input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Linux Kernel < 2.6.7-rc3 (Slackware 9.1 / Debian 3.0) - 'sys_chown()' Group Ownership Alteration Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive | This is a dos exploit for multiple platform. Description: WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive. Author: Google Security Research |
Analyze the security implications of: WebKit - Universal XSS in JSObject::putInlineSlow and JSValue::putToPrimitive | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Banner Management Script - SQL Injection | This is a webapps exploit for php platform. Description: Banner Management Script - SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: Banner Management Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Inventory Webapp - 'itemquery' SQL injection | This is a webapps exploit for php platform. Description: Inventory Webapp - 'itemquery' SQL injection. Author: mohammad zaheri |
Analyze the security implications of: Inventory Webapp - 'itemquery' SQL injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Eclipse 3.6.1 - Help Server 'help/index.jsp' Cross-Site Scripting | This is a remote exploit for linux platform. Description: Eclipse 3.6.1 - Help Server 'help/index.jsp' Cross-Site Scripting. Author: Aung Khant |
Analyze the security implications of: Eclipse 3.6.1 - Help Server 'help/index.jsp' Cross-Site Scripting | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FreeLyrics 1.0 - Remote File Disclosure | This is a webapps exploit for php platform. Description: FreeLyrics 1.0 - Remote File Disclosure. Author: Piker |
Analyze the security implications of: FreeLyrics 1.0 - Remote File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Attendance and Payroll System v1.0 - SQLi Authentication Bypass | This is a webapps exploit for php platform. Description: Attendance and Payroll System v1.0 - SQLi Authentication Bypass. Author: pr0z |
Analyze the security implications of: Attendance and Payroll System v1.0 - SQLi Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iTechClassifieds 3.03.057 - SQL Injection | This is a webapps exploit for php platform. Description: iTechClassifieds 3.03.057 - SQL Injection. Author: vinicius777 |
Analyze the security implications of: iTechClassifieds 3.03.057 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Brasero CD/DVD Burner 3.4.1 - '.m3u' Buffer Overflow Crash (PoC) | This is a dos exploit for linux platform. Description: Brasero CD/DVD Burner 3.4.1 - '.m3u' Buffer Overflow Crash (PoC). Author: Avinash Thapa |
Analyze the security implications of: Brasero CD/DVD Burner 3.4.1 - '.m3u' Buffer Overflow Crash (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache Solr - Remote Code Execution via Velocity Template (Metasploit) | This is a remote exploit for multiple platform. Description: Apache Solr - Remote Code Execution via Velocity Template (Metasploit). Author: Metasploit |
Analyze the security implications of: Apache Solr - Remote Code Execution via Velocity Template (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: dotProject 2.0 - '/modules/projects/gantt2.php?dPconfig[root_dir]' Remote File Inclusion | This is a webapps exploit for php platform. Description: dotProject 2.0 - '/modules/projects/gantt2.php?dPconfig[root_dir]' Remote File Inclusion. Author: r.verton |
Analyze the security implications of: dotProject 2.0 - '/modules/projects/gantt2.php?dPconfig[root_dir]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.0 < 2.6.31 - 'pipe.c' Local Privilege Escalation (1) | This is a local exploit for linux platform. Description: Linux Kernel 2.6.0 < 2.6.31 - 'pipe.c' Local Privilege Escalation (1). Author: teach & xipe |
Analyze the security implications of: Linux Kernel 2.6.0 < 2.6.31 - 'pipe.c' Local Privilege Escalation (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Microsoft SharePoint 2013 SP1 - 'DestinationFolder' Persistant Cross-Site Scripting | This is a webapps exploit for aspx platform. Description: Microsoft SharePoint 2013 SP1 - 'DestinationFolder' Persistant Cross-Site Scripting. Author: Davide Cioccia |
Analyze the security implications of: Microsoft SharePoint 2013 SP1 - 'DestinationFolder' Persistant Cross-Site Scripting | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Campsite 2.6.1 - 'template.php?g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'template.php?g_documentRoot' Remote File Inclusion. Author: anonymous |
Analyze the security implications of: Campsite 2.6.1 - 'template.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: anaconda clipper 3.3 - Directory Traversal | This is a remote exploit for cgi platform. Description: anaconda clipper 3.3 - Directory Traversal. Author: UkR hacking team |
Analyze the security implications of: anaconda clipper 3.3 - Directory Traversal | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Craft CMS 4.4.14 - Unauthenticated Remote Code Execution | This is a webapps exploit for php platform. Description: Craft CMS 4.4.14 - Unauthenticated Remote Code Execution. Author: Olivier Lasne |
Analyze the security implications of: Craft CMS 4.4.14 - Unauthenticated Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple macOS 10.12.1 Kernel - Writable Privileged IOKit Registry Properties Code Execution | This is a dos exploit for macos platform. Description: Apple macOS 10.12.1 Kernel - Writable Privileged IOKit Registry Properties Code Execution. Author: Google Security Research |
Analyze the security implications of: Apple macOS 10.12.1 Kernel - Writable Privileged IOKit Registry Properties Code Execution | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Libuser - 'roothelper' Local Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: Libuser - 'roothelper' Local Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Libuser - 'roothelper' Local Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Anchor CMS 0.9.1 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Anchor CMS 0.9.1 - Persistent Cross-Site Scripting. Author: DURAKIBOX |
Analyze the security implications of: Anchor CMS 0.9.1 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cmsWorks 2.2 RC4 - 'FCKeditor' Arbitrary File Upload | This is a webapps exploit for php platform. Description: cmsWorks 2.2 RC4 - 'FCKeditor' Arbitrary File Upload. Author: Stack |
Analyze the security implications of: cmsWorks 2.2 RC4 - 'FCKeditor' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Debian 2.2 / Su.S.E 6.3/6.4/7.0 - man '-l' Format String | This is a local exploit for linux platform. Description: Debian 2.2 / Su.S.E 6.3/6.4/7.0 - man '-l' Format String. Author: IhaQueR |
Analyze the security implications of: Debian 2.2 / Su.S.E 6.3/6.4/7.0 - man '-l' Format String | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Indexu 5.0/5.3 - 'user_detail.php?u' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Indexu 5.0/5.3 - 'user_detail.php?u' Cross-Site Scripting. Author: SwEET-DeViL |
Analyze the security implications of: Indexu 5.0/5.3 - 'user_detail.php?u' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: InstantCMS 1.10.3 - Blind SQL Injection | This is a webapps exploit for php platform. Description: InstantCMS 1.10.3 - Blind SQL Injection. Author: High-Tech Bridge SA |
Analyze the security implications of: InstantCMS 1.10.3 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Gallery 2.0.7 - SQL Injection | This is a webapps exploit for php platform. Description: Invision Gallery 2.0.7 - SQL Injection. Author: RST/GHC |
Analyze the security implications of: Invision Gallery 2.0.7 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alkacon OpenCMS 7.0.3 - 'logfileViewSettings.jsp?filePath.0' Arbitrary File Access | This is a webapps exploit for php platform. Description: Alkacon OpenCMS 7.0.3 - 'logfileViewSettings.jsp?filePath.0' Arbitrary File Access. Author: nnposter |
Analyze the security implications of: Alkacon OpenCMS 7.0.3 - 'logfileViewSettings.jsp?filePath.0' Arbitrary File Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Samba 3.4.5 - Symlink Directory Traversal | This is a remote exploit for linux platform. Description: Samba 3.4.5 - Symlink Directory Traversal. Author: kingcope |
Analyze the security implications of: Samba 3.4.5 - Symlink Directory Traversal | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component JP Jobs 1.4.1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JP Jobs 1.4.1 - SQL Injection. Author: Valentin |
Analyze the security implications of: Joomla! Component JP Jobs 1.4.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: APBoard 2.1.0 - 'board.php?id' SQL Injection | This is a webapps exploit for php platform. Description: APBoard 2.1.0 - 'board.php?id' SQL Injection. Author: secret |
Analyze the security implications of: APBoard 2.1.0 - 'board.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple WebKit / Safari 10.0.3(12602.4.8) - 'WebCore::FrameView::scheduleRelayout' Use-After-Free | This is a dos exploit for multiple platform. Description: Apple WebKit / Safari 10.0.3(12602.4.8) - 'WebCore::FrameView::scheduleRelayout' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Apple WebKit / Safari 10.0.3(12602.4.8) - 'WebCore::FrameView::scheduleRelayout' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: flatnux 2021-03.25 - Remote Code Execution (Authenticated) | This is a webapps exploit for php platform. Description: flatnux 2021-03.25 - Remote Code Execution (Authenticated). Author: Ömer Hasan Durmuş |
Analyze the security implications of: flatnux 2021-03.25 - Remote Code Execution (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jira 4.0.1 - Cross-Site Scripting / Information Disclosure | This is a webapps exploit for jsp platform. Description: Jira 4.0.1 - Cross-Site Scripting / Information Disclosure. Author: MaXe |
Analyze the security implications of: Jira 4.0.1 - Cross-Site Scripting / Information Disclosure | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Joomla! Component Guru Pro - 'Itemid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Guru Pro - 'Itemid' SQL Injection. Author: s0nk3y |
Analyze the security implications of: Joomla! Component Guru Pro - 'Itemid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EasyImageCatalogue 1.31 - 'addcomment.php?d' Cross-Site Scripting | This is a webapps exploit for php platform. Description: EasyImageCatalogue 1.31 - 'addcomment.php?d' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: EasyImageCatalogue 1.31 - 'addcomment.php?d' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ISC DHCPD - Denial of Service | This is a dos exploit for multiple platform. Description: ISC DHCPD - Denial of Service. Author: sid |
Analyze the security implications of: ISC DHCPD - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.