input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: Ninja Privilege Escalation Detection and Prevention System 0.1.3 - Race Condition Privilege Escalation | This is a local exploit for linux platform. Description: Ninja Privilege Escalation Detection and Prevention System 0.1.3 - Race Condition Privilege Escalation. Author: Ben Sheppard |
Analyze the security implications of: Ninja Privilege Escalation Detection and Prevention System 0.1.3 - Race Condition Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component Agenda Address Book 1.0.1 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Agenda Address Book 1.0.1 - 'id' SQL Injection. Author: v3n0m |
Analyze the security implications of: Joomla! Component Agenda Address Book 1.0.1 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Blog System 1.x - 'note' SQL Injection | This is a webapps exploit for php platform. Description: Blog System 1.x - 'note' SQL Injection. Author: h4ck3r |
Analyze the security implications of: Blog System 1.x - 'note' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HIOX GUEST BOOK (HGB) 4.0 - Remote Code Execution | This is a webapps exploit for php platform. Description: HIOX GUEST BOOK (HGB) 4.0 - Remote Code Execution. Author: Dj7xpl |
Analyze the security implications of: HIOX GUEST BOOK (HGB) 4.0 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 724CMS Enterprise 4.59 - SQL Injection | This is a webapps exploit for php platform. Description: 724CMS Enterprise 4.59 - SQL Injection. Author: cyberlog |
Analyze the security implications of: 724CMS Enterprise 4.59 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Advneced Management For Services Sites - File Disclosure | This is a webapps exploit for php platform. Description: Advneced Management For Services Sites - File Disclosure. Author: indoushka |
Analyze the security implications of: Advneced Management For Services Sites - File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_sef - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_sef - Remote File Inclusion. Author: Li0n-PaL |
Analyze the security implications of: Joomla! Component com_sef - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fast FAQs System - Authentication Bypass | This is a webapps exploit for php platform. Description: Fast FAQs System - Authentication Bypass. Author: x0r |
Analyze the security implications of: Fast FAQs System - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Yosoro 1.0.4 - Remote Code Execution | This is a webapps exploit for macos platform. Description: Yosoro 1.0.4 - Remote Code Execution. Author: Carlo Pelliccioni |
Analyze the security implications of: Yosoro 1.0.4 - Remote Code Execution | This exploit targets macos systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Fez 1.3/2.0 RC1 - 'list.php' SQL Injection | This is a webapps exploit for php platform. Description: Fez 1.3/2.0 RC1 - 'list.php' SQL Injection. Author: d3v1l |
Analyze the security implications of: Fez 1.3/2.0 RC1 - 'list.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Safari 10.0.3 - 'JSC::CachedCall' Use-After-Free | This is a remote exploit for macos platform. Description: Apple Safari 10.0.3 - 'JSC::CachedCall' Use-After-Free. Author: saelo & niklasb |
Analyze the security implications of: Apple Safari 10.0.3 - 'JSC::CachedCall' Use-After-Free | This exploit targets macos systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Joomla! / Mambo Component com_team - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_team - SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! / Mambo Component com_team - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pixelimity 1.0 - 'password' Cross-Site Request Forgery | This is a webapps exploit for multiple platform. Description: Pixelimity 1.0 - 'password' Cross-Site Request Forgery. Author: Noth |
Analyze the security implications of: Pixelimity 1.0 - 'password' Cross-Site Request Forgery | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: dotCMS 1.6 - 'id' Local File Inclusion | This is a webapps exploit for php platform. Description: dotCMS 1.6 - 'id' Local File Inclusion. Author: Don |
Analyze the security implications of: dotCMS 1.6 - 'id' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NuSchool 1.0 - 'CampusNewsDetails.asp' SQL Injection | This is a webapps exploit for asp platform. Description: NuSchool 1.0 - 'CampusNewsDetails.asp' SQL Injection. Author: ajann |
Analyze the security implications of: NuSchool 1.0 - 'CampusNewsDetails.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: infoware - SQL Injection | This is a webapps exploit for php platform. Description: infoware - SQL Injection. Author: cyberlog |
Analyze the security implications of: infoware - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Creasito E-Commerce Content Manager - 'admin' Authentication Bypass | This is a webapps exploit for php platform. Description: Creasito E-Commerce Content Manager - 'admin' Authentication Bypass. Author: SlimTim10 |
Analyze the security implications of: Creasito E-Commerce Content Manager - 'admin' Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Net-SNMP 4.2.3 - snmpnetstat Remote Heap Overflow | This is a remote exploit for linux platform. Description: Net-SNMP 4.2.3 - snmpnetstat Remote Heap Overflow. Author: Juan M. de la Torre |
Analyze the security implications of: Net-SNMP 4.2.3 - snmpnetstat Remote Heap Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WU-FTPD 2.6.1 - Remote Command Execution | This is a remote exploit for linux platform. Description: WU-FTPD 2.6.1 - Remote Command Execution. Author: Teso |
Analyze the security implications of: WU-FTPD 2.6.1 - Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AdminBot 9.0.5 - 'live_status.lib.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: AdminBot 9.0.5 - 'live_status.lib.php' Remote File Inclusion. Author: ThE TiGeR |
Analyze the security implications of: AdminBot 9.0.5 - 'live_status.lib.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Rae Media Real Estate Single Agent - SQL Injection | This is a webapps exploit for asp platform. Description: Rae Media Real Estate Single Agent - SQL Injection. Author: R4dc0re |
Analyze the security implications of: Rae Media Real Estate Single Agent - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: GZ Forum Script 1.8 - Stored Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: GZ Forum Script 1.8 - Stored Cross-Site Scripting (XSS). Author: CraCkEr |
Analyze the security implications of: GZ Forum Script 1.8 - Stored Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Advanced Guestbook 2.x - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Advanced Guestbook 2.x - Multiple Cross-Site Scripting Vulnerabilities. Author: Handrix |
Analyze the security implications of: Advanced Guestbook 2.x - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Atmail WebMail - Message Attachment File Name Reflected Cross-Site Scripting | This is a webapps exploit for php platform. Description: Atmail WebMail - Message Attachment File Name Reflected Cross-Site Scripting. Author: Vicente Aguilera Diaz |
Analyze the security implications of: Atmail WebMail - Message Attachment File Name Reflected Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DIR-880L - Multiple Buffer Overflow Vulnerabilities | This is a remote exploit for hardware platform. Description: D-Link DIR-880L - Multiple Buffer Overflow Vulnerabilities. Author: Samuel Huntley |
Analyze the security implications of: D-Link DIR-880L - Multiple Buffer Overflow Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - '/admin/index.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - '/admin/index.php?base_path' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - '/admin/index.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BSA Radar 1.6.7234.24750 - Cross-Site Request Forgery (Change Password) | This is a webapps exploit for hardware platform. Description: BSA Radar 1.6.7234.24750 - Cross-Site Request Forgery (Change Password). Author: William Summerhill |
Analyze the security implications of: BSA Radar 1.6.7234.24750 - Cross-Site Request Forgery (Change Password) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FreeWebShop.org 2.2.9 RC2 - 'lang_file' Local File Inclusion | This is a webapps exploit for php platform. Description: FreeWebShop.org 2.2.9 RC2 - 'lang_file' Local File Inclusion. Author: ahmadbady |
Analyze the security implications of: FreeWebShop.org 2.2.9 RC2 - 'lang_file' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Enthrallweb eNews 1.0 - Remote User Pass Change | This is a webapps exploit for asp platform. Description: Enthrallweb eNews 1.0 - Remote User Pass Change. Author: ajann |
Analyze the security implications of: Enthrallweb eNews 1.0 - Remote User Pass Change | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: AHG Search Engine 1.0 - 'search.cgi' Arbitrary Command Execution | This is a webapps exploit for cgi platform. Description: AHG Search Engine 1.0 - 'search.cgi' Arbitrary Command Execution. Author: Aleksey Sintsov |
Analyze the security implications of: AHG Search Engine 1.0 - 'search.cgi' Arbitrary Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Hosting Controller 6.1 Hotfix 3.2 - Access | This is a webapps exploit for asp platform. Description: Hosting Controller 6.1 Hotfix 3.2 - Access. Author: Soroush Dalili |
Analyze the security implications of: Hosting Controller 6.1 Hotfix 3.2 - Access | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ngIRCd 0.6/0.7/0.8 - Remote Buffer Overflow | This is a dos exploit for linux platform. Description: ngIRCd 0.6/0.7/0.8 - Remote Buffer Overflow. Author: Florian Westphal |
Analyze the security implications of: ngIRCd 0.6/0.7/0.8 - Remote Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: burnCMS 0.2 - 'root' Remote File Inclusion | This is a webapps exploit for php platform. Description: burnCMS 0.2 - 'root' Remote File Inclusion. Author: GoLd_M |
Analyze the security implications of: burnCMS 0.2 - 'root' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.