input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: D-Link DIR-615 Rev D3 / DIR-300 Rev A - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Oddsock Song Requester 2.1 WinAmp Plugin - Denial of Service | This is a dos exploit for cgi platform. Description: Oddsock Song Requester 2.1 WinAmp Plugin - Denial of Service. Author: Lucas Lundgren |
Analyze the security implications of: Oddsock Song Requester 2.1 WinAmp Plugin - Denial of Service | This exploit targets cgi systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Allomani Movies Library 2.0 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: Allomani Movies Library 2.0 - Cross-Site Request Forgery (Add Admin). Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Allomani Movies Library 2.0 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Maian Uploader 4.0 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Maian Uploader 4.0 - Arbitrary File Upload. Author: indoushka |
Analyze the security implications of: Maian Uploader 4.0 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ABB Cylon Aspect 3.08.04 DeploySource - Remote Code Execution (RCE) | This is a remote exploit for multiple platform. Description: ABB Cylon Aspect 3.08.04 DeploySource - Remote Code Execution (RCE). Author: LiquidWorm |
Analyze the security implications of: ABB Cylon Aspect 3.08.04 DeploySource - Remote Code Execution (RCE) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mambo Component N-Myndir - SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component N-Myndir - SQL Injection. Author: CoBRa_21 |
Analyze the security implications of: Mambo Component N-Myndir - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Graugon Gallery 1.0 - Cross-Site Scripting / SQL Injection / Cookie Bypass | This is a webapps exploit for php platform. Description: Graugon Gallery 1.0 - Cross-Site Scripting / SQL Injection / Cookie Bypass. Author: x0r |
Analyze the security implications of: Graugon Gallery 1.0 - Cross-Site Scripting / SQL Injection / Cookie Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iMessage - NSArray Deserialization can Invoke Subclass that does not Retain References | This is a dos exploit for multiple platform. Description: iMessage - NSArray Deserialization can Invoke Subclass that does not Retain References. Author: Google Security Research |
Analyze the security implications of: iMessage - NSArray Deserialization can Invoke Subclass that does not Retain References | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: WzdFTPD 0.5.4 - Remote Command Execution | This is a remote exploit for linux platform. Description: WzdFTPD 0.5.4 - Remote Command Execution. Author: kingcope |
Analyze the security implications of: WzdFTPD 0.5.4 - Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Arcadem LE 2.04 - 'loadadminpage' Remote File Inclusion | This is a webapps exploit for php platform. Description: Arcadem LE 2.04 - 'loadadminpage' Remote File Inclusion. Author: KnocKout |
Analyze the security implications of: Arcadem LE 2.04 - 'loadadminpage' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jax PHP Scripts 1.0/1.34/2.14/3.31 - 'dwt_editor.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Jax PHP Scripts 1.0/1.34/2.14/3.31 - 'dwt_editor.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Lostmon |
Analyze the security implications of: Jax PHP Scripts 1.0/1.34/2.14/3.31 - 'dwt_editor.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ImageCMS 4.0.0b - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: ImageCMS 4.0.0b - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: ImageCMS 4.0.0b - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP - 'Safe_mode' Bypass via 'proc_open()' and custom Environment | This is a local exploit for linux platform. Description: PHP - 'Safe_mode' Bypass via 'proc_open()' and custom Environment. Author: gat3way |
Analyze the security implications of: PHP - 'Safe_mode' Bypass via 'proc_open()' and custom Environment | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: i-pos StoreFront 1.3 - 'index.asp' SQL Injection | This is a webapps exploit for asp platform. Description: i-pos StoreFront 1.3 - 'index.asp' SQL Injection. Author: KnocKout |
Analyze the security implications of: i-pos StoreFront 1.3 - 'index.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Flatnuke 2.5.8 - 'userlang' Local Inclusion / Delete All Users | This is a webapps exploit for php platform. Description: Flatnuke 2.5.8 - 'userlang' Local Inclusion / Delete All Users. Author: rgod |
Analyze the security implications of: Flatnuke 2.5.8 - 'userlang' Local Inclusion / Delete All Users | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GetSimple CMS Custom JS 0.1 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: GetSimple CMS Custom JS 0.1 - Cross-Site Request Forgery. Author: boku |
Analyze the security implications of: GetSimple CMS Custom JS 0.1 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Active Test 2.1 - Authentication Bypass | This is a webapps exploit for asp platform. Description: Active Test 2.1 - Authentication Bypass. Author: R3d-D3V!L |
Analyze the security implications of: Active Test 2.1 - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linux Kernel (Debian 9/10 / Ubuntu 14.04.5/16.04.2/17.04 / Fedora 23/24/25) - 'ldso_dynamic Stack Clash' Local Privilege Escalation | This is a local exploit for linux_x86 platform. Description: Linux Kernel (Debian 9/10 / Ubuntu 14.04.5/16.04.2/17.04 / Fedora 23/24/25) - 'ldso_dynamic Stack Clash' Local Privilege Escalation. Author: Qualys Corporation |
Analyze the security implications of: Linux Kernel (Debian 9/10 / Ubuntu 14.04.5/16.04.2/17.04 / Fedora 23/24/25) - 'ldso_dynamic Stack Clash' Local Privilege Escalation | This exploit targets linux_x86 systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux_x86 platform |
What is this exploit about: Inout QuerySpace 1.0 Script - Improper Access Restrictions | This is a webapps exploit for php platform. Description: Inout QuerySpace 1.0 Script - Improper Access Restrictions. Author: Ihsan Sencan |
Analyze the security implications of: Inout QuerySpace 1.0 Script - Improper Access Restrictions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Professional Download Assistant 0.1 - Database Disclosure | This is a webapps exploit for asp platform. Description: Professional Download Assistant 0.1 - Database Disclosure. Author: Ghost Hacker |
Analyze the security implications of: Professional Download Assistant 0.1 - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: PHP Point Of Sale - 'ofc_upload_image.php' Remote Code Execution | This is a remote exploit for php platform. Description: PHP Point Of Sale - 'ofc_upload_image.php' Remote Code Execution. Author: Gabby |
Analyze the security implications of: PHP Point Of Sale - 'ofc_upload_image.php' Remote Code Execution | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Chrome V8 - 'Runtime_RegExpReplace' Integer Overflow | This is a dos exploit for multiple platform. Description: Chrome V8 - 'Runtime_RegExpReplace' Integer Overflow. Author: Google Security Research |
Analyze the security implications of: Chrome V8 - 'Runtime_RegExpReplace' Integer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple Mac OSX - IOBluetoothHCIPacketLogUserClient Memory Corruption | This is a dos exploit for osx platform. Description: Apple Mac OSX - IOBluetoothHCIPacketLogUserClient Memory Corruption. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX - IOBluetoothHCIPacketLogUserClient Memory Corruption | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Hospital Management System 4.0 - 'multiple' SQL Injection | This is a webapps exploit for php platform. Description: Hospital Management System 4.0 - 'multiple' SQL Injection. Author: nu11secur1ty |
Analyze the security implications of: Hospital Management System 4.0 - 'multiple' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Spring Security OAuth - Open Redirector | This is a webapps exploit for java platform. Description: Spring Security OAuth - Open Redirector. Author: Riemann |
Analyze the security implications of: Spring Security OAuth - Open Redirector | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Goanywhere Encryption helper 7.1.1 - Remote Code Execution (RCE) | This is a webapps exploit for java platform. Description: Goanywhere Encryption helper 7.1.1 - Remote Code Execution (RCE). Author: Youssef Muhammad |
Analyze the security implications of: Goanywhere Encryption helper 7.1.1 - Remote Code Execution (RCE) | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: gpEasy 1.5RC3 - Remote File Inclusion | This is a webapps exploit for php platform. Description: gpEasy 1.5RC3 - Remote File Inclusion. Author: cr4wl3r |
Analyze the security implications of: gpEasy 1.5RC3 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Logitech Media Server 8.2.0 - 'Title' Cross-Site Scripting (XSS) | This is a webapps exploit for multiple platform. Description: Logitech Media Server 8.2.0 - 'Title' Cross-Site Scripting (XSS). Author: Mert Daş |
Analyze the security implications of: Logitech Media Server 8.2.0 - 'Title' Cross-Site Scripting (XSS) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Hycus CMS - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Hycus CMS - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: Hycus CMS - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Garage Management System 1.0 (categoriesName) - Stored XSS | This is a webapps exploit for multiple platform. Description: Garage Management System 1.0 (categoriesName) - Stored XSS. Author: ub3rsick |
Analyze the security implications of: Garage Management System 1.0 (categoriesName) - Stored XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Smiths Medical Medfusion 4000 - 'DHCP' Denial of Service | This is a dos exploit for hardware platform. Description: Smiths Medical Medfusion 4000 - 'DHCP' Denial of Service. Author: Scott Gayou |
Analyze the security implications of: Smiths Medical Medfusion 4000 - 'DHCP' Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: EasyGallery 5.0tr - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: EasyGallery 5.0tr - Multiple Vulnerabilities. Author: JosS |
Analyze the security implications of: EasyGallery 5.0tr - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component simpledownload 0.9.5 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component simpledownload 0.9.5 - Local File Inclusion. Author: Xr0b0t |
Analyze the security implications of: Joomla! Component simpledownload 0.9.5 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: e107 Plugin alternate_profiles - 'id' SQL Injection | This is a webapps exploit for php platform. Description: e107 Plugin alternate_profiles - 'id' SQL Injection. Author: boom3rang |
Analyze the security implications of: e107 Plugin alternate_profiles - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.