input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: CitrusDB 0.3.6 - 'importcc.php' Arbitrary Database Injection
|
This is a webapps exploit for php platform. Description: CitrusDB 0.3.6 - 'importcc.php' Arbitrary Database Injection. Author: RedTeam Pentesting
|
Analyze the security implications of: CitrusDB 0.3.6 - 'importcc.php' Arbitrary Database Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IRIX 5.3 - '/usr/sbin/iwsh' Local Buffer Overflow / Local Privilege Escalation
|
This is a local exploit for irix platform. Description: IRIX 5.3 - '/usr/sbin/iwsh' Local Buffer Overflow / Local Privilege Escalation. Author: David Hedley
|
Analyze the security implications of: IRIX 5.3 - '/usr/sbin/iwsh' Local Buffer Overflow / Local Privilege Escalation
|
This exploit targets irix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets irix platform
|
What is this exploit about: Magento eCommerce CE v2.3.5-p2 - Blind SQLi
|
This is a webapps exploit for php platform. Description: Magento eCommerce CE v2.3.5-p2 - Blind SQLi. Author: Aydin Naserifard
|
Analyze the security implications of: Magento eCommerce CE v2.3.5-p2 - Blind SQLi
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_photo - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Joomla! Component com_photo - Multiple SQL Injections. Author: Chokri Ben Achor
|
Analyze the security implications of: Joomla! Component com_photo - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_informations - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_informations - SQL Injection. Author: Omar
|
Analyze the security implications of: Joomla! Component com_informations - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HTMLToNuke - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: HTMLToNuke - Cross-Site Scripting. Author: JOCANOR
|
Analyze the security implications of: HTMLToNuke - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Valve Software Half-Life Server 1.1.1.0/3.1.1.1c1/4.1.1.1a - Multiplayer Request Buffer Overflow
|
This is a remote exploit for linux platform. Description: Valve Software Half-Life Server 1.1.1.0/3.1.1.1c1/4.1.1.1a - Multiplayer Request Buffer Overflow. Author: hkvig
|
Analyze the security implications of: Valve Software Half-Life Server 1.1.1.0/3.1.1.1c1/4.1.1.1a - Multiplayer Request Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Centreo 19.10.8 - 'DisplayServiceStatus' Remote Code Execution
|
This is a webapps exploit for php platform. Description: Centreo 19.10.8 - 'DisplayServiceStatus' Remote Code Execution. Author: Engin Demirbilek
|
Analyze the security implications of: Centreo 19.10.8 - 'DisplayServiceStatus' Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: phpMyAdmin - (Authenticated) Remote Code Execution (Metasploit)
|
This is a remote exploit for php platform. Description: phpMyAdmin - (Authenticated) Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: phpMyAdmin - (Authenticated) Remote Code Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Lunar CMS 3.3 - Remote Command Execution
|
This is a webapps exploit for php platform. Description: Lunar CMS 3.3 - Remote Command Execution. Author: LiquidWorm
|
Analyze the security implications of: Lunar CMS 3.3 - Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle Reports Server 6.0.8/9.0.x - XML File Disclosure
|
This is a remote exploit for multiple platform. Description: Oracle Reports Server 6.0.8/9.0.x - XML File Disclosure. Author: Alexander Kornbrust
|
Analyze the security implications of: Oracle Reports Server 6.0.8/9.0.x - XML File Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: GreyMatter WebLog 1.21d - Remote Command Execution (2)
|
This is a webapps exploit for php platform. Description: GreyMatter WebLog 1.21d - Remote Command Execution (2). Author: Hessam-x
|
Analyze the security implications of: GreyMatter WebLog 1.21d - Remote Command Execution (2)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Achievo 1.3.2 - 'atknodetype' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Achievo 1.3.2 - 'atknodetype' Cross-Site Scripting. Author: Rohit Bansal
|
Analyze the security implications of: Achievo 1.3.2 - 'atknodetype' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Unreal Engine - 'UnChan.cpp' Failed Assertion Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Unreal Engine - 'UnChan.cpp' Failed Assertion Remote Denial of Service. Author: Luigi Auriemma
|
Analyze the security implications of: Unreal Engine - 'UnChan.cpp' Failed Assertion Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Linux Kernel 2.6.x - Proc dentry_unused Corruption Local Denial of Service
|
This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - Proc dentry_unused Corruption Local Denial of Service. Author: Tony Griffiths
|
Analyze the security implications of: Linux Kernel 2.6.x - Proc dentry_unused Corruption Local Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apache mod_session_crypto - Padding Oracle
|
This is a webapps exploit for multiple platform. Description: Apache mod_session_crypto - Padding Oracle. Author: RedTeam Pentesting GmbH
|
Analyze the security implications of: Apache mod_session_crypto - Padding Oracle
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ISDN4Linux 3.1 - IPPPD Device String SysLog Format String (1)
|
This is a local exploit for linux platform. Description: ISDN4Linux 3.1 - IPPPD Device String SysLog Format String (1). Author: Gobbles Security
|
Analyze the security implications of: ISDN4Linux 3.1 - IPPPD Device String SysLog Format String (1)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticketreply.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticketreply.php' SQL Injection. Author: qw3rTyTy
|
Analyze the security implications of: Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticketreply.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GNU binutils - 'aarch64_ext_ldst_reglist' Buffer Overflow
|
This is a dos exploit for linux platform. Description: GNU binutils - 'aarch64_ext_ldst_reglist' Buffer Overflow. Author: Alexandre Adamski
|
Analyze the security implications of: GNU binutils - 'aarch64_ext_ldst_reglist' Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: IBM AIX eNetwork Firewall 3.2/3.3 - Insecure Temporary File Creation
|
This is a local exploit for aix platform. Description: IBM AIX eNetwork Firewall 3.2/3.3 - Insecure Temporary File Creation. Author: Paul Cammidge
|
Analyze the security implications of: IBM AIX eNetwork Firewall 3.2/3.3 - Insecure Temporary File Creation
|
This exploit targets aix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: Pre Classified Listings 1.0 - 'detailad.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: Pre Classified Listings 1.0 - 'detailad.asp' SQL Injection. Author: Pouya_Server
|
Analyze the security implications of: Pre Classified Listings 1.0 - 'detailad.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Linux Kernel 2.6.x - 'net/ipv6/ip6_output.c' Null Pointer Dereference Denial of Service
|
This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - 'net/ipv6/ip6_output.c' Null Pointer Dereference Denial of Service. Author: Rémi Denis-Courmont
|
Analyze the security implications of: Linux Kernel 2.6.x - 'net/ipv6/ip6_output.c' Null Pointer Dereference Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Graugon Forum 1.3 - SQL Injection
|
This is a webapps exploit for php platform. Description: Graugon Forum 1.3 - SQL Injection. Author: AutoSec Tools
|
Analyze the security implications of: Graugon Forum 1.3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: perfSONAR v4.4.5 - Partial Blind CSRF
|
This is a webapps exploit for multiple platform. Description: perfSONAR v4.4.5 - Partial Blind CSRF. Author: Ryan Moore
|
Analyze the security implications of: perfSONAR v4.4.5 - Partial Blind CSRF
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Wireshark - 'get_t61_string' Heap Out-of-Bounds Read
|
This is a dos exploit for multiple platform. Description: Wireshark - 'get_t61_string' Heap Out-of-Bounds Read. Author: Google Security Research
|
Analyze the security implications of: Wireshark - 'get_t61_string' Heap Out-of-Bounds Read
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Airbnb Crashpadder Clone Script - SQL Injection
|
This is a webapps exploit for php platform. Description: Airbnb Crashpadder Clone Script - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Airbnb Crashpadder Clone Script - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link/TRENDnet - NCC Service Command Injection (Metasploit)
|
This is a webapps exploit for linux platform. Description: D-Link/TRENDnet - NCC Service Command Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: D-Link/TRENDnet - NCC Service Command Injection (Metasploit)
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! / Mambo Component com_most - 'secid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_most - 'secid' SQL Injection. Author: S@BUN
|
Analyze the security implications of: Joomla! / Mambo Component com_most - 'secid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 4Images 1.7.8 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: 4Images 1.7.8 - Remote File Inclusion. Author: LoSt.HaCkEr
|
Analyze the security implications of: 4Images 1.7.8 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Magnolia CMS 6.2.19 - Stored Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Magnolia CMS 6.2.19 - Stored Cross-Site Scripting (XSS). Author: Giulio Garzia Ozozuz
|
Analyze the security implications of: Magnolia CMS 6.2.19 - Stored Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Beerwin's PHPLinkAdmin 1.0 - Remote File Inclusion / SQL Injection
|
This is a webapps exploit for php platform. Description: Beerwin's PHPLinkAdmin 1.0 - Remote File Inclusion / SQL Injection. Author: SirGod
|
Analyze the security implications of: Beerwin's PHPLinkAdmin 1.0 - Remote File Inclusion / SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Platform Load Sharing Facility 4/5 - 'LSF_ENVDIR' Local Command Execution
|
This is a local exploit for multiple platform. Description: Platform Load Sharing Facility 4/5 - 'LSF_ENVDIR' Local Command Execution. Author: Tomasz Grabowski
|
Analyze the security implications of: Platform Load Sharing Facility 4/5 - 'LSF_ENVDIR' Local Command Execution
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component FlashGames 1.5.0 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component FlashGames 1.5.0 - Local File Inclusion. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component FlashGames 1.5.0 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 2.6.x - fs/eventpoll.c epoll Data Structure File Descriptor Local Denial of Service
|
This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - fs/eventpoll.c epoll Data Structure File Descriptor Local Denial of Service. Author: Nelson Elhage
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.