input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Franklin Fueling Systems TS-550 - Exploit and Default Password | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: SilverSHielD 6.x - Local Privilege Escalation | This is a local exploit for multiple platform. Description: SilverSHielD 6.x - Local Privilege Escalation. Author: Ian Bredemeyer |
Analyze the security implications of: SilverSHielD 6.x - Local Privilege Escalation | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Kietu 2/3 - 'index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Kietu 2/3 - 'index.php' Remote File Inclusion. Author: Himeur Nourredine |
Analyze the security implications of: Kietu 2/3 - 'index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Galleristic 1.0 - 'cat' SQL Injection | This is a webapps exploit for php platform. Description: Galleristic 1.0 - 'cat' SQL Injection. Author: cOndemned |
Analyze the security implications of: Galleristic 1.0 - 'cat' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Imagam iFiles 1.16.0 iOS - Multiple Web Vulnerabilities | This is a webapps exploit for ios platform. Description: Imagam iFiles 1.16.0 iOS - Multiple Web Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Imagam iFiles 1.16.0 iOS - Multiple Web Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Feetan Inc WireShare 1.9.1 iOS - Persistent | This is a webapps exploit for ios platform. Description: Feetan Inc WireShare 1.9.1 iOS - Persistent. Author: Vulnerability-Lab |
Analyze the security implications of: Feetan Inc WireShare 1.9.1 iOS - Persistent | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Conky Linux 1.8.0 - Local Denial of Service (PoC) | This is a dos exploit for linux platform. Description: Conky Linux 1.8.0 - Local Denial of Service (PoC). Author: Arturo D'Elia |
Analyze the security implications of: Conky Linux 1.8.0 - Local Denial of Service (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Content Management System for Phprojekt 0.6.1 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Content Management System for Phprojekt 0.6.1 - Remote File Inclusion. Author: RoMaNcYxHaCkEr |
Analyze the security implications of: Content Management System for Phprojekt 0.6.1 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cells Blog 3.3 - Reflected Cross-Site Scripting / Blind SQLite Injection | This is a webapps exploit for php platform. Description: Cells Blog 3.3 - Reflected Cross-Site Scripting / Blind SQLite Injection. Author: vinicius777 |
Analyze the security implications of: Cells Blog 3.3 - Reflected Cross-Site Scripting / Blind SQLite Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Web Wiz Guestbook 8.21 - Database Disclosure | This is a webapps exploit for asp platform. Description: Web Wiz Guestbook 8.21 - Database Disclosure. Author: Cold Zero |
Analyze the security implications of: Web Wiz Guestbook 8.21 - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: iGiveTest 2.1.0 - SQL Injection | This is a webapps exploit for php platform. Description: iGiveTest 2.1.0 - SQL Injection. Author: Brendan Coles |
Analyze the security implications of: iGiveTest 2.1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BrudaGB 1.1 - '/admin/index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: BrudaGB 1.1 - '/admin/index.php' Remote File Inclusion. Author: SHiKaA |
Analyze the security implications of: BrudaGB 1.1 - '/admin/index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cayin Digital Signage System xPost 2.5 - Remote Command Injection | This is a webapps exploit for multiple platform. Description: Cayin Digital Signage System xPost 2.5 - Remote Command Injection. Author: LiquidWorm |
Analyze the security implications of: Cayin Digital Signage System xPost 2.5 - Remote Command Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Avant Browser 11.7 Build 9 - JavaScript Engine Integer Overflow | This is a dos exploit for multiple platform. Description: Avant Browser 11.7 Build 9 - JavaScript Engine Integer Overflow. Author: 0x90 |
Analyze the security implications of: Avant Browser 11.7 Build 9 - JavaScript Engine Integer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Digital Ultrix 4.0/4.1 - '/usr/bin/chroot' Local Privilege Escalation | This is a local exploit for aix platform. Description: Digital Ultrix 4.0/4.1 - '/usr/bin/chroot' Local Privilege Escalation. Author: anonymous |
Analyze the security implications of: Digital Ultrix 4.0/4.1 - '/usr/bin/chroot' Local Privilege Escalation | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Webhints 1.03 - Remote Command Execution (C) (2) | This is a webapps exploit for cgi platform. Description: Webhints 1.03 - Remote Command Execution (C) (2). Author: Alpha_Programmer |
Analyze the security implications of: Webhints 1.03 - Remote Command Execution (C) (2) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Getsimple CMS 3.2.1 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Getsimple CMS 3.2.1 - Arbitrary File Upload. Author: Ahmed Elhady Mohamed |
Analyze the security implications of: Getsimple CMS 3.2.1 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iknSupport 'search' Module - Cross-Site Scripting | This is a webapps exploit for php platform. Description: iknSupport 'search' Module - Cross-Site Scripting. Author: Red Security TEAM |
Analyze the security implications of: iknSupport 'search' Module - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fastream NETFile FTP/Web Server 6.5/6.7 - Directory Traversal | This is a webapps exploit for cgi platform. Description: Fastream NETFile FTP/Web Server 6.5/6.7 - Directory Traversal. Author: Andres Tarasco Acuna |
Analyze the security implications of: Fastream NETFile FTP/Web Server 6.5/6.7 - Directory Traversal | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: FreeType - '.TTF' File Remote Denial of Service | This is a dos exploit for multiple platform. Description: FreeType - '.TTF' File Remote Denial of Service. Author: Josh Bressers |
Analyze the security implications of: FreeType - '.TTF' File Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Iris ID IrisAccess ICU 7000-2 - Remote Command Execution | This is a webapps exploit for cgi platform. Description: Iris ID IrisAccess ICU 7000-2 - Remote Command Execution. Author: LiquidWorm |
Analyze the security implications of: Iris ID IrisAccess ICU 7000-2 - Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: X-ice News System 1.0 - 'devami.asp?id' SQL Injection | This is a webapps exploit for asp platform. Description: X-ice News System 1.0 - 'devami.asp?id' SQL Injection. Author: CyberGhost |
Analyze the security implications of: X-ice News System 1.0 - 'devami.asp?id' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Mozilla Firefox/Thunderbird/SeaMonkey - Chrome-Loaded About:Blank Script Execution | This is a remote exploit for linux platform. Description: Mozilla Firefox/Thunderbird/SeaMonkey - Chrome-Loaded About:Blank Script Execution. Author: moz_bug_r_a4 |
Analyze the security implications of: Mozilla Firefox/Thunderbird/SeaMonkey - Chrome-Loaded About:Blank Script Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Tunnelblick - Setuid Privilege Escalation (Metasploit) | This is a local exploit for osx platform. Description: Tunnelblick - Setuid Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Tunnelblick - Setuid Privilege Escalation (Metasploit) | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: CactuSoft CactuShop 5.0/5.1 - Cross-Site Scripting | This is a webapps exploit for asp platform. Description: CactuSoft CactuShop 5.0/5.1 - Cross-Site Scripting. Author: Nick Gudov |
Analyze the security implications of: CactuSoft CactuShop 5.0/5.1 - Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: QEMU 0.9 - Translation Block Local Denial of Service | This is a dos exploit for linux platform. Description: QEMU 0.9 - Translation Block Local Denial of Service. Author: TeLeMan |
Analyze the security implications of: QEMU 0.9 - Translation Block Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PHP 5.2.10/5.3 - 'ini_restore()' Memory Information Disclosure (1) | This is a remote exploit for php platform. Description: PHP 5.2.10/5.3 - 'ini_restore()' Memory Information Disclosure (1). Author: Maksymilian Arciemowicz |
Analyze the security implications of: PHP 5.2.10/5.3 - 'ini_restore()' Memory Information Disclosure (1) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gearbox Software Halo Game 1.x - Client Remote Denial of Service | This is a dos exploit for multiple platform. Description: Gearbox Software Halo Game 1.x - Client Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Gearbox Software Halo Game 1.x - Client Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AnotherPHPBook (APB) 1.3.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: AnotherPHPBook (APB) 1.3.0 - Authentication Bypass. Author: n3w7u |
Analyze the security implications of: AnotherPHPBook (APB) 1.3.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Duhok Forum 1.0 script - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Duhok Forum 1.0 script - Cross-Site Scripting. Author: indoushka |
Analyze the security implications of: Duhok Forum 1.0 script - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Enthrallweb eCars 1.0 - 'types.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Enthrallweb eCars 1.0 - 'types.asp' SQL Injection. Author: ajann |
Analyze the security implications of: Enthrallweb eCars 1.0 - 'types.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Employee Management System 1.0 - _txtfullname_ and _txtphone_ SQL Injection | This is a webapps exploit for php platform. Description: Employee Management System 1.0 - _txtfullname_ and _txtphone_ SQL Injection. Author: Yevhenii Butenko |
Analyze the security implications of: Employee Management System 1.0 - _txtfullname_ and _txtphone_ SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jenkins Plugin Script Security 1.49/Declarative 1.3.4/Groovy 2.60 - Remote Code Execution | This is a webapps exploit for java platform. Description: Jenkins Plugin Script Security 1.49/Declarative 1.3.4/Groovy 2.60 - Remote Code Execution. Author: wetw0rk |
Analyze the security implications of: Jenkins Plugin Script Security 1.49/Declarative 1.3.4/Groovy 2.60 - Remote Code Execution | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Apple Mac OSX Server 10.5 - Wiki Server Directory Traversal | This is a remote exploit for osx platform. Description: Apple Mac OSX Server 10.5 - Wiki Server Directory Traversal. Author: Rodrigo Carvalho |
Analyze the security implications of: Apple Mac OSX Server 10.5 - Wiki Server Directory Traversal | This exploit targets osx systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.