input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component Percha Downloads Attach 1.1 - 'Controller' Traversal Arbitrary File Access
|
This is a webapps exploit for php platform. Description: Joomla! Component Percha Downloads Attach 1.1 - 'Controller' Traversal Arbitrary File Access. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component Percha Downloads Attach 1.1 - 'Controller' Traversal Arbitrary File Access
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: man-db 2.4.1 - 'open_cat_stream()' Local uid=man
|
This is a local exploit for linux platform. Description: man-db 2.4.1 - 'open_cat_stream()' Local uid=man. Author: vade79
|
Analyze the security implications of: man-db 2.4.1 - 'open_cat_stream()' Local uid=man
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: CITSmart ITSM 9.1.2.27 - 'query' Time-based Blind SQL Injection (Authenticated)
|
This is a webapps exploit for java platform. Description: CITSmart ITSM 9.1.2.27 - 'query' Time-based Blind SQL Injection (Authenticated). Author: skysbsb
|
Analyze the security implications of: CITSmart ITSM 9.1.2.27 - 'query' Time-based Blind SQL Injection (Authenticated)
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: LIOOSYS CMS - SQL Injection / Information Disclosure
|
This is a webapps exploit for php platform. Description: LIOOSYS CMS - SQL Injection / Information Disclosure. Author: MustLive
|
Analyze the security implications of: LIOOSYS CMS - SQL Injection / Information Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple macOS/iOS Kernel - Memory Disclosure Due to Lack of Bounds Checking in netagent Socket Option Handling
|
This is a dos exploit for multiple platform. Description: Apple macOS/iOS Kernel - Memory Disclosure Due to Lack of Bounds Checking in netagent Socket Option Handling. Author: Google Security Research
|
Analyze the security implications of: Apple macOS/iOS Kernel - Memory Disclosure Due to Lack of Bounds Checking in netagent Socket Option Handling
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Polkit 0.105-26 0.117-2 - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Polkit 0.105-26 0.117-2 - Local Privilege Escalation. Author: J Smith
|
Analyze the security implications of: Polkit 0.105-26 0.117-2 - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: BMC Software Patrol 3.2.5 - Patrol SNMP Agent File Creation/Permission
|
This is a local exploit for linux platform. Description: BMC Software Patrol 3.2.5 - Patrol SNMP Agent File Creation/Permission. Author: Andrew Alness
|
Analyze the security implications of: BMC Software Patrol 3.2.5 - Patrol SNMP Agent File Creation/Permission
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ETchat 3.7 - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: ETchat 3.7 - Cross-Site Request Forgery. Author: Hesam Bazvand
|
Analyze the security implications of: ETchat 3.7 - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Aria 0.99-6 - 'page' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Aria 0.99-6 - 'page' Local File Inclusion. Author: DSecRG
|
Analyze the security implications of: Aria 0.99-6 - 'page' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Orchard CMS 1.7.3/1.8.2/1.9.0 - Persistent Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Orchard CMS 1.7.3/1.8.2/1.9.0 - Persistent Cross-Site Scripting. Author: Paris Zoumpouloglou
|
Analyze the security implications of: Orchard CMS 1.7.3/1.8.2/1.9.0 - Persistent Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Oracle OpenJDK Runtime Environment 1.8.0_112-b15 - Java Serialization Denial Of Service
|
This is a dos exploit for multiple platform. Description: Oracle OpenJDK Runtime Environment 1.8.0_112-b15 - Java Serialization Denial Of Service. Author: ERPScan
|
Analyze the security implications of: Oracle OpenJDK Runtime Environment 1.8.0_112-b15 - Java Serialization Denial Of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: WebDisk 3.0.2 PhotoViewer iOS - Command Execution
|
This is a webapps exploit for ios platform. Description: WebDisk 3.0.2 PhotoViewer iOS - Command Execution. Author: Vulnerability-Lab
|
Analyze the security implications of: WebDisk 3.0.2 PhotoViewer iOS - Command Execution
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Aborior Encore Web Forum - Arbitrary Command Execution
|
This is a webapps exploit for cgi platform. Description: Aborior Encore Web Forum - Arbitrary Command Execution. Author: K-159
|
Analyze the security implications of: Aborior Encore Web Forum - Arbitrary Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: E-Sic Software livre CMS - 'f' SQL Injection
|
This is a webapps exploit for php platform. Description: E-Sic Software livre CMS - 'f' SQL Injection. Author: Elber Tavares
|
Analyze the security implications of: E-Sic Software livre CMS - 'f' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gogs - 'label' SQL Injection
|
This is a webapps exploit for multiple platform. Description: Gogs - 'label' SQL Injection. Author: Timo Schmid
|
Analyze the security implications of: Gogs - 'label' SQL Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: GParted 0.14.1 - OS Command Execution
|
This is a local exploit for linux platform. Description: GParted 0.14.1 - OS Command Execution. Author: SEC Consult
|
Analyze the security implications of: GParted 0.14.1 - OS Command Execution
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Spring Cloud 3.2.2 - Remote Command Execution (RCE)
|
This is a webapps exploit for java platform. Description: Spring Cloud 3.2.2 - Remote Command Execution (RCE). Author: GatoGamer1155
|
Analyze the security implications of: Spring Cloud 3.2.2 - Remote Command Execution (RCE)
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Code Widgets Online Job Application - 'admin.asp' Multiple SQL Injections
|
This is a webapps exploit for asp platform. Description: Code Widgets Online Job Application - 'admin.asp' Multiple SQL Injections. Author: L0rd CrusAd3r
|
Analyze the security implications of: Code Widgets Online Job Application - 'admin.asp' Multiple SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: D-Link DIR-850L - OS Command Execution (Metasploit)
|
This is a remote exploit for linux_mips platform. Description: D-Link DIR-850L - OS Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: D-Link DIR-850L - OS Command Execution (Metasploit)
|
This exploit targets linux_mips systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux_mips platform
|
What is this exploit about: Last Wizardz - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Last Wizardz - 'id' SQL Injection. Author: Sec Attack Team
|
Analyze the security implications of: Last Wizardz - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Artica Proxy 4.50 - Remote Code Execution (RCE)
|
This is a webapps exploit for php platform. Description: Artica Proxy 4.50 - Remote Code Execution (RCE). Author: Madan
|
Analyze the security implications of: Artica Proxy 4.50 - Remote Code Execution (RCE)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Falt4 CMS rc4 10.9.2007 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Falt4 CMS rc4 10.9.2007 - Multiple Vulnerabilities. Author: H-Security Labs
|
Analyze the security implications of: Falt4 CMS rc4 10.9.2007 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: News Update 1.1 - Change Admin Password
|
This is a webapps exploit for cgi platform. Description: News Update 1.1 - Change Admin Password. Author: morpheus[bd]
|
Analyze the security implications of: News Update 1.1 - Change Admin Password
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Array Networks vAPV and vxAG - Private Key Privilege Escalation / Code Execution (Metasploit)
|
This is a remote exploit for hardware platform. Description: Array Networks vAPV and vxAG - Private Key Privilege Escalation / Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Array Networks vAPV and vxAG - Private Key Privilege Escalation / Code Execution (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: vBulletin - Denial of Service
|
This is a dos exploit for php platform. Description: vBulletin - Denial of Service. Author: R3d-D3V!L
|
Analyze the security implications of: vBulletin - Denial of Service
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Qualcomm qpopper 2.4 - POP Server Buffer Overflow (1)
|
This is a remote exploit for linux platform. Description: Qualcomm qpopper 2.4 - POP Server Buffer Overflow (1). Author: Seth McGann
|
Analyze the security implications of: Qualcomm qpopper 2.4 - POP Server Buffer Overflow (1)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: BtiTracker 1.4.1 - Become Admin SQL Injection
|
This is a webapps exploit for php platform. Description: BtiTracker 1.4.1 - Become Admin SQL Injection. Author: m@ge|ozz
|
Analyze the security implications of: BtiTracker 1.4.1 - Become Admin SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gcards 1.13 - 'Addnews.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Gcards 1.13 - 'Addnews.php' Remote File Inclusion. Author: DeatH VirUs
|
Analyze the security implications of: Gcards 1.13 - 'Addnews.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Google Chrome for Android - Multiple 'file::' URL Handler Local Downloaded Content Disclosure Vulnerabilities
|
This is a remote exploit for android platform. Description: Google Chrome for Android - Multiple 'file::' URL Handler Local Downloaded Content Disclosure Vulnerabilities. Author: Artem Chaykin
|
Analyze the security implications of: Google Chrome for Android - Multiple 'file::' URL Handler Local Downloaded Content Disclosure Vulnerabilities
|
This exploit targets android systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Battleaxe Software BTTLXE Forum - 'login.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: Battleaxe Software BTTLXE Forum - 'login.asp' SQL Injection. Author: Du|L
|
Analyze the security implications of: Battleaxe Software BTTLXE Forum - 'login.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: eXV2 Module WebChat 1.60 - 'roomid' SQL Injection
|
This is a webapps exploit for php platform. Description: eXV2 Module WebChat 1.60 - 'roomid' SQL Injection. Author: S@BUN
|
Analyze the security implications of: eXV2 Module WebChat 1.60 - 'roomid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JForum 2.1.8 BookMarks - Cross-Site Request Forgery / Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: JForum 2.1.8 BookMarks - Cross-Site Request Forgery / Cross-Site Scripting. Author: Adam Baldwin
|
Analyze the security implications of: JForum 2.1.8 BookMarks - Cross-Site Request Forgery / Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: BookReview 1.0 - 'add_review.htm' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: BookReview 1.0 - 'add_review.htm' Multiple Cross-Site Scripting Vulnerabilities. Author: Lostmon
|
Analyze the security implications of: BookReview 1.0 - 'add_review.htm' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.