input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Netbilling NBMEMBER Script - Information Disclosure | This is a webapps exploit for cgi platform. Description: Netbilling NBMEMBER Script - Information Disclosure. Author: ls |
Analyze the security implications of: Netbilling NBMEMBER Script - Information Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: ATutor 2.1 - 'tool_file' Local File Inclusion | This is a webapps exploit for php platform. Description: ATutor 2.1 - 'tool_file' Local File Inclusion. Author: Julian Horoszkiewicz |
Analyze the security implications of: ATutor 2.1 - 'tool_file' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.4.3 - wddx_serialize_* / stream_bucket_* Variant Object Null Ptr Dereference | This is a dos exploit for php platform. Description: PHP 5.4.3 - wddx_serialize_* / stream_bucket_* Variant Object Null Ptr Dereference. Author: condis |
Analyze the security implications of: PHP 5.4.3 - wddx_serialize_* / stream_bucket_* Variant Object Null Ptr Dereference | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AIX 4.3.3/5.x - Getlvcb Command Line Argument Buffer Overflow (2) | This is a local exploit for aix platform. Description: AIX 4.3.3/5.x - Getlvcb Command Line Argument Buffer Overflow (2). Author: mattox |
Analyze the security implications of: AIX 4.3.3/5.x - Getlvcb Command Line Argument Buffer Overflow (2) | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Arris Router Firmware 9.1.103 - Remote Code Execution (RCE) (Authenticated) | This is a remote exploit for hardware platform. Description: Arris Router Firmware 9.1.103 - Remote Code Execution (RCE) (Authenticated). Author: Yerodin Richards |
Analyze the security implications of: Arris Router Firmware 9.1.103 - Remote Code Execution (RCE) (Authenticated) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apache Struts 2 - Namespace Redirect OGNL Injection (Metasploit) | This is a remote exploit for multiple platform. Description: Apache Struts 2 - Namespace Redirect OGNL Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Apache Struts 2 - Namespace Redirect OGNL Injection (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Oracle Weblogic Server - 'AsyncResponseService' Deserialization Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Oracle Weblogic Server - 'AsyncResponseService' Deserialization Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Oracle Weblogic Server - 'AsyncResponseService' Deserialization Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Karotz Smart Rabbit 12.07.19.00 - Multiple Vulnerabilities | This is a local exploit for hardware platform. Description: Karotz Smart Rabbit 12.07.19.00 - Multiple Vulnerabilities. Author: Trustwave's SpiderLabs |
Analyze the security implications of: Karotz Smart Rabbit 12.07.19.00 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GLPI 0.83.9 - 'Unserialize()' Remote Code Execution | This is a webapps exploit for php platform. Description: GLPI 0.83.9 - 'Unserialize()' Remote Code Execution. Author: Xavier Mehrenberger |
Analyze the security implications of: GLPI 0.83.9 - 'Unserialize()' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: pfSense - 'interfaces.php?if' Cross-Site Scripting | This is a remote exploit for hardware platform. Description: pfSense - 'interfaces.php?if' Cross-Site Scripting. Author: dave b |
Analyze the security implications of: pfSense - 'interfaces.php?if' Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Oracle VM VirtualBox - Cooperating VMs can Escape from Shared Folder | This is a local exploit for linux platform. Description: Oracle VM VirtualBox - Cooperating VMs can Escape from Shared Folder. Author: Google Security Research |
Analyze the security implications of: Oracle VM VirtualBox - Cooperating VMs can Escape from Shared Folder | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux 4.8.0 < 4.8.0-46 - AF_PACKET packet_set_ring Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: Linux 4.8.0 < 4.8.0-46 - AF_PACKET packet_set_ring Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Linux 4.8.0 < 4.8.0-46 - AF_PACKET packet_set_ring Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: dSMTP Mail Server 3.1b (Linux) - Format String | This is a remote exploit for linux platform. Description: dSMTP Mail Server 3.1b (Linux) - Format String. Author: cybertronic |
Analyze the security implications of: dSMTP Mail Server 3.1b (Linux) - Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: My File Explorer 1.3.1 iOS - Multiple Web Vulnerabilities | This is a webapps exploit for ios platform. Description: My File Explorer 1.3.1 iOS - Multiple Web Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: My File Explorer 1.3.1 iOS - Multiple Web Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Clicker CMS - Blind SQL Injection | This is a webapps exploit for php platform. Description: Clicker CMS - Blind SQL Injection. Author: hacker@sr.gov.yu |
Analyze the security implications of: Clicker CMS - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JUX Real Estate 3.4.0 - SQL Injection | This is a webapps exploit for php platform. Description: JUX Real Estate 3.4.0 - SQL Injection. Author: CraCkEr |
Analyze the security implications of: JUX Real Estate 3.4.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bus Pass Management System 1.0 - 'viewid' Insecure direct object references (IDOR) | This is a webapps exploit for php platform. Description: Bus Pass Management System 1.0 - 'viewid' Insecure direct object references (IDOR). Author: sudoninja |
Analyze the security implications of: Bus Pass Management System 1.0 - 'viewid' Insecure direct object references (IDOR) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla 1.x / Opera 7.0 - LiveConnect JavaScript Denial of Service | This is a dos exploit for multiple platform. Description: Mozilla 1.x / Opera 7.0 - LiveConnect JavaScript Denial of Service. Author: Marc Schoenefeld |
Analyze the security implications of: Mozilla 1.x / Opera 7.0 - LiveConnect JavaScript Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CitrusDB 2.4.1 - Local File Inclusion / SQL Injection | This is a webapps exploit for php platform. Description: CitrusDB 2.4.1 - Local File Inclusion / SQL Injection. Author: wacky |
Analyze the security implications of: CitrusDB 2.4.1 - Local File Inclusion / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gallery 1.3.x/1.4 - Remote Global Variable Injection | This is a webapps exploit for php platform. Description: Gallery 1.3.x/1.4 - Remote Global Variable Injection. Author: Bharat Mediratta |
Analyze the security implications of: Gallery 1.3.x/1.4 - Remote Global Variable Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Foscam < 11.37.2.49 - Directory Traversal | This is a remote exploit for hardware platform. Description: Foscam < 11.37.2.49 - Directory Traversal. Author: Frederic Basse |
Analyze the security implications of: Foscam < 11.37.2.49 - Directory Traversal | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PHP Topsites < 2.2 - Multiple Vulnerabilities | This is a webapps exploit for multiple platform. Description: PHP Topsites < 2.2 - Multiple Vulnerabilities. Author: GulfTech Security |
Analyze the security implications of: PHP Topsites < 2.2 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: KMail 1.x - GnuPG Arbitrary Content Injection | This is a remote exploit for linux platform. Description: KMail 1.x - GnuPG Arbitrary Content Injection. Author: Gerardo Richarte |
Analyze the security implications of: KMail 1.x - GnuPG Arbitrary Content Injection | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: OpenSSH < 6.6 SFTP (x64) - Command Execution | This is a remote exploit for linux_x86-64 platform. Description: OpenSSH < 6.6 SFTP (x64) - Command Execution. Author: Jann Horn |
Analyze the security implications of: OpenSSH < 6.6 SFTP (x64) - Command Execution | This exploit targets linux_x86-64 systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux_x86-64 platform |
What is this exploit about: dump 0.4b15 - Local Privilege Escalation | This is a local exploit for linux platform. Description: dump 0.4b15 - Local Privilege Escalation. Author: mat |
Analyze the security implications of: dump 0.4b15 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: EggBlog 4.1.1 - Local Directory Traversal | This is a webapps exploit for php platform. Description: EggBlog 4.1.1 - Local Directory Traversal. Author: StAkeR |
Analyze the security implications of: EggBlog 4.1.1 - Local Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple macOS - '32-bit syscall exit' Kernel Register Leak | This is a dos exploit for macos platform. Description: Apple macOS - '32-bit syscall exit' Kernel Register Leak. Author: Google Security Research |
Analyze the security implications of: Apple macOS - '32-bit syscall exit' Kernel Register Leak | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Sipwise C5 NGCP CSC - Click2Dial Cross-Site Request Forgery (CSRF) | This is a webapps exploit for hardware platform. Description: Sipwise C5 NGCP CSC - Click2Dial Cross-Site Request Forgery (CSRF). Author: LiquidWorm |
Analyze the security implications of: Sipwise C5 NGCP CSC - Click2Dial Cross-Site Request Forgery (CSRF) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PHP 5.3.5 libzip 0.9.3 - _zip_name_locate Null Pointer Dereference | This is a dos exploit for linux platform. Description: PHP 5.3.5 libzip 0.9.3 - _zip_name_locate Null Pointer Dereference. Author: Maksymilian Arciemowicz |
Analyze the security implications of: PHP 5.3.5 libzip 0.9.3 - _zip_name_locate Null Pointer Dereference | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Libstats 1.0.3 - 'template_csv.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Libstats 1.0.3 - 'template_csv.php' Remote File Inclusion. Author: Mehmet Ince |
Analyze the security implications of: Libstats 1.0.3 - 'template_csv.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: dsock 1.3 - 'buf' Remote Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: dsock 1.3 - 'buf' Remote Buffer Overflow (PoC). Author: DaveK |
Analyze the security implications of: dsock 1.3 - 'buf' Remote Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mozilla Firefox 3.0 - '.JPEG' File Denial of Service | This is a dos exploit for linux platform. Description: Mozilla Firefox 3.0 - '.JPEG' File Denial of Service. Author: Beenu Arora |
Analyze the security implications of: Mozilla Firefox 3.0 - '.JPEG' File Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple macOS < 10.14.5 / iOS < 12.3 JavaScriptCore - Loop-Invariant Code Motion (LICM) in DFG JIT Leaves Stack Variable Uninitialized | This is a dos exploit for multiple platform. Description: Apple macOS < 10.14.5 / iOS < 12.3 JavaScriptCore - Loop-Invariant Code Motion (LICM) in DFG JIT Leaves Stack Variable Uninitialized. Author: Google Security Research |
Analyze the security implications of: Apple macOS < 10.14.5 / iOS < 12.3 JavaScriptCore - Loop-Invariant Code Motion (LICM) in DFG JIT Leaves Stack Variable Uninitialized | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.