input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Global Centre Aplomb Poll 1.1 - 'vote.php?Madoa' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ChemInv 1.0 - Authenticated Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: ChemInv 1.0 - Authenticated Persistent Cross-Site Scripting. Author: boku |
Analyze the security implications of: ChemInv 1.0 - Authenticated Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Yelp - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Yelp - SQL Injection. Author: B-HUNT3|2 |
Analyze the security implications of: Joomla! Component Yelp - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Exim 4.41 - 'dns_build_reverse' Local Buffer Overflow | This is a local exploit for linux platform. Description: Exim 4.41 - 'dns_build_reverse' Local Buffer Overflow. Author: Rafael Carrasco |
Analyze the security implications of: Exim 4.41 - 'dns_build_reverse' Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component Tech Article 1.x - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Tech Article 1.x - SQL Injection. Author: InjEctOr5 |
Analyze the security implications of: Joomla! Component Tech Article 1.x - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple macOS 10.12.1 / iOS Kernel - 'IOService::matchPassive' Use-After-Free | This is a dos exploit for multiple platform. Description: Apple macOS 10.12.1 / iOS Kernel - 'IOService::matchPassive' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Apple macOS 10.12.1 / iOS Kernel - 'IOService::matchPassive' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Systrace 1.x (Linux Kernel x64) - Aware Local Privilege Escalation | This is a local exploit for linux_x86-64 platform. Description: Systrace 1.x (Linux Kernel x64) - Aware Local Privilege Escalation. Author: Chris Evans |
Analyze the security implications of: Systrace 1.x (Linux Kernel x64) - Aware Local Privilege Escalation | This exploit targets linux_x86-64 systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux_x86-64 platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - 'index.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - 'index.php?base_path' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - 'index.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component D4JeZine 2.8 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component D4JeZine 2.8 - Blind SQL Injection. Author: ajann |
Analyze the security implications of: Joomla! Component D4JeZine 2.8 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kagao 3.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Kagao 3.0 - Multiple Vulnerabilities. Author: N4TuraL |
Analyze the security implications of: Kagao 3.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Selea Targa IP OCR-ANPR Camera - Developer Backdoor Config Overwrite | This is a webapps exploit for hardware platform. Description: Selea Targa IP OCR-ANPR Camera - Developer Backdoor Config Overwrite. Author: LiquidWorm |
Analyze the security implications of: Selea Targa IP OCR-ANPR Camera - Developer Backdoor Config Overwrite | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Cisco DPC2100 2.0.2 r1256-060303 - Multiple Security Bypass / Cross-Site Request Forgery Vulnerabilities | This is a remote exploit for hardware platform. Description: Cisco DPC2100 2.0.2 r1256-060303 - Multiple Security Bypass / Cross-Site Request Forgery Vulnerabilities. Author: Dan Rosenberg |
Analyze the security implications of: Cisco DPC2100 2.0.2 r1256-060303 - Multiple Security Bypass / Cross-Site Request Forgery Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CumulusClips 2.4.1 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: CumulusClips 2.4.1 - Multiple Vulnerabilities. Author: kor3k |
Analyze the security implications of: CumulusClips 2.4.1 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EVA-Web 1.1 < 2.2 - 'index.php3' Remote File Inclusion | This is a webapps exploit for php platform. Description: EVA-Web 1.1 < 2.2 - 'index.php3' Remote File Inclusion. Author: g00ns |
Analyze the security implications of: EVA-Web 1.1 < 2.2 - 'index.php3' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: i-doit CMDB 1.11.2 - Remote Code Execution | This is a webapps exploit for php platform. Description: i-doit CMDB 1.11.2 - Remote Code Execution. Author: AkkuS |
Analyze the security implications of: i-doit CMDB 1.11.2 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: artmedic webdesign weblog - Multiple Local File Inclusions | This is a webapps exploit for php platform. Description: artmedic webdesign weblog - Multiple Local File Inclusions. Author: muuratsalo |
Analyze the security implications of: artmedic webdesign weblog - Multiple Local File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Comersus Cart 7.0.7 - 'comersus_message.asp' redirectUrl Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Comersus Cart 7.0.7 - 'comersus_message.asp' redirectUrl Cross-Site Scripting. Author: Doz |
Analyze the security implications of: Comersus Cart 7.0.7 - 'comersus_message.asp' redirectUrl Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: NXP Semiconductors MIFARE Classic Smartcard - Multiple Vulnerabilities | This is a local exploit for multiple platform. Description: NXP Semiconductors MIFARE Classic Smartcard - Multiple Vulnerabilities. Author: Flavio D. Garcia |
Analyze the security implications of: NXP Semiconductors MIFARE Classic Smartcard - Multiple Vulnerabilities | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Clinic Management System 1.0 - Authenticated Arbitrary File Upload | This is a webapps exploit for php platform. Description: Clinic Management System 1.0 - Authenticated Arbitrary File Upload. Author: BKpatron |
Analyze the security implications of: Clinic Management System 1.0 - Authenticated Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cURL/libcURL 7.19.3 - HTTP 'Location:' Redirect Security Bypass | This is a remote exploit for linux platform. Description: cURL/libcURL 7.19.3 - HTTP 'Location:' Redirect Security Bypass. Author: David Kierznowski |
Analyze the security implications of: cURL/libcURL 7.19.3 - HTTP 'Location:' Redirect Security Bypass | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SkyPortal Classifieds System 0.12 - Contents Change | This is a webapps exploit for asp platform. Description: SkyPortal Classifieds System 0.12 - Contents Change. Author: ByALBAYX |
Analyze the security implications of: SkyPortal Classifieds System 0.12 - Contents Change | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Questions 1.4.3 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Questions 1.4.3 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Questions 1.4.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ImpressPages CMS 3.6 - Arbitrary File Deletion | This is a webapps exploit for php platform. Description: ImpressPages CMS 3.6 - Arbitrary File Deletion. Author: LiquidWorm |
Analyze the security implications of: ImpressPages CMS 3.6 - Arbitrary File Deletion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DIR-Series Routers - '/model/__show_info.php' Local File Disclosure | This is a webapps exploit for hardware platform. Description: D-Link DIR-Series Routers - '/model/__show_info.php' Local File Disclosure. Author: tytusromekiatomek |
Analyze the security implications of: D-Link DIR-Series Routers - '/model/__show_info.php' Local File Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: @lex Guestbook 4.0.5 - 'setup.php?language_setup' Cross-Site Scripting | This is a webapps exploit for php platform. Description: @lex Guestbook 4.0.5 - 'setup.php?language_setup' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: @lex Guestbook 4.0.5 - 'setup.php?language_setup' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bitweaver 1.x - '/fisheye/list_galleries.php?sort_mode' SQL Injection | This is a webapps exploit for php platform. Description: Bitweaver 1.x - '/fisheye/list_galleries.php?sort_mode' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: Bitweaver 1.x - '/fisheye/list_galleries.php?sort_mode' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco IOS - IPv4 Packets Denial of Service | This is a dos exploit for hardware platform. Description: Cisco IOS - IPv4 Packets Denial of Service. Author: l0cK |
Analyze the security implications of: Cisco IOS - IPv4 Packets Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Oracle MySQL 5.1.48 - 'HANDLER' Interface Denial of Service | This is a dos exploit for linux platform. Description: Oracle MySQL 5.1.48 - 'HANDLER' Interface Denial of Service. Author: Matthias Leich |
Analyze the security implications of: Oracle MySQL 5.1.48 - 'HANDLER' Interface Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Beck IPC GmbH IPC@CHIP - TelnetD Login Account Brute Force | This is a remote exploit for multiple platform. Description: Beck IPC GmbH IPC@CHIP - TelnetD Login Account Brute Force. Author: Courtesy Sentry Research Labs |
Analyze the security implications of: Beck IPC GmbH IPC@CHIP - TelnetD Login Account Brute Force | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CarLine Forum Russian Board 4.2 - 'reply_in.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: CarLine Forum Russian Board 4.2 - 'reply_in.php' Multiple SQL Injections. Author: 1dt.w0lf |
Analyze the security implications of: CarLine Forum Russian Board 4.2 - 'reply_in.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Web-Calendar Lite 1.0 - Authentication Bypass | This is a webapps exploit for asp platform. Description: Web-Calendar Lite 1.0 - Authentication Bypass. Author: ByALBAYX |
Analyze the security implications of: Web-Calendar Lite 1.0 - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: HomeMatic Zentrale CCU2 - Remote Code Execution | This is a remote exploit for hardware platform. Description: HomeMatic Zentrale CCU2 - Remote Code Execution. Author: Kacper Szurek |
Analyze the security implications of: HomeMatic Zentrale CCU2 - Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Dolibarr ERP 14.0.1 - Privilege Escalation | This is a webapps exploit for php platform. Description: Dolibarr ERP 14.0.1 - Privilege Escalation. Author: Vishwaraj Bhattrai |
Analyze the security implications of: Dolibarr ERP 14.0.1 - Privilege Escalation | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DCForum+ 1.2 - 'Subject' HTML Injection | This is a webapps exploit for php platform. Description: DCForum+ 1.2 - 'Subject' HTML Injection. Author: G00db0y |
Analyze the security implications of: DCForum+ 1.2 - 'Subject' HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.