input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Libsafe 2.0 - Multi-threaded Process Race Condition Security Bypass | This is a dos exploit for linux platform. Description: Libsafe 2.0 - Multi-threaded Process Race Condition Security Bypass. Author: Overflow.pl |
Analyze the security implications of: Libsafe 2.0 - Multi-threaded Process Race Condition Security Bypass | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_bookJoomlas 0.1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_bookJoomlas 0.1 - SQL Injection. Author: Salvatore Fresta |
Analyze the security implications of: Joomla! Component com_bookJoomlas 0.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NIBE heat pump - Remote Code Execution | This is a webapps exploit for cgi platform. Description: NIBE heat pump - Remote Code Execution. Author: Jelmer de Hen |
Analyze the security implications of: NIBE heat pump - Remote Code Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Dlili Script - SQL Injection | This is a webapps exploit for php platform. Description: Dlili Script - SQL Injection. Author: Dr.DaShEr |
Analyze the security implications of: Dlili Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: e107 Plugin EasyShop - 'category_id' Blind SQL Injection | This is a webapps exploit for php platform. Description: e107 Plugin EasyShop - 'category_id' Blind SQL Injection. Author: StAkeR |
Analyze the security implications of: e107 Plugin EasyShop - 'category_id' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Asbru Web Content Management System 9.2.7 - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: Asbru Web Content Management System 9.2.7 - Multiple Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: Asbru Web Content Management System 9.2.7 - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Cacti 0.8.x - 'graph.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Cacti 0.8.x - 'graph.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Moritz Naumann |
Analyze the security implications of: Cacti 0.8.x - 'graph.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CE Phoenix v1.0.8.20 - Remote Code Execution | This is a webapps exploit for php platform. Description: CE Phoenix v1.0.8.20 - Remote Code Execution. Author: tmrswrr |
Analyze the security implications of: CE Phoenix v1.0.8.20 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AssetMan 2.5-b - SQL Injection using Session Fixation | This is a webapps exploit for php platform. Description: AssetMan 2.5-b - SQL Injection using Session Fixation. Author: Neo Anderson |
Analyze the security implications of: AssetMan 2.5-b - SQL Injection using Session Fixation | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Eskolar CMS 0.9.0.0 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: Eskolar CMS 0.9.0.0 - 'index.php' SQL Injection. Author: HACKERS PAL |
Analyze the security implications of: Eskolar CMS 0.9.0.0 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IDevSpot iSupport 1.8 - 'index.php?cons_page_title' Cross-Site Scripting | This is a webapps exploit for php platform. Description: IDevSpot iSupport 1.8 - 'index.php?cons_page_title' Cross-Site Scripting. Author: s3rv3r_hack3r |
Analyze the security implications of: IDevSpot iSupport 1.8 - 'index.php?cons_page_title' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iScripts EasySnaps 2.0 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: iScripts EasySnaps 2.0 - Multiple SQL Injections. Author: Salvatore Fresta |
Analyze the security implications of: iScripts EasySnaps 2.0 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MakeBook 2.2 - Form Field Input Validation | This is a webapps exploit for cgi platform. Description: MakeBook 2.2 - Form Field Input Validation. Author: b0iler |
Analyze the security implications of: MakeBook 2.2 - Form Field Input Validation | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: ImageMagick 7.1.0-49 - DoS | This is a dos exploit for php platform. Description: ImageMagick 7.1.0-49 - DoS. Author: nu11secur1ty |
Analyze the security implications of: ImageMagick 7.1.0-49 - DoS | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco Video Surveillance Operations Manager 6.3.2 - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: Cisco Video Surveillance Operations Manager 6.3.2 - Multiple Vulnerabilities. Author: Bassem |
Analyze the security implications of: Cisco Video Surveillance Operations Manager 6.3.2 - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: City Reviewer - 'search.php' Script SQL Injection | This is a webapps exploit for php platform. Description: City Reviewer - 'search.php' Script SQL Injection. Author: 3spi0n |
Analyze the security implications of: City Reviewer - 'search.php' Script SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AVM FRITZ!Box < 6.30 - Remote Buffer Overflow | This is a remote exploit for hardware platform. Description: AVM FRITZ!Box < 6.30 - Remote Buffer Overflow. Author: RedTeam Pentesting |
Analyze the security implications of: AVM FRITZ!Box < 6.30 - Remote Buffer Overflow | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Mambo Component SimpleBoard 1.0.3 - 'catid' SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component SimpleBoard 1.0.3 - 'catid' SQL Injection. Author: it's my |
Analyze the security implications of: Mambo Component SimpleBoard 1.0.3 - 'catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Daily Tracker System 1.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: Daily Tracker System 1.0 - Authentication Bypass. Author: Adeeb Shah |
Analyze the security implications of: Daily Tracker System 1.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GL.iNet AR300M v3.216 Remote Code Execution - CVE-2023-46456 Exploit | This is a remote exploit for hardware platform. Description: GL.iNet AR300M v3.216 Remote Code Execution - CVE-2023-46456 Exploit. Author: cyberaz0r |
Analyze the security implications of: GL.iNet AR300M v3.216 Remote Code Execution - CVE-2023-46456 Exploit | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: LokiCMS 0.3.3 - Arbitrary File Delete | This is a webapps exploit for php platform. Description: LokiCMS 0.3.3 - Arbitrary File Delete. Author: cOndemned |
Analyze the security implications of: LokiCMS 0.3.3 - Arbitrary File Delete | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Memcached 1.4.33 - 'Add' (PoC) | This is a dos exploit for linux platform. Description: Memcached 1.4.33 - 'Add' (PoC). Author: p0wd3r / dawu |
Analyze the security implications of: Memcached 1.4.33 - 'Add' (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Wireshark - addresses_equal 'dissect_rsvp_common' Use-After-Free | This is a dos exploit for multiple platform. Description: Wireshark - addresses_equal 'dissect_rsvp_common' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Wireshark - addresses_equal 'dissect_rsvp_common' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation. Author: rebel |
Analyze the security implications of: Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Fly-High CMS 2012-07-08 - Unrestricted Arbitrary File Upload | This is a webapps exploit for php platform. Description: Fly-High CMS 2012-07-08 - Unrestricted Arbitrary File Upload. Author: CWH Underground |
Analyze the security implications of: Fly-High CMS 2012-07-08 - Unrestricted Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Caucho Resin - '/resin-admin/' URI Cross-Site Scripting | This is a webapps exploit for php platform. Description: Caucho Resin - '/resin-admin/' URI Cross-Site Scripting. Author: Gjoko Krstic |
Analyze the security implications of: Caucho Resin - '/resin-admin/' URI Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WordPress Core 4.0 - Denial of Service | This is a dos exploit for php platform. Description: WordPress Core 4.0 - Denial of Service. Author: SECURELI.com |
Analyze the security implications of: WordPress Core 4.0 - Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lowest Unique Bid Auction - SQL Injection | This is a webapps exploit for php platform. Description: Lowest Unique Bid Auction - SQL Injection. Author: 3spi0n |
Analyze the security implications of: Lowest Unique Bid Auction - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BandSite CMS 1.1 - 'sendemail.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: BandSite CMS 1.1 - 'sendemail.php' Cross-Site Scripting. Author: HACKERS PAL |
Analyze the security implications of: BandSite CMS 1.1 - 'sendemail.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AuraCMS 2.2.2 - '/pages_data.php' Arbitrary Edit/Add/Delete | This is a webapps exploit for php platform. Description: AuraCMS 2.2.2 - '/pages_data.php' Arbitrary Edit/Add/Delete. Author: k1tk4t |
Analyze the security implications of: AuraCMS 2.2.2 - '/pages_data.php' Arbitrary Edit/Add/Delete | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Complaint Management System 4.2 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Complaint Management System 4.2 - Persistent Cross-Site Scripting. Author: Besim |
Analyze the security implications of: Complaint Management System 4.2 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component ArtForms 2.1b7.2 rc2 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component ArtForms 2.1b7.2 rc2 - Multiple Vulnerabilities. Author: Salvatore Fresta |
Analyze the security implications of: Joomla! Component ArtForms 2.1b7.2 rc2 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CustomCMS 4.0 - 'print.php' SQL Injection | This is a webapps exploit for php platform. Description: CustomCMS 4.0 - 'print.php' SQL Injection. Author: ~!Dok_tOR!~ |
Analyze the security implications of: CustomCMS 4.0 - 'print.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kasra CMS - 'index.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: Kasra CMS - 'index.php' Multiple SQL Injections. Author: G4N0K |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.