input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Libsafe 2.0 - Multi-threaded Process Race Condition Security Bypass
|
This is a dos exploit for linux platform. Description: Libsafe 2.0 - Multi-threaded Process Race Condition Security Bypass. Author: Overflow.pl
|
Analyze the security implications of: Libsafe 2.0 - Multi-threaded Process Race Condition Security Bypass
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_bookJoomlas 0.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_bookJoomlas 0.1 - SQL Injection. Author: Salvatore Fresta
|
Analyze the security implications of: Joomla! Component com_bookJoomlas 0.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: NIBE heat pump - Remote Code Execution
|
This is a webapps exploit for cgi platform. Description: NIBE heat pump - Remote Code Execution. Author: Jelmer de Hen
|
Analyze the security implications of: NIBE heat pump - Remote Code Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Dlili Script - SQL Injection
|
This is a webapps exploit for php platform. Description: Dlili Script - SQL Injection. Author: Dr.DaShEr
|
Analyze the security implications of: Dlili Script - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: e107 Plugin EasyShop - 'category_id' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: e107 Plugin EasyShop - 'category_id' Blind SQL Injection. Author: StAkeR
|
Analyze the security implications of: e107 Plugin EasyShop - 'category_id' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Asbru Web Content Management System 9.2.7 - Multiple Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: Asbru Web Content Management System 9.2.7 - Multiple Vulnerabilities. Author: LiquidWorm
|
Analyze the security implications of: Asbru Web Content Management System 9.2.7 - Multiple Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Cacti 0.8.x - 'graph.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Cacti 0.8.x - 'graph.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Moritz Naumann
|
Analyze the security implications of: Cacti 0.8.x - 'graph.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CE Phoenix v1.0.8.20 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: CE Phoenix v1.0.8.20 - Remote Code Execution. Author: tmrswrr
|
Analyze the security implications of: CE Phoenix v1.0.8.20 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AssetMan 2.5-b - SQL Injection using Session Fixation
|
This is a webapps exploit for php platform. Description: AssetMan 2.5-b - SQL Injection using Session Fixation. Author: Neo Anderson
|
Analyze the security implications of: AssetMan 2.5-b - SQL Injection using Session Fixation
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Eskolar CMS 0.9.0.0 - 'index.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Eskolar CMS 0.9.0.0 - 'index.php' SQL Injection. Author: HACKERS PAL
|
Analyze the security implications of: Eskolar CMS 0.9.0.0 - 'index.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IDevSpot iSupport 1.8 - 'index.php?cons_page_title' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: IDevSpot iSupport 1.8 - 'index.php?cons_page_title' Cross-Site Scripting. Author: s3rv3r_hack3r
|
Analyze the security implications of: IDevSpot iSupport 1.8 - 'index.php?cons_page_title' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: iScripts EasySnaps 2.0 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: iScripts EasySnaps 2.0 - Multiple SQL Injections. Author: Salvatore Fresta
|
Analyze the security implications of: iScripts EasySnaps 2.0 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MakeBook 2.2 - Form Field Input Validation
|
This is a webapps exploit for cgi platform. Description: MakeBook 2.2 - Form Field Input Validation. Author: b0iler
|
Analyze the security implications of: MakeBook 2.2 - Form Field Input Validation
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: ImageMagick 7.1.0-49 - DoS
|
This is a dos exploit for php platform. Description: ImageMagick 7.1.0-49 - DoS. Author: nu11secur1ty
|
Analyze the security implications of: ImageMagick 7.1.0-49 - DoS
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco Video Surveillance Operations Manager 6.3.2 - Multiple Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: Cisco Video Surveillance Operations Manager 6.3.2 - Multiple Vulnerabilities. Author: Bassem
|
Analyze the security implications of: Cisco Video Surveillance Operations Manager 6.3.2 - Multiple Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: City Reviewer - 'search.php' Script SQL Injection
|
This is a webapps exploit for php platform. Description: City Reviewer - 'search.php' Script SQL Injection. Author: 3spi0n
|
Analyze the security implications of: City Reviewer - 'search.php' Script SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AVM FRITZ!Box < 6.30 - Remote Buffer Overflow
|
This is a remote exploit for hardware platform. Description: AVM FRITZ!Box < 6.30 - Remote Buffer Overflow. Author: RedTeam Pentesting
|
Analyze the security implications of: AVM FRITZ!Box < 6.30 - Remote Buffer Overflow
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Mambo Component SimpleBoard 1.0.3 - 'catid' SQL Injection
|
This is a webapps exploit for php platform. Description: Mambo Component SimpleBoard 1.0.3 - 'catid' SQL Injection. Author: it's my
|
Analyze the security implications of: Mambo Component SimpleBoard 1.0.3 - 'catid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Daily Tracker System 1.0 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Daily Tracker System 1.0 - Authentication Bypass. Author: Adeeb Shah
|
Analyze the security implications of: Daily Tracker System 1.0 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GL.iNet AR300M v3.216 Remote Code Execution - CVE-2023-46456 Exploit
|
This is a remote exploit for hardware platform. Description: GL.iNet AR300M v3.216 Remote Code Execution - CVE-2023-46456 Exploit. Author: cyberaz0r
|
Analyze the security implications of: GL.iNet AR300M v3.216 Remote Code Execution - CVE-2023-46456 Exploit
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: LokiCMS 0.3.3 - Arbitrary File Delete
|
This is a webapps exploit for php platform. Description: LokiCMS 0.3.3 - Arbitrary File Delete. Author: cOndemned
|
Analyze the security implications of: LokiCMS 0.3.3 - Arbitrary File Delete
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Memcached 1.4.33 - 'Add' (PoC)
|
This is a dos exploit for linux platform. Description: Memcached 1.4.33 - 'Add' (PoC). Author: p0wd3r / dawu
|
Analyze the security implications of: Memcached 1.4.33 - 'Add' (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Wireshark - addresses_equal 'dissect_rsvp_common' Use-After-Free
|
This is a dos exploit for multiple platform. Description: Wireshark - addresses_equal 'dissect_rsvp_common' Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: Wireshark - addresses_equal 'dissect_rsvp_common' Use-After-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation. Author: rebel
|
Analyze the security implications of: Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Fly-High CMS 2012-07-08 - Unrestricted Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Fly-High CMS 2012-07-08 - Unrestricted Arbitrary File Upload. Author: CWH Underground
|
Analyze the security implications of: Fly-High CMS 2012-07-08 - Unrestricted Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Caucho Resin - '/resin-admin/' URI Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Caucho Resin - '/resin-admin/' URI Cross-Site Scripting. Author: Gjoko Krstic
|
Analyze the security implications of: Caucho Resin - '/resin-admin/' URI Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WordPress Core 4.0 - Denial of Service
|
This is a dos exploit for php platform. Description: WordPress Core 4.0 - Denial of Service. Author: SECURELI.com
|
Analyze the security implications of: WordPress Core 4.0 - Denial of Service
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Lowest Unique Bid Auction - SQL Injection
|
This is a webapps exploit for php platform. Description: Lowest Unique Bid Auction - SQL Injection. Author: 3spi0n
|
Analyze the security implications of: Lowest Unique Bid Auction - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BandSite CMS 1.1 - 'sendemail.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: BandSite CMS 1.1 - 'sendemail.php' Cross-Site Scripting. Author: HACKERS PAL
|
Analyze the security implications of: BandSite CMS 1.1 - 'sendemail.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AuraCMS 2.2.2 - '/pages_data.php' Arbitrary Edit/Add/Delete
|
This is a webapps exploit for php platform. Description: AuraCMS 2.2.2 - '/pages_data.php' Arbitrary Edit/Add/Delete. Author: k1tk4t
|
Analyze the security implications of: AuraCMS 2.2.2 - '/pages_data.php' Arbitrary Edit/Add/Delete
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Complaint Management System 4.2 - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Complaint Management System 4.2 - Persistent Cross-Site Scripting. Author: Besim
|
Analyze the security implications of: Complaint Management System 4.2 - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component ArtForms 2.1b7.2 rc2 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Joomla! Component ArtForms 2.1b7.2 rc2 - Multiple Vulnerabilities. Author: Salvatore Fresta
|
Analyze the security implications of: Joomla! Component ArtForms 2.1b7.2 rc2 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CustomCMS 4.0 - 'print.php' SQL Injection
|
This is a webapps exploit for php platform. Description: CustomCMS 4.0 - 'print.php' SQL Injection. Author: ~!Dok_tOR!~
|
Analyze the security implications of: CustomCMS 4.0 - 'print.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Kasra CMS - 'index.php' Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Kasra CMS - 'index.php' Multiple SQL Injections. Author: G4N0K
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.