input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Franklin Fueling Systems TS-550 - Exploit and Default Password
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: SilverSHielD 6.x - Local Privilege Escalation
|
This is a local exploit for multiple platform. Description: SilverSHielD 6.x - Local Privilege Escalation. Author: Ian Bredemeyer
|
Analyze the security implications of: SilverSHielD 6.x - Local Privilege Escalation
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Kietu 2/3 - 'index.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Kietu 2/3 - 'index.php' Remote File Inclusion. Author: Himeur Nourredine
|
Analyze the security implications of: Kietu 2/3 - 'index.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Galleristic 1.0 - 'cat' SQL Injection
|
This is a webapps exploit for php platform. Description: Galleristic 1.0 - 'cat' SQL Injection. Author: cOndemned
|
Analyze the security implications of: Galleristic 1.0 - 'cat' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Imagam iFiles 1.16.0 iOS - Multiple Web Vulnerabilities
|
This is a webapps exploit for ios platform. Description: Imagam iFiles 1.16.0 iOS - Multiple Web Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: Imagam iFiles 1.16.0 iOS - Multiple Web Vulnerabilities
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Feetan Inc WireShare 1.9.1 iOS - Persistent
|
This is a webapps exploit for ios platform. Description: Feetan Inc WireShare 1.9.1 iOS - Persistent. Author: Vulnerability-Lab
|
Analyze the security implications of: Feetan Inc WireShare 1.9.1 iOS - Persistent
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Conky Linux 1.8.0 - Local Denial of Service (PoC)
|
This is a dos exploit for linux platform. Description: Conky Linux 1.8.0 - Local Denial of Service (PoC). Author: Arturo D'Elia
|
Analyze the security implications of: Conky Linux 1.8.0 - Local Denial of Service (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Content Management System for Phprojekt 0.6.1 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Content Management System for Phprojekt 0.6.1 - Remote File Inclusion. Author: RoMaNcYxHaCkEr
|
Analyze the security implications of: Content Management System for Phprojekt 0.6.1 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cells Blog 3.3 - Reflected Cross-Site Scripting / Blind SQLite Injection
|
This is a webapps exploit for php platform. Description: Cells Blog 3.3 - Reflected Cross-Site Scripting / Blind SQLite Injection. Author: vinicius777
|
Analyze the security implications of: Cells Blog 3.3 - Reflected Cross-Site Scripting / Blind SQLite Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Web Wiz Guestbook 8.21 - Database Disclosure
|
This is a webapps exploit for asp platform. Description: Web Wiz Guestbook 8.21 - Database Disclosure. Author: Cold Zero
|
Analyze the security implications of: Web Wiz Guestbook 8.21 - Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: iGiveTest 2.1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: iGiveTest 2.1.0 - SQL Injection. Author: Brendan Coles
|
Analyze the security implications of: iGiveTest 2.1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BrudaGB 1.1 - '/admin/index.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: BrudaGB 1.1 - '/admin/index.php' Remote File Inclusion. Author: SHiKaA
|
Analyze the security implications of: BrudaGB 1.1 - '/admin/index.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cayin Digital Signage System xPost 2.5 - Remote Command Injection
|
This is a webapps exploit for multiple platform. Description: Cayin Digital Signage System xPost 2.5 - Remote Command Injection. Author: LiquidWorm
|
Analyze the security implications of: Cayin Digital Signage System xPost 2.5 - Remote Command Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Avant Browser 11.7 Build 9 - JavaScript Engine Integer Overflow
|
This is a dos exploit for multiple platform. Description: Avant Browser 11.7 Build 9 - JavaScript Engine Integer Overflow. Author: 0x90
|
Analyze the security implications of: Avant Browser 11.7 Build 9 - JavaScript Engine Integer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Digital Ultrix 4.0/4.1 - '/usr/bin/chroot' Local Privilege Escalation
|
This is a local exploit for aix platform. Description: Digital Ultrix 4.0/4.1 - '/usr/bin/chroot' Local Privilege Escalation. Author: anonymous
|
Analyze the security implications of: Digital Ultrix 4.0/4.1 - '/usr/bin/chroot' Local Privilege Escalation
|
This exploit targets aix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: Webhints 1.03 - Remote Command Execution (C) (2)
|
This is a webapps exploit for cgi platform. Description: Webhints 1.03 - Remote Command Execution (C) (2). Author: Alpha_Programmer
|
Analyze the security implications of: Webhints 1.03 - Remote Command Execution (C) (2)
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Getsimple CMS 3.2.1 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Getsimple CMS 3.2.1 - Arbitrary File Upload. Author: Ahmed Elhady Mohamed
|
Analyze the security implications of: Getsimple CMS 3.2.1 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iknSupport 'search' Module - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: iknSupport 'search' Module - Cross-Site Scripting. Author: Red Security TEAM
|
Analyze the security implications of: iknSupport 'search' Module - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Fastream NETFile FTP/Web Server 6.5/6.7 - Directory Traversal
|
This is a webapps exploit for cgi platform. Description: Fastream NETFile FTP/Web Server 6.5/6.7 - Directory Traversal. Author: Andres Tarasco Acuna
|
Analyze the security implications of: Fastream NETFile FTP/Web Server 6.5/6.7 - Directory Traversal
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: FreeType - '.TTF' File Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: FreeType - '.TTF' File Remote Denial of Service. Author: Josh Bressers
|
Analyze the security implications of: FreeType - '.TTF' File Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Iris ID IrisAccess ICU 7000-2 - Remote Command Execution
|
This is a webapps exploit for cgi platform. Description: Iris ID IrisAccess ICU 7000-2 - Remote Command Execution. Author: LiquidWorm
|
Analyze the security implications of: Iris ID IrisAccess ICU 7000-2 - Remote Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: X-ice News System 1.0 - 'devami.asp?id' SQL Injection
|
This is a webapps exploit for asp platform. Description: X-ice News System 1.0 - 'devami.asp?id' SQL Injection. Author: CyberGhost
|
Analyze the security implications of: X-ice News System 1.0 - 'devami.asp?id' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Mozilla Firefox/Thunderbird/SeaMonkey - Chrome-Loaded About:Blank Script Execution
|
This is a remote exploit for linux platform. Description: Mozilla Firefox/Thunderbird/SeaMonkey - Chrome-Loaded About:Blank Script Execution. Author: moz_bug_r_a4
|
Analyze the security implications of: Mozilla Firefox/Thunderbird/SeaMonkey - Chrome-Loaded About:Blank Script Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Tunnelblick - Setuid Privilege Escalation (Metasploit)
|
This is a local exploit for osx platform. Description: Tunnelblick - Setuid Privilege Escalation (Metasploit). Author: Metasploit
|
Analyze the security implications of: Tunnelblick - Setuid Privilege Escalation (Metasploit)
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: CactuSoft CactuShop 5.0/5.1 - Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: CactuSoft CactuShop 5.0/5.1 - Cross-Site Scripting. Author: Nick Gudov
|
Analyze the security implications of: CactuSoft CactuShop 5.0/5.1 - Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: QEMU 0.9 - Translation Block Local Denial of Service
|
This is a dos exploit for linux platform. Description: QEMU 0.9 - Translation Block Local Denial of Service. Author: TeLeMan
|
Analyze the security implications of: QEMU 0.9 - Translation Block Local Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: PHP 5.2.10/5.3 - 'ini_restore()' Memory Information Disclosure (1)
|
This is a remote exploit for php platform. Description: PHP 5.2.10/5.3 - 'ini_restore()' Memory Information Disclosure (1). Author: Maksymilian Arciemowicz
|
Analyze the security implications of: PHP 5.2.10/5.3 - 'ini_restore()' Memory Information Disclosure (1)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gearbox Software Halo Game 1.x - Client Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Gearbox Software Halo Game 1.x - Client Remote Denial of Service. Author: Luigi Auriemma
|
Analyze the security implications of: Gearbox Software Halo Game 1.x - Client Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: AnotherPHPBook (APB) 1.3.0 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: AnotherPHPBook (APB) 1.3.0 - Authentication Bypass. Author: n3w7u
|
Analyze the security implications of: AnotherPHPBook (APB) 1.3.0 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Duhok Forum 1.0 script - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Duhok Forum 1.0 script - Cross-Site Scripting. Author: indoushka
|
Analyze the security implications of: Duhok Forum 1.0 script - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Enthrallweb eCars 1.0 - 'types.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: Enthrallweb eCars 1.0 - 'types.asp' SQL Injection. Author: ajann
|
Analyze the security implications of: Enthrallweb eCars 1.0 - 'types.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Employee Management System 1.0 - _txtfullname_ and _txtphone_ SQL Injection
|
This is a webapps exploit for php platform. Description: Employee Management System 1.0 - _txtfullname_ and _txtphone_ SQL Injection. Author: Yevhenii Butenko
|
Analyze the security implications of: Employee Management System 1.0 - _txtfullname_ and _txtphone_ SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jenkins Plugin Script Security 1.49/Declarative 1.3.4/Groovy 2.60 - Remote Code Execution
|
This is a webapps exploit for java platform. Description: Jenkins Plugin Script Security 1.49/Declarative 1.3.4/Groovy 2.60 - Remote Code Execution. Author: wetw0rk
|
Analyze the security implications of: Jenkins Plugin Script Security 1.49/Declarative 1.3.4/Groovy 2.60 - Remote Code Execution
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Apple Mac OSX Server 10.5 - Wiki Server Directory Traversal
|
This is a remote exploit for osx platform. Description: Apple Mac OSX Server 10.5 - Wiki Server Directory Traversal. Author: Rodrigo Carvalho
|
Analyze the security implications of: Apple Mac OSX Server 10.5 - Wiki Server Directory Traversal
|
This exploit targets osx systems. Type: remote. Risk level: High
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.