input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: fkey 0.0.2 - Local File Accessibility | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Easy Support Tools 1.0 - 'stt' SQL Injection | This is a webapps exploit for php platform. Description: Easy Support Tools 1.0 - 'stt' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Easy Support Tools 1.0 - 'stt' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pimcore CMS 1.4.9 <2.1.0 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Pimcore CMS 1.4.9 <2.1.0 - Multiple Vulnerabilities. Author: Pedro Ribeiro |
Analyze the security implications of: Pimcore CMS 1.4.9 <2.1.0 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: OracleAS TopLink Mapping Workbench - Weak Encryption Algorithm | This is a local exploit for multiple platform. Description: OracleAS TopLink Mapping Workbench - Weak Encryption Algorithm. Author: Pete Finnigan |
Analyze the security implications of: OracleAS TopLink Mapping Workbench - Weak Encryption Algorithm | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Graphite2 - TtfUtil::CheckCmapSubtable12 Heap Overread | This is a dos exploit for multiple platform. Description: Graphite2 - TtfUtil::CheckCmapSubtable12 Heap Overread. Author: Google Security Research |
Analyze the security implications of: Graphite2 - TtfUtil::CheckCmapSubtable12 Heap Overread | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Just William's Amazon Webstore - 'CurrentIsExpanded' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Just William's Amazon Webstore - 'CurrentIsExpanded' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: Just William's Amazon Webstore - 'CurrentIsExpanded' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.30 < 2.6.30.1 / SELinux (RHEL 5) - Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel 2.6.30 < 2.6.30.1 / SELinux (RHEL 5) - Local Privilege Escalation. Author: spender |
Analyze the security implications of: Linux Kernel 2.6.30 < 2.6.30.1 / SELinux (RHEL 5) - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: EasyNews 1.5 - NewsDatabase/Template Modification | This is a webapps exploit for php platform. Description: EasyNews 1.5 - NewsDatabase/Template Modification. Author: markus arndt |
Analyze the security implications of: EasyNews 1.5 - NewsDatabase/Template Modification | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: coppermine 1.5.18 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: coppermine 1.5.18 - Multiple Vulnerabilities. Author: waraxe |
Analyze the security implications of: coppermine 1.5.18 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DomPHP 0.83 - Local Directory Traversal | This is a webapps exploit for php platform. Description: DomPHP 0.83 - Local Directory Traversal. Author: Houssamix |
Analyze the security implications of: DomPHP 0.83 - Local Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Full Site for Restaurant - SQL Injection | This is a webapps exploit for php platform. Description: Full Site for Restaurant - SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: Full Site for Restaurant - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wireshark - dissect_ber_set Static Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: Wireshark - dissect_ber_set Static Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: Wireshark - dissect_ber_set Static Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: RedHat 6.2 Piranha Virtual Server Package - Default Account and Password | This is a remote exploit for linux platform. Description: RedHat 6.2 Piranha Virtual Server Package - Default Account and Password. Author: Max Vision |
Analyze the security implications of: RedHat 6.2 Piranha Virtual Server Package - Default Account and Password | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cacti 1.2.12 - 'filter' SQL Injection | This is a webapps exploit for php platform. Description: Cacti 1.2.12 - 'filter' SQL Injection. Author: Leonardo Paiva |
Analyze the security implications of: Cacti 1.2.12 - 'filter' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WhatsUp Gold 2022 (22.1.0 Build 39) - XSS | This is a webapps exploit for multiple platform. Description: WhatsUp Gold 2022 (22.1.0 Build 39) - XSS. Author: Andreas Finstad |
Analyze the security implications of: WhatsUp Gold 2022 (22.1.0 Build 39) - XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Blog:CMS 4.1 - 'Dir_Plugins' Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Blog:CMS 4.1 - 'Dir_Plugins' Multiple Remote File Inclusions. Author: Drago84 |
Analyze the security implications of: Blog:CMS 4.1 - 'Dir_Plugins' Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Andy Mack 35mm Slide Gallery 6.0 - 'popup.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Andy Mack 35mm Slide Gallery 6.0 - 'popup.php' Multiple Cross-Site Scripting Vulnerabilities. Author: black-cod3 |
Analyze the security implications of: Andy Mack 35mm Slide Gallery 6.0 - 'popup.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ruby on Rails - XML Processor YAML Deserialization Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Ruby on Rails - XML Processor YAML Deserialization Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Ruby on Rails - XML Processor YAML Deserialization Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Adive Framework 2.0.8 - Cross-Site Request Forgery (Change Admin Password) | This is a webapps exploit for php platform. Description: Adive Framework 2.0.8 - Cross-Site Request Forgery (Change Admin Password). Author: Sarthak Saini |
Analyze the security implications of: Adive Framework 2.0.8 - Cross-Site Request Forgery (Change Admin Password) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNU GNATS 4.0/4.1 - Gen-Index Arbitrary Local File Disclosure/Overwrite | This is a local exploit for linux platform. Description: GNU GNATS 4.0/4.1 - Gen-Index Arbitrary Local File Disclosure/Overwrite. Author: pi3ki31ny |
Analyze the security implications of: GNU GNATS 4.0/4.1 - Gen-Index Arbitrary Local File Disclosure/Overwrite | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache mod_ssl 2.0.x - Remote Denial of Service | This is a dos exploit for linux platform. Description: Apache mod_ssl 2.0.x - Remote Denial of Service. Author: M. _Alex_ Hankins |
Analyze the security implications of: Apache mod_ssl 2.0.x - Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: 2WIRE Router 5.29.52 - Remote Denial of Service | This is a dos exploit for hardware platform. Description: 2WIRE Router 5.29.52 - Remote Denial of Service. Author: hkm |
Analyze the security implications of: 2WIRE Router 5.29.52 - Remote Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Adobe Flex SDK 3.x - 'index.template.html' Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Adobe Flex SDK 3.x - 'index.template.html' Cross-Site Scripting. Author: Adam Bixby |
Analyze the security implications of: Adobe Flex SDK 3.x - 'index.template.html' Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ZYXEL P-660HN-T1H_IPv6 - Remote Configuration Editor / Web Server Denial of Service | This is a dos exploit for hardware platform. Description: ZYXEL P-660HN-T1H_IPv6 - Remote Configuration Editor / Web Server Denial of Service. Author: Koorosh Ghorbani |
Analyze the security implications of: ZYXEL P-660HN-T1H_IPv6 - Remote Configuration Editor / Web Server Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Majoda CMS - Authentication Bypass | This is a webapps exploit for asp platform. Description: Majoda CMS - Authentication Bypass. Author: Phenom |
Analyze the security implications of: Majoda CMS - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: LG SuperSign EZ CMS 2.5 - Local File Inclusion | This is a webapps exploit for hardware platform. Description: LG SuperSign EZ CMS 2.5 - Local File Inclusion. Author: Alejandro Fanjul |
Analyze the security implications of: LG SuperSign EZ CMS 2.5 - Local File Inclusion | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Arq 5.9.7 - Local Privilege Escalation | This is a local exploit for macos platform. Description: Arq 5.9.7 - Local Privilege Escalation. Author: Mark Wadham |
Analyze the security implications of: Arq 5.9.7 - Local Privilege Escalation | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Apple macOS 10.13.5 - Local Privilege Escalation | This is a local exploit for macos platform. Description: Apple macOS 10.13.5 - Local Privilege Escalation. Author: Synacktiv |
Analyze the security implications of: Apple macOS 10.13.5 - Local Privilege Escalation | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: I-net Multi User Email Script - SQL Injection | This is a webapps exploit for php platform. Description: I-net Multi User Email Script - SQL Injection. Author: Sid3^effects |
Analyze the security implications of: I-net Multi User Email Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10.4.8 - QuickDraw GetSrcBits32ARGB Remote Memory Corruption | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.4.8 - QuickDraw GetSrcBits32ARGB Remote Memory Corruption. Author: LMH |
Analyze the security implications of: Apple Mac OSX 10.4.8 - QuickDraw GetSrcBits32ARGB Remote Memory Corruption | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Eggdrop Server Module Message Handling - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Eggdrop Server Module Message Handling - Remote Buffer Overflow. Author: bangus/magnum |
Analyze the security implications of: Eggdrop Server Module Message Handling - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Flip 3.0 - Remote Password Hash Disclosure | This is a webapps exploit for php platform. Description: Flip 3.0 - Remote Password Hash Disclosure. Author: undefined1_ |
Analyze the security implications of: Flip 3.0 - Remote Password Hash Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lighttpd < 1.4.23 (BSD/Solaris) - Source Code Disclosure | This is a remote exploit for multiple platform. Description: Lighttpd < 1.4.23 (BSD/Solaris) - Source Code Disclosure. Author: venatir |
Analyze the security implications of: Lighttpd < 1.4.23 (BSD/Solaris) - Source Code Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SmarterMail 8.0 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: SmarterMail 8.0 - Multiple Cross-Site Scripting Vulnerabilities. Author: Hoyt LLC Research |
Analyze the security implications of: SmarterMail 8.0 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.