input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Kamailio 4.3.4 - Heap Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_iJoomla_rss - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_iJoomla_rss - Blind SQL Injection. Author: Mehmet Ince |
Analyze the security implications of: Joomla! Component com_iJoomla_rss - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SGI IRIX 6.4 - 'startmidi' Local Privilege Escalation | This is a local exploit for irix platform. Description: SGI IRIX 6.4 - 'startmidi' Local Privilege Escalation. Author: David Hedley |
Analyze the security implications of: SGI IRIX 6.4 - 'startmidi' Local Privilege Escalation | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: Coppermine Photo Gallery 1.4.22 - SQL Injection | This is a webapps exploit for php platform. Description: Coppermine Photo Gallery 1.4.22 - SQL Injection. Author: girex |
Analyze the security implications of: Coppermine Photo Gallery 1.4.22 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FS Ebay Clone 1.0 - 'id' / 'sub_category_id' / 'category_id' SQL Injection | This is a webapps exploit for php platform. Description: FS Ebay Clone 1.0 - 'id' / 'sub_category_id' / 'category_id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: FS Ebay Clone 1.0 - 'id' / 'sub_category_id' / 'category_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FS Care Clone 1.0 - 'jobFrequency' / 'jobType' SQL Injection | This is a webapps exploit for php platform. Description: FS Care Clone 1.0 - 'jobFrequency' / 'jobType' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: FS Care Clone 1.0 - 'jobFrequency' / 'jobType' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.2.x - Non-Readable File Ptrace Local Information Leak | This is a local exploit for linux platform. Description: Linux Kernel 2.2.x - Non-Readable File Ptrace Local Information Leak. Author: Lamagra Argamal |
Analyze the security implications of: Linux Kernel 2.2.x - Non-Readable File Ptrace Local Information Leak | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ContentKeeper Web - Remote Command Execution (Metasploit) | This is a webapps exploit for hardware platform. Description: ContentKeeper Web - Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: ContentKeeper Web - Remote Command Execution (Metasploit) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ZTE ZXV10 W300 Router - Hard-Coded Credentials | This is a webapps exploit for hardware platform. Description: ZTE ZXV10 W300 Router - Hard-Coded Credentials. Author: Cesar Neira |
Analyze the security implications of: ZTE ZXV10 W300 Router - Hard-Coded Credentials | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component com_jfuploader < 2.12 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component com_jfuploader < 2.12 - Arbitrary File Upload. Author: Setr0nix |
Analyze the security implications of: Joomla! Component com_jfuploader < 2.12 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ReQlogic v11.3 - Reflected Cross-Site Scripting (XSS) | This is a webapps exploit for aspx platform. Description: ReQlogic v11.3 - Reflected Cross-Site Scripting (XSS). Author: Okan Kurtulus |
Analyze the security implications of: ReQlogic v11.3 - Reflected Cross-Site Scripting (XSS) | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Inout StickBoard 1.0 Script - Improper Access Restrictions | This is a webapps exploit for php platform. Description: Inout StickBoard 1.0 Script - Improper Access Restrictions. Author: Ihsan Sencan |
Analyze the security implications of: Inout StickBoard 1.0 Script - Improper Access Restrictions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Banana Dance - Cross-Site Scripting / SQL Injection | This is a webapps exploit for php platform. Description: Banana Dance - Cross-Site Scripting / SQL Injection. Author: Canberk BOLAT |
Analyze the security implications of: Banana Dance - Cross-Site Scripting / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache OFBiz - Remote Execution (via SQL Execution) | This is a remote exploit for multiple platform. Description: Apache OFBiz - Remote Execution (via SQL Execution). Author: Lucas Apa |
Analyze the security implications of: Apache OFBiz - Remote Execution (via SQL Execution) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Dingtian-DT-R002 3.1.276A - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Dingtian-DT-R002 3.1.276A - Authentication Bypass. Author: Victor Hanna |
Analyze the security implications of: Dingtian-DT-R002 3.1.276A - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apple macOS 10.12.3 / iOS < 10.3.2 - Userspace Entitlement Checking Race Condition | This is a local exploit for multiple platform. Description: Apple macOS 10.12.3 / iOS < 10.3.2 - Userspace Entitlement Checking Race Condition. Author: Google Security Research |
Analyze the security implications of: Apple macOS 10.12.3 / iOS < 10.3.2 - Userspace Entitlement Checking Race Condition | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AROUNDMe 1.1 - 'language_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: AROUNDMe 1.1 - 'language_path' Remote File Inclusion. Author: cr4wl3r |
Analyze the security implications of: AROUNDMe 1.1 - 'language_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CBHotel Hotel Software and Booking system 1.8 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: CBHotel Hotel Software and Booking system 1.8 - Multiple Vulnerabilities. Author: Dylan Irzi |
Analyze the security implications of: CBHotel Hotel Software and Booking system 1.8 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple WebKit - 'table' Use-After-Free | This is a dos exploit for multiple platform. Description: Apple WebKit - 'table' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Apple WebKit - 'table' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: 0verkill 0.16 - Game Client Multiple Local Buffer Overflow Vulnerabilities | This is a local exploit for linux platform. Description: 0verkill 0.16 - Game Client Multiple Local Buffer Overflow Vulnerabilities. Author: pi3ki31ny |
Analyze the security implications of: 0verkill 0.16 - Game Client Multiple Local Buffer Overflow Vulnerabilities | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: D-Link WBR-2310 1.0.4 - 'GET' Remote Buffer Overflow (PoC) | This is a dos exploit for hardware platform. Description: D-Link WBR-2310 1.0.4 - 'GET' Remote Buffer Overflow (PoC). Author: Rodrigo Escobar |
Analyze the security implications of: D-Link WBR-2310 1.0.4 - 'GET' Remote Buffer Overflow (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component EasyBlog - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component EasyBlog - Persistent Cross-Site Scripting. Author: Sid3^effects |
Analyze the security implications of: Joomla! Component EasyBlog - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Halloween Linux 4.0 / SuSE Linux 6.0/6.1/6.2/6.3 - 'kreatecd' Local Privilege Escalation | This is a local exploit for linux platform. Description: Halloween Linux 4.0 / SuSE Linux 6.0/6.1/6.2/6.3 - 'kreatecd' Local Privilege Escalation. Author: Sebastian |
Analyze the security implications of: Halloween Linux 4.0 / SuSE Linux 6.0/6.1/6.2/6.3 - 'kreatecd' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Adobe SVG Viewer 3.0 - 'postURL'/'getURL' Restriction Bypass | This is a remote exploit for multiple platform. Description: Adobe SVG Viewer 3.0 - 'postURL'/'getURL' Restriction Bypass. Author: GreyMagic Software |
Analyze the security implications of: Adobe SVG Viewer 3.0 - 'postURL'/'getURL' Restriction Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: University of Washington pop2d 4.4 - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: University of Washington pop2d 4.4 - Remote Buffer Overflow. Author: Chris Evans |
Analyze the security implications of: University of Washington pop2d 4.4 - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: HostDirectory Pro - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: HostDirectory Pro - Insecure Cookie Handling. Author: Crackers_Child |
Analyze the security implications of: HostDirectory Pro - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dream4 Koobi Pro 6.25 Shop - 'categ' SQL Injection | This is a webapps exploit for php platform. Description: Dream4 Koobi Pro 6.25 Shop - 'categ' SQL Injection. Author: S@BUN |
Analyze the security implications of: Dream4 Koobi Pro 6.25 Shop - 'categ' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Xen 3.3 - XenStore Domain Configuration Data Unsafe Storage | This is a local exploit for linux platform. Description: Xen 3.3 - XenStore Domain Configuration Data Unsafe Storage. Author: Pascal Bouchareine |
Analyze the security implications of: Xen 3.3 - XenStore Domain Configuration Data Unsafe Storage | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: MyServer 0.4.3 - Denial of Service | This is a dos exploit for multiple platform. Description: MyServer 0.4.3 - Denial of Service. Author: badpack3t |
Analyze the security implications of: MyServer 0.4.3 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: openMAINT 1.1-2.4.2 - Arbitrary File Upload | This is a webapps exploit for json platform. Description: openMAINT 1.1-2.4.2 - Arbitrary File Upload. Author: mrb3n |
Analyze the security implications of: openMAINT 1.1-2.4.2 - Arbitrary File Upload | This exploit targets json systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets json platform |
What is this exploit about: DmxReady Faqs Manager 1.2 - SQL Injection | This is a webapps exploit for asp platform. Description: DmxReady Faqs Manager 1.2 - SQL Injection. Author: Bellatrix |
Analyze the security implications of: DmxReady Faqs Manager 1.2 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: DodosMail 2.5 - 'dodosmail.php' Local File Inclusion | This is a webapps exploit for php platform. Description: DodosMail 2.5 - 'dodosmail.php' Local File Inclusion. Author: ahmadbady |
Analyze the security implications of: DodosMail 2.5 - 'dodosmail.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Asterisk 1.2.x - SIP channel driver / in pedantic mode Remote Crash | This is a dos exploit for multiple platform. Description: Asterisk 1.2.x - SIP channel driver / in pedantic mode Remote Crash. Author: Armando Oliveira |
Analyze the security implications of: Asterisk 1.2.x - SIP channel driver / in pedantic mode Remote Crash | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! / Mambo Component com_detail - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_detail - 'id' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! / Mambo Component com_detail - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.