input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: SunOS 4.1.1 - '/usr/release/bin/winstall' Local Privilege Escalation
|
This is a local exploit for aix platform. Description: SunOS 4.1.1 - '/usr/release/bin/winstall' Local Privilege Escalation. Author: anonymous
|
Analyze the security implications of: SunOS 4.1.1 - '/usr/release/bin/winstall' Local Privilege Escalation
|
This exploit targets aix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: ezpack 4.2b2 - Cross-Site Scripting / SQL Injection
|
This is a webapps exploit for php platform. Description: ezpack 4.2b2 - Cross-Site Scripting / SQL Injection. Author: !-BUGJACK-!
|
Analyze the security implications of: ezpack 4.2b2 - Cross-Site Scripting / SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SolarWinds Platform 2024.1 SR1 - Race Condition
|
This is a webapps exploit for multiple platform. Description: SolarWinds Platform 2024.1 SR1 - Race Condition. Author: Elhussain Fathy
|
Analyze the security implications of: SolarWinds Platform 2024.1 SR1 - Race Condition
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: FreeBSD 3.5.1/4.2 - Ports Package 'elvrec' Local Privilege Escalation
|
This is a local exploit for bsd platform. Description: FreeBSD 3.5.1/4.2 - Ports Package 'elvrec' Local Privilege Escalation. Author: dethy
|
Analyze the security implications of: FreeBSD 3.5.1/4.2 - Ports Package 'elvrec' Local Privilege Escalation
|
This exploit targets bsd systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets bsd platform
|
What is this exploit about: Cybuzu Garoon 2.1.0 - Multiple SQL Injections
|
This is a webapps exploit for cgi platform. Description: Cybuzu Garoon 2.1.0 - Multiple SQL Injections. Author: Tan Chew Keong
|
Analyze the security implications of: Cybuzu Garoon 2.1.0 - Multiple SQL Injections
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: BOOKSolved 1.2.2 - Remote File Disclosure
|
This is a webapps exploit for php platform. Description: BOOKSolved 1.2.2 - Remote File Disclosure. Author: bd0rk
|
Analyze the security implications of: BOOKSolved 1.2.2 - Remote File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Foscam IP Camera - Predictable Credentials Security Bypass
|
This is a remote exploit for hardware platform. Description: Foscam IP Camera - Predictable Credentials Security Bypass. Author: Sergey Shekyan
|
Analyze the security implications of: Foscam IP Camera - Predictable Credentials Security Bypass
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Berlios GPSD 2.7 - Remote Format String (Metasploit)
|
This is a remote exploit for linux platform. Description: Berlios GPSD 2.7 - Remote Format String (Metasploit). Author: Enseirb
|
Analyze the security implications of: Berlios GPSD 2.7 - Remote Format String (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apple Mac OSX / iOS Kernel - IOHDIXControllUserClient::clientClose Use-After-Free/Double-Free
|
This is a dos exploit for multiple platform. Description: Apple Mac OSX / iOS Kernel - IOHDIXControllUserClient::clientClose Use-After-Free/Double-Free. Author: Google Security Research
|
Analyze the security implications of: Apple Mac OSX / iOS Kernel - IOHDIXControllUserClient::clientClose Use-After-Free/Double-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: InterPhoto Gallery - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: InterPhoto Gallery - Multiple Vulnerabilities. Author: Abysssec
|
Analyze the security implications of: InterPhoto Gallery - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eLitius 1.0 - '/manage-admin.php' Arbitrary Add Admin/Change Password
|
This is a webapps exploit for php platform. Description: eLitius 1.0 - '/manage-admin.php' Arbitrary Add Admin/Change Password. Author: ThE g0bL!N
|
Analyze the security implications of: eLitius 1.0 - '/manage-admin.php' Arbitrary Add Admin/Change Password
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Grsecurity Kernel Patch 1.9.4 (Linux Kernel) - Memory Protection
|
This is a local exploit for linux platform. Description: Grsecurity Kernel Patch 1.9.4 (Linux Kernel) - Memory Protection. Author: Guillaume PELAT
|
Analyze the security implications of: Grsecurity Kernel Patch 1.9.4 (Linux Kernel) - Memory Protection
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: KB Login Authentication Script 1.1 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: KB Login Authentication Script 1.1 - Authentication Bypass. Author: Ihsan Sencan
|
Analyze the security implications of: KB Login Authentication Script 1.1 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eCommerce Corporation Online Store Kit 3.0 - 'listing.php?id' SQL Injection
|
This is a webapps exploit for php platform. Description: eCommerce Corporation Online Store Kit 3.0 - 'listing.php?id' SQL Injection. Author: G00db0y
|
Analyze the security implications of: eCommerce Corporation Online Store Kit 3.0 - 'listing.php?id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: e-Soft24 PTC Script 1.2 - 'login.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: e-Soft24 PTC Script 1.2 - 'login.php' Multiple Cross-Site Scripting Vulnerabilities. Author: 599eme Man
|
Analyze the security implications of: e-Soft24 PTC Script 1.2 - 'login.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ArcadeBuilder Game Portal Manager 1.7 - SQL Injection
|
This is a webapps exploit for php platform. Description: ArcadeBuilder Game Portal Manager 1.7 - SQL Injection. Author: t0pP8uZz
|
Analyze the security implications of: ArcadeBuilder Game Portal Manager 1.7 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Land Down Under 800/801 - 'links.php?w' SQL Injection
|
This is a webapps exploit for php platform. Description: Land Down Under 800/801 - 'links.php?w' SQL Injection. Author: bl2k
|
Analyze the security implications of: Land Down Under 800/801 - 'links.php?w' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Active Test 2.1 - 'QuizID' Blind SQL Injection
|
This is a webapps exploit for asp platform. Description: Active Test 2.1 - 'QuizID' Blind SQL Injection. Author: R3d-D3V!L
|
Analyze the security implications of: Active Test 2.1 - 'QuizID' Blind SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component Card View JX - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Joomla! Component Card View JX - Cross-Site Scripting. Author: Valentin
|
Analyze the security implications of: Joomla! Component Card View JX - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cornerstone CMS - SQL Injection
|
This is a webapps exploit for php platform. Description: Cornerstone CMS - SQL Injection. Author: Th3 RDX
|
Analyze the security implications of: Cornerstone CMS - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Inout Article Base Ultimate - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Inout Article Base Ultimate - Arbitrary File Upload. Author: SONIC
|
Analyze the security implications of: Inout Article Base Ultimate - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Groupon Clone Script 3.01 - 'state_id' / 'search' SQL Injection
|
This is a webapps exploit for php platform. Description: Groupon Clone Script 3.01 - 'state_id' / 'search' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Groupon Clone Script 3.01 - 'state_id' / 'search' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adobe Reader for Android < 11.2.0 - 'addJavascriptInterface' Local Overflow (Metasploit)
|
This is a local exploit for arm platform. Description: Adobe Reader for Android < 11.2.0 - 'addJavascriptInterface' Local Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: Adobe Reader for Android < 11.2.0 - 'addJavascriptInterface' Local Overflow (Metasploit)
|
This exploit targets arm systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets arm platform
|
What is this exploit about: Joomla! Component onisQuotes 2.5 - 'tag' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component onisQuotes 2.5 - 'tag' SQL Injection. Author: Persian Hack Team
|
Analyze the security implications of: Joomla! Component onisQuotes 2.5 - 'tag' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BestWebApp Dating Site - 'login_form.asp?msg' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: BestWebApp Dating Site - 'login_form.asp?msg' Cross-Site Scripting. Author: laurent gaffie
|
Analyze the security implications of: BestWebApp Dating Site - 'login_form.asp?msg' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Astium VoIP PBX 2.1 build 25399 - Remote Crash (PoC)
|
This is a dos exploit for linux platform. Description: Astium VoIP PBX 2.1 build 25399 - Remote Crash (PoC). Author: xistence
|
Analyze the security implications of: Astium VoIP PBX 2.1 build 25399 - Remote Crash (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: GnomeHack - Local Buffer Overflow
|
This is a local exploit for linux platform. Description: GnomeHack - Local Buffer Overflow. Author: Cody Tubbs
|
Analyze the security implications of: GnomeHack - Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Cezanne 6.5.1/7 - 'CznCustomContainer.asp' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for asp platform. Description: Cezanne 6.5.1/7 - 'CznCustomContainer.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: Juan de la Fuente Costa
|
Analyze the security implications of: Cezanne 6.5.1/7 - 'CznCustomContainer.asp' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component com_jnews 8.5.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_jnews 8.5.1 - SQL Injection. Author: Omer Ramić
|
Analyze the security implications of: Joomla! Component com_jnews 8.5.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Netgear ReadyNAS - Perl Code Evaluation (Metasploit)
|
This is a remote exploit for hardware platform. Description: Netgear ReadyNAS - Perl Code Evaluation (Metasploit). Author: Metasploit
|
Analyze the security implications of: Netgear ReadyNAS - Perl Code Evaluation (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: AtomatiCMS - Upload Arbitrary File
|
This is a webapps exploit for asp platform. Description: AtomatiCMS - Upload Arbitrary File. Author: Abysssec
|
Analyze the security implications of: AtomatiCMS - Upload Arbitrary File
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: adaptweb 0.9.2 - Local File Inclusion / SQL Injection
|
This is a webapps exploit for php platform. Description: adaptweb 0.9.2 - Local File Inclusion / SQL Injection. Author: SirGod
|
Analyze the security implications of: adaptweb 0.9.2 - Local File Inclusion / SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: U.S.Robotics USR5463 0.06 Firmware - 'setup_ddns.exe' HTML Injection
|
This is a remote exploit for hardware platform. Description: U.S.Robotics USR5463 0.06 Firmware - 'setup_ddns.exe' HTML Injection. Author: SH4V
|
Analyze the security implications of: U.S.Robotics USR5463 0.06 Firmware - 'setup_ddns.exe' HTML Injection
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: OpenText Documentum Content Server - Privilege Escalation
|
This is a webapps exploit for multiple platform. Description: OpenText Documentum Content Server - Privilege Escalation. Author: Andrey B. Panfilov
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.