input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Arq 5.10 - Local Privilege Escalation (1) | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: mailwatch 1.0.4 - 'doc' Local File Inclusion | This is a webapps exploit for php platform. Description: mailwatch 1.0.4 - 'doc' Local File Inclusion. Author: dun |
Analyze the security implications of: mailwatch 1.0.4 - 'doc' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Redmine SCM Repository - Arbitrary Command Execution (Metasploit) | This is a remote exploit for linux platform. Description: Redmine SCM Repository - Arbitrary Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Redmine SCM Repository - Arbitrary Command Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Adobe Flash - addProperty Use-After-Free | This is a dos exploit for multiple platform. Description: Adobe Flash - addProperty Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - addProperty Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Palo Alto PAN-OS < v11.1.2-h3 - Command Injection and Arbitrary File Creation | This is a remote exploit for linux_x86-64 platform. Description: Palo Alto PAN-OS < v11.1.2-h3 - Command Injection and Arbitrary File Creation. Author: Kr0ff |
Analyze the security implications of: Palo Alto PAN-OS < v11.1.2-h3 - Command Injection and Arbitrary File Creation | This exploit targets linux_x86-64 systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux_x86-64 platform |
What is this exploit about: Mambo Component Restaurant 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component Restaurant 1.0 - SQL Injection. Author: S@BUN |
Analyze the security implications of: Mambo Component Restaurant 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Maelstrom Player 3.0.x - Argument Buffer Overflow (1) | This is a local exploit for linux platform. Description: Maelstrom Player 3.0.x - Argument Buffer Overflow (1). Author: Luca Ercoli |
Analyze the security implications of: Maelstrom Player 3.0.x - Argument Buffer Overflow (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Dog Pedigree Online Database 1.0.1b - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Dog Pedigree Online Database 1.0.1b - Multiple SQL Injections. Author: YEnH4ckEr |
Analyze the security implications of: Dog Pedigree Online Database 1.0.1b - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNU Mailutils imap4d 0.6 - exec-shield Remote Format String | This is a remote exploit for linux platform. Description: GNU Mailutils imap4d 0.6 - exec-shield Remote Format String. Author: Xpl017Elz |
Analyze the security implications of: GNU Mailutils imap4d 0.6 - exec-shield Remote Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GIU Gallery Image Upload 0.3.1 - 'category' SQL Injection | This is a webapps exploit for php platform. Description: GIU Gallery Image Upload 0.3.1 - 'category' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: GIU Gallery Image Upload 0.3.1 - 'category' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeBSD 8.0 Run-Time Link-Editor (RTLD) - Local Privilege Escalation | This is a local exploit for bsd platform. Description: FreeBSD 8.0 Run-Time Link-Editor (RTLD) - Local Privilege Escalation. Author: kingcope |
Analyze the security implications of: FreeBSD 8.0 Run-Time Link-Editor (RTLD) - Local Privilege Escalation | This exploit targets bsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Sun ONE Directory Server 5.2 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Sun ONE Directory Server 5.2 - Remote Denial of Service. Author: Evgeny Legerov |
Analyze the security implications of: Sun ONE Directory Server 5.2 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Learning Management System 0.1 - Authentication Bypass | This is a webapps exploit for php platform. Description: Learning Management System 0.1 - Authentication Bypass. Author: lahilote |
Analyze the security implications of: Learning Management System 0.1 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Document Server 6.0 Extensions - 'ads-readerext?actionID' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Adobe Document Server 6.0 Extensions - 'ads-readerext?actionID' Cross-Site Scripting. Author: Tan Chew Keong |
Analyze the security implications of: Adobe Document Server 6.0 Extensions - 'ads-readerext?actionID' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Discussion Forums 2k 3.3 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Discussion Forums 2k 3.3 - Multiple SQL Injections. Author: ~!Dok_tOR!~ |
Analyze the security implications of: Discussion Forums 2k 3.3 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CenterIM 4.22.3 - Remote Command Execution | This is a remote exploit for linux platform. Description: CenterIM 4.22.3 - Remote Command Execution. Author: Brian Fonfara |
Analyze the security implications of: CenterIM 4.22.3 - Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple macOS - 'necp_get_socket_attributes' so_pcb Type Confusion | This is a dos exploit for macos platform. Description: Apple macOS - 'necp_get_socket_attributes' so_pcb Type Confusion. Author: Google Security Research |
Analyze the security implications of: Apple macOS - 'necp_get_socket_attributes' so_pcb Type Confusion | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: FBDj - 'id' SQL Injection | This is a webapps exploit for php platform. Description: FBDj - 'id' SQL Injection. Author: TUNISIAN CYBER |
Analyze the security implications of: FBDj - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP < 5.3.6 'Zip' Extension - 'zip_fread()' Denial of Service | This is a dos exploit for php platform. Description: PHP < 5.3.6 'Zip' Extension - 'zip_fread()' Denial of Service. Author: TorokAlpar |
Analyze the security implications of: PHP < 5.3.6 'Zip' Extension - 'zip_fread()' Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alstrasoft Article Manager Pro - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Alstrasoft Article Manager Pro - Arbitrary File Upload. Author: ZoRLu |
Analyze the security implications of: Alstrasoft Article Manager Pro - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: dotDefender Firewall 5.00.12865/5.13-13282 - Cross-Site Request Forgery | This is a webapps exploit for multiple platform. Description: dotDefender Firewall 5.00.12865/5.13-13282 - Cross-Site Request Forgery. Author: hyp3rlinx |
Analyze the security implications of: dotDefender Firewall 5.00.12865/5.13-13282 - Cross-Site Request Forgery | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: OBLOG - 'err.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: OBLOG - 'err.asp' Cross-Site Scripting. Author: arash.setayeshi |
Analyze the security implications of: OBLOG - 'err.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ASP Fast Forum - 'error.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: ASP Fast Forum - 'error.asp' Cross-Site Scripting. Author: syst3m_f4ult |
Analyze the security implications of: ASP Fast Forum - 'error.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: CKGold Shopping Cart 2.0 - 'category.php' Blind SQL Injection | This is a webapps exploit for php platform. Description: CKGold Shopping Cart 2.0 - 'category.php' Blind SQL Injection. Author: k1tk4t |
Analyze the security implications of: CKGold Shopping Cart 2.0 - 'category.php' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! / Mambo Component Tupinambis - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component Tupinambis - SQL Injection. Author: Don Tukulesto |
Analyze the security implications of: Joomla! / Mambo Component Tupinambis - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Borland Interbase 7.x - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Borland Interbase 7.x - Remote Buffer Overflow. Author: Aviram Jenik |
Analyze the security implications of: Borland Interbase 7.x - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cyberfolio 7.12 - 'rep' Remote File Inclusion | This is a webapps exploit for php platform. Description: Cyberfolio 7.12 - 'rep' Remote File Inclusion. Author: RoMaNcYxHaCkEr |
Analyze the security implications of: Cyberfolio 7.12 - 'rep' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EzPub Simple Classic ASP CMS - SQL Injection | This is a webapps exploit for asp platform. Description: EzPub Simple Classic ASP CMS - SQL Injection. Author: p0pc0rn |
Analyze the security implications of: EzPub Simple Classic ASP CMS - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Cisco RV130W 1.0.3.44 - Remote Stack Overflow | This is a remote exploit for hardware platform. Description: Cisco RV130W 1.0.3.44 - Remote Stack Overflow. Author: @0x00string |
Analyze the security implications of: Cisco RV130W 1.0.3.44 - Remote Stack Overflow | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component You!Hostit! 1.0.1 Template - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component You!Hostit! 1.0.1 Template - Cross-Site Scripting. Author: andresg888 |
Analyze the security implications of: Joomla! Component You!Hostit! 1.0.1 Template - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alstrasoft Video Share Enterprise 4.x - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: Alstrasoft Video Share Enterprise 4.x - Multiple Input Validation Vulnerabilities. Author: Lostmon |
Analyze the security implications of: Alstrasoft Video Share Enterprise 4.x - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WordPress Frontend Login and Registration Blocks Plugin 1.0.7 - Privilege Escalation | This is a webapps exploit for multiple platform. Description: WordPress Frontend Login and Registration Blocks Plugin 1.0.7 - Privilege Escalation. Author: Md Shoriful Islam |
Analyze the security implications of: WordPress Frontend Login and Registration Blocks Plugin 1.0.7 - Privilege Escalation | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mandrake 7/8/9 / RedHat 6.x/7 Bonobo EFSTool - Commandline Argument Buffer Overflow (3) | This is a local exploit for linux platform. Description: Mandrake 7/8/9 / RedHat 6.x/7 Bonobo EFSTool - Commandline Argument Buffer Overflow (3). Author: N4rK07IX |
Analyze the security implications of: Mandrake 7/8/9 / RedHat 6.x/7 Bonobo EFSTool - Commandline Argument Buffer Overflow (3) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Jupiter CMS 1.1.4/1.1.5 - modules/register Multiple SQL Injections | This is a webapps exploit for php platform. Description: Jupiter CMS 1.1.4/1.1.5 - modules/register Multiple SQL Injections. Author: HACKERS PAL |
Analyze the security implications of: Jupiter CMS 1.1.4/1.1.5 - modules/register Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.