input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Apple Intel HD 3000 Graphics Driver 10.0.0 - Local Privilege Escalation | This is a local exploit for osx platform. Description: Apple Intel HD 3000 Graphics Driver 10.0.0 - Local Privilege Escalation. Author: Piotr Bania |
Analyze the security implications of: Apple Intel HD 3000 Graphics Driver 10.0.0 - Local Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: IBM AIX 3.2.5 - 'login(1)' Privilege Escalation | This is a remote exploit for aix platform. Description: IBM AIX 3.2.5 - 'login(1)' Privilege Escalation. Author: anonymous |
Analyze the security implications of: IBM AIX 3.2.5 - 'login(1)' Privilege Escalation | This exploit targets aix systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: D2-Shoutbox 4.2 IPB Mod - 'load' SQL Injection | This is a webapps exploit for php platform. Description: D2-Shoutbox 4.2 IPB Mod - 'load' SQL Injection. Author: SkOd |
Analyze the security implications of: D2-Shoutbox 4.2 IPB Mod - 'load' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GForge 4.6/4.5/3.1 - 'Verify.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: GForge 4.6/4.5/3.1 - 'Verify.php' Cross-Site Scripting. Author: Jose Sanchez |
Analyze the security implications of: GForge 4.6/4.5/3.1 - 'Verify.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nessus Web UI 2.3.3 - Persistent Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Nessus Web UI 2.3.3 - Persistent Cross-Site Scripting. Author: Frank Lycops |
Analyze the security implications of: Nessus Web UI 2.3.3 - Persistent Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BEESCMS 4.0 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: BEESCMS 4.0 - Cross-Site Request Forgery (Add Admin). Author: bay0net |
Analyze the security implications of: BEESCMS 4.0 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MOJO's IWms 7 - SQL Injection / Cross-Site Scripting | This is a webapps exploit for asp platform. Description: MOJO's IWms 7 - SQL Injection / Cross-Site Scripting. Author: cp77fk4r |
Analyze the security implications of: MOJO's IWms 7 - SQL Injection / Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Fuzzylime CMS 3.03a - Local Inclusion / Arbitrary File Corruption | This is a webapps exploit for php platform. Description: Fuzzylime CMS 3.03a - Local Inclusion / Arbitrary File Corruption. Author: StAkeR |
Analyze the security implications of: Fuzzylime CMS 3.03a - Local Inclusion / Arbitrary File Corruption | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MiniWeb HTTP Server 0.8.19 - Buffer Overflow (PoC) | This is a webapps exploit for multiple platform. Description: MiniWeb HTTP Server 0.8.19 - Buffer Overflow (PoC). Author: securityforeveryone.com |
Analyze the security implications of: MiniWeb HTTP Server 0.8.19 - Buffer Overflow (PoC) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AFCommerce - 'adblock.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: AFCommerce - 'adblock.php' Remote File Inclusion. Author: NoGe |
Analyze the security implications of: AFCommerce - 'adblock.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component jesectionfinder - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component jesectionfinder - Local File Inclusion. Author: Sid3^effects |
Analyze the security implications of: Joomla! Component jesectionfinder - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zimbra 8.0.9 GA - Cross-Site Request Forgery | This is a webapps exploit for linux platform. Description: Zimbra 8.0.9 GA - Cross-Site Request Forgery. Author: Sysdream |
Analyze the security implications of: Zimbra 8.0.9 GA - Cross-Site Request Forgery | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: EuroTel ETL3100 - Transmitter Default Credentials | This is a remote exploit for hardware platform. Description: EuroTel ETL3100 - Transmitter Default Credentials. Author: LiquidWorm |
Analyze the security implications of: EuroTel ETL3100 - Transmitter Default Credentials | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: dotWidget for articles 2.0 - '/admin/index.php' Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: dotWidget for articles 2.0 - '/admin/index.php' Multiple Remote File Inclusions. Author: SwEET-DeViL |
Analyze the security implications of: dotWidget for articles 2.0 - '/admin/index.php' Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adiscon LogAnalyzer v.4.1.13 - Cross Site Scripting | This is a webapps exploit for php platform. Description: Adiscon LogAnalyzer v.4.1.13 - Cross Site Scripting. Author: Pedro |
Analyze the security implications of: Adiscon LogAnalyzer v.4.1.13 - Cross Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Zh GoogleMap 8.4.0.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Zh GoogleMap 8.4.0.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Zh GoogleMap 8.4.0.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 - Remote Code Execution | This is a webapps exploit for hardware platform. Description: EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 - Remote Code Execution. Author: LiquidWorm |
Analyze the security implications of: EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CMS Made Simple 1.6.6 - Local File Inclusion / Cross-Site Scripting | This is a webapps exploit for php platform. Description: CMS Made Simple 1.6.6 - Local File Inclusion / Cross-Site Scripting. Author: Beenu Arora |
Analyze the security implications of: CMS Made Simple 1.6.6 - Local File Inclusion / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wireshark - hiqnet_display_data Static Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: Wireshark - hiqnet_display_data Static Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: Wireshark - hiqnet_display_data Static Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ID Software Quake 1.9 - Denial of Service | This is a dos exploit for multiple platform. Description: ID Software Quake 1.9 - Denial of Service. Author: Andy Gavin |
Analyze the security implications of: ID Software Quake 1.9 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Carousel Flash Image Gallery - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Carousel Flash Image Gallery - Remote File Inclusion. Author: Crackers_Child |
Analyze the security implications of: Joomla! Component Carousel Flash Image Gallery - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Simple PHP Blog 0.4 - 'preview_cgi.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cgi platform. Description: Simple PHP Blog 0.4 - 'preview_cgi.php' Multiple Cross-Site Scripting Vulnerabilities. Author: enji@infosys.tuwien.ac.at |
Analyze the security implications of: Simple PHP Blog 0.4 - 'preview_cgi.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: CcMail 1.0.1 - 'functions_dir' Remote File Inclusion | This is a webapps exploit for php platform. Description: CcMail 1.0.1 - 'functions_dir' Remote File Inclusion. Author: Crackers_Child |
Analyze the security implications of: CcMail 1.0.1 - 'functions_dir' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Golf Course Guide 0.9.6.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Golf Course Guide 0.9.6.0 - SQL Injection. Author: Valentin |
Analyze the security implications of: Joomla! Component Golf Course Guide 0.9.6.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LiveWorld Multiple Products - Cross Site Scripting | This is a webapps exploit for asp platform. Description: LiveWorld Multiple Products - Cross Site Scripting. Author: GulfTech Security |
Analyze the security implications of: LiveWorld Multiple Products - Cross Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: 4CMS - SQL Injection / Local File Inclusion | This is a webapps exploit for php platform. Description: 4CMS - SQL Injection / Local File Inclusion. Author: k1ll3r_null |
Analyze the security implications of: 4CMS - SQL Injection / Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BitMover BitKeeper 3.0 - Daemon Mode Remote Command Execution | This is a remote exploit for multiple platform. Description: BitMover BitKeeper 3.0 - Daemon Mode Remote Command Execution. Author: Maurycy Prodeus |
Analyze the security implications of: BitMover BitKeeper 3.0 - Daemon Mode Remote Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Openlitespeed 1.7.9 - 'Notes' Stored Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Openlitespeed 1.7.9 - 'Notes' Stored Cross-Site Scripting. Author: cmOs |
Analyze the security implications of: Openlitespeed 1.7.9 - 'Notes' Stored Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: asp inline Corporate Calendar - SQL Injection / Cross-Site Scripting | This is a webapps exploit for asp platform. Description: asp inline Corporate Calendar - SQL Injection / Cross-Site Scripting. Author: Bl@ckbe@rD |
Analyze the security implications of: asp inline Corporate Calendar - SQL Injection / Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apache HTTP Server 2.4.50 - Remote Code Execution (RCE) (3) | This is a webapps exploit for multiple platform. Description: Apache HTTP Server 2.4.50 - Remote Code Execution (RCE) (3). Author: Valentin Lobstein |
Analyze the security implications of: Apache HTTP Server 2.4.50 - Remote Code Execution (RCE) (3) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Categories hierarchy phpBB Mod 2.1.2 - 'phpbb_root_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Categories hierarchy phpBB Mod 2.1.2 - 'phpbb_root_path' Remote File Inclusion. Author: Mehmet Ince |
Analyze the security implications of: Categories hierarchy phpBB Mod 2.1.2 - 'phpbb_root_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple iPhone 2.2.1 - Call Approval Dialog Security Bypass (1) | This is a remote exploit for hardware platform. Description: Apple iPhone 2.2.1 - Call Approval Dialog Security Bypass (1). Author: Collin Mulliner |
Analyze the security implications of: Apple iPhone 2.2.1 - Call Approval Dialog Security Bypass (1) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: OpenX - 'banner-edit.php' Arbitrary File Upload / PHP Code Execution (Metasploit) | This is a remote exploit for php platform. Description: OpenX - 'banner-edit.php' Arbitrary File Upload / PHP Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: OpenX - 'banner-edit.php' Arbitrary File Upload / PHP Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kayako SupportSuite 3.x - '/staff/index.php?customfieldlinkid' SQL Injection | This is a webapps exploit for php platform. Description: Kayako SupportSuite 3.x - '/staff/index.php?customfieldlinkid' SQL Injection. Author: GulfTech Security |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.