input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Visual Tools DVR VX16 4.2.28 - Local Privilege Escalation
|
This is a webapps exploit for hardware platform. Description: Visual Tools DVR VX16 4.2.28 - Local Privilege Escalation. Author: Andrea D\'Ubaldo
|
Analyze the security implications of: Visual Tools DVR VX16 4.2.28 - Local Privilege Escalation
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Sun Java JDK 1.x - Multiple Vulnerabilities
|
This is a remote exploit for linux platform. Description: Sun Java JDK 1.x - Multiple Vulnerabilities. Author: Chris Evans
|
Analyze the security implications of: Sun Java JDK 1.x - Multiple Vulnerabilities
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Fusebox 4.1 - 'index.cfm' Cross-Site Scripting
|
This is a webapps exploit for cfm platform. Description: Fusebox 4.1 - 'index.cfm' Cross-Site Scripting. Author: N.N.P
|
Analyze the security implications of: Fusebox 4.1 - 'index.cfm' Cross-Site Scripting
|
This exploit targets cfm systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cfm platform
|
What is this exploit about: Alguest 1.1c-patched - 'elimina' SQL Injection
|
This is a webapps exploit for php platform. Description: Alguest 1.1c-patched - 'elimina' SQL Injection. Author: Aliaksandr Hartsuyeu
|
Analyze the security implications of: Alguest 1.1c-patched - 'elimina' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jenkins 2.63 - Sandbox bypass in pipeline: Groovy plug-in
|
This is a webapps exploit for java platform. Description: Jenkins 2.63 - Sandbox bypass in pipeline: Groovy plug-in. Author: Daniel Morris
|
Analyze the security implications of: Jenkins 2.63 - Sandbox bypass in pipeline: Groovy plug-in
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Xine 0.99.x - Filename Handling Remote Format String
|
This is a dos exploit for linux platform. Description: Xine 0.99.x - Filename Handling Remote Format String. Author: KaDaL-X
|
Analyze the security implications of: Xine 0.99.x - Filename Handling Remote Format String
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: J! Reactions 1.8.1 - comPath Remote File Inclusion
|
This is a webapps exploit for php platform. Description: J! Reactions 1.8.1 - comPath Remote File Inclusion. Author: Yollubunlar.Org
|
Analyze the security implications of: J! Reactions 1.8.1 - comPath Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ICGames-Games Site Script 1.2 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: ICGames-Games Site Script 1.2 - Authentication Bypass. Author: Ihsan Sencan
|
Analyze the security implications of: ICGames-Games Site Script 1.2 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BookReview 1.0 - 'add_classification.htm?isbn' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: BookReview 1.0 - 'add_classification.htm?isbn' Cross-Site Scripting. Author: Lostmon
|
Analyze the security implications of: BookReview 1.0 - 'add_classification.htm?isbn' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 3Com OfficeConnect - Code Execution
|
This is a remote exploit for hardware platform. Description: 3Com OfficeConnect - Code Execution. Author: Andrea Fabizi
|
Analyze the security implications of: 3Com OfficeConnect - Code Execution
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Content2Web 1.0.1 - Multiple Input Validation Vulnerabilities
|
This is a webapps exploit for php platform. Description: Content2Web 1.0.1 - Multiple Input Validation Vulnerabilities. Author: Security Tester
|
Analyze the security implications of: Content2Web 1.0.1 - Multiple Input Validation Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: dotProject 2.1.2 - Multiple SQL Injections / Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: dotProject 2.1.2 - Multiple SQL Injections / Cross-Site Scripting Vulnerabilities. Author: C1c4Tr1Z
|
Analyze the security implications of: dotProject 2.1.2 - Multiple SQL Injections / Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EI-Tube 3 - SQL Injection
|
This is a webapps exploit for php platform. Description: EI-Tube 3 - SQL Injection. Author: Meisam Monsef
|
Analyze the security implications of: EI-Tube 3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Chamilo LMS IDOR - 'messageId' Delete POST Injection
|
This is a webapps exploit for php platform. Description: Chamilo LMS IDOR - 'messageId' Delete POST Injection. Author: Vulnerability-Lab
|
Analyze the security implications of: Chamilo LMS IDOR - 'messageId' Delete POST Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BosDev BosDates 3.x - SQL Injection
|
This is a webapps exploit for php platform. Description: BosDev BosDates 3.x - SQL Injection. Author: G00db0y
|
Analyze the security implications of: BosDev BosDates 3.x - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Pixel8 Web Photo Album 3.0 - SQL Injection
|
This is a webapps exploit for asp platform. Description: Pixel8 Web Photo Album 3.0 - SQL Injection. Author: AlpHaNiX
|
Analyze the security implications of: Pixel8 Web Photo Album 3.0 - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: BandSite CMS 1.1 - 'bio_content.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: BandSite CMS 1.1 - 'bio_content.php' Cross-Site Scripting. Author: HACKERS PAL
|
Analyze the security implications of: BandSite CMS 1.1 - 'bio_content.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: E-vanced Solutions E-vents 5.0 - Multiple Input Validation Vulnerabilities
|
This is a webapps exploit for asp platform. Description: E-vanced Solutions E-vents 5.0 - Multiple Input Validation Vulnerabilities. Author: joseph.giron13
|
Analyze the security implications of: E-vanced Solutions E-vents 5.0 - Multiple Input Validation Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: D-Link DIR-817LW - Multiple Vulnerabilities
|
This is a remote exploit for hardware platform. Description: D-Link DIR-817LW - Multiple Vulnerabilities. Author: Samuel Huntley
|
Analyze the security implications of: D-Link DIR-817LW - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Ilia Alshanetsky FUDForum 1.2.8/1.9.8/2.0.2 - File Modification
|
This is a webapps exploit for php platform. Description: Ilia Alshanetsky FUDForum 1.2.8/1.9.8/2.0.2 - File Modification. Author: Ulf Harnhammar
|
Analyze the security implications of: Ilia Alshanetsky FUDForum 1.2.8/1.9.8/2.0.2 - File Modification
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Knox Arkeia Pro 5.1.12 - Backup Remote Code Execution
|
This is a remote exploit for linux platform. Description: Knox Arkeia Pro 5.1.12 - Backup Remote Code Execution. Author: anonymous
|
Analyze the security implications of: Knox Arkeia Pro 5.1.12 - Backup Remote Code Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_tree - 'key' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_tree - 'key' SQL Injection. Author: CoBRa_21
|
Analyze the security implications of: Joomla! Component com_tree - 'key' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Claroline 1.5/1.6 - 'user_access_details.php?data' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Claroline 1.5/1.6 - 'user_access_details.php?data' Cross-Site Scripting. Author: Sieg Fried
|
Analyze the security implications of: Claroline 1.5/1.6 - 'user_access_details.php?data' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sam Lantinga splitvt 1.6.3 - Local Buffer Overflow
|
This is a local exploit for linux platform. Description: Sam Lantinga splitvt 1.6.3 - Local Buffer Overflow. Author: Syzop
|
Analyze the security implications of: Sam Lantinga splitvt 1.6.3 - Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Kronos Telestaff < 2.92EU29 - SQL Injection
|
This is a webapps exploit for asp platform. Description: Kronos Telestaff < 2.92EU29 - SQL Injection. Author: Goran Tuzovic
|
Analyze the security implications of: Kronos Telestaff < 2.92EU29 - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Kirby CMS 2.5.12 - Cross-Site Request Forgery (Delete Page)
|
This is a webapps exploit for linux platform. Description: Kirby CMS 2.5.12 - Cross-Site Request Forgery (Delete Page). Author: Zaran Shaikh
|
Analyze the security implications of: Kirby CMS 2.5.12 - Cross-Site Request Forgery (Delete Page)
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Dansie Shopping Cart - Server Error Message Installation Full Path Disclosure
|
This is a webapps exploit for cgi platform. Description: Dansie Shopping Cart - Server Error Message Installation Full Path Disclosure. Author: Dr_Ponidi
|
Analyze the security implications of: Dansie Shopping Cart - Server Error Message Installation Full Path Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Joomla! Component JomEstate PRO 3.7 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JomEstate PRO 3.7 - 'id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component JomEstate PRO 3.7 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Tangora Portal CMS 4.0 - 'Action' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Tangora Portal CMS 4.0 - 'Action' Cross-Site Scripting. Author: r0t3d3Vil
|
Analyze the security implications of: Tangora Portal CMS 4.0 - 'Action' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Ximian Evolution 1.x - MIME image/* Content-Type Data Inclusion
|
This is a remote exploit for linux platform. Description: Ximian Evolution 1.x - MIME image/* Content-Type Data Inclusion. Author: Core Security
|
Analyze the security implications of: Ximian Evolution 1.x - MIME image/* Content-Type Data Inclusion
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Jadu CMS for Government - 'recruit_details.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Jadu CMS for Government - 'recruit_details.php' SQL Injection. Author: r45c4l
|
Analyze the security implications of: Jadu CMS for Government - 'recruit_details.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: libvirt - 'virConnectListAllInterfaces' Method Denial of Service
|
This is a dos exploit for linux platform. Description: libvirt - 'virConnectListAllInterfaces' Method Denial of Service. Author: Daniel P. Berrange
|
Analyze the security implications of: libvirt - 'virConnectListAllInterfaces' Method Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: BetMore Site Suite 4 - 'bid' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: BetMore Site Suite 4 - 'bid' Blind SQL Injection. Author: h4ck3r
|
Analyze the security implications of: BetMore Site Suite 4 - 'bid' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 2532/Gigs 1.2.2 Stable - Remote Authentication Bypass
|
This is a webapps exploit for php platform. Description: 2532/Gigs 1.2.2 Stable - Remote Authentication Bypass. Author: StAkeR
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.