input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Gnews Publisher .NET - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: 4Images 1.7.1 - Local File Inclusion / Remote Code Execution
|
This is a webapps exploit for php platform. Description: 4Images 1.7.1 - Local File Inclusion / Remote Code Execution. Author: rgod
|
Analyze the security implications of: 4Images 1.7.1 - Local File Inclusion / Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MinIO < 2024-01-31T20-20-33Z - Privilege Escalation
|
This is a remote exploit for go platform. Description: MinIO < 2024-01-31T20-20-33Z - Privilege Escalation. Author: Jenson Zhao
|
Analyze the security implications of: MinIO < 2024-01-31T20-20-33Z - Privilege Escalation
|
This exploit targets go systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets go platform
|
What is this exploit about: Joomla! Component com_xmap 1.2.11 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_xmap 1.2.11 - Blind SQL Injection. Author: jdc
|
Analyze the security implications of: Joomla! Component com_xmap 1.2.11 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: @Mail 4.0/4.13 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for cgi platform. Description: @Mail 4.0/4.13 - Multiple Cross-Site Scripting Vulnerabilities. Author: Lostmon
|
Analyze the security implications of: @Mail 4.0/4.13 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: D-Link DKVM-IP8 - Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: D-Link DKVM-IP8 - Cross-Site Scripting. Author: POPCORN
|
Analyze the security implications of: D-Link DKVM-IP8 - Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: IBM Tivoli Directory Server 6.0 - LDAP Memory Corruption
|
This is a dos exploit for multiple platform. Description: IBM Tivoli Directory Server 6.0 - LDAP Memory Corruption. Author: Evgeny Legerov
|
Analyze the security implications of: IBM Tivoli Directory Server 6.0 - LDAP Memory Corruption
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Garbage Collection Management System 1.0 - SQL Injection + Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Garbage Collection Management System 1.0 - SQL Injection + Arbitrary File Upload. Author: Luca Bernardi
|
Analyze the security implications of: Garbage Collection Management System 1.0 - SQL Injection + Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle VM VirtualBox 4.0 - 'tracepath' Local Denial of Service
|
This is a dos exploit for multiple platform. Description: Oracle VM VirtualBox 4.0 - 'tracepath' Local Denial of Service. Author: Thomas Dreibholz
|
Analyze the security implications of: Oracle VM VirtualBox 4.0 - 'tracepath' Local Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Class-1 Forum 0.24.4 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: Class-1 Forum 0.24.4 - Remote Code Execution. Author: rgod
|
Analyze the security implications of: Class-1 Forum 0.24.4 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IISWorks ASPKnowledgeBase 2.0 - 'KB.asp' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: IISWorks ASPKnowledgeBase 2.0 - 'KB.asp' Cross-Site Scripting. Author: r0t
|
Analyze the security implications of: IISWorks ASPKnowledgeBase 2.0 - 'KB.asp' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component Advertisement Board 3.0.4 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Advertisement Board 3.0.4 - 'id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Advertisement Board 3.0.4 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jenzabar 9.2.2 - 'query' Reflected XSS.
|
This is a webapps exploit for multiple platform. Description: Jenzabar 9.2.2 - 'query' Reflected XSS.. Author: y0ung_dst
|
Analyze the security implications of: Jenzabar 9.2.2 - 'query' Reflected XSS.
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CMS Galaxie Software - 'category_id' SQL Injection
|
This is a webapps exploit for php platform. Description: CMS Galaxie Software - 'category_id' SQL Injection. Author: MurderSkillz
|
Analyze the security implications of: CMS Galaxie Software - 'category_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DeDeCMS 5.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: DeDeCMS 5.1 - SQL Injection. Author: Securitylab Security Research
|
Analyze the security implications of: DeDeCMS 5.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Campsite 2.6.1 - 'UrlType.php?g_documentRoot' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'UrlType.php?g_documentRoot' Remote File Inclusion. Author: anonymous
|
Analyze the security implications of: Campsite 2.6.1 - 'UrlType.php?g_documentRoot' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Web Wiz Forums 9.64 - Database Disclosure
|
This is a webapps exploit for asp platform. Description: Web Wiz Forums 9.64 - Database Disclosure. Author: ViRuSMaN
|
Analyze the security implications of: Web Wiz Forums 9.64 - Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: GnuPG 1.x - Detached Signature Verification Bypass
|
This is a local exploit for linux platform. Description: GnuPG 1.x - Detached Signature Verification Bypass. Author: taviso
|
Analyze the security implications of: GnuPG 1.x - Detached Signature Verification Bypass
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Sun Java System Communications Express 6.3 - 'search.xml' Cross-Site Scripting
|
This is a webapps exploit for java platform. Description: Sun Java System Communications Express 6.3 - 'search.xml' Cross-Site Scripting. Author: SCS team
|
Analyze the security implications of: Sun Java System Communications Express 6.3 - 'search.xml' Cross-Site Scripting
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Joomla! Convert Forms version 2.0.3 - Formula Injection (CSV Injection)
|
This is a webapps exploit for php platform. Description: Joomla! Convert Forms version 2.0.3 - Formula Injection (CSV Injection). Author: Sairam Jetty
|
Analyze the security implications of: Joomla! Convert Forms version 2.0.3 - Formula Injection (CSV Injection)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Mac OSX Kernel - Use-After-Free and Double Delete Due to Incorrect Locking in Intel GPU Driver
|
This is a dos exploit for osx platform. Description: Apple Mac OSX Kernel - Use-After-Free and Double Delete Due to Incorrect Locking in Intel GPU Driver. Author: Google Security Research
|
Analyze the security implications of: Apple Mac OSX Kernel - Use-After-Free and Double Delete Due to Incorrect Locking in Intel GPU Driver
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: SolarWinds Storage Manager - Authentication Bypass (Metasploit)
|
This is a remote exploit for java platform. Description: SolarWinds Storage Manager - Authentication Bypass (Metasploit). Author: Metasploit
|
Analyze the security implications of: SolarWinds Storage Manager - Authentication Bypass (Metasploit)
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: CubeCart 3.0.20 - Multiple Script 'redir' Arbitrary Site Redirects
|
This is a webapps exploit for php platform. Description: CubeCart 3.0.20 - Multiple Script 'redir' Arbitrary Site Redirects. Author: Aung Khant
|
Analyze the security implications of: CubeCart 3.0.20 - Multiple Script 'redir' Arbitrary Site Redirects
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Mac OSX Safari 2.0.3 (417.9.2) - Multiple Vulnerabilities
|
This is a dos exploit for osx platform. Description: Apple Mac OSX Safari 2.0.3 (417.9.2) - Multiple Vulnerabilities. Author: Tom Ferris
|
Analyze the security implications of: Apple Mac OSX Safari 2.0.3 (417.9.2) - Multiple Vulnerabilities
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Home Owners Collection Management System 1.0 - 'id' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Home Owners Collection Management System 1.0 - 'id' Blind SQL Injection. Author: Saud Alenazi
|
Analyze the security implications of: Home Owners Collection Management System 1.0 - 'id' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Lotus Domino Server 5.0.x - Directory Traversal (2)
|
This is a remote exploit for multiple platform. Description: Lotus Domino Server 5.0.x - Directory Traversal (2). Author: Georgi Guninski
|
Analyze the security implications of: Lotus Domino Server 5.0.x - Directory Traversal (2)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Land Down Under 800/801 - 'journal.php?m' SQL Injection
|
This is a webapps exploit for php platform. Description: Land Down Under 800/801 - 'journal.php?m' SQL Injection. Author: bl2k
|
Analyze the security implications of: Land Down Under 800/801 - 'journal.php?m' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jewelry Cart Software - 'product.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Jewelry Cart Software - 'product.php' SQL Injection. Author: Asyraf
|
Analyze the security implications of: Jewelry Cart Software - 'product.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WU-FTPD 2.6.2 - 'wuftpd-freezer.c' Remote Denial of Service
|
This is a dos exploit for linux platform. Description: WU-FTPD 2.6.2 - 'wuftpd-freezer.c' Remote Denial of Service. Author: Angelo Rosiello
|
Analyze the security implications of: WU-FTPD 2.6.2 - 'wuftpd-freezer.c' Remote Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: G-WAN 2.10.6 - Buffer Overflow (Denial of Service) (PoC)
|
This is a dos exploit for multiple platform. Description: G-WAN 2.10.6 - Buffer Overflow (Denial of Service) (PoC). Author: Fredrik Widlund
|
Analyze the security implications of: G-WAN 2.10.6 - Buffer Overflow (Denial of Service) (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: AWStats Totals 1.14 multisort - Remote Command Execution (Metasploit)
|
This is a webapps exploit for php platform. Description: AWStats Totals 1.14 multisort - Remote Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: AWStats Totals 1.14 multisort - Remote Command Execution (Metasploit)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: McAfee VirusScan for Mac (Virex) 7.7 - Local Privilege Escalation
|
This is a local exploit for osx platform. Description: McAfee VirusScan for Mac (Virex) 7.7 - Local Privilege Escalation. Author: Kevin Finisterre
|
Analyze the security implications of: McAfee VirusScan for Mac (Virex) 7.7 - Local Privilege Escalation
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Hrsale 2.0.0 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Hrsale 2.0.0 - Local File Inclusion. Author: Sosecure
|
Analyze the security implications of: Hrsale 2.0.0 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ghostscript - Failed Restore Command Execution (Metasploit)
|
This is a local exploit for linux platform. Description: Ghostscript - Failed Restore Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Ghostscript - Failed Restore Command Execution (Metasploit)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.