input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bayanno Hospital Management System 4.0 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Bayanno Hospital Management System 4.0 - Cross-Site Scripting. Author: Gokhan Sagoglu |
Analyze the security implications of: Bayanno Hospital Management System 4.0 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash Player 10.0.22 / AIR - URI Parsing Heap Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: Adobe Flash Player 10.0.22 / AIR - URI Parsing Heap Buffer Overflow (PoC). Author: iDefense |
Analyze the security implications of: Adobe Flash Player 10.0.22 / AIR - URI Parsing Heap Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Technicolor TC7337 - 'SSID' Persistent Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Technicolor TC7337 - 'SSID' Persistent Cross-Site Scripting. Author: Geolado giolado |
Analyze the security implications of: Technicolor TC7337 - 'SSID' Persistent Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apple macOS < 10.12.2 / iOS < 10.2 Kernel - ipc_port_t Reference Count Leak Due to Incorrect externalMethod Overrides Use-After-Free | This is a dos exploit for multiple platform. Description: Apple macOS < 10.12.2 / iOS < 10.2 Kernel - ipc_port_t Reference Count Leak Due to Incorrect externalMethod Overrides Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Apple macOS < 10.12.2 / iOS < 10.2 Kernel - ipc_port_t Reference Count Leak Due to Incorrect externalMethod Overrides Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Go SSH servers 0.0.2 - Denial of Service (PoC) | This is a dos exploit for linux platform. Description: Go SSH servers 0.0.2 - Denial of Service (PoC). Author: Mark Adams |
Analyze the security implications of: Go SSH servers 0.0.2 - Denial of Service (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_cartikads 1.0 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component com_cartikads 1.0 - Arbitrary File Upload. Author: kaMtiEz |
Analyze the security implications of: Joomla! Component com_cartikads 1.0 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Broadcom Wi-Fi SoC - Heap Overflow 'wlc_tdls_cal_mic_chk' Due to Large RSN IE in TDLS Setup Confirm Frame | This is a dos exploit for hardware platform. Description: Broadcom Wi-Fi SoC - Heap Overflow 'wlc_tdls_cal_mic_chk' Due to Large RSN IE in TDLS Setup Confirm Frame. Author: Google Security Research |
Analyze the security implications of: Broadcom Wi-Fi SoC - Heap Overflow 'wlc_tdls_cal_mic_chk' Due to Large RSN IE in TDLS Setup Confirm Frame | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Arcadwy Arcade Script - 'Username' Static Cross-Site Scripting | This is a webapps exploit for php platform. Description: Arcadwy Arcade Script - 'Username' Static Cross-Site Scripting. Author: Anarchy Angel |
Analyze the security implications of: Arcadwy Arcade Script - 'Username' Static Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DIR-645 - Multiple UPNP Vulnerabilities | This is a remote exploit for hardware platform. Description: D-Link DIR-645 - Multiple UPNP Vulnerabilities. Author: Samuel Huntley |
Analyze the security implications of: D-Link DIR-645 - Multiple UPNP Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: IFOBS - 'regclientprint.jsp' Multiple HTML Injection Vulnerabilities | This is a webapps exploit for jsp platform. Description: IFOBS - 'regclientprint.jsp' Multiple HTML Injection Vulnerabilities. Author: MustLive |
Analyze the security implications of: IFOBS - 'regclientprint.jsp' Multiple HTML Injection Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Evince 3.24.0 - Command Injection | This is a dos exploit for linux platform. Description: Evince 3.24.0 - Command Injection. Author: Matlink |
Analyze the security implications of: Evince 3.24.0 - Command Injection | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Kojoney 0.0.4.1 - 'urllib.urlopen()' Remote Denial of Service | This is a dos exploit for linux platform. Description: Kojoney 0.0.4.1 - 'urllib.urlopen()' Remote Denial of Service. Author: Nicob |
Analyze the security implications of: Kojoney 0.0.4.1 - 'urllib.urlopen()' Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DoceboLms 4.0.4 - 'index.php' Multiple HTML Injection Vulnerabilities | This is a webapps exploit for php platform. Description: DoceboLms 4.0.4 - 'index.php' Multiple HTML Injection Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: DoceboLms 4.0.4 - 'index.php' Multiple HTML Injection Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zeroo HTTP Server 1.5 - Directory Traversal (1) | This is a remote exploit for linux platform. Description: Zeroo HTTP Server 1.5 - Directory Traversal (1). Author: mikecc |
Analyze the security implications of: Zeroo HTTP Server 1.5 - Directory Traversal (1) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Artworks Gallery Management System 1.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Artworks Gallery Management System 1.0 - 'id' SQL Injection. Author: Vijay Sachdeva |
Analyze the security implications of: Artworks Gallery Management System 1.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 3.10.0-229.x (CentOS / RHEL 7.1) - 'iowarrior' Driver Crash (PoC) | This is a dos exploit for linux platform. Description: Linux Kernel 3.10.0-229.x (CentOS / RHEL 7.1) - 'iowarrior' Driver Crash (PoC). Author: OpenSource Security |
Analyze the security implications of: Linux Kernel 3.10.0-229.x (CentOS / RHEL 7.1) - 'iowarrior' Driver Crash (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Novell eDirectory 8.x - iMonitor HTTPSTK Buffer Overflow (2) | This is a remote exploit for novell platform. Description: Novell eDirectory 8.x - iMonitor HTTPSTK Buffer Overflow (2). Author: Expanders |
Analyze the security implications of: Novell eDirectory 8.x - iMonitor HTTPSTK Buffer Overflow (2) | This exploit targets novell systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: Lucee Scheduled Job v1.0 - Command Execution | This is a local exploit for multiple platform. Description: Lucee Scheduled Job v1.0 - Command Execution. Author: Alexander Philiotis |
Analyze the security implications of: Lucee Scheduled Job v1.0 - Command Execution | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_jsjobs 1.0.5.6 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_jsjobs 1.0.5.6 - SQL Injection. Author: kaMtiEz |
Analyze the security implications of: Joomla! Component com_jsjobs 1.0.5.6 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Netgear WNR2000 - Multiple Information Disclosure Vulnerabilities | This is a remote exploit for hardware platform. Description: Netgear WNR2000 - Multiple Information Disclosure Vulnerabilities. Author: Jean Trolleur |
Analyze the security implications of: Netgear WNR2000 - Multiple Information Disclosure Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: IBM AIX 4.3.2 - 'ftpd' Remote Buffer Overflow | This is a remote exploit for aix platform. Description: IBM AIX 4.3.2 - 'ftpd' Remote Buffer Overflow. Author: Gerrie |
Analyze the security implications of: IBM AIX 4.3.2 - 'ftpd' Remote Buffer Overflow | This exploit targets aix systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Tenda N11 Wireless Router 5.07.43_en_NEX01 - Remote DNS Change | This is a webapps exploit for hardware platform. Description: Tenda N11 Wireless Router 5.07.43_en_NEX01 - Remote DNS Change. Author: Todor Donev |
Analyze the security implications of: Tenda N11 Wireless Router 5.07.43_en_NEX01 - Remote DNS Change | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: webdesproxy 0.0.1 - 'exec-shield' GET Remote Code Execution | This is a remote exploit for linux platform. Description: webdesproxy 0.0.1 - 'exec-shield' GET Remote Code Execution. Author: Xpl017Elz |
Analyze the security implications of: webdesproxy 0.0.1 - 'exec-shield' GET Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: VMware View 3.1.x - URL Processing Cross-Site Scripting | This is a remote exploit for multiple platform. Description: VMware View 3.1.x - URL Processing Cross-Site Scripting. Author: Alexey Sintsov |
Analyze the security implications of: VMware View 3.1.x - URL Processing Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: e107 website system 0.7.5 - 'contact.php?Query String (PATH_INFO)' Cross-Site Scripting | This is a webapps exploit for php platform. Description: e107 website system 0.7.5 - 'contact.php?Query String (PATH_INFO)' Cross-Site Scripting. Author: zark0vac |
Analyze the security implications of: e107 website system 0.7.5 - 'contact.php?Query String (PATH_INFO)' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: QNAP QTS < 4.2.4 - Domain Privilege Escalation | This is a local exploit for hardware platform. Description: QNAP QTS < 4.2.4 - Domain Privilege Escalation. Author: Pasquale Fiorillo |
Analyze the security implications of: QNAP QTS < 4.2.4 - Domain Privilege Escalation | This exploit targets hardware systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CA Arcserve D2D GWT RPC - Credential Information Disclosure (Metasploit) | This is a webapps exploit for jsp platform. Description: CA Arcserve D2D GWT RPC - Credential Information Disclosure (Metasploit). Author: Metasploit |
Analyze the security implications of: CA Arcserve D2D GWT RPC - Credential Information Disclosure (Metasploit) | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: INFINICART - 'sendpassword.asp?email' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: INFINICART - 'sendpassword.asp?email' Cross-Site Scripting. Author: laurent gaffie |
Analyze the security implications of: INFINICART - 'sendpassword.asp?email' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Novell Client 4.91.5 - ActiveX Control 'nwsetup.dll' Remote Denial of Service (1) | This is a dos exploit for novell platform. Description: Novell Client 4.91.5 - ActiveX Control 'nwsetup.dll' Remote Denial of Service (1). Author: Francis Provencher |
Analyze the security implications of: Novell Client 4.91.5 - ActiveX Control 'nwsetup.dll' Remote Denial of Service (1) | This exploit targets novell systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: Selenium 3.141.59 - Remote Code Execution (Firefox/geckodriver) | This is a webapps exploit for linux platform. Description: Selenium 3.141.59 - Remote Code Execution (Firefox/geckodriver). Author: Jon Stratton |
Analyze the security implications of: Selenium 3.141.59 - Remote Code Execution (Firefox/geckodriver) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Exim - 'perl_startup' Local Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: Exim - 'perl_startup' Local Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Exim - 'perl_startup' Local Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: LearnPress WordPress LMS Plugin 4.2.7 - SQL Injection | This is a webapps exploit for php platform. Description: LearnPress WordPress LMS Plugin 4.2.7 - SQL Injection. Author: Francisco Moraga (BTshell) |
Analyze the security implications of: LearnPress WordPress LMS Plugin 4.2.7 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Job Search Script - SQL Injection | This is a webapps exploit for php platform. Description: Job Search Script - SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: Job Search Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.