input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Avast! - Out-of-Bounds Write Decrypting PEncrypt Packed executables | This is a dos exploit for multiple platform. Description: Avast! - Out-of-Bounds Write Decrypting PEncrypt Packed executables. Author: Google Security Research |
Analyze the security implications of: Avast! - Out-of-Bounds Write Decrypting PEncrypt Packed executables | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: LibTIFF 3.9.4 - Out-Of-Order Tag Type Mismatch Remote Denial of Service | This is a dos exploit for linux platform. Description: LibTIFF 3.9.4 - Out-Of-Order Tag Type Mismatch Remote Denial of Service. Author: Tom Lane |
Analyze the security implications of: LibTIFF 3.9.4 - Out-Of-Order Tag Type Mismatch Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Netbus 2.0 Pro - Directory Listings Disclosure / Arbitrary File Upload | This is a remote exploit for multiple platform. Description: Netbus 2.0 Pro - Directory Listings Disclosure / Arbitrary File Upload. Author: Rafel Ivgi The-Insider |
Analyze the security implications of: Netbus 2.0 Pro - Directory Listings Disclosure / Arbitrary File Upload | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Just Dial Clone Script - 'srch' SQL Injection | This is a webapps exploit for php platform. Description: Just Dial Clone Script - 'srch' SQL Injection. Author: Arbin Godar |
Analyze the security implications of: Just Dial Clone Script - 'srch' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Macromedia Sitespring 1.2 - Default Error Page Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Macromedia Sitespring 1.2 - Default Error Page Cross-Site Scripting. Author: Peter Gründl |
Analyze the security implications of: Macromedia Sitespring 1.2 - Default Error Page Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Joomla! Component Timetable Schedule 3.6.8 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Timetable Schedule 3.6.8 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Timetable Schedule 3.6.8 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Boat Classifieds - 'printdetail.asp?Id' SQL Injection | This is a webapps exploit for asp platform. Description: Boat Classifieds - 'printdetail.asp?Id' SQL Injection. Author: CoBRa_21 |
Analyze the security implications of: Boat Classifieds - 'printdetail.asp?Id' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Oracle 8.1.x/9.0/9.2 - TNS Listener Service_CurLoad Remote Denial of Service | This is a dos exploit for multiple platform. Description: Oracle 8.1.x/9.0/9.2 - TNS Listener Service_CurLoad Remote Denial of Service. Author: Rapid 7 |
Analyze the security implications of: Oracle 8.1.x/9.0/9.2 - TNS Listener Service_CurLoad Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: EZDatabase 2.1.1 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: EZDatabase 2.1.1 - 'index.php' Cross-Site Scripting. Author: Josh Zlatin-Amishav |
Analyze the security implications of: EZDatabase 2.1.1 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TP-Link TL-WR740N 111130 - 'ping_addr' HTML Injection | This is a remote exploit for hardware platform. Description: TP-Link TL-WR740N 111130 - 'ping_addr' HTML Injection. Author: l20ot |
Analyze the security implications of: TP-Link TL-WR740N 111130 - 'ping_addr' HTML Injection | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Trend Micro Control Manager - ImportFile Directory Traversal Remote Code Execution (Metasploit) | This is a remote exploit for php platform. Description: Trend Micro Control Manager - ImportFile Directory Traversal Remote Code Execution (Metasploit). Author: James Fitts |
Analyze the security implications of: Trend Micro Control Manager - ImportFile Directory Traversal Remote Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fastpublish CMS 1.9999 - config[fsBase] Remote File Inclusion | This is a webapps exploit for php platform. Description: Fastpublish CMS 1.9999 - config[fsBase] Remote File Inclusion. Author: RoMaNcYxHaCkEr |
Analyze the security implications of: Fastpublish CMS 1.9999 - config[fsBase] Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Power Board (IP.Board) 3.3.4 - Unserialize Regex Bypass | This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) 3.3.4 - Unserialize Regex Bypass. Author: webDEViL |
Analyze the security implications of: Invision Power Board (IP.Board) 3.3.4 - Unserialize Regex Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ZHONE < S3.0.501 - Multiple Remote Code Execution Vulnerabilities | This is a dos exploit for hardware platform. Description: ZHONE < S3.0.501 - Multiple Remote Code Execution Vulnerabilities. Author: Lyon Yang |
Analyze the security implications of: ZHONE < S3.0.501 - Multiple Remote Code Execution Vulnerabilities | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution | This is a webapps exploit for linux platform. Description: Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution. Author: Vex Woo |
Analyze the security implications of: Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cambium ePMP1000 - 'get_chart' Shell via Command Injection (Metasploit) | This is a remote exploit for cgi platform. Description: Cambium ePMP1000 - 'get_chart' Shell via Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Cambium ePMP1000 - 'get_chart' Shell via Command Injection (Metasploit) | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! Component EXP Shop 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component EXP Shop 1.0 - SQL Injection. Author: His0k4 |
Analyze the security implications of: Joomla! Component EXP Shop 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: icblogger 2.0 - 'YID' SQL Injection | This is a webapps exploit for asp platform. Description: icblogger 2.0 - 'YID' SQL Injection. Author: Chironex Fleckeri |
Analyze the security implications of: icblogger 2.0 - 'YID' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Sielco Analog FM Transmitter 2.12 - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Sielco Analog FM Transmitter 2.12 - Cross-Site Request Forgery. Author: LiquidWorm |
Analyze the security implications of: Sielco Analog FM Transmitter 2.12 - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CoMoblog 1.0 - 'Img.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CoMoblog 1.0 - 'Img.php' Cross-Site Scripting. Author: FarhadKey |
Analyze the security implications of: CoMoblog 1.0 - 'Img.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASPNuke 0.80 - 'register.asp' SQL Injection | This is a webapps exploit for asp platform. Description: ASPNuke 0.80 - 'register.asp' SQL Injection. Author: ajann |
Analyze the security implications of: ASPNuke 0.80 - 'register.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: DotA OpenStats 1.3.9 - SQL Injection | This is a webapps exploit for php platform. Description: DotA OpenStats 1.3.9 - SQL Injection. Author: HvM17 |
Analyze the security implications of: DotA OpenStats 1.3.9 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Horde Webmail 5.2.22 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Horde Webmail 5.2.22 - Multiple Vulnerabilities. Author: InfinitumIT |
Analyze the security implications of: Horde Webmail 5.2.22 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iLife iPhoto Photocast - XML Title Remote Format String (PoC) | This is a dos exploit for osx platform. Description: iLife iPhoto Photocast - XML Title Remote Format String (PoC). Author: MoAB |
Analyze the security implications of: iLife iPhoto Photocast - XML Title Remote Format String (PoC) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Struts 2.0.11 - Multiple Directory Traversal Vulnerabilities | This is a remote exploit for multiple platform. Description: Struts 2.0.11 - Multiple Directory Traversal Vulnerabilities. Author: Csaba Barta |
Analyze the security implications of: Struts 2.0.11 - Multiple Directory Traversal Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux NTP query client 4.2.6p1 - Heap Overflow | This is a dos exploit for linux platform. Description: Linux NTP query client 4.2.6p1 - Heap Overflow. Author: mr_me |
Analyze the security implications of: Linux NTP query client 4.2.6p1 - Heap Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Jaws 0.x - Remote File Inclusion | This is a webapps exploit for php platform. Description: Jaws 0.x - Remote File Inclusion. Author: Stefan Esser |
Analyze the security implications of: Jaws 0.x - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mutiny 5 - Arbitrary File Upload (Metasploit) | This is a remote exploit for linux platform. Description: Mutiny 5 - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: Mutiny 5 - Arbitrary File Upload (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: chCounter - indirect SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: chCounter - indirect SQL Injection / Cross-Site Scripting. Author: Valentin |
Analyze the security implications of: chCounter - indirect SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HT Editor 2.0.18 - File Opening Stack Overflow | This is a local exploit for linux platform. Description: HT Editor 2.0.18 - File Opening Stack Overflow. Author: ZadYree |
Analyze the security implications of: HT Editor 2.0.18 - File Opening Stack Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux Kernel 3.4 < 3.13.2 - recvmmsg x32 compat (PoC) | This is a dos exploit for linux platform. Description: Linux Kernel 3.4 < 3.13.2 - recvmmsg x32 compat (PoC). Author: Kees Cook |
Analyze the security implications of: Linux Kernel 3.4 < 3.13.2 - recvmmsg x32 compat (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 - Authentication Bypass. Author: LiquidWorm |
Analyze the security implications of: Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ManageEngine Security Manager Plus 5.5 build 5505 - Directory Traversal | This is a webapps exploit for multiple platform. Description: ManageEngine Security Manager Plus 5.5 build 5505 - Directory Traversal. Author: xistence |
Analyze the security implications of: ManageEngine Security Manager Plus 5.5 build 5505 - Directory Traversal | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Habari Blog - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Habari Blog - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.