input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Xen - Broken Check in 'memory_exchange()' Permits PV Guest Breakout | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Magic Photo Storage Website - '/user/couple_profile.php?_config[site_path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/user/couple_profile.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina |
Analyze the security implications of: Magic Photo Storage Website - '/user/couple_profile.php?_config[site_path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ibProArcade 3.3.0 - SQL Injection | This is a webapps exploit for php platform. Description: ibProArcade 3.3.0 - SQL Injection. Author: RST/GHC |
Analyze the security implications of: ibProArcade 3.3.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Clipbucket 2.6 - 'videos.php?cat' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Clipbucket 2.6 - 'videos.php?cat' Cross-Site Scripting. Author: YaDoY666 |
Analyze the security implications of: Clipbucket 2.6 - 'videos.php?cat' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NetBSD - 'Stack Clash' (PoC) | This is a dos exploit for netbsd_x86 platform. Description: NetBSD - 'Stack Clash' (PoC). Author: Qualys Corporation |
Analyze the security implications of: NetBSD - 'Stack Clash' (PoC) | This exploit targets netbsd_x86 systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets netbsd_x86 platform |
What is this exploit about: Remote File Manager 1.2 iOS - Multiple Vulnerabilities | This is a webapps exploit for ios platform. Description: Remote File Manager 1.2 iOS - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Remote File Manager 1.2 iOS - Multiple Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Form Sender 1.0 - 'Processform.php3?Failed' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Form Sender 1.0 - 'Processform.php3?Failed' Cross-Site Scripting. Author: rgod |
Analyze the security implications of: Form Sender 1.0 - 'Processform.php3?Failed' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ca3de - Multiple Vulnerabilities | This is a remote exploit for multiple platform. Description: ca3de - Multiple Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: ca3de - Multiple Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ArticleFR 11.06.2014 - 'data.php' Privilege Escalation | This is a webapps exploit for php platform. Description: ArticleFR 11.06.2014 - 'data.php' Privilege Escalation. Author: High-Tech Bridge SA |
Analyze the security implications of: ArticleFR 11.06.2014 - 'data.php' Privilege Escalation | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Best Top List - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Best Top List - Cross-Site Scripting. Author: indoushka |
Analyze the security implications of: Best Top List - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fully Functional ASP Forum 1.0 - Database Disclosure | This is a webapps exploit for asp platform. Description: Fully Functional ASP Forum 1.0 - Database Disclosure. Author: indoushka |
Analyze the security implications of: Fully Functional ASP Forum 1.0 - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Easy Web Search 4.0 - SQL Injection | This is a webapps exploit for php platform. Description: Easy Web Search 4.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Easy Web Search 4.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ChiTeX 6.1.2 - Local Privilege Escalation | This is a local exploit for linux platform. Description: ChiTeX 6.1.2 - Local Privilege Escalation. Author: zillion |
Analyze the security implications of: ChiTeX 6.1.2 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: D-Link DNS-323 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: D-Link DNS-323 - Multiple Vulnerabilities. Author: sghctoma |
Analyze the security implications of: D-Link DNS-323 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: OraclMySQL 5.1.48 - 'LOAD DATA INFILE' Denial of Service | This is a dos exploit for linux platform. Description: OraclMySQL 5.1.48 - 'LOAD DATA INFILE' Denial of Service. Author: Elena Stepanova |
Analyze the security implications of: OraclMySQL 5.1.48 - 'LOAD DATA INFILE' Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Espinas CMS - SQL Injection | This is a webapps exploit for asp platform. Description: Espinas CMS - SQL Injection. Author: Pouya Daneshmand |
Analyze the security implications of: Espinas CMS - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Netgear WNR1000v3 - Password Recovery Credential Disclosure (Metasploit) | This is a webapps exploit for hardware platform. Description: Netgear WNR1000v3 - Password Recovery Credential Disclosure (Metasploit). Author: c1ph04 |
Analyze the security implications of: Netgear WNR1000v3 - Password Recovery Credential Disclosure (Metasploit) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: WebEyes Guest Book 3 - 'yorum.asp?mesajid' SQL Injection | This is a webapps exploit for asp platform. Description: WebEyes Guest Book 3 - 'yorum.asp?mesajid' SQL Injection. Author: Bl@ckbe@rD |
Analyze the security implications of: WebEyes Guest Book 3 - 'yorum.asp?mesajid' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: MACCMS 10 - Cross-Site Request Forgery (Add User) | This is a webapps exploit for php platform. Description: MACCMS 10 - Cross-Site Request Forgery (Add User). Author: bay0net |
Analyze the security implications of: MACCMS 10 - Cross-Site Request Forgery (Add User) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_user - 'view' Open Redirection | This is a webapps exploit for php platform. Description: Joomla! Component com_user - 'view' Open Redirection. Author: 599eme Man |
Analyze the security implications of: Joomla! Component com_user - 'view' Open Redirection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.4/5.5/5.6 - 'Unserialize()' Use-After-Free | This is a dos exploit for php platform. Description: PHP 5.4/5.5/5.6 - 'Unserialize()' Use-After-Free. Author: Taoguang Chen |
Analyze the security implications of: PHP 5.4/5.5/5.6 - 'Unserialize()' Use-After-Free | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Forum 1 - 'footer' Remote File Inclusion | This is a webapps exploit for php platform. Description: D-Forum 1 - 'footer' Remote File Inclusion. Author: frog |
Analyze the security implications of: D-Forum 1 - 'footer' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_mosres - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Joomla! Component com_mosres - Multiple SQL Injections. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component com_mosres - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_pbbooking 1.0.4_3 - Multiple Blind SQL Injections | This is a webapps exploit for php platform. Description: Joomla! Component com_pbbooking 1.0.4_3 - Multiple Blind SQL Injections. Author: Salvatore Fresta |
Analyze the security implications of: Joomla! Component com_pbbooking 1.0.4_3 - Multiple Blind SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Urchin 5.7.x - 'session.cgi' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Urchin 5.7.x - 'session.cgi' Cross-Site Scripting. Author: pagvac |
Analyze the security implications of: Urchin 5.7.x - 'session.cgi' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Linkster - PHP/MySQL SQL Injection | This is a webapps exploit for php platform. Description: Linkster - PHP/MySQL SQL Injection. Author: Angela Zhang |
Analyze the security implications of: Linkster - PHP/MySQL SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 4Images 1.7.7 - Filter Bypass HTML Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: 4Images 1.7.7 - Filter Bypass HTML Injection / Cross-Site Scripting. Author: Qabandi |
Analyze the security implications of: 4Images 1.7.7 - Filter Bypass HTML Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bolt CMS 3.6.6 - Cross-Site Request Forgery / Remote Code Execution | This is a webapps exploit for php platform. Description: Bolt CMS 3.6.6 - Cross-Site Request Forgery / Remote Code Execution. Author: FelipeGaspar |
Analyze the security implications of: Bolt CMS 3.6.6 - Cross-Site Request Forgery / Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Luch Web Designer - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Luch Web Designer - Multiple SQL Injections. Author: p0pc0rn |
Analyze the security implications of: Luch Web Designer - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: cPanel 10.8.x - 'cpwrap' via MySQLAdmin Privilege Escalation | This is a webapps exploit for php platform. Description: cPanel 10.8.x - 'cpwrap' via MySQLAdmin Privilege Escalation. Author: Nima Salehi |
Analyze the security implications of: cPanel 10.8.x - 'cpwrap' via MySQLAdmin Privilege Escalation | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Component Reporter 1.0 - 'Reporter.sql.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Component Reporter 1.0 - 'Reporter.sql.php' Remote File Inclusion. Author: Crackers_Child |
Analyze the security implications of: Mambo Component Reporter 1.0 - 'Reporter.sql.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Free Arcade Script 1.0 - Local File Inclusion Command Execution | This is a webapps exploit for php platform. Description: Free Arcade Script 1.0 - Local File Inclusion Command Execution. Author: Osirys |
Analyze the security implications of: Free Arcade Script 1.0 - Local File Inclusion Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 4Images 1.7.x - 'search.php' SQL Injection | This is a webapps exploit for php platform. Description: 4Images 1.7.x - 'search.php' SQL Injection. Author: Synsta |
Analyze the security implications of: 4Images 1.7.x - 'search.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ContentServ 3.0/3.1/4.0 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: ContentServ 3.0/3.1/4.0 - 'index.php' SQL Injection. Author: r0t |
Analyze the security implications of: ContentServ 3.0/3.1/4.0 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.