input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: eVestigator Forensic PenTester - Man In The Middle Remote Code Execution | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Setuid perl - 'PerlIO_Debug()' Local Overflow | This is a local exploit for linux platform. Description: Setuid perl - 'PerlIO_Debug()' Local Overflow. Author: Kevin Finisterre |
Analyze the security implications of: Setuid perl - 'PerlIO_Debug()' Local Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Alphaware E-Commerce System 1.0 - Unauthenicated Remote Code Execution (File Upload + SQL injection) | This is a webapps exploit for php platform. Description: Alphaware E-Commerce System 1.0 - Unauthenicated Remote Code Execution (File Upload + SQL injection). Author: Christian Vierschilling |
Analyze the security implications of: Alphaware E-Commerce System 1.0 - Unauthenicated Remote Code Execution (File Upload + SQL injection) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ArabPortal 2.0.1 - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: ArabPortal 2.0.1 - Multiple Input Validation Vulnerabilities. Author: o.y.6 |
Analyze the security implications of: ArabPortal 2.0.1 - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AWStats 6.0 < 6.2 - 'configdir' Remote Command Execution | This is a webapps exploit for cgi platform. Description: AWStats 6.0 < 6.2 - 'configdir' Remote Command Execution. Author: GHC |
Analyze the security implications of: AWStats 6.0 < 6.2 - 'configdir' Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Bs Recipes_Website Script - SQL Injection / Authentication Bypass | This is a webapps exploit for php platform. Description: Bs Recipes_Website Script - SQL Injection / Authentication Bypass. Author: Sid3^effects |
Analyze the security implications of: Bs Recipes_Website Script - SQL Injection / Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HC Newssystem 1.0-1.4 - 'index.php?ID' SQL Injection | This is a webapps exploit for php platform. Description: HC Newssystem 1.0-1.4 - 'index.php?ID' SQL Injection. Author: WiLdBoY |
Analyze the security implications of: HC Newssystem 1.0-1.4 - 'index.php?ID' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 2DayBiz MLM Script - SQL Injection | This is a webapps exploit for php platform. Description: 2DayBiz MLM Script - SQL Injection. Author: JaMbA |
Analyze the security implications of: 2DayBiz MLM Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Libpango 1.40.8 - Denial of Service (PoC) | This is a dos exploit for multiple platform. Description: Libpango 1.40.8 - Denial of Service (PoC). Author: Jeffery M |
Analyze the security implications of: Libpango 1.40.8 - Denial of Service (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Eibiz i-Media Server Digital Signage 3.8.0 - Privilege Escalation | This is a webapps exploit for hardware platform. Description: Eibiz i-Media Server Digital Signage 3.8.0 - Privilege Escalation. Author: LiquidWorm |
Analyze the security implications of: Eibiz i-Media Server Digital Signage 3.8.0 - Privilege Escalation | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Geeklog 1.5.2 - 'SEC_authenticate()' SQL Injection | This is a webapps exploit for php platform. Description: Geeklog 1.5.2 - 'SEC_authenticate()' SQL Injection. Author: Nine:Situations:Group |
Analyze the security implications of: Geeklog 1.5.2 - 'SEC_authenticate()' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LandShop 0.6.3 - 'ls.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: LandShop 0.6.3 - 'ls.php' Multiple Cross-Site Scripting Vulnerabilities. Author: laurent gaffie |
Analyze the security implications of: LandShop 0.6.3 - 'ls.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: perfexcrm 1.10 - 'State' Stored Cross-site scripting (XSS) | This is a webapps exploit for multiple platform. Description: perfexcrm 1.10 - 'State' Stored Cross-site scripting (XSS). Author: Alhasan Abbas |
Analyze the security implications of: perfexcrm 1.10 - 'State' Stored Cross-site scripting (XSS) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Huawei EchoLife HG520c - Modem Reset (Denial of Service) | This is a dos exploit for hardware platform. Description: Huawei EchoLife HG520c - Modem Reset (Denial of Service). Author: hkm |
Analyze the security implications of: Huawei EchoLife HG520c - Modem Reset (Denial of Service) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: OnePlug CMS - '/services/details.asp?Service_ID' SQL Injection | This is a webapps exploit for asp platform. Description: OnePlug CMS - '/services/details.asp?Service_ID' SQL Injection. Author: Preddy |
Analyze the security implications of: OnePlug CMS - '/services/details.asp?Service_ID' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component BeeHeard 1.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component BeeHeard 1.0 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component BeeHeard 1.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SolarView Compact 6.00 - 'pow' Cross-Site Scripting (XSS) | This is a webapps exploit for hardware platform. Description: SolarView Compact 6.00 - 'pow' Cross-Site Scripting (XSS). Author: Ahmed Alroky |
Analyze the security implications of: SolarView Compact 6.00 - 'pow' Cross-Site Scripting (XSS) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Fusion News 3.3 - Unauthorized Account Addition | This is a webapps exploit for php platform. Description: Fusion News 3.3 - Unauthorized Account Addition. Author: DarkKnight |
Analyze the security implications of: Fusion News 3.3 - Unauthorized Account Addition | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flowers - 'Cas.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Flowers - 'Cas.php' Cross-Site Scripting. Author: the_Edit0r |
Analyze the security implications of: Flowers - 'Cas.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FAQEngine 4.16.03 - 'question.php?questionref' SQL Injection | This is a webapps exploit for php platform. Description: FAQEngine 4.16.03 - 'question.php?questionref' SQL Injection. Author: Silentz |
Analyze the security implications of: FAQEngine 4.16.03 - 'question.php?questionref' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nucom ADSL ADSLR5000UN - ISP Credentials Disclosure | This is a webapps exploit for hardware platform. Description: Nucom ADSL ADSLR5000UN - ISP Credentials Disclosure. Author: Sebastián Magof |
Analyze the security implications of: Nucom ADSL ADSLR5000UN - ISP Credentials Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Komfy Switch with Camera DKZ-201S/W - WiFi Password Disclosure | This is a remote exploit for hardware platform. Description: Komfy Switch with Camera DKZ-201S/W - WiFi Password Disclosure. Author: Jason Doyle |
Analyze the security implications of: Komfy Switch with Camera DKZ-201S/W - WiFi Password Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Adobe Reader 9.1.3 Plugin - Cross-Site Scripting | This is a remote exploit for linux platform. Description: Adobe Reader 9.1.3 Plugin - Cross-Site Scripting. Author: Stefano Di Paola |
Analyze the security implications of: Adobe Reader 9.1.3 Plugin - Cross-Site Scripting | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Itetris 1.6.1/1.6.2 - Privileged Arbitrary Command Execution | This is a local exploit for linux platform. Description: Itetris 1.6.1/1.6.2 - Privileged Arbitrary Command Execution. Author: V9 |
Analyze the security implications of: Itetris 1.6.1/1.6.2 - Privileged Arbitrary Command Execution | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: binutils 2.29.51.20170921 - 'read_1_byte' Heap Buffer Overflow | This is a dos exploit for linux platform. Description: binutils 2.29.51.20170921 - 'read_1_byte' Heap Buffer Overflow. Author: Agostino Sarubbo |
Analyze the security implications of: binutils 2.29.51.20170921 - 'read_1_byte' Heap Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Subversion 1.0.2 - 'svn_time_from_cstring()' Remote Overflow | This is a remote exploit for linux platform. Description: Subversion 1.0.2 - 'svn_time_from_cstring()' Remote Overflow. Author: Gyan Chawdhary |
Analyze the security implications of: Subversion 1.0.2 - 'svn_time_from_cstring()' Remote Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DCI-Taskeen 1.03 - 'basket.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: DCI-Taskeen 1.03 - 'basket.php' Multiple SQL Injections. Author: Linux_Drox |
Analyze the security implications of: DCI-Taskeen 1.03 - 'basket.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SimpleBlog 2.3 - '/admin/edit.asp' SQL Injection | This is a webapps exploit for asp platform. Description: SimpleBlog 2.3 - '/admin/edit.asp' SQL Injection. Author: bolivar |
Analyze the security implications of: SimpleBlog 2.3 - '/admin/edit.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Event Ticket Portal Script Admin Password Change - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Event Ticket Portal Script Admin Password Change - Cross-Site Request Forgery. Author: KnocKout |
Analyze the security implications of: Event Ticket Portal Script Admin Password Change - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iOS Share 1.0 - Directory Traversal | This is a remote exploit for ios platform. Description: iOS Share 1.0 - Directory Traversal. Author: R3d@l3rt_ Sp@2K_ Sunlight |
Analyze the security implications of: iOS Share 1.0 - Directory Traversal | This exploit targets ios systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: PHP 5.3.3 - 'ibase_gen_id()' Off-by-One Overflow | This is a dos exploit for php platform. Description: PHP 5.3.3 - 'ibase_gen_id()' Off-by-One Overflow. Author: Canberk BOLAT |
Analyze the security implications of: PHP 5.3.3 - 'ibase_gen_id()' Off-by-One Overflow | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache mod_perl - 'Apache::Status' / 'Apache2::Status' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Apache mod_perl - 'Apache::Status' / 'Apache2::Status' Cross-Site Scripting. Author: Richard H. Brain |
Analyze the security implications of: Apache mod_perl - 'Apache::Status' / 'Apache2::Status' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Bitrix24 - Remote Code Execution (RCE) (Authenticated) | This is a webapps exploit for php platform. Description: Bitrix24 - Remote Code Execution (RCE) (Authenticated). Author: heinjame |
Analyze the security implications of: Bitrix24 - Remote Code Execution (RCE) (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Webkit (Chome < 61) - 'MHTML' Universal Cross-site Scripting | This is a local exploit for multiple platform. Description: Webkit (Chome < 61) - 'MHTML' Universal Cross-site Scripting. Author: Anton Lopanitsyn |
Analyze the security implications of: Webkit (Chome < 61) - 'MHTML' Universal Cross-site Scripting | This exploit targets multiple systems. Type: local. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.