input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: KCFinder 2.51 - Local File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FileZilla 3.33 - Buffer Overflow (PoC)
|
This is a dos exploit for linux platform. Description: FileZilla 3.33 - Buffer Overflow (PoC). Author: Kağan Çapar
|
Analyze the security implications of: FileZilla 3.33 - Buffer Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Novel Boutique House-plus 3.5.1 - Arbitrary File Download
|
This is a webapps exploit for java platform. Description: Novel Boutique House-plus 3.5.1 - Arbitrary File Download. Author: tuyiqiang
|
Analyze the security implications of: Novel Boutique House-plus 3.5.1 - Arbitrary File Download
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Netgear FM114P ProSafe Wireless Router - UPnP Information Disclosure
|
This is a remote exploit for hardware platform. Description: Netgear FM114P ProSafe Wireless Router - UPnP Information Disclosure. Author: stickler
|
Analyze the security implications of: Netgear FM114P ProSafe Wireless Router - UPnP Information Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: OctoBot WebInterface 0.4.3 - Remote Code Execution (RCE)
|
This is a webapps exploit for multiple platform. Description: OctoBot WebInterface 0.4.3 - Remote Code Execution (RCE). Author: Samy Younsi
|
Analyze the security implications of: OctoBot WebInterface 0.4.3 - Remote Code Execution (RCE)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Interlogy Profile Manager Basic - Insecure Cookie Handling
|
This is a webapps exploit for cgi platform. Description: Interlogy Profile Manager Basic - Insecure Cookie Handling. Author: ZoRLu
|
Analyze the security implications of: Interlogy Profile Manager Basic - Insecure Cookie Handling
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: VOX Music Player 2.8.8 - '.pls' Denial of Service
|
This is a dos exploit for osx platform. Description: VOX Music Player 2.8.8 - '.pls' Denial of Service. Author: Antonio Z.
|
Analyze the security implications of: VOX Music Player 2.8.8 - '.pls' Denial of Service
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: GetSolutions GetInternet - Multiple SQL Injections
|
This is a webapps exploit for asp platform. Description: GetSolutions GetInternet - Multiple SQL Injections. Author: Criolabs
|
Analyze the security implications of: GetSolutions GetInternet - Multiple SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Honeywell IP-Camera HICC-1100PT - Credentials Disclosure
|
This is a webapps exploit for cgi platform. Description: Honeywell IP-Camera HICC-1100PT - Credentials Disclosure. Author: Yakir Wizman
|
Analyze the security implications of: Honeywell IP-Camera HICC-1100PT - Credentials Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: PHP 4.4.7/5.2.3 - MySQL/MySQLi 'Safe_Mode' Bypass
|
This is a local exploit for multiple platform. Description: PHP 4.4.7/5.2.3 - MySQL/MySQLi 'Safe_Mode' Bypass. Author: Mattias Bengtsson
|
Analyze the security implications of: PHP 4.4.7/5.2.3 - MySQL/MySQLi 'Safe_Mode' Bypass
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: dump 0.4b15 (RedHat 6.2) - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: dump 0.4b15 (RedHat 6.2) - Local Privilege Escalation. Author: mat
|
Analyze the security implications of: dump 0.4b15 (RedHat 6.2) - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: CarLine Forum Russian Board 4.2 - 'menu_header.php?table_sql' SQL Injection
|
This is a webapps exploit for php platform. Description: CarLine Forum Russian Board 4.2 - 'menu_header.php?table_sql' SQL Injection. Author: 1dt.w0lf
|
Analyze the security implications of: CarLine Forum Russian Board 4.2 - 'menu_header.php?table_sql' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple QuickTime 7.4.1 - Null Pointer Dereference Denial of Service
|
This is a dos exploit for multiple platform. Description: Apple QuickTime 7.4.1 - Null Pointer Dereference Denial of Service. Author: Thierry Zoller
|
Analyze the security implications of: Apple QuickTime 7.4.1 - Null Pointer Dereference Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Linux Kernel 2.4.x/2.6.x - 'Bluez' BlueTooth Signed Buffer Index Privilege Escalation (2)
|
This is a local exploit for linux platform. Description: Linux Kernel 2.4.x/2.6.x - 'Bluez' BlueTooth Signed Buffer Index Privilege Escalation (2). Author: qobaiashi
|
Analyze the security implications of: Linux Kernel 2.4.x/2.6.x - 'Bluez' BlueTooth Signed Buffer Index Privilege Escalation (2)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apache CouchDB 2.3.1 - Cross-Site Request Forgery / Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: Apache CouchDB 2.3.1 - Cross-Site Request Forgery / Cross-Site Scripting. Author: Ozer Goker
|
Analyze the security implications of: Apache CouchDB 2.3.1 - Cross-Site Request Forgery / Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Android Kernel < 4.8 - ptrace seccomp Filter Bypass
|
This is a dos exploit for android platform. Description: Android Kernel < 4.8 - ptrace seccomp Filter Bypass. Author: Google Security Research
|
Analyze the security implications of: Android Kernel < 4.8 - ptrace seccomp Filter Bypass
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: SuperMicro IPMI 03.40 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for hardware platform. Description: SuperMicro IPMI 03.40 - Cross-Site Request Forgery (Add Admin). Author: Metin Yunus Kandemir
|
Analyze the security implications of: SuperMicro IPMI 03.40 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: YaBB 1.x/9.1.2000 - Administrator Command Execution
|
This is a webapps exploit for cgi platform. Description: YaBB 1.x/9.1.2000 - Administrator Command Execution. Author: GulfTech Security
|
Analyze the security implications of: YaBB 1.x/9.1.2000 - Administrator Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Perl 5.x - 'Perl_reg_numbered_buff_fetch()' Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Perl 5.x - 'Perl_reg_numbered_buff_fetch()' Remote Denial of Service. Author: Vladimir Perepelitsa
|
Analyze the security implications of: Perl 5.x - 'Perl_reg_numbered_buff_fetch()' Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Hedgehog-CMS 1.21 - 'header.php' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Hedgehog-CMS 1.21 - 'header.php' Local File Inclusion. Author: CraCkEr
|
Analyze the security implications of: Hedgehog-CMS 1.21 - 'header.php' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CuteNews 1.4.1 - 'template' Traversal Arbitrary File Access
|
This is a webapps exploit for php platform. Description: CuteNews 1.4.1 - 'template' Traversal Arbitrary File Access. Author: retrogod@aliceposta.it
|
Analyze the security implications of: CuteNews 1.4.1 - 'template' Traversal Arbitrary File Access
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BK Mobile jQuery CMS 2.4 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: BK Mobile jQuery CMS 2.4 - Multiple Vulnerabilities. Author: Rahul Pratap Singh
|
Analyze the security implications of: BK Mobile jQuery CMS 2.4 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DD-WRT HTTP v24-SP1 - Command Injection
|
This is a remote exploit for linux platform. Description: DD-WRT HTTP v24-SP1 - Command Injection. Author: H D Moore
|
Analyze the security implications of: DD-WRT HTTP v24-SP1 - Command Injection
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Strapi 3.0.0-beta.17.7 - Remote Code Execution (RCE) (Authenticated)
|
This is a webapps exploit for multiple platform. Description: Strapi 3.0.0-beta.17.7 - Remote Code Execution (RCE) (Authenticated). Author: David Utón
|
Analyze the security implications of: Strapi 3.0.0-beta.17.7 - Remote Code Execution (RCE) (Authenticated)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: mplayer 4.4.1 - Null Pointer Dereference (PoC)
|
This is a dos exploit for multiple platform. Description: mplayer 4.4.1 - Null Pointer Dereference (PoC). Author: Pietro Oliva
|
Analyze the security implications of: mplayer 4.4.1 - Null Pointer Dereference (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: BoastMachine 3.1 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for php platform. Description: BoastMachine 3.1 - Cross-Site Request Forgery (Add Admin). Author: Dr.NaNo
|
Analyze the security implications of: BoastMachine 3.1 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Easy Estate Rental - 's_location' SQL Injection
|
This is a webapps exploit for php platform. Description: Easy Estate Rental - 's_location' SQL Injection. Author: Lazmania61
|
Analyze the security implications of: Easy Estate Rental - 's_location' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Nokia Affix 2.0/2.1/3.x - BTSRV/BTOBEX Remote Command Execution
|
This is a remote exploit for hardware platform. Description: Nokia Affix 2.0/2.1/3.x - BTSRV/BTOBEX Remote Command Execution. Author: Kevin Finisterre
|
Analyze the security implications of: Nokia Affix 2.0/2.1/3.x - BTSRV/BTOBEX Remote Command Execution
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: SIRCD Server 0.5.2/0.5.3 - Operator Privilege Escalation
|
This is a remote exploit for multiple platform. Description: SIRCD Server 0.5.2/0.5.3 - Operator Privilege Escalation. Author: Victor Jerlin
|
Analyze the security implications of: SIRCD Server 0.5.2/0.5.3 - Operator Privilege Escalation
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: PHP 4.x - 'copy() Safe_Mode' Bypass
|
This is a remote exploit for php platform. Description: PHP 4.x - 'copy() Safe_Mode' Bypass. Author: Maksymilian Arciemowicz
|
Analyze the security implications of: PHP 4.x - 'copy() Safe_Mode' Bypass
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Huawei SNMPv3 Service - Multiple Buffer Overflow Vulnerabilities (PoC)
|
This is a dos exploit for hardware platform. Description: Huawei SNMPv3 Service - Multiple Buffer Overflow Vulnerabilities (PoC). Author: Roberto Paleari
|
Analyze the security implications of: Huawei SNMPv3 Service - Multiple Buffer Overflow Vulnerabilities (PoC)
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: PineApp MailSecure - Remote Command Execution
|
This is a remote exploit for linux platform. Description: PineApp MailSecure - Remote Command Execution. Author: Ruben Garrote García
|
Analyze the security implications of: PineApp MailSecure - Remote Command Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_virtuemart - order_status_id SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_virtuemart - order_status_id SQL Injection. Author: B-HUNT3|2
|
Analyze the security implications of: Joomla! Component com_virtuemart - order_status_id SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Betsy CMS versions 3.5 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Betsy CMS versions 3.5 - Local File Inclusion. Author: MizoZ
|
Analyze the security implications of: Betsy CMS versions 3.5 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.