |
Analyze the security implications of: CSF Firewall - Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Iris ID IrisAccess iCAM4000/iCAM7000 - Hard-Coded Credentials Remote Shell Access | This is a remote exploit for linux platform. Description: Iris ID IrisAccess iCAM4000/iCAM7000 - Hard-Coded Credentials Remote Shell Access. Author: LiquidWorm |
Analyze the security implications of: Iris ID IrisAccess iCAM4000/iCAM7000 - Hard-Coded Credentials Remote Shell Access | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Clipbucket 2.5 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Clipbucket 2.5 - Cross-Site Request Forgery. Author: DaOne |
Analyze the security implications of: Clipbucket 2.5 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SePortal 2.5 - SQL Injection / Remote Code Execution (Metasploit) | This is a remote exploit for php platform. Description: SePortal 2.5 - SQL Injection / Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: SePortal 2.5 - SQL Injection / Remote Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nvidia Graphics Driver 8774 - Local Buffer Overflow | This is a local exploit for linux platform. Description: Nvidia Graphics Driver 8774 - Local Buffer Overflow. Author: Rapid7 Security |
Analyze the security implications of: Nvidia Graphics Driver 8774 - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: 5 star Rating 1.2 - Authentication Bypass | This is a webapps exploit for php platform. Description: 5 star Rating 1.2 - Authentication Bypass. Author: zer0day |
Analyze the security implications of: 5 star Rating 1.2 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ProjectApp 3.3 - 'links.asp?keywords' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: ProjectApp 3.3 - 'links.asp?keywords' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: ProjectApp 3.3 - 'links.asp?keywords' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Apple iPhone 2.2.1 - Call Approval Dialog Security Bypass (3) | This is a remote exploit for hardware platform. Description: Apple iPhone 2.2.1 - Call Approval Dialog Security Bypass (3). Author: Collin Mulliner |
Analyze the security implications of: Apple iPhone 2.2.1 - Call Approval Dialog Security Bypass (3) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: E-Xoopport Samsara 3.1 (eCal Module) - Blind SQL Injection | This is a webapps exploit for php platform. Description: E-Xoopport Samsara 3.1 (eCal Module) - Blind SQL Injection. Author: _mRkZ_ |
Analyze the security implications of: E-Xoopport Samsara 3.1 (eCal Module) - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux 4.4.0 < 4.4.0-53 - 'AF_PACKET chocobo_root' Local Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: Linux 4.4.0 < 4.4.0-53 - 'AF_PACKET chocobo_root' Local Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Linux 4.4.0 < 4.4.0-53 - 'AF_PACKET chocobo_root' Local Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PerlDesk Language Variable - Server-Side Script Execution | This is a webapps exploit for cgi platform. Description: PerlDesk Language Variable - Server-Side Script Execution. Author: Nikyt0x Argentina |
Analyze the security implications of: PerlDesk Language Variable - Server-Side Script Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: ktsuss 1.4 - suid Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: ktsuss 1.4 - suid Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: ktsuss 1.4 - suid Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BTGrup Admin WebController - SQL Injection | This is a webapps exploit for php platform. Description: BTGrup Admin WebController - SQL Injection. Author: khc@bsdmail.org |
Analyze the security implications of: BTGrup Admin WebController - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EyesOfNetwork 5.3 - RCE & PrivEsc | This is a webapps exploit for multiple platform. Description: EyesOfNetwork 5.3 - RCE & PrivEsc. Author: Audencia Business SCHOOL Red Team |
Analyze the security implications of: EyesOfNetwork 5.3 - RCE & PrivEsc | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Land Down Under 800/801 - 'list.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: Land Down Under 800/801 - 'list.php' Multiple SQL Injections. Author: bl2k |
Analyze the security implications of: Land Down Under 800/801 - 'list.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_state_query.inc.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_state_query.inc.php?base_path' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_state_query.inc.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: evoBB 0.3 - 'path' Remote File Inclusion | This is a webapps exploit for php platform. Description: evoBB 0.3 - 'path' Remote File Inclusion. Author: SHiKaA |
Analyze the security implications of: evoBB 0.3 - 'path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Activist Mobilization Platform (AMP) 3.2 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Activist Mobilization Platform (AMP) 3.2 - Remote File Inclusion. Author: the_day |
Analyze the security implications of: Activist Mobilization Platform (AMP) 3.2 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Tea LaTex 1.0 - Remote Code Execution (Unauthenticated) | This is a webapps exploit for multiple platform. Description: Tea LaTex 1.0 - Remote Code Execution (Unauthenticated). Author: nepska |
Analyze the security implications of: Tea LaTex 1.0 - Remote Code Execution (Unauthenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Honeywell IP-Camera HICC-1100PT - Local File Disclosure | This is a webapps exploit for cgi platform. Description: Honeywell IP-Camera HICC-1100PT - Local File Disclosure. Author: Yakir Wizman |
Analyze the security implications of: Honeywell IP-Camera HICC-1100PT - Local File Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Desi Short URL Script - (Authentication Bypass) Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Desi Short URL Script - (Authentication Bypass) Insecure Cookie Handling. Author: N@bilX |
Analyze the security implications of: Desi Short URL Script - (Authentication Bypass) Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Compro Technology IP Camera - 'killps.cgi' Denial of Service (DoS) | This is a webapps exploit for hardware platform. Description: Compro Technology IP Camera - 'killps.cgi' Denial of Service (DoS). Author: icekam |
Analyze the security implications of: Compro Technology IP Camera - 'killps.cgi' Denial of Service (DoS) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: TVT NVMS 1000 - Directory Traversal | This is a webapps exploit for hardware platform. Description: TVT NVMS 1000 - Directory Traversal. Author: Mohin Paramasivam |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.