input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: iScripts AutoHoster - 'checktransferstatusbck.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Spidermonkey - IonMonkey Type Inference is Incorrect for Constructors Entered via OSR | This is a dos exploit for multiple platform. Description: Spidermonkey - IonMonkey Type Inference is Incorrect for Constructors Entered via OSR. Author: Google Security Research |
Analyze the security implications of: Spidermonkey - IonMonkey Type Inference is Incorrect for Constructors Entered via OSR | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: StorePortal 2.63 - 'default.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: StorePortal 2.63 - 'default.asp' Multiple SQL Injections. Author: Dcrab |
Analyze the security implications of: StorePortal 2.63 - 'default.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: KDE 1.1/1.1.1/1.2/2.0 kscd - SHELL Environmental Variable | This is a local exploit for linux platform. Description: KDE 1.1/1.1.1/1.2/2.0 kscd - SHELL Environmental Variable. Author: Sebastian |
Analyze the security implications of: KDE 1.1/1.1.1/1.2/2.0 kscd - SHELL Environmental Variable | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Kim Websites 1.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: Kim Websites 1.0 - Authentication Bypass. Author: Virangar Security |
Analyze the security implications of: Kim Websites 1.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BES-CMS 0.4/0.5 - 'hacking.php' File Inclusion | This is a webapps exploit for php platform. Description: BES-CMS 0.4/0.5 - 'hacking.php' File Inclusion. Author: frog |
Analyze the security implications of: BES-CMS 0.4/0.5 - 'hacking.php' File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component AlphaIndex Dictionaries 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component AlphaIndex Dictionaries 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component AlphaIndex Dictionaries 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: grocy 2.7.1 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: grocy 2.7.1 - Persistent Cross-Site Scripting. Author: Mufaddal Masalawala |
Analyze the security implications of: grocy 2.7.1 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SUIDPerl 5.6 - Information Disclosure | This is a local exploit for linux platform. Description: SUIDPerl 5.6 - Information Disclosure. Author: zen-parse |
Analyze the security implications of: SUIDPerl 5.6 - Information Disclosure | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Collabtive 1.2 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Collabtive 1.2 - Persistent Cross-Site Scripting. Author: Deepak Rathore |
Analyze the security implications of: Collabtive 1.2 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kenel 2.6.37-rc1 - serial_core TIOCGICOUNT Leak | This is a dos exploit for linux platform. Description: Linux Kenel 2.6.37-rc1 - serial_core TIOCGICOUNT Leak. Author: prdelka |
Analyze the security implications of: Linux Kenel 2.6.37-rc1 - serial_core TIOCGICOUNT Leak | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: bcoos 1.0.13 - 'viewcat.php' SQL Injection | This is a webapps exploit for php platform. Description: bcoos 1.0.13 - 'viewcat.php' SQL Injection. Author: CWH Underground |
Analyze the security implications of: bcoos 1.0.13 - 'viewcat.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CentOS Web Panel 0.9.8.740 - Cross-Site Request Forgery / Cross-Site Scripting | This is a webapps exploit for php platform. Description: CentOS Web Panel 0.9.8.740 - Cross-Site Request Forgery / Cross-Site Scripting. Author: InfinitumIT |
Analyze the security implications of: CentOS Web Panel 0.9.8.740 - Cross-Site Request Forgery / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_acstartseite - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_acstartseite - SQL Injection. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Joomla! Component com_acstartseite - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Trend Micro Enterprise Mobile Security 2.0.0.1700 - 'Servidor' Denial of Service (PoC) | This is a dos exploit for ios platform. Description: Trend Micro Enterprise Mobile Security 2.0.0.1700 - 'Servidor' Denial of Service (PoC). Author: Luis Martínez |
Analyze the security implications of: Trend Micro Enterprise Mobile Security 2.0.0.1700 - 'Servidor' Denial of Service (PoC) | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Linux Kernel < 2.6.37-rc2 - 'ACPI custom_method' Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel < 2.6.37-rc2 - 'ACPI custom_method' Local Privilege Escalation. Author: Jon Oberheide |
Analyze the security implications of: Linux Kernel < 2.6.37-rc2 - 'ACPI custom_method' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Best pos Management System v1.0 - Remote Code Execution (RCE) on File Upload | This is a webapps exploit for php platform. Description: Best pos Management System v1.0 - Remote Code Execution (RCE) on File Upload. Author: Ahmed Ismail |
Analyze the security implications of: Best pos Management System v1.0 - Remote Code Execution (RCE) on File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: extreme-fusion 4.02 - Remote Code Execution | This is a webapps exploit for php platform. Description: extreme-fusion 4.02 - Remote Code Execution. Author: Kacper |
Analyze the security implications of: extreme-fusion 4.02 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dacio's Image Gallery 1.6 - Directory Traversal / Authentication Bypass / Arbitrary File Upload | This is a webapps exploit for php platform. Description: Dacio's Image Gallery 1.6 - Directory Traversal / Authentication Bypass / Arbitrary File Upload. Author: ahmadbady |
Analyze the security implications of: Dacio's Image Gallery 1.6 - Directory Traversal / Authentication Bypass / Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: bcoos 1.0.10 - 'ratelink.php' SQL Injection | This is a webapps exploit for php platform. Description: bcoos 1.0.10 - 'ratelink.php' SQL Injection. Author: Lostmon |
Analyze the security implications of: bcoos 1.0.10 - 'ratelink.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Def-Blog 1.0.3 - 'comadd.php' SQL Injection | This is a webapps exploit for php platform. Description: Def-Blog 1.0.3 - 'comadd.php' SQL Injection. Author: SHiKaA |
Analyze the security implications of: Def-Blog 1.0.3 - 'comadd.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Affix Bluetooth Protocol Stack 3.1/3.2 - Signed Buffer Index (2) | This is a remote exploit for linux platform. Description: Affix Bluetooth Protocol Stack 3.1/3.2 - Signed Buffer Index (2). Author: kf |
Analyze the security implications of: Affix Bluetooth Protocol Stack 3.1/3.2 - Signed Buffer Index (2) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_mtree 2.1.5 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component com_mtree 2.1.5 - Arbitrary File Upload. Author: jdc |
Analyze the security implications of: Joomla! Component com_mtree 2.1.5 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_departments - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_departments - SQL Injection. Author: DevilZ TM |
Analyze the security implications of: Joomla! Component com_departments - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TigerCom My Assistant 1.1 iOS - Local File Inclusion | This is a webapps exploit for ios platform. Description: TigerCom My Assistant 1.1 iOS - Local File Inclusion. Author: Vulnerability-Lab |
Analyze the security implications of: TigerCom My Assistant 1.1 iOS - Local File Inclusion | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: 0DayDB 2.3 - 'id' Remote Authentication Bypass | This is a webapps exploit for php platform. Description: 0DayDB 2.3 - 'id' Remote Authentication Bypass. Author: Pr0metheuS |
Analyze the security implications of: 0DayDB 2.3 - 'id' Remote Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: deeemm CMS (dmcms) 0.7.4 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: deeemm CMS (dmcms) 0.7.4 - Multiple Vulnerabilities. Author: Khashayar Fereidani |
Analyze the security implications of: deeemm CMS (dmcms) 0.7.4 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: VMware Virtual 8086 - Linux Local Ring0 | This is a local exploit for multiple platform. Description: VMware Virtual 8086 - Linux Local Ring0. Author: Tavis Ormandy & Julien Tinnes |
Analyze the security implications of: VMware Virtual 8086 - Linux Local Ring0 | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: COVID19 Testing Management System 1.0 - 'Admin name' Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: COVID19 Testing Management System 1.0 - 'Admin name' Cross-Site Scripting (XSS). Author: Rohit Burke |
Analyze the security implications of: COVID19 Testing Management System 1.0 - 'Admin name' Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ntop-ng 2.5.160805 - Username Enumeration | This is a webapps exploit for multiple platform. Description: ntop-ng 2.5.160805 - Username Enumeration. Author: Dolev Farhi |
Analyze the security implications of: ntop-ng 2.5.160805 - Username Enumeration | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Auto Dealer Management System v1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Auto Dealer Management System v1.0 - SQL Injection. Author: Muhammad Navaid Zafar Ansari |
Analyze the security implications of: Auto Dealer Management System v1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FlatNuke 2.5.x - 'index.php?where' Full Path Disclosure | This is a webapps exploit for php platform. Description: FlatNuke 2.5.x - 'index.php?where' Full Path Disclosure. Author: SecWatch |
Analyze the security implications of: FlatNuke 2.5.x - 'index.php?where' Full Path Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple macOS - 'stackshot' Raw Frame Pointers | This is a dos exploit for macos platform. Description: Apple macOS - 'stackshot' Raw Frame Pointers. Author: Google Security Research |
Analyze the security implications of: Apple macOS - 'stackshot' Raw Frame Pointers | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Apple iOS 5.1.1 Safari Browser - 'JS match()' / 'search()' Crash (PoC) | This is a dos exploit for ios platform. Description: Apple iOS 5.1.1 Safari Browser - 'JS match()' / 'search()' Crash (PoC). Author: Alberto Ortega |
Analyze the security implications of: Apple iOS 5.1.1 Safari Browser - 'JS match()' / 'search()' Crash (PoC) | This exploit targets ios systems. Type: dos. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.