input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component Percha Downloads Attach 1.1 - 'Controller' Traversal Arbitrary File Access | This is a webapps exploit for php platform. Description: Joomla! Component Percha Downloads Attach 1.1 - 'Controller' Traversal Arbitrary File Access. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Percha Downloads Attach 1.1 - 'Controller' Traversal Arbitrary File Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: man-db 2.4.1 - 'open_cat_stream()' Local uid=man | This is a local exploit for linux platform. Description: man-db 2.4.1 - 'open_cat_stream()' Local uid=man. Author: vade79 |
Analyze the security implications of: man-db 2.4.1 - 'open_cat_stream()' Local uid=man | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CITSmart ITSM 9.1.2.27 - 'query' Time-based Blind SQL Injection (Authenticated) | This is a webapps exploit for java platform. Description: CITSmart ITSM 9.1.2.27 - 'query' Time-based Blind SQL Injection (Authenticated). Author: skysbsb |
Analyze the security implications of: CITSmart ITSM 9.1.2.27 - 'query' Time-based Blind SQL Injection (Authenticated) | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: LIOOSYS CMS - SQL Injection / Information Disclosure | This is a webapps exploit for php platform. Description: LIOOSYS CMS - SQL Injection / Information Disclosure. Author: MustLive |
Analyze the security implications of: LIOOSYS CMS - SQL Injection / Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple macOS/iOS Kernel - Memory Disclosure Due to Lack of Bounds Checking in netagent Socket Option Handling | This is a dos exploit for multiple platform. Description: Apple macOS/iOS Kernel - Memory Disclosure Due to Lack of Bounds Checking in netagent Socket Option Handling. Author: Google Security Research |
Analyze the security implications of: Apple macOS/iOS Kernel - Memory Disclosure Due to Lack of Bounds Checking in netagent Socket Option Handling | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Polkit 0.105-26 0.117-2 - Local Privilege Escalation | This is a local exploit for linux platform. Description: Polkit 0.105-26 0.117-2 - Local Privilege Escalation. Author: J Smith |
Analyze the security implications of: Polkit 0.105-26 0.117-2 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BMC Software Patrol 3.2.5 - Patrol SNMP Agent File Creation/Permission | This is a local exploit for linux platform. Description: BMC Software Patrol 3.2.5 - Patrol SNMP Agent File Creation/Permission. Author: Andrew Alness |
Analyze the security implications of: BMC Software Patrol 3.2.5 - Patrol SNMP Agent File Creation/Permission | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ETchat 3.7 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: ETchat 3.7 - Cross-Site Request Forgery. Author: Hesam Bazvand |
Analyze the security implications of: ETchat 3.7 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Aria 0.99-6 - 'page' Local File Inclusion | This is a webapps exploit for php platform. Description: Aria 0.99-6 - 'page' Local File Inclusion. Author: DSecRG |
Analyze the security implications of: Aria 0.99-6 - 'page' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Orchard CMS 1.7.3/1.8.2/1.9.0 - Persistent Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Orchard CMS 1.7.3/1.8.2/1.9.0 - Persistent Cross-Site Scripting. Author: Paris Zoumpouloglou |
Analyze the security implications of: Orchard CMS 1.7.3/1.8.2/1.9.0 - Persistent Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Oracle OpenJDK Runtime Environment 1.8.0_112-b15 - Java Serialization Denial Of Service | This is a dos exploit for multiple platform. Description: Oracle OpenJDK Runtime Environment 1.8.0_112-b15 - Java Serialization Denial Of Service. Author: ERPScan |
Analyze the security implications of: Oracle OpenJDK Runtime Environment 1.8.0_112-b15 - Java Serialization Denial Of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: WebDisk 3.0.2 PhotoViewer iOS - Command Execution | This is a webapps exploit for ios platform. Description: WebDisk 3.0.2 PhotoViewer iOS - Command Execution. Author: Vulnerability-Lab |
Analyze the security implications of: WebDisk 3.0.2 PhotoViewer iOS - Command Execution | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: Aborior Encore Web Forum - Arbitrary Command Execution | This is a webapps exploit for cgi platform. Description: Aborior Encore Web Forum - Arbitrary Command Execution. Author: K-159 |
Analyze the security implications of: Aborior Encore Web Forum - Arbitrary Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: E-Sic Software livre CMS - 'f' SQL Injection | This is a webapps exploit for php platform. Description: E-Sic Software livre CMS - 'f' SQL Injection. Author: Elber Tavares |
Analyze the security implications of: E-Sic Software livre CMS - 'f' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gogs - 'label' SQL Injection | This is a webapps exploit for multiple platform. Description: Gogs - 'label' SQL Injection. Author: Timo Schmid |
Analyze the security implications of: Gogs - 'label' SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GParted 0.14.1 - OS Command Execution | This is a local exploit for linux platform. Description: GParted 0.14.1 - OS Command Execution. Author: SEC Consult |
Analyze the security implications of: GParted 0.14.1 - OS Command Execution | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Spring Cloud 3.2.2 - Remote Command Execution (RCE) | This is a webapps exploit for java platform. Description: Spring Cloud 3.2.2 - Remote Command Execution (RCE). Author: GatoGamer1155 |
Analyze the security implications of: Spring Cloud 3.2.2 - Remote Command Execution (RCE) | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Code Widgets Online Job Application - 'admin.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Code Widgets Online Job Application - 'admin.asp' Multiple SQL Injections. Author: L0rd CrusAd3r |
Analyze the security implications of: Code Widgets Online Job Application - 'admin.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: D-Link DIR-850L - OS Command Execution (Metasploit) | This is a remote exploit for linux_mips platform. Description: D-Link DIR-850L - OS Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: D-Link DIR-850L - OS Command Execution (Metasploit) | This exploit targets linux_mips systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux_mips platform |
What is this exploit about: Last Wizardz - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Last Wizardz - 'id' SQL Injection. Author: Sec Attack Team |
Analyze the security implications of: Last Wizardz - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Artica Proxy 4.50 - Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: Artica Proxy 4.50 - Remote Code Execution (RCE). Author: Madan |
Analyze the security implications of: Artica Proxy 4.50 - Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Falt4 CMS rc4 10.9.2007 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Falt4 CMS rc4 10.9.2007 - Multiple Vulnerabilities. Author: H-Security Labs |
Analyze the security implications of: Falt4 CMS rc4 10.9.2007 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: News Update 1.1 - Change Admin Password | This is a webapps exploit for cgi platform. Description: News Update 1.1 - Change Admin Password. Author: morpheus[bd] |
Analyze the security implications of: News Update 1.1 - Change Admin Password | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Array Networks vAPV and vxAG - Private Key Privilege Escalation / Code Execution (Metasploit) | This is a remote exploit for hardware platform. Description: Array Networks vAPV and vxAG - Private Key Privilege Escalation / Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Array Networks vAPV and vxAG - Private Key Privilege Escalation / Code Execution (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: vBulletin - Denial of Service | This is a dos exploit for php platform. Description: vBulletin - Denial of Service. Author: R3d-D3V!L |
Analyze the security implications of: vBulletin - Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Qualcomm qpopper 2.4 - POP Server Buffer Overflow (1) | This is a remote exploit for linux platform. Description: Qualcomm qpopper 2.4 - POP Server Buffer Overflow (1). Author: Seth McGann |
Analyze the security implications of: Qualcomm qpopper 2.4 - POP Server Buffer Overflow (1) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BtiTracker 1.4.1 - Become Admin SQL Injection | This is a webapps exploit for php platform. Description: BtiTracker 1.4.1 - Become Admin SQL Injection. Author: m@ge|ozz |
Analyze the security implications of: BtiTracker 1.4.1 - Become Admin SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gcards 1.13 - 'Addnews.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Gcards 1.13 - 'Addnews.php' Remote File Inclusion. Author: DeatH VirUs |
Analyze the security implications of: Gcards 1.13 - 'Addnews.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Chrome for Android - Multiple 'file::' URL Handler Local Downloaded Content Disclosure Vulnerabilities | This is a remote exploit for android platform. Description: Google Chrome for Android - Multiple 'file::' URL Handler Local Downloaded Content Disclosure Vulnerabilities. Author: Artem Chaykin |
Analyze the security implications of: Google Chrome for Android - Multiple 'file::' URL Handler Local Downloaded Content Disclosure Vulnerabilities | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Battleaxe Software BTTLXE Forum - 'login.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Battleaxe Software BTTLXE Forum - 'login.asp' SQL Injection. Author: Du|L |
Analyze the security implications of: Battleaxe Software BTTLXE Forum - 'login.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: eXV2 Module WebChat 1.60 - 'roomid' SQL Injection | This is a webapps exploit for php platform. Description: eXV2 Module WebChat 1.60 - 'roomid' SQL Injection. Author: S@BUN |
Analyze the security implications of: eXV2 Module WebChat 1.60 - 'roomid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JForum 2.1.8 BookMarks - Cross-Site Request Forgery / Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: JForum 2.1.8 BookMarks - Cross-Site Request Forgery / Cross-Site Scripting. Author: Adam Baldwin |
Analyze the security implications of: JForum 2.1.8 BookMarks - Cross-Site Request Forgery / Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BookReview 1.0 - 'add_review.htm' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: BookReview 1.0 - 'add_review.htm' Multiple Cross-Site Scripting Vulnerabilities. Author: Lostmon |
Analyze the security implications of: BookReview 1.0 - 'add_review.htm' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.