input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Ricon Industrial Cellular Router S9922XL - Remote Command Execution (RCE) | This is a webapps exploit for hardware platform. Description: Ricon Industrial Cellular Router S9922XL - Remote Command Execution (RCE). Author: LiquidWorm |
Analyze the security implications of: Ricon Industrial Cellular Router S9922XL - Remote Command Execution (RCE) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: MySQL 3.22.27/3.22.29/3.23.8 - GRANT Global Password Changing | This is a local exploit for multiple platform. Description: MySQL 3.22.27/3.22.29/3.23.8 - GRANT Global Password Changing. Author: Viktor Fougstedt |
Analyze the security implications of: MySQL 3.22.27/3.22.29/3.23.8 - GRANT Global Password Changing | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Seyon 2.1 rev. 4b i586-Linux (RedHat 4.0/5.1) - Local Overflow | This is a local exploit for linux platform. Description: Seyon 2.1 rev. 4b i586-Linux (RedHat 4.0/5.1) - Local Overflow. Author: teleh0r |
Analyze the security implications of: Seyon 2.1 rev. 4b i586-Linux (RedHat 4.0/5.1) - Local Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_personal - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_personal - SQL Injection. Author: DevilZ TM |
Analyze the security implications of: Joomla! Component com_personal - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 3Com OfficeConnect DSL Router 812 1.1.7/840 1.1.7 - HTTP Port Router Denial of Service | This is a dos exploit for hardware platform. Description: 3Com OfficeConnect DSL Router 812 1.1.7/840 1.1.7 - HTTP Port Router Denial of Service. Author: Sniffer |
Analyze the security implications of: 3Com OfficeConnect DSL Router 812 1.1.7/840 1.1.7 - HTTP Port Router Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Interspire Knowledge Manager 5 - 'p' Directory Traversal | This is a webapps exploit for php platform. Description: Interspire Knowledge Manager 5 - 'p' Directory Traversal. Author: Infected Web |
Analyze the security implications of: Interspire Knowledge Manager 5 - 'p' Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component pcchess 0.8 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component pcchess 0.8 - SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! Component pcchess 0.8 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Omilen Photo Gallery 0.5b - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Omilen Photo Gallery 0.5b - Local File Inclusion. Author: ByALBAYX |
Analyze the security implications of: Joomla! Component Omilen Photo Gallery 0.5b - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.3 - 'mail.log' Configuration Option 'open_basedir' Restriction Bypass | This is a local exploit for php platform. Description: PHP 5.3 - 'mail.log' Configuration Option 'open_basedir' Restriction Bypass. Author: Maksymilian Arciemowicz |
Analyze the security implications of: PHP 5.3 - 'mail.log' Configuration Option 'open_basedir' Restriction Bypass | This exploit targets php systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LibreOffice 3.5.2.2 - Memory Corruption | This is a dos exploit for multiple platform. Description: LibreOffice 3.5.2.2 - Memory Corruption. Author: shinnai |
Analyze the security implications of: LibreOffice 3.5.2.2 - Memory Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: id Software Quake II Server 3.20/3.21 - Remote Information Disclosure | This is a remote exploit for multiple platform. Description: id Software Quake II Server 3.20/3.21 - Remote Information Disclosure. Author: Redix |
Analyze the security implications of: id Software Quake II Server 3.20/3.21 - Remote Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Doctor Patient Project 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Doctor Patient Project 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Doctor Patient Project 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ozeki SMS Gateway 10.3.208 - Arbitrary File Read (Unauthenticated) | This is a webapps exploit for multiple platform. Description: Ozeki SMS Gateway 10.3.208 - Arbitrary File Read (Unauthenticated). Author: Ahmet Ümit BAYRAM |
Analyze the security implications of: Ozeki SMS Gateway 10.3.208 - Arbitrary File Read (Unauthenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: usersctp - Out-of-Bounds Reads in sctp_load_addresses_from_init | This is a dos exploit for linux platform. Description: usersctp - Out-of-Bounds Reads in sctp_load_addresses_from_init. Author: Google Security Research |
Analyze the security implications of: usersctp - Out-of-Bounds Reads in sctp_load_addresses_from_init | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Advanced Bus Booking Script 2.04 - SQL Injection | This is a webapps exploit for php platform. Description: Advanced Bus Booking Script 2.04 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Advanced Bus Booking Script 2.04 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cacti 0.8.7e - SQL Injection | This is a webapps exploit for php platform. Description: Cacti 0.8.7e - SQL Injection. Author: Nahuel Grisolia |
Analyze the security implications of: Cacti 0.8.7e - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! / Mambo Component com_iomezun - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_iomezun - 'id' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! / Mambo Component com_iomezun - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_jajobboard - Multiple Local File Inclusions | This is a webapps exploit for php platform. Description: Joomla! Component com_jajobboard - Multiple Local File Inclusions. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component com_jajobboard - Multiple Local File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: File Roller v3.4.1 - Denial of Service (PoC) | This is a dos exploit for linux platform. Description: File Roller v3.4.1 - Denial of Service (PoC). Author: Arsyntex |
Analyze the security implications of: File Roller v3.4.1 - Denial of Service (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AJ Auction 1.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: AJ Auction 1.0 - 'id' SQL Injection. Author: Hussin X |
Analyze the security implications of: AJ Auction 1.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hikvision Digital Video Recorder - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Hikvision Digital Video Recorder - Cross-Site Request Forgery. Author: LiquidWorm |
Analyze the security implications of: Hikvision Digital Video Recorder - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linux Kernel 4.4.x (Ubuntu 16.04) - 'double-fdput()' bpf(BPF_PROG_LOAD) Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel 4.4.x (Ubuntu 16.04) - 'double-fdput()' bpf(BPF_PROG_LOAD) Privilege Escalation. Author: Google Security Research |
Analyze the security implications of: Linux Kernel 4.4.x (Ubuntu 16.04) - 'double-fdput()' bpf(BPF_PROG_LOAD) Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Icecast 2.x - XSL Parser Multiple Vulnerabilities | This is a remote exploit for multiple platform. Description: Icecast 2.x - XSL Parser Multiple Vulnerabilities. Author: patrick |
Analyze the security implications of: Icecast 2.x - XSL Parser Multiple Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ManageEngine Firewall Analyzer 8.0 - Directory Traversal / Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: ManageEngine Firewall Analyzer 8.0 - Directory Traversal / Cross-Site Scripting. Author: Ertebat Gostar Co |
Analyze the security implications of: ManageEngine Firewall Analyzer 8.0 - Directory Traversal / Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: HP Insight Diagnostics Online Edition 8.4 - 'parameters.php?device' Cross-Site Scripting | This is a webapps exploit for php platform. Description: HP Insight Diagnostics Online Edition 8.4 - 'parameters.php?device' Cross-Site Scripting. Author: Mr Teatime |
Analyze the security implications of: HP Insight Diagnostics Online Edition 8.4 - 'parameters.php?device' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ntfs-3g (Debian 9) - Local Privilege Escalation | This is a local exploit for linux platform. Description: ntfs-3g (Debian 9) - Local Privilege Escalation. Author: Kristian Erik Hermansen |
Analyze the security implications of: ntfs-3g (Debian 9) - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Active Price Comparison 4 - Authentication Bypass | This is a webapps exploit for asp platform. Description: Active Price Comparison 4 - Authentication Bypass. Author: R3d-D3V!L |
Analyze the security implications of: Active Price Comparison 4 - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Campsite 2.6.1 - 'LocalizerLanguage.php?g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'LocalizerLanguage.php?g_documentRoot' Remote File Inclusion. Author: anonymous |
Analyze the security implications of: Campsite 2.6.1 - 'LocalizerLanguage.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: VelotiSmart WiFi B-380 Camera - Directory Traversal | This is a webapps exploit for hardware platform. Description: VelotiSmart WiFi B-380 Camera - Directory Traversal. Author: Miguel Mendez Z |
Analyze the security implications of: VelotiSmart WiFi B-380 Camera - Directory Traversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CPA Site Solutions - Arbitrary File Upload | This is a webapps exploit for php platform. Description: CPA Site Solutions - Arbitrary File Upload. Author: R3VAN_BASTARD |
Analyze the security implications of: CPA Site Solutions - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Appsource School Management System 1.0 - 'student_id' SQL Injection | This is a webapps exploit for php platform. Description: Appsource School Management System 1.0 - 'student_id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Appsource School Management System 1.0 - 'student_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASP-Nuke 2.0.7 - 'gotourl.asp' Open Redirect | This is a webapps exploit for asp platform. Description: ASP-Nuke 2.0.7 - 'gotourl.asp' Open Redirect. Author: felipe andrian |
Analyze the security implications of: ASP-Nuke 2.0.7 - 'gotourl.asp' Open Redirect | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Wireshark 1.0.x - '.ncf' Packet Capture Local Denial of Service | This is a dos exploit for multiple platform. Description: Wireshark 1.0.x - '.ncf' Packet Capture Local Denial of Service. Author: Shinnok |
Analyze the security implications of: Wireshark 1.0.x - '.ncf' Packet Capture Local Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: KiviCare Clinic & Patient Management System (EHR) 3.6.4 - Unauthenticated SQL Injection | This is a webapps exploit for php platform. Description: KiviCare Clinic & Patient Management System (EHR) 3.6.4 - Unauthenticated SQL Injection. Author: samogod |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.