input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Magic Photo Storage Website - '/user/user_email.php?_config[site_path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Android Bluetooth - BNEP BNEP_SETUP_CONNECTION_REQUEST_MSG Out-of-Bounds Read | This is a dos exploit for android platform. Description: Android Bluetooth - BNEP BNEP_SETUP_CONNECTION_REQUEST_MSG Out-of-Bounds Read. Author: QuarksLab |
Analyze the security implications of: Android Bluetooth - BNEP BNEP_SETUP_CONNECTION_REQUEST_MSG Out-of-Bounds Read | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Joomla! Component Spider FAQ - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Spider FAQ - SQL Injection. Author: Manish Tanwar |
Analyze the security implications of: Joomla! Component Spider FAQ - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: dompdf 0.6.0 - 'dompdf.php?read' Arbitrary File Read | This is a webapps exploit for php platform. Description: dompdf 0.6.0 - 'dompdf.php?read' Arbitrary File Read. Author: Portcullis |
Analyze the security implications of: dompdf 0.6.0 - 'dompdf.php?read' Arbitrary File Read | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Eltek SmartPack - Backdoor Account | This is a webapps exploit for hardware platform. Description: Eltek SmartPack - Backdoor Account. Author: Saeed reza Zamanian |
Analyze the security implications of: Eltek SmartPack - Backdoor Account | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Squid - 'httpMakeVaryMark()' Remote Denial of Service | This is a dos exploit for linux platform. Description: Squid - 'httpMakeVaryMark()' Remote Denial of Service. Author: tytusromekiatomek |
Analyze the security implications of: Squid - 'httpMakeVaryMark()' Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CosCMS 1.721 - OS Command Injection | This is a webapps exploit for php platform. Description: CosCMS 1.721 - OS Command Injection. Author: High-Tech Bridge SA |
Analyze the security implications of: CosCMS 1.721 - OS Command Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ftpzik - Cross-Site Scripting / Local File Inclusion | This is a webapps exploit for php platform. Description: ftpzik - Cross-Site Scripting / Local File Inclusion. Author: JIKO |
Analyze the security implications of: ftpzik - Cross-Site Scripting / Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASP Inline Corporate Calendar 3.6.3 - 'Defer.asp' SQL Injection | This is a webapps exploit for asp platform. Description: ASP Inline Corporate Calendar 3.6.3 - 'Defer.asp' SQL Injection. Author: Zinho |
Analyze the security implications of: ASP Inline Corporate Calendar 3.6.3 - 'Defer.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Jedox 2020.2.5 - Disclosure of Database Credentials via Improper Access Controls | This is a webapps exploit for php platform. Description: Jedox 2020.2.5 - Disclosure of Database Credentials via Improper Access Controls. Author: Team Syslifters |
Analyze the security implications of: Jedox 2020.2.5 - Disclosure of Database Credentials via Improper Access Controls | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: All In One 1.4 Control Panel - 'cp_polls_results.php' SQL Injection | This is a webapps exploit for php platform. Description: All In One 1.4 Control Panel - 'cp_polls_results.php' SQL Injection. Author: ExSploiters |
Analyze the security implications of: All In One 1.4 Control Panel - 'cp_polls_results.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zabbix Agent - 'net.tcp.listen' Command Injection (Metasploit) | This is a remote exploit for freebsd platform. Description: Zabbix Agent - 'net.tcp.listen' Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Zabbix Agent - 'net.tcp.listen' Command Injection (Metasploit) | This exploit targets freebsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Mah-Jong 1.4/1.6 - Server Remote Denial of Service | This is a dos exploit for linux platform. Description: Mah-Jong 1.4/1.6 - Server Remote Denial of Service. Author: jsk |
Analyze the security implications of: Mah-Jong 1.4/1.6 - Server Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: VMware Fusion 2.0.5 - vmx86 kext Kernel Privilege Escalation | This is a local exploit for osx platform. Description: VMware Fusion 2.0.5 - vmx86 kext Kernel Privilege Escalation. Author: mu-b |
Analyze the security implications of: VMware Fusion 2.0.5 - vmx86 kext Kernel Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Invision Community 4.5.4 - 'Field Name' Stored Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Invision Community 4.5.4 - 'Field Name' Stored Cross-Site Scripting. Author: Hemant Patidar |
Analyze the security implications of: Invision Community 4.5.4 - 'Field Name' Stored Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Oracle Database - Remote Listener Memory Corruption | This is a dos exploit for multiple platform. Description: Oracle Database - Remote Listener Memory Corruption. Author: Dennis Yurichev |
Analyze the security implications of: Oracle Database - Remote Listener Memory Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Half-Life Server 3.1.1.0 - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Half-Life Server 3.1.1.0 - Remote Buffer Overflow. Author: greuff |
Analyze the security implications of: Half-Life Server 3.1.1.0 - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Geeklog < 1.4.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Geeklog < 1.4.0 - Multiple Vulnerabilities. Author: GulfTech Security |
Analyze the security implications of: Geeklog < 1.4.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HiSilicon Video Encoders - RCE via unauthenticated command injection | This is a webapps exploit for hardware platform. Description: HiSilicon Video Encoders - RCE via unauthenticated command injection. Author: Alexei Kojenov |
Analyze the security implications of: HiSilicon Video Encoders - RCE via unauthenticated command injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component Timetable Responsive Schedule For Joomla! 1.5 - 'alias' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Timetable Responsive Schedule For Joomla! 1.5 - 'alias' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Timetable Responsive Schedule For Joomla! 1.5 - 'alias' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MikroTik RouterOS < 6.43.12 (stable) / < 6.42.12 (long-term) - Firewall and NAT Bypass | This is a remote exploit for hardware platform. Description: MikroTik RouterOS < 6.43.12 (stable) / < 6.42.12 (long-term) - Firewall and NAT Bypass. Author: Jacob Baines |
Analyze the security implications of: MikroTik RouterOS < 6.43.12 (stable) / < 6.42.12 (long-term) - Firewall and NAT Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: httprint 202.0 - HTTP Response Server Field Arbitrary Script Injection | This is a remote exploit for multiple platform. Description: httprint 202.0 - HTTP Response Server Field Arbitrary Script Injection. Author: Mariano Nunez Di Croce |
Analyze the security implications of: httprint 202.0 - HTTP Response Server Field Arbitrary Script Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: RSA ACE Agent 5.x - Image Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: RSA ACE Agent 5.x - Image Cross-Site Scripting. Author: Bernhard Mueller |
Analyze the security implications of: RSA ACE Agent 5.x - Image Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: BIND 9.x - Remote DNS Cache Poisoning | This is a remote exploit for multiple platform. Description: BIND 9.x - Remote DNS Cache Poisoning. Author: Julien Desfossez |
Analyze the security implications of: BIND 9.x - Remote DNS Cache Poisoning | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DUWare Multiple Products - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: DUWare Multiple Products - Multiple Vulnerabilities. Author: GulfTech Security |
Analyze the security implications of: DUWare Multiple Products - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Highslide 1.5 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Highslide 1.5 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Highslide 1.5 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: zkfingerd 0.9.1 - 'say()' Format String | This is a remote exploit for linux platform. Description: zkfingerd 0.9.1 - 'say()' Format String. Author: Marceta Milos |
Analyze the security implications of: zkfingerd 0.9.1 - 'say()' Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WebKit - 'WebCore::RenderLayer::updateDescendantDependentFlags' Use-After-Free | This is a dos exploit for multiple platform. Description: WebKit - 'WebCore::RenderLayer::updateDescendantDependentFlags' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: WebKit - 'WebCore::RenderLayer::updateDescendantDependentFlags' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Odoo CRM 10.0 - Code Execution | This is a local exploit for linux platform. Description: Odoo CRM 10.0 - Code Execution. Author: SecuriTeam |
Analyze the security implications of: Odoo CRM 10.0 - Code Execution | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: NuCom 11N Wireless Router 5.07.90 - Remote Privilege Escalation | This is a webapps exploit for hardware platform. Description: NuCom 11N Wireless Router 5.07.90 - Remote Privilege Escalation. Author: LiquidWorm |
Analyze the security implications of: NuCom 11N Wireless Router 5.07.90 - Remote Privilege Escalation | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Mongoose 2.8 - Space String Remote File Disclosure | This is a remote exploit for multiple platform. Description: Mongoose 2.8 - Space String Remote File Disclosure. Author: Pouya Daneshmand |
Analyze the security implications of: Mongoose 2.8 - Space String Remote File Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cyrus IMAPD 2.3.2 - 'pop3d' Remote Buffer Overflow (2) | This is a remote exploit for multiple platform. Description: Cyrus IMAPD 2.3.2 - 'pop3d' Remote Buffer Overflow (2). Author: bannedit |
Analyze the security implications of: Cyrus IMAPD 2.3.2 - 'pop3d' Remote Buffer Overflow (2) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Customer Support System 1.0 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Customer Support System 1.0 - Cross-Site Request Forgery. Author: Ahmed Abbas |
Analyze the security implications of: Customer Support System 1.0 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Skybox Security 6.3.x < 6.4.x - Multiple Information Disclosures | This is a webapps exploit for hardware platform. Description: Skybox Security 6.3.x < 6.4.x - Multiple Information Disclosures. Author: Luigi Vezzoso |
Analyze the security implications of: Skybox Security 6.3.x < 6.4.x - Multiple Information Disclosures | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.