input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: LucidCMS 2.0 - Login SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: C2S DVR Management IRDOME-II-C2S / IRBOX-II-C2S / DVR - Credentials Disclosure / Authentication Bypass | This is a webapps exploit for cgi platform. Description: C2S DVR Management IRDOME-II-C2S / IRBOX-II-C2S / DVR - Credentials Disclosure / Authentication Bypass. Author: Yakir Wizman |
Analyze the security implications of: C2S DVR Management IRDOME-II-C2S / IRBOX-II-C2S / DVR - Credentials Disclosure / Authentication Bypass | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Indexu 5.0/5.3 - 'tell_friend.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Indexu 5.0/5.3 - 'tell_friend.php' Multiple Cross-Site Scripting Vulnerabilities. Author: SwEET-DeViL |
Analyze the security implications of: Indexu 5.0/5.3 - 'tell_friend.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Moab < 7.2.9 - Authentication Bypass | This is a webapps exploit for multiple platform. Description: Moab < 7.2.9 - Authentication Bypass. Author: MWR InfoSecurity |
Analyze the security implications of: Moab < 7.2.9 - Authentication Bypass | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: MySQL 5.0.75 - 'sql_parse.cc' Multiple Format String Vulnerabilities | This is a dos exploit for linux platform. Description: MySQL 5.0.75 - 'sql_parse.cc' Multiple Format String Vulnerabilities. Author: kingcope |
Analyze the security implications of: MySQL 5.0.75 - 'sql_parse.cc' Multiple Format String Vulnerabilities | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple macOS HelpViewer 10.12.1 - XSS Leads to Arbitrary File Execution / Arbitrary File Read | This is a remote exploit for macos platform. Description: Apple macOS HelpViewer 10.12.1 - XSS Leads to Arbitrary File Execution / Arbitrary File Read. Author: Google Security Research |
Analyze the security implications of: Apple macOS HelpViewer 10.12.1 - XSS Leads to Arbitrary File Execution / Arbitrary File Read | This exploit targets macos systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Bitweaver 1.1.1 - 'view.php?blog_id' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Bitweaver 1.1.1 - 'view.php?blog_id' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: Bitweaver 1.1.1 - 'view.php?blog_id' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bludit < 3.13.1 Backup Plugin - Arbitrary File Download (Authenticated) | This is a webapps exploit for php platform. Description: Bludit < 3.13.1 Backup Plugin - Arbitrary File Download (Authenticated). Author: Antonio Cuomo |
Analyze the security implications of: Bludit < 3.13.1 Backup Plugin - Arbitrary File Download (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Inout SocialTiles 2.0 Script - Improper Access Restrictions | This is a webapps exploit for php platform. Description: Inout SocialTiles 2.0 Script - Improper Access Restrictions. Author: Ihsan Sencan |
Analyze the security implications of: Inout SocialTiles 2.0 Script - Improper Access Restrictions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Core 3.9.1 - Persistent Cross-Site Scripting in Global Configuration Textfilter Settings | This is a webapps exploit for php platform. Description: Joomla! Core 3.9.1 - Persistent Cross-Site Scripting in Global Configuration Textfilter Settings. Author: Praveen Sutar |
Analyze the security implications of: Joomla! Core 3.9.1 - Persistent Cross-Site Scripting in Global Configuration Textfilter Settings | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNOME Rhythmbox 0.11.5 - '.Playlist' File Denial of Service | This is a dos exploit for linux platform. Description: GNOME Rhythmbox 0.11.5 - '.Playlist' File Denial of Service. Author: Juan Pablo Lopez Yacubian |
Analyze the security implications of: GNOME Rhythmbox 0.11.5 - '.Playlist' File Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DreamBox DM800 - Arbitrary File Download | This is a remote exploit for hardware platform. Description: DreamBox DM800 - Arbitrary File Download. Author: ShellVision |
Analyze the security implications of: DreamBox DM800 - Arbitrary File Download | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: STunnel 3.x - Client Negotiation Protocol Format String | This is a remote exploit for linux platform. Description: STunnel 3.x - Client Negotiation Protocol Format String. Author: deltha |
Analyze the security implications of: STunnel 3.x - Client Negotiation Protocol Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CDRDAO 1.1.x - Home Directory Configuration File Symbolic Link (1) | This is a local exploit for linux platform. Description: CDRDAO 1.1.x - Home Directory Configuration File Symbolic Link (1). Author: anonymous |
Analyze the security implications of: CDRDAO 1.1.x - Home Directory Configuration File Symbolic Link (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DIGISOL DG-BR4000NG - Buffer Overflow (PoC) | This is a dos exploit for hardware platform. Description: DIGISOL DG-BR4000NG - Buffer Overflow (PoC). Author: Adipta Basu |
Analyze the security implications of: DIGISOL DG-BR4000NG - Buffer Overflow (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Sricam gSOAP 2.8 - Denial of Service | This is a dos exploit for hardware platform. Description: Sricam gSOAP 2.8 - Denial of Service. Author: Andrew Watson |
Analyze the security implications of: Sricam gSOAP 2.8 - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component Google Map Store Locator 4.4 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Google Map Store Locator 4.4 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Google Map Store Locator 4.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bandmin 1.4 - Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Bandmin 1.4 - Cross-Site Scripting. Author: silent needel |
Analyze the security implications of: Bandmin 1.4 - Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: MySQL 5.0.45 - (Authenticated) COM_CREATE_DB Format String (PoC) | This is a dos exploit for multiple platform. Description: MySQL 5.0.45 - (Authenticated) COM_CREATE_DB Format String (PoC). Author: kingcope |
Analyze the security implications of: MySQL 5.0.45 - (Authenticated) COM_CREATE_DB Format String (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Links Pile - 'link.php' SQL Injection | This is a webapps exploit for php platform. Description: Links Pile - 'link.php' SQL Injection. Author: HaCkeR_EgY |
Analyze the security implications of: Links Pile - 'link.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AIX 7.1 - 'lquerylv' Local Privilege Escalation | This is a local exploit for aix platform. Description: AIX 7.1 - 'lquerylv' Local Privilege Escalation. Author: S2 Crew |
Analyze the security implications of: AIX 7.1 - 'lquerylv' Local Privilege Escalation | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: eLitius 1.0 - Arbitrary Database Backup | This is a webapps exploit for php platform. Description: eLitius 1.0 - Arbitrary Database Backup. Author: ThE g0bL!N |
Analyze the security implications of: eLitius 1.0 - Arbitrary Database Backup | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Binn SBuilder - 'nid' Blind SQL Injection | This is a webapps exploit for php platform. Description: Binn SBuilder - 'nid' Blind SQL Injection. Author: JosS |
Analyze the security implications of: Binn SBuilder - 'nid' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenBSD 5.6 - Multiple Local Kernel Panics (Denial of Service) | This is a dos exploit for bsd platform. Description: OpenBSD 5.6 - Multiple Local Kernel Panics (Denial of Service). Author: nitr0us |
Analyze the security implications of: OpenBSD 5.6 - Multiple Local Kernel Panics (Denial of Service) | This exploit targets bsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: WebDoc 3.0 - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: WebDoc 3.0 - Multiple SQL Injections. Author: Chrysalid |
Analyze the security implications of: WebDoc 3.0 - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component com_search 1.5 RC3 - 'index.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: Joomla! Component com_search 1.5 RC3 - 'index.php' Multiple SQL Injections. Author: beenudel1986 |
Analyze the security implications of: Joomla! Component com_search 1.5 RC3 - 'index.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: idmos-phoenix CMS - 'aural.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: idmos-phoenix CMS - 'aural.php' Remote File Inclusion. Author: HACKERS PAL |
Analyze the security implications of: idmos-phoenix CMS - 'aural.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASPilot Pilot Cart 7.3 - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: ASPilot Pilot Cart 7.3 - Multiple Vulnerabilities. Author: Ariko-Security |
Analyze the security implications of: ASPilot Pilot Cart 7.3 - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FunGamez - Arbitrary File Upload | This is a webapps exploit for php platform. Description: FunGamez - Arbitrary File Upload. Author: cr4wl3r |
Analyze the security implications of: FunGamez - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component PaymentsPlus 2.1.5 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component PaymentsPlus 2.1.5 - Blind SQL Injection. Author: Sid3^effects |
Analyze the security implications of: Joomla! Component PaymentsPlus 2.1.5 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alienvault OSSIM/USM 5.3.1 - SQL Injection | This is a webapps exploit for php platform. Description: Alienvault OSSIM/USM 5.3.1 - SQL Injection. Author: Peter Lapp |
Analyze the security implications of: Alienvault OSSIM/USM 5.3.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AV Tutorial Script 1.0 - Remote User Pass Change | This is a webapps exploit for php platform. Description: AV Tutorial Script 1.0 - Remote User Pass Change. Author: Dj7xpl |
Analyze the security implications of: AV Tutorial Script 1.0 - Remote User Pass Change | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: S.u.S.E Linux 4.x/5.x/6.x/7.0 / Slackware 3.x/4.0 / Turbolinux 6 / OpenLinux 7.0 - 'fdmount' Local Buffer Overflow (3) | This is a local exploit for linux platform. Description: S.u.S.E Linux 4.x/5.x/6.x/7.0 / Slackware 3.x/4.0 / Turbolinux 6 / OpenLinux 7.0 - 'fdmount' Local Buffer Overflow (3). Author: WaR |
Analyze the security implications of: S.u.S.E Linux 4.x/5.x/6.x/7.0 / Slackware 3.x/4.0 / Turbolinux 6 / OpenLinux 7.0 - 'fdmount' Local Buffer Overflow (3) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! / Mambo Component rsgallery 2.0b5 - 'catid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component rsgallery 2.0b5 - 'catid' SQL Injection. Author: K-159 |
Analyze the security implications of: Joomla! / Mambo Component rsgallery 2.0b5 - 'catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.