input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: iOS iFTPStorage 1.3 - Directory Traversal | This exploit targets ios systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Jetbox CMS 2.1 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Jetbox CMS 2.1 - Multiple SQL Injections. Author: Jesper Jurcenoks |
Analyze the security implications of: Jetbox CMS 2.1 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple WebKit - 'HTMLKeygenElement' Type Confusion | This is a dos exploit for multiple platform. Description: Apple WebKit - 'HTMLKeygenElement' Type Confusion. Author: Google Security Research |
Analyze the security implications of: Apple WebKit - 'HTMLKeygenElement' Type Confusion | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cplinks 1.03 - Authentication Bypass / SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Cplinks 1.03 - Authentication Bypass / SQL Injection / Cross-Site Scripting. Author: InjEctOr5 |
Analyze the security implications of: Cplinks 1.03 - Authentication Bypass / SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Genepi 1.6 - 'genepi.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Genepi 1.6 - 'genepi.php' Remote File Inclusion. Author: Kw3[R]Ln |
Analyze the security implications of: Genepi 1.6 - 'genepi.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ZOO - '.ZOO' Decompression Infinite Loop Denial of Service (PoC) | This is a dos exploit for multiple platform. Description: ZOO - '.ZOO' Decompression Infinite Loop Denial of Service (PoC). Author: Jean-Sébastien |
Analyze the security implications of: ZOO - '.ZOO' Decompression Infinite Loop Denial of Service (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mitel Audio and Web Conferencing 4.4.3.0 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: Mitel Audio and Web Conferencing 4.4.3.0 - Multiple Cross-Site Scripting Vulnerabilities. Author: Richard Brain |
Analyze the security implications of: Mitel Audio and Web Conferencing 4.4.3.0 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Busewe 1.2 - SQL Injection | This is a webapps exploit for php platform. Description: Busewe 1.2 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Busewe 1.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX (Lion) - Directory Services Security Bypass | This is a local exploit for osx platform. Description: Apple Mac OSX (Lion) - Directory Services Security Bypass. Author: Defence in Depth |
Analyze the security implications of: Apple Mac OSX (Lion) - Directory Services Security Bypass | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Razer Sila - Local File Inclusion (LFI) | This is a webapps exploit for hardware platform. Description: Razer Sila - Local File Inclusion (LFI). Author: Kevin Randall |
Analyze the security implications of: Razer Sila - Local File Inclusion (LFI) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CMS Buzz - 'id' SQL Injection | This is a webapps exploit for php platform. Description: CMS Buzz - 'id' SQL Injection. Author: security fears team |
Analyze the security implications of: CMS Buzz - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AlphAdmin CMS 1.0.5_03 - 'aa_login' Cookie Authentication Bypass | This is a webapps exploit for php platform. Description: AlphAdmin CMS 1.0.5_03 - 'aa_login' Cookie Authentication Bypass. Author: Ciph3r |
Analyze the security implications of: AlphAdmin CMS 1.0.5_03 - 'aa_login' Cookie Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Chrome < M72 - Use-After-Free in RenderProcessHostImpl Binding for P2PSocketDispatcherHost | This is a dos exploit for multiple platform. Description: Google Chrome < M72 - Use-After-Free in RenderProcessHostImpl Binding for P2PSocketDispatcherHost. Author: Google Security Research |
Analyze the security implications of: Google Chrome < M72 - Use-After-Free in RenderProcessHostImpl Binding for P2PSocketDispatcherHost | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AlgoSec Firewall Analyzer - Cross-Site Scripting | This is a remote exploit for hardware platform. Description: AlgoSec Firewall Analyzer - Cross-Site Scripting. Author: Asheesh kumar Mani Tripathi |
Analyze the security implications of: AlgoSec Firewall Analyzer - Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Zyxel NBG-418N v2 Modem 1.00(AAXM.6)C0 - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Zyxel NBG-418N v2 Modem 1.00(AAXM.6)C0 - Cross-Site Request Forgery. Author: Ali Can Gönüllü |
Analyze the security implications of: Zyxel NBG-418N v2 Modem 1.00(AAXM.6)C0 - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Enthrallweb ePhotos 1.0 - 'subLevel2.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Enthrallweb ePhotos 1.0 - 'subLevel2.asp' SQL Injection. Author: ajann |
Analyze the security implications of: Enthrallweb ePhotos 1.0 - 'subLevel2.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: World in Conflict 1.0.1 - Typecheck Remote Denial of Service | This is a dos exploit for multiple platform. Description: World in Conflict 1.0.1 - Typecheck Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: World in Conflict 1.0.1 - Typecheck Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AWebServer GhostBuilding 18 - Denial of Service (DoS) | This is a remote exploit for android platform. Description: AWebServer GhostBuilding 18 - Denial of Service (DoS). Author: Andres Ramos |
Analyze the security implications of: AWebServer GhostBuilding 18 - Denial of Service (DoS) | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Joomla! Component com_voj - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_voj - SQL Injection. Author: CoBRa_21 |
Analyze the security implications of: Joomla! Component com_voj - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Roteador Wireless Intelbras WRN150 - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Roteador Wireless Intelbras WRN150 - Cross-Site Scripting. Author: Elber Tavares |
Analyze the security implications of: Roteador Wireless Intelbras WRN150 - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: KwsPHP Module ConcoursPhoto 2.0 - 'C_ID' SQL Injection | This is a webapps exploit for php platform. Description: KwsPHP Module ConcoursPhoto 2.0 - 'C_ID' SQL Injection. Author: Stack |
Analyze the security implications of: KwsPHP Module ConcoursPhoto 2.0 - 'C_ID' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM AIX 5.6/6.1 - '_LIB_INIT_DBG' Arbitrary File Overwrite via Libc Debug | This is a local exploit for aix platform. Description: IBM AIX 5.6/6.1 - '_LIB_INIT_DBG' Arbitrary File Overwrite via Libc Debug. Author: Marco Ivaldi |
Analyze the security implications of: IBM AIX 5.6/6.1 - '_LIB_INIT_DBG' Arbitrary File Overwrite via Libc Debug | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: htmlLawed 1.2.5 - Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: htmlLawed 1.2.5 - Remote Code Execution (RCE). Author: Miguel Redondo |
Analyze the security implications of: htmlLawed 1.2.5 - Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Twitter for iPhone - Man in the Middle Security | This is a remote exploit for ios platform. Description: Twitter for iPhone - Man in the Middle Security. Author: Carlos Reventlov |
Analyze the security implications of: Twitter for iPhone - Man in the Middle Security | This exploit targets ios systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: 4 TOTOLINK Router Models - Backdoor Credentials | This is a webapps exploit for hardware platform. Description: 4 TOTOLINK Router Models - Backdoor Credentials. Author: Pierre Kim |
Analyze the security implications of: 4 TOTOLINK Router Models - Backdoor Credentials | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: My School Script - Database Disclosure | This is a webapps exploit for asp platform. Description: My School Script - Database Disclosure. Author: indoushka |
Analyze the security implications of: My School Script - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Curfew e-Pass Management System 1.0 - FromDate SQL Injection | This is a webapps exploit for php platform. Description: Curfew e-Pass Management System 1.0 - FromDate SQL Injection. Author: Puja Dey |
Analyze the security implications of: Curfew e-Pass Management System 1.0 - FromDate SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MiniUPnPd 2.1 - Out-of-Bounds Read | This is a dos exploit for linux platform. Description: MiniUPnPd 2.1 - Out-of-Bounds Read. Author: b1ack0wl |
Analyze the security implications of: MiniUPnPd 2.1 - Out-of-Bounds Read | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Luca Deri ntop 1.2 a7-9 - Unauthorized File Retrieval | This is a remote exploit for linux platform. Description: Luca Deri ntop 1.2 a7-9 - Unauthorized File Retrieval. Author: dubhe |
Analyze the security implications of: Luca Deri ntop 1.2 a7-9 - Unauthorized File Retrieval | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ManageEngine EventLog Analyzer 6.1 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: ManageEngine EventLog Analyzer 6.1 - Multiple Cross-Site Scripting Vulnerabilities. Author: Rob Kraus |
Analyze the security implications of: ManageEngine EventLog Analyzer 6.1 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MySQL yaSSL (Linux) - SSL Hello Message Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: MySQL yaSSL (Linux) - SSL Hello Message Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: MySQL yaSSL (Linux) - SSL Hello Message Buffer Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Bahar Download Script 2.0 - 'aspkat.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Bahar Download Script 2.0 - 'aspkat.asp' SQL Injection. Author: CyberGrup Lojistik |
Analyze the security implications of: Bahar Download Script 2.0 - 'aspkat.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Visual Voicemail for iPhone - IMAP NAMESPACE Processing Use-After-Free | This is a dos exploit for ios platform. Description: Visual Voicemail for iPhone - IMAP NAMESPACE Processing Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Visual Voicemail for iPhone - IMAP NAMESPACE Processing Use-After-Free | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: iFdate Social Dating Script 2.0 - SQL Injection | This is a webapps exploit for php platform. Description: iFdate Social Dating Script 2.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: iFdate Social Dating Script 2.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.