input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: ExoPHPDesk 1.2.1 - 'faq.php' SQL Injection | This is a webapps exploit for php platform. Description: ExoPHPDesk 1.2.1 - 'faq.php' SQL Injection. Author: ajann |
Analyze the security implications of: ExoPHPDesk 1.2.1 - 'faq.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bankoi Webhost Panel 1.20 - Authentication Bypass | This is a webapps exploit for asp platform. Description: Bankoi Webhost Panel 1.20 - Authentication Bypass. Author: R3d-D3V!L |
Analyze the security implications of: Bankoi Webhost Panel 1.20 - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: HoMaP-CMS 0.1 - 'go' SQL Injection | This is a webapps exploit for php platform. Description: HoMaP-CMS 0.1 - 'go' SQL Injection. Author: SxCx |
Analyze the security implications of: HoMaP-CMS 0.1 - 'go' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LifeType 1.2.8 - 'admin.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: LifeType 1.2.8 - 'admin.php' Cross-Site Scripting. Author: Khashayar Fereidani |
Analyze the security implications of: LifeType 1.2.8 - 'admin.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel < 4.4.0-116 (Ubuntu 16.04.4) - Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel < 4.4.0-116 (Ubuntu 16.04.4) - Local Privilege Escalation. Author: Bruce Leidl |
Analyze the security implications of: Linux Kernel < 4.4.0-116 (Ubuntu 16.04.4) - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Frank McIngvale LuxMan 0.41 - Local Buffer Overflow | This is a local exploit for linux platform. Description: Frank McIngvale LuxMan 0.41 - Local Buffer Overflow. Author: Kevin Finisterre |
Analyze the security implications of: Frank McIngvale LuxMan 0.41 - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FTP Media Server 3.0 - Authentication Bypass / Denial of Service | This is a remote exploit for ios platform. Description: FTP Media Server 3.0 - Authentication Bypass / Denial of Service. Author: Wh1t3Rh1n0 (Michael Allen) |
Analyze the security implications of: FTP Media Server 3.0 - Authentication Bypass / Denial of Service | This exploit targets ios systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Dev Web Management System 1.5 - 'download_now.php?target' SQL Injection | This is a webapps exploit for php platform. Description: Dev Web Management System 1.5 - 'download_now.php?target' SQL Injection. Author: retrogod@aliceposta.it |
Analyze the security implications of: Dev Web Management System 1.5 - 'download_now.php?target' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 3.x/4.x - prima WLAN Driver Heap Overflow | This is a dos exploit for linux platform. Description: Linux Kernel 3.x/4.x - prima WLAN Driver Heap Overflow. Author: Shawn the R0ck |
Analyze the security implications of: Linux Kernel 3.x/4.x - prima WLAN Driver Heap Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: iTech Classifieds Script 7.41 - SQL Injection | This is a webapps exploit for php platform. Description: iTech Classifieds Script 7.41 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: iTech Classifieds Script 7.41 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle 9i/10g - 'extproc' Local/Remote Command Execution | This is a remote exploit for multiple platform. Description: Oracle 9i/10g - 'extproc' Local/Remote Command Execution. Author: Marco Ivaldi |
Analyze the security implications of: Oracle 9i/10g - 'extproc' Local/Remote Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ABC Advertise 1.0 - Admin Password Disclosure | This is a webapps exploit for php platform. Description: ABC Advertise 1.0 - Admin Password Disclosure. Author: SirGod |
Analyze the security implications of: ABC Advertise 1.0 - Admin Password Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Class Scheduling System 1.0 - Multiple Stored XSS | This is a webapps exploit for php platform. Description: Class Scheduling System 1.0 - Multiple Stored XSS. Author: Aakash Madaan |
Analyze the security implications of: Class Scheduling System 1.0 - Multiple Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco Aironet Wireless Access Points - Memory Exhaustion ARP (Denial of Service) | This is a dos exploit for hardware platform. Description: Cisco Aironet Wireless Access Points - Memory Exhaustion ARP (Denial of Service). Author: Pasv |
Analyze the security implications of: Cisco Aironet Wireless Access Points - Memory Exhaustion ARP (Denial of Service) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (2) | This is a dos exploit for multiple platform. Description: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (2). Author: COSIG |
Analyze the security implications of: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (2) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: cgit < 1.2.1 - 'cgit_clone_objects()' Directory Traversal | This is a webapps exploit for cgi platform. Description: cgit < 1.2.1 - 'cgit_clone_objects()' Directory Traversal. Author: Google Security Research |
Analyze the security implications of: cgit < 1.2.1 - 'cgit_clone_objects()' Directory Traversal | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: FusionPBX - Operator Panel exec.php Command Execution (Metasploit) | This is a remote exploit for multiple platform. Description: FusionPBX - Operator Panel exec.php Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: FusionPBX - Operator Panel exec.php Command Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux Kernel - 'ping' Local Denial of Service | This is a dos exploit for android platform. Description: Linux Kernel - 'ping' Local Denial of Service. Author: Daniel Jiang |
Analyze the security implications of: Linux Kernel - 'ping' Local Denial of Service | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: BBClone 0.31 - 'selectlang.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: BBClone 0.31 - 'selectlang.php' Remote File Inclusion. Author: 3l3ctric-Cracker |
Analyze the security implications of: BBClone 0.31 - 'selectlang.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Thinfinity VirtualUI 2.5.41.0 - IFRAME Injection | This is a webapps exploit for multiple platform. Description: Thinfinity VirtualUI 2.5.41.0 - IFRAME Injection. Author: Daniel Morales |
Analyze the security implications of: Thinfinity VirtualUI 2.5.41.0 - IFRAME Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache Spark - (Unauthenticated) Command Execution (Metasploit) | This is a remote exploit for java platform. Description: Apache Spark - (Unauthenticated) Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Apache Spark - (Unauthenticated) Command Execution (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: D-Link Devices - UPnP SOAP Command Execution (Metasploit) | This is a remote exploit for hardware platform. Description: D-Link Devices - UPnP SOAP Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: D-Link Devices - UPnP SOAP Command Execution (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: macOS XNU - Copy-on-Write Behavior Bypass via Mount of User-Owned Filesystem Image | This is a dos exploit for macos platform. Description: macOS XNU - Copy-on-Write Behavior Bypass via Mount of User-Owned Filesystem Image. Author: Google Security Research |
Analyze the security implications of: macOS XNU - Copy-on-Write Behavior Bypass via Mount of User-Owned Filesystem Image | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Interspire SHOPPING CART 5.5.4 - Ultimate Edition backup dump | This is a webapps exploit for php platform. Description: Interspire SHOPPING CART 5.5.4 - Ultimate Edition backup dump. Author: indoushka |
Analyze the security implications of: Interspire SHOPPING CART 5.5.4 - Ultimate Edition backup dump | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Drale DBTableViewer 100123 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Drale DBTableViewer 100123 - Blind SQL Injection. Author: HaHwul |
Analyze the security implications of: Drale DBTableViewer 100123 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Thomson SpeedTouch 500 Series - NewUser Function 31 Variable Persistent User Creation | This is a remote exploit for hardware platform. Description: Thomson SpeedTouch 500 Series - NewUser Function 31 Variable Persistent User Creation. Author: Preben Nylokken |
Analyze the security implications of: Thomson SpeedTouch 500 Series - NewUser Function 31 Variable Persistent User Creation | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ezscheduler - Remote Database Disclosure | This is a webapps exploit for asp platform. Description: ezscheduler - Remote Database Disclosure. Author: RENO |
Analyze the security implications of: ezscheduler - Remote Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: IBM AIX 5.2/5.3 - Capture Command Local Stack Buffer Overflow | This is a local exploit for aix platform. Description: IBM AIX 5.2/5.3 - Capture Command Local Stack Buffer Overflow. Author: qaaz |
Analyze the security implications of: IBM AIX 5.2/5.3 - Capture Command Local Stack Buffer Overflow | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: MySQL - Denial of Service (PoC) | This is a dos exploit for linux platform. Description: MySQL - Denial of Service (PoC). Author: kingcope |
Analyze the security implications of: MySQL - Denial of Service (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux Kernel 3.10.0 (CentOS 7) - Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 3.10.0 (CentOS 7) - Denial of Service. Author: FarazPajohan |
Analyze the security implications of: Linux Kernel 3.10.0 (CentOS 7) - Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: i-dreams GB 5.4 Final - 'admin.dat' File Disclosure | This is a webapps exploit for cgi platform. Description: i-dreams GB 5.4 Final - 'admin.dat' File Disclosure. Author: Pouya_Server |
Analyze the security implications of: i-dreams GB 5.4 Final - 'admin.dat' File Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Free Advertisment CMS - 'user_info.php' SQL Injection | This is a webapps exploit for php platform. Description: Free Advertisment CMS - 'user_info.php' SQL Injection. Author: XroGuE |
Analyze the security implications of: Free Advertisment CMS - 'user_info.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Websense 7.6 Triton - 'ws_irpt.exe' Remote Command Execution | This is a webapps exploit for cgi platform. Description: Websense 7.6 Triton - 'ws_irpt.exe' Remote Command Execution. Author: Ben Williams |
Analyze the security implications of: Websense 7.6 Triton - 'ws_irpt.exe' Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: VMware vSphere Data Protection 5.x/6.x - Java Deserialization | This is a remote exploit for multiple platform. Description: VMware vSphere Data Protection 5.x/6.x - Java Deserialization. Author: Kelly Correll |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.