input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: D-Link DIR-615 Rev D3 / DIR-300 Rev A - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Oddsock Song Requester 2.1 WinAmp Plugin - Denial of Service
|
This is a dos exploit for cgi platform. Description: Oddsock Song Requester 2.1 WinAmp Plugin - Denial of Service. Author: Lucas Lundgren
|
Analyze the security implications of: Oddsock Song Requester 2.1 WinAmp Plugin - Denial of Service
|
This exploit targets cgi systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Allomani Movies Library 2.0 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for php platform. Description: Allomani Movies Library 2.0 - Cross-Site Request Forgery (Add Admin). Author: AtT4CKxT3rR0r1ST
|
Analyze the security implications of: Allomani Movies Library 2.0 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Maian Uploader 4.0 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Maian Uploader 4.0 - Arbitrary File Upload. Author: indoushka
|
Analyze the security implications of: Maian Uploader 4.0 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ABB Cylon Aspect 3.08.04 DeploySource - Remote Code Execution (RCE)
|
This is a remote exploit for multiple platform. Description: ABB Cylon Aspect 3.08.04 DeploySource - Remote Code Execution (RCE). Author: LiquidWorm
|
Analyze the security implications of: ABB Cylon Aspect 3.08.04 DeploySource - Remote Code Execution (RCE)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Mambo Component N-Myndir - SQL Injection
|
This is a webapps exploit for php platform. Description: Mambo Component N-Myndir - SQL Injection. Author: CoBRa_21
|
Analyze the security implications of: Mambo Component N-Myndir - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Graugon Gallery 1.0 - Cross-Site Scripting / SQL Injection / Cookie Bypass
|
This is a webapps exploit for php platform. Description: Graugon Gallery 1.0 - Cross-Site Scripting / SQL Injection / Cookie Bypass. Author: x0r
|
Analyze the security implications of: Graugon Gallery 1.0 - Cross-Site Scripting / SQL Injection / Cookie Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iMessage - NSArray Deserialization can Invoke Subclass that does not Retain References
|
This is a dos exploit for multiple platform. Description: iMessage - NSArray Deserialization can Invoke Subclass that does not Retain References. Author: Google Security Research
|
Analyze the security implications of: iMessage - NSArray Deserialization can Invoke Subclass that does not Retain References
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: WzdFTPD 0.5.4 - Remote Command Execution
|
This is a remote exploit for linux platform. Description: WzdFTPD 0.5.4 - Remote Command Execution. Author: kingcope
|
Analyze the security implications of: WzdFTPD 0.5.4 - Remote Command Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Arcadem LE 2.04 - 'loadadminpage' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Arcadem LE 2.04 - 'loadadminpage' Remote File Inclusion. Author: KnocKout
|
Analyze the security implications of: Arcadem LE 2.04 - 'loadadminpage' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jax PHP Scripts 1.0/1.34/2.14/3.31 - 'dwt_editor.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Jax PHP Scripts 1.0/1.34/2.14/3.31 - 'dwt_editor.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Lostmon
|
Analyze the security implications of: Jax PHP Scripts 1.0/1.34/2.14/3.31 - 'dwt_editor.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ImageCMS 4.0.0b - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: ImageCMS 4.0.0b - Multiple Vulnerabilities. Author: High-Tech Bridge SA
|
Analyze the security implications of: ImageCMS 4.0.0b - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP - 'Safe_mode' Bypass via 'proc_open()' and custom Environment
|
This is a local exploit for linux platform. Description: PHP - 'Safe_mode' Bypass via 'proc_open()' and custom Environment. Author: gat3way
|
Analyze the security implications of: PHP - 'Safe_mode' Bypass via 'proc_open()' and custom Environment
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: i-pos StoreFront 1.3 - 'index.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: i-pos StoreFront 1.3 - 'index.asp' SQL Injection. Author: KnocKout
|
Analyze the security implications of: i-pos StoreFront 1.3 - 'index.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Flatnuke 2.5.8 - 'userlang' Local Inclusion / Delete All Users
|
This is a webapps exploit for php platform. Description: Flatnuke 2.5.8 - 'userlang' Local Inclusion / Delete All Users. Author: rgod
|
Analyze the security implications of: Flatnuke 2.5.8 - 'userlang' Local Inclusion / Delete All Users
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GetSimple CMS Custom JS 0.1 - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: GetSimple CMS Custom JS 0.1 - Cross-Site Request Forgery. Author: boku
|
Analyze the security implications of: GetSimple CMS Custom JS 0.1 - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Active Test 2.1 - Authentication Bypass
|
This is a webapps exploit for asp platform. Description: Active Test 2.1 - Authentication Bypass. Author: R3d-D3V!L
|
Analyze the security implications of: Active Test 2.1 - Authentication Bypass
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Linux Kernel (Debian 9/10 / Ubuntu 14.04.5/16.04.2/17.04 / Fedora 23/24/25) - 'ldso_dynamic Stack Clash' Local Privilege Escalation
|
This is a local exploit for linux_x86 platform. Description: Linux Kernel (Debian 9/10 / Ubuntu 14.04.5/16.04.2/17.04 / Fedora 23/24/25) - 'ldso_dynamic Stack Clash' Local Privilege Escalation. Author: Qualys Corporation
|
Analyze the security implications of: Linux Kernel (Debian 9/10 / Ubuntu 14.04.5/16.04.2/17.04 / Fedora 23/24/25) - 'ldso_dynamic Stack Clash' Local Privilege Escalation
|
This exploit targets linux_x86 systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux_x86 platform
|
What is this exploit about: Inout QuerySpace 1.0 Script - Improper Access Restrictions
|
This is a webapps exploit for php platform. Description: Inout QuerySpace 1.0 Script - Improper Access Restrictions. Author: Ihsan Sencan
|
Analyze the security implications of: Inout QuerySpace 1.0 Script - Improper Access Restrictions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Professional Download Assistant 0.1 - Database Disclosure
|
This is a webapps exploit for asp platform. Description: Professional Download Assistant 0.1 - Database Disclosure. Author: Ghost Hacker
|
Analyze the security implications of: Professional Download Assistant 0.1 - Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: PHP Point Of Sale - 'ofc_upload_image.php' Remote Code Execution
|
This is a remote exploit for php platform. Description: PHP Point Of Sale - 'ofc_upload_image.php' Remote Code Execution. Author: Gabby
|
Analyze the security implications of: PHP Point Of Sale - 'ofc_upload_image.php' Remote Code Execution
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Chrome V8 - 'Runtime_RegExpReplace' Integer Overflow
|
This is a dos exploit for multiple platform. Description: Chrome V8 - 'Runtime_RegExpReplace' Integer Overflow. Author: Google Security Research
|
Analyze the security implications of: Chrome V8 - 'Runtime_RegExpReplace' Integer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apple Mac OSX - IOBluetoothHCIPacketLogUserClient Memory Corruption
|
This is a dos exploit for osx platform. Description: Apple Mac OSX - IOBluetoothHCIPacketLogUserClient Memory Corruption. Author: Google Security Research
|
Analyze the security implications of: Apple Mac OSX - IOBluetoothHCIPacketLogUserClient Memory Corruption
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Hospital Management System 4.0 - 'multiple' SQL Injection
|
This is a webapps exploit for php platform. Description: Hospital Management System 4.0 - 'multiple' SQL Injection. Author: nu11secur1ty
|
Analyze the security implications of: Hospital Management System 4.0 - 'multiple' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Spring Security OAuth - Open Redirector
|
This is a webapps exploit for java platform. Description: Spring Security OAuth - Open Redirector. Author: Riemann
|
Analyze the security implications of: Spring Security OAuth - Open Redirector
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Goanywhere Encryption helper 7.1.1 - Remote Code Execution (RCE)
|
This is a webapps exploit for java platform. Description: Goanywhere Encryption helper 7.1.1 - Remote Code Execution (RCE). Author: Youssef Muhammad
|
Analyze the security implications of: Goanywhere Encryption helper 7.1.1 - Remote Code Execution (RCE)
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: gpEasy 1.5RC3 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: gpEasy 1.5RC3 - Remote File Inclusion. Author: cr4wl3r
|
Analyze the security implications of: gpEasy 1.5RC3 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Logitech Media Server 8.2.0 - 'Title' Cross-Site Scripting (XSS)
|
This is a webapps exploit for multiple platform. Description: Logitech Media Server 8.2.0 - 'Title' Cross-Site Scripting (XSS). Author: Mert Daş
|
Analyze the security implications of: Logitech Media Server 8.2.0 - 'Title' Cross-Site Scripting (XSS)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Hycus CMS - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Hycus CMS - Multiple Vulnerabilities. Author: High-Tech Bridge SA
|
Analyze the security implications of: Hycus CMS - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Garage Management System 1.0 (categoriesName) - Stored XSS
|
This is a webapps exploit for multiple platform. Description: Garage Management System 1.0 (categoriesName) - Stored XSS. Author: ub3rsick
|
Analyze the security implications of: Garage Management System 1.0 (categoriesName) - Stored XSS
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Smiths Medical Medfusion 4000 - 'DHCP' Denial of Service
|
This is a dos exploit for hardware platform. Description: Smiths Medical Medfusion 4000 - 'DHCP' Denial of Service. Author: Scott Gayou
|
Analyze the security implications of: Smiths Medical Medfusion 4000 - 'DHCP' Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: EasyGallery 5.0tr - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: EasyGallery 5.0tr - Multiple Vulnerabilities. Author: JosS
|
Analyze the security implications of: EasyGallery 5.0tr - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component simpledownload 0.9.5 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component simpledownload 0.9.5 - Local File Inclusion. Author: Xr0b0t
|
Analyze the security implications of: Joomla! Component simpledownload 0.9.5 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: e107 Plugin alternate_profiles - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: e107 Plugin alternate_profiles - 'id' SQL Injection. Author: boom3rang
|
Analyze the security implications of: e107 Plugin alternate_profiles - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.