input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Citadel/UX BBS 6.07 - Remote Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: geeeekShop 1.4 - Information Disclosure | This is a webapps exploit for php platform. Description: geeeekShop 1.4 - Information Disclosure. Author: G00db0y |
Analyze the security implications of: geeeekShop 1.4 - Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lost and Found Information System v1.0 - ( IDOR ) leads to Account Take over | This is a webapps exploit for php platform. Description: Lost and Found Information System v1.0 - ( IDOR ) leads to Account Take over. Author: Or4nG.M4N |
Analyze the security implications of: Lost and Found Information System v1.0 - ( IDOR ) leads to Account Take over | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Exponent CMS 0.96.3 - 'view' Remote Command Execution | This is a webapps exploit for php platform. Description: Exponent CMS 0.96.3 - 'view' Remote Command Execution. Author: rgod |
Analyze the security implications of: Exponent CMS 0.96.3 - 'view' Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GigToDo 1.3 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: GigToDo 1.3 - Cross-Site Scripting. Author: m0ze |
Analyze the security implications of: GigToDo 1.3 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GreenSQL Firewall 0.9.x - WHERE Clause Security Bypass | This is a remote exploit for multiple platform. Description: GreenSQL Firewall 0.9.x - WHERE Clause Security Bypass. Author: Johannes Dahse |
Analyze the security implications of: GreenSQL Firewall 0.9.x - WHERE Clause Security Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Impact Software AdPeeps 8.5d1 - Cross-Site Scripting / HTML Injection | This is a webapps exploit for php platform. Description: Impact Software AdPeeps 8.5d1 - Cross-Site Scripting / HTML Injection. Author: intern0t |
Analyze the security implications of: Impact Software AdPeeps 8.5d1 - Cross-Site Scripting / HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BSI Advance Hotel Booking System 2.0 - 'booking_details.php Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: BSI Advance Hotel Booking System 2.0 - 'booking_details.php Persistent Cross-Site Scripting. Author: Angelo Ruwantha |
Analyze the security implications of: BSI Advance Hotel Booking System 2.0 - 'booking_details.php Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Quinn - 'the Eskimo' and Peter N. Lewis Internet Configuration 1.0/2.0 Weak Password Encryption | This is a local exploit for osx platform. Description: Quinn - 'the Eskimo' and Peter N. Lewis Internet Configuration 1.0/2.0 Weak Password Encryption. Author: Dawid adix Adamski |
Analyze the security implications of: Quinn - 'the Eskimo' and Peter N. Lewis Internet Configuration 1.0/2.0 Weak Password Encryption | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Python 2.5 - 'PyLocale_strxfrm' Remote Information Leak | This is a remote exploit for linux platform. Description: Python 2.5 - 'PyLocale_strxfrm' Remote Information Leak. Author: Piotr Engelking |
Analyze the security implications of: Python 2.5 - 'PyLocale_strxfrm' Remote Information Leak | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Python < 2.5.2 Imageop Module - 'imageop.crop()' Buffer Overflow | This is a dos exploit for multiple platform. Description: Python < 2.5.2 Imageop Module - 'imageop.crop()' Buffer Overflow. Author: Chris Evans |
Analyze the security implications of: Python < 2.5.2 Imageop Module - 'imageop.crop()' Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: phpCollab 2.5.1 - File Upload (Metasploit) | This is a remote exploit for php platform. Description: phpCollab 2.5.1 - File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: phpCollab 2.5.1 - File Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: H-Sphere WebShell 4.3.10 - 'actions.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: H-Sphere WebShell 4.3.10 - 'actions.php' Multiple Cross-Site Scripting Vulnerabilities. Author: C1c4Tr1Z |
Analyze the security implications of: H-Sphere WebShell 4.3.10 - 'actions.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_jstore - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_jstore - SQL Injection. Author: Sid3^effects |
Analyze the security implications of: Joomla! Component com_jstore - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Accesspress Anonymous Post Pro < 3.2.0 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Accesspress Anonymous Post Pro < 3.2.0 - Arbitrary File Upload. Author: Colette Chamberland |
Analyze the security implications of: Accesspress Anonymous Post Pro < 3.2.0 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nutanix AOS & Prism < 5.5.5 (LTS) / < 5.8.1 (STS) - SFTP Authentication Bypass | This is a remote exploit for multiple platform. Description: Nutanix AOS & Prism < 5.5.5 (LTS) / < 5.8.1 (STS) - SFTP Authentication Bypass. Author: Adam Brown |
Analyze the security implications of: Nutanix AOS & Prism < 5.5.5 (LTS) / < 5.8.1 (STS) - SFTP Authentication Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: H&H Solutions WebSoccer 2.80 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: H&H Solutions WebSoccer 2.80 - 'id' SQL Injection. Author: d3v1l |
Analyze the security implications of: H&H Solutions WebSoccer 2.80 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MGinternet Property Site Manager - 'listings.asp?s' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: MGinternet Property Site Manager - 'listings.asp?s' Cross-Site Scripting. Author: laurent gaffie |
Analyze the security implications of: MGinternet Property Site Manager - 'listings.asp?s' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Watchguard XCS - FixCorruptMail Privilege Escalation (Metasploit) | This is a local exploit for bsd platform. Description: Watchguard XCS - FixCorruptMail Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Watchguard XCS - FixCorruptMail Privilege Escalation (Metasploit) | This exploit targets bsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Tor Browser < 0.3.2.10 - Use After Free (PoC) | This is a dos exploit for linux platform. Description: Tor Browser < 0.3.2.10 - Use After Free (PoC). Author: t4rkd3vilz |
Analyze the security implications of: Tor Browser < 0.3.2.10 - Use After Free (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: D-Link DCS-900 Camera - Remote IP Address Changer | This is a remote exploit for hardware platform. Description: D-Link DCS-900 Camera - Remote IP Address Changer. Author: anonymous |
Analyze the security implications of: D-Link DCS-900 Camera - Remote IP Address Changer | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Nihuo Web Log Analyzer 1.6 - HTML Injection | This is a remote exploit for multiple platform. Description: Nihuo Web Log Analyzer 1.6 - HTML Injection. Author: Audun Larsen |
Analyze the security implications of: Nihuo Web Log Analyzer 1.6 - HTML Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Juniper Junos 8.5/9.0 J - Web Interface 'PATH_INFO' Cross-Site Scripting | This is a remote exploit for hardware platform. Description: Juniper Junos 8.5/9.0 J - Web Interface 'PATH_INFO' Cross-Site Scripting. Author: Amir Azam |
Analyze the security implications of: Juniper Junos 8.5/9.0 J - Web Interface 'PATH_INFO' Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AsusWRT LAN - Remote Code Execution (Metasploit) | This is a remote exploit for hardware platform. Description: AsusWRT LAN - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: AsusWRT LAN - Remote Code Execution (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apple Mac OSX 10.10 - BlueTooth TransferACLPacketToHW Crash (PoC) | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.10 - BlueTooth TransferACLPacketToHW Crash (PoC). Author: rpaleari & joystick |
Analyze the security implications of: Apple Mac OSX 10.10 - BlueTooth TransferACLPacketToHW Crash (PoC) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Linux Kernel 3.3.5 - Btrfs CRC32C feature Infinite Loop Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 3.3.5 - Btrfs CRC32C feature Infinite Loop Local Denial of Service. Author: Pascal Junod |
Analyze the security implications of: Linux Kernel 3.3.5 - Btrfs CRC32C feature Infinite Loop Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux Kernel 4.14.0-rc4+ - 'waitid()' Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel 4.14.0-rc4+ - 'waitid()' Local Privilege Escalation. Author: @XeR_0x2A & @chaign_c |
Analyze the security implications of: Linux Kernel 4.14.0-rc4+ - 'waitid()' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Arab Portal 2.1 (Windows) - Remote File Disclosure | This is a webapps exploit for php platform. Description: Arab Portal 2.1 (Windows) - Remote File Disclosure. Author: Khashayar Fereidani |
Analyze the security implications of: Arab Portal 2.1 (Windows) - Remote File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AWCM 2.1 - Local File Inclusion / Authentication Bypass | This is a webapps exploit for php platform. Description: AWCM 2.1 - Local File Inclusion / Authentication Bypass. Author: SwEET-DeViL |
Analyze the security implications of: AWCM 2.1 - Local File Inclusion / Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX xnu 1228.0 - 'super_blob' Local kernel Denial of Service (PoC) | This is a dos exploit for osx platform. Description: Apple Mac OSX xnu 1228.0 - 'super_blob' Local kernel Denial of Service (PoC). Author: mu-b |
Analyze the security implications of: Apple Mac OSX xnu 1228.0 - 'super_blob' Local kernel Denial of Service (PoC) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Spidermonkey - IonMonkey Leaks JS_OPTIMIZED_OUT Magic Value to Script | This is a dos exploit for multiple platform. Description: Spidermonkey - IonMonkey Leaks JS_OPTIMIZED_OUT Magic Value to Script. Author: Google Security Research |
Analyze the security implications of: Spidermonkey - IonMonkey Leaks JS_OPTIMIZED_OUT Magic Value to Script | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ladder v0.0.21 - Server-side request forgery (SSRF) | This is a webapps exploit for go platform. Description: Ladder v0.0.21 - Server-side request forgery (SSRF). Author: @_chebuya |
Analyze the security implications of: Ladder v0.0.21 - Server-side request forgery (SSRF) | This exploit targets go systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets go platform |
What is this exploit about: Community CMS 0.1 - 'include.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Community CMS 0.1 - 'include.php' Remote File Inclusion. Author: N3TR00T3R |
Analyze the security implications of: Community CMS 0.1 - 'include.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Novell BorderManager Enterprise Edition 3.5 - Denial of Service | This is a dos exploit for novell platform. Description: Novell BorderManager Enterprise Edition 3.5 - Denial of Service. Author: honoriak |
Analyze the security implications of: Novell BorderManager Enterprise Edition 3.5 - Denial of Service | This exploit targets novell systems. Type: dos. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.