input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: MySQL 4.1/5.0 - Authentication Bypass
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CMSimple 4.4.4 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: CMSimple 4.4.4 - Remote File Inclusion. Author: Govind Singh
|
Analyze the security implications of: CMSimple 4.4.4 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: VideoLAN VLC Media Player 2.1.3 - '.wav' File Memory Corruption
|
This is a dos exploit for multiple platform. Description: VideoLAN VLC Media Player 2.1.3 - '.wav' File Memory Corruption. Author: Aryan Bayaninejad
|
Analyze the security implications of: VideoLAN VLC Media Player 2.1.3 - '.wav' File Memory Corruption
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Darwin Streaming Server 4.1.2 - 'parse_xml.cgi' Code Execution
|
This is a remote exploit for osx platform. Description: Darwin Streaming Server 4.1.2 - 'parse_xml.cgi' Code Execution. Author: FOX_MULDER
|
Analyze the security implications of: Darwin Streaming Server 4.1.2 - 'parse_xml.cgi' Code Execution
|
This exploit targets osx systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: HPE 1.0 - HPEinc Remote File Inclusion (2)
|
This is a webapps exploit for php platform. Description: HPE 1.0 - HPEinc Remote File Inclusion (2). Author: the master
|
Analyze the security implications of: HPE 1.0 - HPEinc Remote File Inclusion (2)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CliServ Web Community 0.65 - 'cl_headers' Include
|
This is a webapps exploit for php platform. Description: CliServ Web Community 0.65 - 'cl_headers' Include. Author: Kacper
|
Analyze the security implications of: CliServ Web Community 0.65 - 'cl_headers' Include
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gaestebuch 1.2 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Gaestebuch 1.2 - Remote File Inclusion. Author: bd0rk
|
Analyze the security implications of: Gaestebuch 1.2 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sony Playstation 4 (PS4) 4.55 - 'Jailbreak' 'setAttributeNodeNS' WebKit 5.02 / 'bpf' Kernel Loader 4.55
|
This is a remote exploit for hardware platform. Description: Sony Playstation 4 (PS4) 4.55 - 'Jailbreak' 'setAttributeNodeNS' WebKit 5.02 / 'bpf' Kernel Loader 4.55. Author: Specter
|
Analyze the security implications of: Sony Playstation 4 (PS4) 4.55 - 'Jailbreak' 'setAttributeNodeNS' WebKit 5.02 / 'bpf' Kernel Loader 4.55
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: 1024 CMS 1.3.1 - Local File Inclusion / SQL Injection
|
This is a webapps exploit for php platform. Description: 1024 CMS 1.3.1 - Local File Inclusion / SQL Injection. Author: irk4z
|
Analyze the security implications of: 1024 CMS 1.3.1 - Local File Inclusion / SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Intel(R) PROSet/Wireless WiFi Software 15.01.1000.0927 - Unquoted Service Path Privilege Escalation
|
This is a webapps exploit for php platform. Description: Intel(R) PROSet/Wireless WiFi Software 15.01.1000.0927 - Unquoted Service Path Privilege Escalation. Author: Joey Lane
|
Analyze the security implications of: Intel(R) PROSet/Wireless WiFi Software 15.01.1000.0927 - Unquoted Service Path Privilege Escalation
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Keene Digital Media Server 1.0.2 - Directory Traversal
|
This is a remote exploit for multiple platform. Description: Keene Digital Media Server 1.0.2 - Directory Traversal. Author: GulfTech Security
|
Analyze the security implications of: Keene Digital Media Server 1.0.2 - Directory Traversal
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Mozilla Firefox SeaMonkey 3.6.10 / Thunderbird 3.1.4 - 'document.write' Memory Corruption
|
This is a remote exploit for linux platform. Description: Mozilla Firefox SeaMonkey 3.6.10 / Thunderbird 3.1.4 - 'document.write' Memory Corruption. Author: Alexander Miller
|
Analyze the security implications of: Mozilla Firefox SeaMonkey 3.6.10 / Thunderbird 3.1.4 - 'document.write' Memory Corruption
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Kleeja Upload - Cross-Site Request Forgery (Change Admin Password)
|
This is a webapps exploit for multiple platform. Description: Kleeja Upload - Cross-Site Request Forgery (Change Admin Password). Author: KOLTN S
|
Analyze the security implications of: Kleeja Upload - Cross-Site Request Forgery (Change Admin Password)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: dnsmasq-utils 2.79-1 - 'dhcp_release' Denial of Service (PoC)
|
This is a dos exploit for linux platform. Description: dnsmasq-utils 2.79-1 - 'dhcp_release' Denial of Service (PoC). Author: JosueEncinar
|
Analyze the security implications of: dnsmasq-utils 2.79-1 - 'dhcp_release' Denial of Service (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Enthrallweb eHomes - 'compareHomes.asp' Multiple SQL Injections
|
This is a webapps exploit for asp platform. Description: Enthrallweb eHomes - 'compareHomes.asp' Multiple SQL Injections. Author: laurent gaffie
|
Analyze the security implications of: Enthrallweb eHomes - 'compareHomes.asp' Multiple SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: WebKit - Universal XSS in WebCore::command
|
This is a dos exploit for multiple platform. Description: WebKit - Universal XSS in WebCore::command. Author: Google Security Research
|
Analyze the security implications of: WebKit - Universal XSS in WebCore::command
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: evilboard 0.1a - SQL Injection / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: evilboard 0.1a - SQL Injection / Cross-Site Scripting. Author: seaofglass
|
Analyze the security implications of: evilboard 0.1a - SQL Injection / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Absolute Form Processor XE-V 1.5 - Insecure Cookie Handling
|
This is a webapps exploit for asp platform. Description: Absolute Form Processor XE-V 1.5 - Insecure Cookie Handling. Author: ZoRLu
|
Analyze the security implications of: Absolute Form Processor XE-V 1.5 - Insecure Cookie Handling
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component Webee Comments 1.1/1.2 - Multiple BBCode Tags Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Joomla! Component Webee Comments 1.1/1.2 - Multiple BBCode Tags Cross-Site Scripting Vulnerabilities. Author: Jeff Channell
|
Analyze the security implications of: Joomla! Component Webee Comments 1.1/1.2 - Multiple BBCode Tags Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Muhammad A. Muquit wwwcount 2.3 - 'Count.cgi' Remote Buffer Overflow
|
This is a remote exploit for linux platform. Description: Muhammad A. Muquit wwwcount 2.3 - 'Count.cgi' Remote Buffer Overflow. Author: Razvan Dragomirescu
|
Analyze the security implications of: Muhammad A. Muquit wwwcount 2.3 - 'Count.cgi' Remote Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component Quiz Deluxe 3.7.4 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Quiz Deluxe 3.7.4 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Quiz Deluxe 3.7.4 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component CP Event Calendar 3.0.1 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component CP Event Calendar 3.0.1 - 'id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component CP Event Calendar 3.0.1 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: gravy media CMS 1.07 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: gravy media CMS 1.07 - Multiple Vulnerabilities. Author: x0r
|
Analyze the security implications of: gravy media CMS 1.07 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Advanced Image Hosting Script 2.x - 'search.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Advanced Image Hosting Script 2.x - 'search.php' Cross-Site Scripting. Author: aBo MoHaMeD
|
Analyze the security implications of: Advanced Image Hosting Script 2.x - 'search.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Thomson Reuters Velocity Analytics - Remote Code Injection
|
This is a remote exploit for hardware platform. Description: Thomson Reuters Velocity Analytics - Remote Code Injection. Author: Eduardo Gonzalez
|
Analyze the security implications of: Thomson Reuters Velocity Analytics - Remote Code Injection
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Zoho ManageEngine ServiceDesk Plus < 10.5 - Improper Access Restrictions
|
This is a webapps exploit for multiple platform. Description: Zoho ManageEngine ServiceDesk Plus < 10.5 - Improper Access Restrictions. Author: Vingroup
|
Analyze the security implications of: Zoho ManageEngine ServiceDesk Plus < 10.5 - Improper Access Restrictions
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Linux Kernel < 4.10.13 - 'keyctl_set_reqkey_keyring' Local Denial of Service
|
This is a dos exploit for linux platform. Description: Linux Kernel < 4.10.13 - 'keyctl_set_reqkey_keyring' Local Denial of Service. Author: Marcus Meissner
|
Analyze the security implications of: Linux Kernel < 4.10.13 - 'keyctl_set_reqkey_keyring' Local Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apple Mac OSX - 'IntelAccelerator::gstqConfigure' Kernel NULL Dereference
|
This is a dos exploit for osx platform. Description: Apple Mac OSX - 'IntelAccelerator::gstqConfigure' Kernel NULL Dereference. Author: Google Security Research
|
Analyze the security implications of: Apple Mac OSX - 'IntelAccelerator::gstqConfigure' Kernel NULL Dereference
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: GameSpy 3D 2.62 - Packet Amplification Denial of Service
|
This is a dos exploit for linux platform. Description: GameSpy 3D 2.62 - Packet Amplification Denial of Service. Author: Mike Kristovich
|
Analyze the security implications of: GameSpy 3D 2.62 - Packet Amplification Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apple Mac OSX 10.10 - 'DYLD_PRINT_TO_FILE' Local Privilege Escalation
|
This is a local exploit for osx platform. Description: Apple Mac OSX 10.10 - 'DYLD_PRINT_TO_FILE' Local Privilege Escalation. Author: Stefan Esser
|
Analyze the security implications of: Apple Mac OSX 10.10 - 'DYLD_PRINT_TO_FILE' Local Privilege Escalation
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Entrans - SQL Injection
|
This is a webapps exploit for php platform. Description: Entrans - SQL Injection. Author: keracker
|
Analyze the security implications of: Entrans - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HP-UX 10.20/11.0 - '.SNMPD' File Permission
|
This is a local exploit for hp-ux platform. Description: HP-UX 10.20/11.0 - '.SNMPD' File Permission. Author: loveyou
|
Analyze the security implications of: HP-UX 10.20/11.0 - '.SNMPD' File Permission
|
This exploit targets hp-ux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hp-ux platform
|
What is this exploit about: AdMentor - Admin Login SQL Injection
|
This is a webapps exploit for asp platform. Description: AdMentor - Admin Login SQL Injection. Author: Cr@zy_King
|
Analyze the security implications of: AdMentor - Admin Login SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_sensor.php?base_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_sensor.php?base_path' Remote File Inclusion. Author: indoushka
|
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_sensor.php?base_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.