input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Easy2Pilot 7 - Cross-Site Request Forgery (Add User) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Crystal Shard http-protection 0.2.0 - IP Spoofing Bypass | This is a webapps exploit for multiple platform. Description: Crystal Shard http-protection 0.2.0 - IP Spoofing Bypass. Author: Halis Duraki |
Analyze the security implications of: Crystal Shard http-protection 0.2.0 - IP Spoofing Bypass | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: RDM Embedded Lock Manager < 9.x - 'lm_tcp' Service Buffer Overflow | This is a remote exploit for multiple platform. Description: RDM Embedded Lock Manager < 9.x - 'lm_tcp' Service Buffer Overflow. Author: Luigi Auriemma |
Analyze the security implications of: RDM Embedded Lock Manager < 9.x - 'lm_tcp' Service Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: TildeSlash Monit 1-4 - Authentication Handling Buffer Overflow | This is a remote exploit for multiple platform. Description: TildeSlash Monit 1-4 - Authentication Handling Buffer Overflow. Author: Nilanjan De |
Analyze the security implications of: TildeSlash Monit 1-4 - Authentication Handling Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Harris WapChat 1 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Harris WapChat 1 - Multiple Remote File Inclusions. Author: k1n9k0ng |
Analyze the security implications of: Harris WapChat 1 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Firejail < 0.9.44.4 / < 0.9.38.8 LTS - Local Sandbox Escape | This is a local exploit for linux platform. Description: Firejail < 0.9.44.4 / < 0.9.38.8 LTS - Local Sandbox Escape. Author: Sebastian Krahmer |
Analyze the security implications of: Firejail < 0.9.44.4 / < 0.9.38.8 LTS - Local Sandbox Escape | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ASPBB 0.4 - 'topic.asp?TID' SQL Injection | This is a webapps exploit for asp platform. Description: ASPBB 0.4 - 'topic.asp?TID' SQL Injection. Author: Dj_Eyes |
Analyze the security implications of: ASPBB 0.4 - 'topic.asp?TID' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Borland Interbase 2007/2007 SP2 - 'INET_connect' Remote Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: Borland Interbase 2007/2007 SP2 - 'INET_connect' Remote Buffer Overflow (Metasploit). Author: Adriano Lima |
Analyze the security implications of: Borland Interbase 2007/2007 SP2 - 'INET_connect' Remote Buffer Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SnapGear Management Console SG560 3.1.5 - Cross-Site Request Forgery (Add Super User) | This is a webapps exploit for hardware platform. Description: SnapGear Management Console SG560 3.1.5 - Cross-Site Request Forgery (Add Super User). Author: LiquidWorm |
Analyze the security implications of: SnapGear Management Console SG560 3.1.5 - Cross-Site Request Forgery (Add Super User) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FreeBSD 6.1 - '/dev/crypto' Local Kernel Denial of Service | This is a dos exploit for bsd platform. Description: FreeBSD 6.1 - '/dev/crypto' Local Kernel Denial of Service. Author: Evgeny Legerov |
Analyze the security implications of: FreeBSD 6.1 - '/dev/crypto' Local Kernel Denial of Service | This exploit targets bsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Belkin F5D9230-4 Wireless G Plus MIMO Router - Authentication Bypass | This is a remote exploit for hardware platform. Description: Belkin F5D9230-4 Wireless G Plus MIMO Router - Authentication Bypass. Author: DarkFig |
Analyze the security implications of: Belkin F5D9230-4 Wireless G Plus MIMO Router - Authentication Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Booking Calendar - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Booking Calendar - Multiple Vulnerabilities. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Booking Calendar - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HybridAuth - 'install.php' PHP Code Execution (Metasploit) | This is a remote exploit for php platform. Description: HybridAuth - 'install.php' PHP Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: HybridAuth - 'install.php' PHP Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Contrexx 1.0.4 - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: Contrexx 1.0.4 - Multiple Input Validation Vulnerabilities. Author: Christopher Kunz |
Analyze the security implications of: Contrexx 1.0.4 - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link - Device Config Disclosure | This is a webapps exploit for hardware platform. Description: Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link - Device Config Disclosure. Author: LiquidWorm |
Analyze the security implications of: Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link - Device Config Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linuxconf 1.1.x/1.2.x - Local Environment Variable Buffer Overflow (2) | This is a local exploit for linux platform. Description: Linuxconf 1.1.x/1.2.x - Local Environment Variable Buffer Overflow (2). Author: David Endler |
Analyze the security implications of: Linuxconf 1.1.x/1.2.x - Local Environment Variable Buffer Overflow (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_b2portfolio 1.0.0 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Joomla! Component com_b2portfolio 1.0.0 - Multiple SQL Injections. Author: Salvatore Fresta |
Analyze the security implications of: Joomla! Component com_b2portfolio 1.0.0 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple OS X Yosemite - 'flow_divert-heap-overflow' Kernel Panic | This is a dos exploit for osx platform. Description: Apple OS X Yosemite - 'flow_divert-heap-overflow' Kernel Panic. Author: Brandon Azad |
Analyze the security implications of: Apple OS X Yosemite - 'flow_divert-heap-overflow' Kernel Panic | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: SGI IRIX 5.3/6.2 - 'ordist' Local Privilege Escalation | This is a local exploit for irix platform. Description: SGI IRIX 5.3/6.2 - 'ordist' Local Privilege Escalation. Author: Yuri Volobuev |
Analyze the security implications of: SGI IRIX 5.3/6.2 - 'ordist' Local Privilege Escalation | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: AJ Article 1.0 - Remote Authentication Bypass | This is a webapps exploit for php platform. Description: AJ Article 1.0 - Remote Authentication Bypass. Author: G4N0K |
Analyze the security implications of: AJ Article 1.0 - Remote Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: House Style 0.1.2 - 'readfile()' Local File Disclosure | This is a webapps exploit for php platform. Description: House Style 0.1.2 - 'readfile()' Local File Disclosure. Author: GoLd_M |
Analyze the security implications of: House Style 0.1.2 - 'readfile()' Local File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HardDrive 2.1 for iOS - Arbitrary File Upload | This is a webapps exploit for ios platform. Description: HardDrive 2.1 for iOS - Arbitrary File Upload. Author: Vulnerability-Lab |
Analyze the security implications of: HardDrive 2.1 for iOS - Arbitrary File Upload | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: FOSS Gallery Public 1.0 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: FOSS Gallery Public 1.0 - Arbitrary File Upload. Author: JosS |
Analyze the security implications of: FOSS Gallery Public 1.0 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: dotProject 2.0.3 - 'baseDir' Remote File Inclusion | This is a webapps exploit for php platform. Description: dotProject 2.0.3 - 'baseDir' Remote File Inclusion. Author: h4ntu |
Analyze the security implications of: dotProject 2.0.3 - 'baseDir' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Edimax Technology EW-7438RPn-v3 Mini 1.27 - Remote Code Execution | This is a webapps exploit for hardware platform. Description: Edimax Technology EW-7438RPn-v3 Mini 1.27 - Remote Code Execution. Author: Wadeek |
Analyze the security implications of: Edimax Technology EW-7438RPn-v3 Mini 1.27 - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Annuaire 1Two 1.0/1.1 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Annuaire 1Two 1.0/1.1 - 'index.php' Cross-Site Scripting. Author: An0nym0uS |
Analyze the security implications of: Annuaire 1Two 1.0/1.1 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bit Weaver 2.7 - Local File Inclusion | This is a webapps exploit for php platform. Description: Bit Weaver 2.7 - Local File Inclusion. Author: John Leitch |
Analyze the security implications of: Bit Weaver 2.7 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 68KB Knowledge Base Script 1.0.0rc2 - Search SQL Injection | This is a webapps exploit for php platform. Description: 68KB Knowledge Base Script 1.0.0rc2 - Search SQL Injection. Author: Jelmer de Hen |
Analyze the security implications of: 68KB Knowledge Base Script 1.0.0rc2 - Search SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DUportal 3.1.2 - 'inc_rating.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: DUportal 3.1.2 - 'inc_rating.asp' Multiple SQL Injections. Author: Dcrab |
Analyze the security implications of: DUportal 3.1.2 - 'inc_rating.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Sudo 1.8.25p - 'pwfeedback' Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: Sudo 1.8.25p - 'pwfeedback' Buffer Overflow (PoC). Author: Joe Vennix |
Analyze the security implications of: Sudo 1.8.25p - 'pwfeedback' Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Digitaldesign CMS 0.1 - Remote Database Disclosure | This is a webapps exploit for php platform. Description: Digitaldesign CMS 0.1 - Remote Database Disclosure. Author: darkjoker |
Analyze the security implications of: Digitaldesign CMS 0.1 - Remote Database Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ricoh Aficio 450/455 PCL Printer - Remote ICMP Denial of Service | This is a dos exploit for hardware platform. Description: Ricoh Aficio 450/455 PCL Printer - Remote ICMP Denial of Service. Author: Hongzhen Zhou |
Analyze the security implications of: Ricoh Aficio 450/455 PCL Printer - Remote ICMP Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component Club Manager - 'cm_id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Club Manager - 'cm_id' SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component Club Manager - 'cm_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: U.S. Robotics USR808054 Wireless Access Point - Web Administration Denial of Service | This is a dos exploit for hardware platform. Description: U.S. Robotics USR808054 Wireless Access Point - Web Administration Denial of Service. Author: Albert Puigsech Galicia |
Analyze the security implications of: U.S. Robotics USR808054 Wireless Access Point - Web Administration Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.