input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: iOS iFTPStorage 1.3 - Directory Traversal
|
This exploit targets ios systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Jetbox CMS 2.1 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Jetbox CMS 2.1 - Multiple SQL Injections. Author: Jesper Jurcenoks
|
Analyze the security implications of: Jetbox CMS 2.1 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple WebKit - 'HTMLKeygenElement' Type Confusion
|
This is a dos exploit for multiple platform. Description: Apple WebKit - 'HTMLKeygenElement' Type Confusion. Author: Google Security Research
|
Analyze the security implications of: Apple WebKit - 'HTMLKeygenElement' Type Confusion
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Cplinks 1.03 - Authentication Bypass / SQL Injection / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Cplinks 1.03 - Authentication Bypass / SQL Injection / Cross-Site Scripting. Author: InjEctOr5
|
Analyze the security implications of: Cplinks 1.03 - Authentication Bypass / SQL Injection / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Genepi 1.6 - 'genepi.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Genepi 1.6 - 'genepi.php' Remote File Inclusion. Author: Kw3[R]Ln
|
Analyze the security implications of: Genepi 1.6 - 'genepi.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ZOO - '.ZOO' Decompression Infinite Loop Denial of Service (PoC)
|
This is a dos exploit for multiple platform. Description: ZOO - '.ZOO' Decompression Infinite Loop Denial of Service (PoC). Author: Jean-Sébastien
|
Analyze the security implications of: ZOO - '.ZOO' Decompression Infinite Loop Denial of Service (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Mitel Audio and Web Conferencing 4.4.3.0 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for asp platform. Description: Mitel Audio and Web Conferencing 4.4.3.0 - Multiple Cross-Site Scripting Vulnerabilities. Author: Richard Brain
|
Analyze the security implications of: Mitel Audio and Web Conferencing 4.4.3.0 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Busewe 1.2 - SQL Injection
|
This is a webapps exploit for php platform. Description: Busewe 1.2 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Busewe 1.2 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Mac OSX (Lion) - Directory Services Security Bypass
|
This is a local exploit for osx platform. Description: Apple Mac OSX (Lion) - Directory Services Security Bypass. Author: Defence in Depth
|
Analyze the security implications of: Apple Mac OSX (Lion) - Directory Services Security Bypass
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Razer Sila - Local File Inclusion (LFI)
|
This is a webapps exploit for hardware platform. Description: Razer Sila - Local File Inclusion (LFI). Author: Kevin Randall
|
Analyze the security implications of: Razer Sila - Local File Inclusion (LFI)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CMS Buzz - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: CMS Buzz - 'id' SQL Injection. Author: security fears team
|
Analyze the security implications of: CMS Buzz - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AlphAdmin CMS 1.0.5_03 - 'aa_login' Cookie Authentication Bypass
|
This is a webapps exploit for php platform. Description: AlphAdmin CMS 1.0.5_03 - 'aa_login' Cookie Authentication Bypass. Author: Ciph3r
|
Analyze the security implications of: AlphAdmin CMS 1.0.5_03 - 'aa_login' Cookie Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Google Chrome < M72 - Use-After-Free in RenderProcessHostImpl Binding for P2PSocketDispatcherHost
|
This is a dos exploit for multiple platform. Description: Google Chrome < M72 - Use-After-Free in RenderProcessHostImpl Binding for P2PSocketDispatcherHost. Author: Google Security Research
|
Analyze the security implications of: Google Chrome < M72 - Use-After-Free in RenderProcessHostImpl Binding for P2PSocketDispatcherHost
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: AlgoSec Firewall Analyzer - Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: AlgoSec Firewall Analyzer - Cross-Site Scripting. Author: Asheesh kumar Mani Tripathi
|
Analyze the security implications of: AlgoSec Firewall Analyzer - Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Zyxel NBG-418N v2 Modem 1.00(AAXM.6)C0 - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: Zyxel NBG-418N v2 Modem 1.00(AAXM.6)C0 - Cross-Site Request Forgery. Author: Ali Can Gönüllü
|
Analyze the security implications of: Zyxel NBG-418N v2 Modem 1.00(AAXM.6)C0 - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Enthrallweb ePhotos 1.0 - 'subLevel2.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: Enthrallweb ePhotos 1.0 - 'subLevel2.asp' SQL Injection. Author: ajann
|
Analyze the security implications of: Enthrallweb ePhotos 1.0 - 'subLevel2.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: World in Conflict 1.0.1 - Typecheck Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: World in Conflict 1.0.1 - Typecheck Remote Denial of Service. Author: Luigi Auriemma
|
Analyze the security implications of: World in Conflict 1.0.1 - Typecheck Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: AWebServer GhostBuilding 18 - Denial of Service (DoS)
|
This is a remote exploit for android platform. Description: AWebServer GhostBuilding 18 - Denial of Service (DoS). Author: Andres Ramos
|
Analyze the security implications of: AWebServer GhostBuilding 18 - Denial of Service (DoS)
|
This exploit targets android systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Joomla! Component com_voj - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_voj - SQL Injection. Author: CoBRa_21
|
Analyze the security implications of: Joomla! Component com_voj - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Roteador Wireless Intelbras WRN150 - Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: Roteador Wireless Intelbras WRN150 - Cross-Site Scripting. Author: Elber Tavares
|
Analyze the security implications of: Roteador Wireless Intelbras WRN150 - Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: KwsPHP Module ConcoursPhoto 2.0 - 'C_ID' SQL Injection
|
This is a webapps exploit for php platform. Description: KwsPHP Module ConcoursPhoto 2.0 - 'C_ID' SQL Injection. Author: Stack
|
Analyze the security implications of: KwsPHP Module ConcoursPhoto 2.0 - 'C_ID' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM AIX 5.6/6.1 - '_LIB_INIT_DBG' Arbitrary File Overwrite via Libc Debug
|
This is a local exploit for aix platform. Description: IBM AIX 5.6/6.1 - '_LIB_INIT_DBG' Arbitrary File Overwrite via Libc Debug. Author: Marco Ivaldi
|
Analyze the security implications of: IBM AIX 5.6/6.1 - '_LIB_INIT_DBG' Arbitrary File Overwrite via Libc Debug
|
This exploit targets aix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: htmlLawed 1.2.5 - Remote Code Execution (RCE)
|
This is a webapps exploit for php platform. Description: htmlLawed 1.2.5 - Remote Code Execution (RCE). Author: Miguel Redondo
|
Analyze the security implications of: htmlLawed 1.2.5 - Remote Code Execution (RCE)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Twitter for iPhone - Man in the Middle Security
|
This is a remote exploit for ios platform. Description: Twitter for iPhone - Man in the Middle Security. Author: Carlos Reventlov
|
Analyze the security implications of: Twitter for iPhone - Man in the Middle Security
|
This exploit targets ios systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: 4 TOTOLINK Router Models - Backdoor Credentials
|
This is a webapps exploit for hardware platform. Description: 4 TOTOLINK Router Models - Backdoor Credentials. Author: Pierre Kim
|
Analyze the security implications of: 4 TOTOLINK Router Models - Backdoor Credentials
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: My School Script - Database Disclosure
|
This is a webapps exploit for asp platform. Description: My School Script - Database Disclosure. Author: indoushka
|
Analyze the security implications of: My School Script - Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Curfew e-Pass Management System 1.0 - FromDate SQL Injection
|
This is a webapps exploit for php platform. Description: Curfew e-Pass Management System 1.0 - FromDate SQL Injection. Author: Puja Dey
|
Analyze the security implications of: Curfew e-Pass Management System 1.0 - FromDate SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MiniUPnPd 2.1 - Out-of-Bounds Read
|
This is a dos exploit for linux platform. Description: MiniUPnPd 2.1 - Out-of-Bounds Read. Author: b1ack0wl
|
Analyze the security implications of: MiniUPnPd 2.1 - Out-of-Bounds Read
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Luca Deri ntop 1.2 a7-9 - Unauthorized File Retrieval
|
This is a remote exploit for linux platform. Description: Luca Deri ntop 1.2 a7-9 - Unauthorized File Retrieval. Author: dubhe
|
Analyze the security implications of: Luca Deri ntop 1.2 a7-9 - Unauthorized File Retrieval
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ManageEngine EventLog Analyzer 6.1 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: ManageEngine EventLog Analyzer 6.1 - Multiple Cross-Site Scripting Vulnerabilities. Author: Rob Kraus
|
Analyze the security implications of: ManageEngine EventLog Analyzer 6.1 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MySQL yaSSL (Linux) - SSL Hello Message Buffer Overflow (Metasploit)
|
This is a remote exploit for linux platform. Description: MySQL yaSSL (Linux) - SSL Hello Message Buffer Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: MySQL yaSSL (Linux) - SSL Hello Message Buffer Overflow (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Bahar Download Script 2.0 - 'aspkat.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: Bahar Download Script 2.0 - 'aspkat.asp' SQL Injection. Author: CyberGrup Lojistik
|
Analyze the security implications of: Bahar Download Script 2.0 - 'aspkat.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Visual Voicemail for iPhone - IMAP NAMESPACE Processing Use-After-Free
|
This is a dos exploit for ios platform. Description: Visual Voicemail for iPhone - IMAP NAMESPACE Processing Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: Visual Voicemail for iPhone - IMAP NAMESPACE Processing Use-After-Free
|
This exploit targets ios systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: iFdate Social Dating Script 2.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: iFdate Social Dating Script 2.0 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: iFdate Social Dating Script 2.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.