input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Lotus Mail Encryption Server 2.1.0.1 (Protector for Mail) - Local File Inclusion / Remote Code Execution (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_jvideodirect - Directory Traversal | This is a webapps exploit for php platform. Description: Joomla! Component com_jvideodirect - Directory Traversal. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_jvideodirect - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fonality trixbox - 'langChoice' Local File Inclusion (connect-back) (2) | This is a webapps exploit for linux platform. Description: Fonality trixbox - 'langChoice' Local File Inclusion (connect-back) (2). Author: Jean-Michel BESNARD |
Analyze the security implications of: Fonality trixbox - 'langChoice' Local File Inclusion (connect-back) (2) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DIY Web CMS - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: DIY Web CMS - Multiple Vulnerabilities. Author: p0pc0rn |
Analyze the security implications of: DIY Web CMS - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apple Mac OSX 10.x - 'libc/strtod(3)' Memory Corruption | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.x - 'libc/strtod(3)' Memory Corruption. Author: Maksymilian Arciemowicz |
Analyze the security implications of: Apple Mac OSX 10.x - 'libc/strtod(3)' Memory Corruption | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: PostgreSQL 9.4-0.5.3 - Privilege Escalation | This is a local exploit for linux platform. Description: PostgreSQL 9.4-0.5.3 - Privilege Escalation. Author: Johannes Segitz |
Analyze the security implications of: PostgreSQL 9.4-0.5.3 - Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DvBBS 2.0 - 'boardrule.php' SQL Injection | This is a webapps exploit for php platform. Description: DvBBS 2.0 - 'boardrule.php' SQL Injection. Author: Securitylab.ir |
Analyze the security implications of: DvBBS 2.0 - 'boardrule.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wireshark - LWRES Dissector getaddrsbyname_request Buffer Overflow (Loop) (Metasploit) | This is a remote exploit for multiple platform. Description: Wireshark - LWRES Dissector getaddrsbyname_request Buffer Overflow (Loop) (Metasploit). Author: Metasploit |
Analyze the security implications of: Wireshark - LWRES Dissector getaddrsbyname_request Buffer Overflow (Loop) (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mozilla Firefox 5.0 < 15.0.1 - __exposedProps__ XCS Code Execution (Metasploit) | This is a local exploit for multiple platform. Description: Mozilla Firefox 5.0 < 15.0.1 - __exposedProps__ XCS Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Mozilla Firefox 5.0 < 15.0.1 - __exposedProps__ XCS Code Execution (Metasploit) | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Car Rental Project 1.0 - Remote Code Execution | This is a webapps exploit for php platform. Description: Car Rental Project 1.0 - Remote Code Execution. Author: ub3rsick |
Analyze the security implications of: Car Rental Project 1.0 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DC Scripts DCShop Beta 1.0 02 - File Disclosure (2) | This is a remote exploit for cgi platform. Description: DC Scripts DCShop Beta 1.0 02 - File Disclosure (2). Author: Peter Helms |
Analyze the security implications of: DC Scripts DCShop Beta 1.0 02 - File Disclosure (2) | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Fully Modded PHPBB2 - 'phpbb_root_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Fully Modded PHPBB2 - 'phpbb_root_path' Remote File Inclusion. Author: HACKERS PAL |
Analyze the security implications of: Fully Modded PHPBB2 - 'phpbb_root_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BS Scripts Directory - 'articlesdetails.php' SQL Injection | This is a webapps exploit for php platform. Description: BS Scripts Directory - 'articlesdetails.php' SQL Injection. Author: k4k4shi |
Analyze the security implications of: BS Scripts Directory - 'articlesdetails.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JumbaCMS 0.0.1 - '/includes/functions.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: JumbaCMS 0.0.1 - '/includes/functions.php' Remote File Inclusion. Author: Kw3[R]Ln |
Analyze the security implications of: JumbaCMS 0.0.1 - '/includes/functions.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Github Enterprise - Default Session Secret and Deserialization (Metasploit) | This is a remote exploit for linux platform. Description: Github Enterprise - Default Session Secret and Deserialization (Metasploit). Author: Metasploit |
Analyze the security implications of: Github Enterprise - Default Session Secret and Deserialization (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Belkin N750 - 'jump?login' Remote Buffer Overflow | This is a remote exploit for hardware platform. Description: Belkin N750 - 'jump?login' Remote Buffer Overflow. Author: Marco Vaz |
Analyze the security implications of: Belkin N750 - 'jump?login' Remote Buffer Overflow | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Free Arcade Script 1.0 - Authentication Bypass / Arbitrary File Upload | This is a webapps exploit for php platform. Description: Free Arcade Script 1.0 - Authentication Bypass / Arbitrary File Upload. Author: Mr.Skonnie |
Analyze the security implications of: Free Arcade Script 1.0 - Authentication Bypass / Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ClanLite - 'conf-php.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: ClanLite - 'conf-php.php' Remote File Inclusion. Author: x_w0x |
Analyze the security implications of: ClanLite - 'conf-php.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_virtualmoney 1.5 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_virtualmoney 1.5 - SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_virtualmoney 1.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Complaint Management System 1.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: Complaint Management System 1.0 - Authentication Bypass. Author: BKpatron |
Analyze the security implications of: Complaint Management System 1.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Android - RKP EL1 Code Loading Bypass | This is a local exploit for android platform. Description: Google Android - RKP EL1 Code Loading Bypass. Author: Google Security Research |
Analyze the security implications of: Google Android - RKP EL1 Code Loading Bypass | This exploit targets android systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Integramod Portal 2.0 rc2 - 'phpbb_root_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Integramod Portal 2.0 rc2 - 'phpbb_root_path' Remote File Inclusion. Author: MATASANOS |
Analyze the security implications of: Integramod Portal 2.0 rc2 - 'phpbb_root_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe ColdFusion - 'probe.cfm' Cross-Site Scripting | This is a webapps exploit for cfm platform. Description: Adobe ColdFusion - 'probe.cfm' Cross-Site Scripting. Author: G.R0b1n |
Analyze the security implications of: Adobe ColdFusion - 'probe.cfm' Cross-Site Scripting | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: blueimp's jQuery 9.22.0 - (Arbitrary) File Upload (Metasploit) | This is a remote exploit for php platform. Description: blueimp's jQuery 9.22.0 - (Arbitrary) File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: blueimp's jQuery 9.22.0 - (Arbitrary) File Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KDPics 1.11/1.16 - 'galeries.inc.php3?categories' Cross-Site Scripting | This is a webapps exploit for php platform. Description: KDPics 1.11/1.16 - 'galeries.inc.php3?categories' Cross-Site Scripting. Author: Mr_KaLiMaN |
Analyze the security implications of: KDPics 1.11/1.16 - 'galeries.inc.php3?categories' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: C2Box 4.0.0(r19171) - Cross-Site Request Forgery | This is a webapps exploit for asp platform. Description: C2Box 4.0.0(r19171) - Cross-Site Request Forgery. Author: Wissam Bashour |
Analyze the security implications of: C2Box 4.0.0(r19171) - Cross-Site Request Forgery | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Billing Management System 2.0 - Union based SQL injection (Authenticated) | This is a webapps exploit for php platform. Description: Billing Management System 2.0 - Union based SQL injection (Authenticated). Author: Mohammad Koochaki |
Analyze the security implications of: Billing Management System 2.0 - Union based SQL injection (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: E-Xoops 1.0.5/1.0.8 - '/myalbum/ratephoto.php?lid' SQL Injection | This is a webapps exploit for php platform. Description: E-Xoops 1.0.5/1.0.8 - '/myalbum/ratephoto.php?lid' SQL Injection. Author: Lostmon |
Analyze the security implications of: E-Xoops 1.0.5/1.0.8 - '/myalbum/ratephoto.php?lid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: dotProject 2.1.3 - Cross-Site Scripting / Improper Permissions | This is a webapps exploit for php platform. Description: dotProject 2.1.3 - Cross-Site Scripting / Improper Permissions. Author: h00die |
Analyze the security implications of: dotProject 2.1.3 - Cross-Site Scripting / Improper Permissions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: sleuthkit 4.11.1 - Command Injection | This is a local exploit for multiple platform. Description: sleuthkit 4.11.1 - Command Injection. Author: Dino Barlattani |
Analyze the security implications of: sleuthkit 4.11.1 - Command Injection | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Korean GHBoard FlashUpload Component - 'download.jsp?name' Arbitrary File Access | This is a webapps exploit for jsp platform. Description: Korean GHBoard FlashUpload Component - 'download.jsp?name' Arbitrary File Access. Author: Xcross87 |
Analyze the security implications of: Korean GHBoard FlashUpload Component - 'download.jsp?name' Arbitrary File Access | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: AlsaPlayer 0.99.x - Multiple Buffer Overflow Vulnerabilities | This is a dos exploit for linux platform. Description: AlsaPlayer 0.99.x - Multiple Buffer Overflow Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: AlsaPlayer 0.99.x - Multiple Buffer Overflow Vulnerabilities | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Snitz Forums 2000 - 'forum.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Snitz Forums 2000 - 'forum.asp' Cross-Site Scripting. Author: ajann |
Analyze the security implications of: Snitz Forums 2000 - 'forum.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Android - Binder Driver Use-After-Free | This is a local exploit for android platform. Description: Android - Binder Driver Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Android - Binder Driver Use-After-Free | This exploit targets android systems. Type: local. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.