input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: CitrusDB 0.3.6 - 'importcc.php' Arbitrary Database Injection | This is a webapps exploit for php platform. Description: CitrusDB 0.3.6 - 'importcc.php' Arbitrary Database Injection. Author: RedTeam Pentesting |
Analyze the security implications of: CitrusDB 0.3.6 - 'importcc.php' Arbitrary Database Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IRIX 5.3 - '/usr/sbin/iwsh' Local Buffer Overflow / Local Privilege Escalation | This is a local exploit for irix platform. Description: IRIX 5.3 - '/usr/sbin/iwsh' Local Buffer Overflow / Local Privilege Escalation. Author: David Hedley |
Analyze the security implications of: IRIX 5.3 - '/usr/sbin/iwsh' Local Buffer Overflow / Local Privilege Escalation | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: Magento eCommerce CE v2.3.5-p2 - Blind SQLi | This is a webapps exploit for php platform. Description: Magento eCommerce CE v2.3.5-p2 - Blind SQLi. Author: Aydin Naserifard |
Analyze the security implications of: Magento eCommerce CE v2.3.5-p2 - Blind SQLi | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_photo - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Joomla! Component com_photo - Multiple SQL Injections. Author: Chokri Ben Achor |
Analyze the security implications of: Joomla! Component com_photo - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_informations - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_informations - SQL Injection. Author: Omar |
Analyze the security implications of: Joomla! Component com_informations - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HTMLToNuke - Cross-Site Scripting | This is a webapps exploit for php platform. Description: HTMLToNuke - Cross-Site Scripting. Author: JOCANOR |
Analyze the security implications of: HTMLToNuke - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Valve Software Half-Life Server 1.1.1.0/3.1.1.1c1/4.1.1.1a - Multiplayer Request Buffer Overflow | This is a remote exploit for linux platform. Description: Valve Software Half-Life Server 1.1.1.0/3.1.1.1c1/4.1.1.1a - Multiplayer Request Buffer Overflow. Author: hkvig |
Analyze the security implications of: Valve Software Half-Life Server 1.1.1.0/3.1.1.1c1/4.1.1.1a - Multiplayer Request Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Centreo 19.10.8 - 'DisplayServiceStatus' Remote Code Execution | This is a webapps exploit for php platform. Description: Centreo 19.10.8 - 'DisplayServiceStatus' Remote Code Execution. Author: Engin Demirbilek |
Analyze the security implications of: Centreo 19.10.8 - 'DisplayServiceStatus' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: phpMyAdmin - (Authenticated) Remote Code Execution (Metasploit) | This is a remote exploit for php platform. Description: phpMyAdmin - (Authenticated) Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: phpMyAdmin - (Authenticated) Remote Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lunar CMS 3.3 - Remote Command Execution | This is a webapps exploit for php platform. Description: Lunar CMS 3.3 - Remote Command Execution. Author: LiquidWorm |
Analyze the security implications of: Lunar CMS 3.3 - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle Reports Server 6.0.8/9.0.x - XML File Disclosure | This is a remote exploit for multiple platform. Description: Oracle Reports Server 6.0.8/9.0.x - XML File Disclosure. Author: Alexander Kornbrust |
Analyze the security implications of: Oracle Reports Server 6.0.8/9.0.x - XML File Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GreyMatter WebLog 1.21d - Remote Command Execution (2) | This is a webapps exploit for php platform. Description: GreyMatter WebLog 1.21d - Remote Command Execution (2). Author: Hessam-x |
Analyze the security implications of: GreyMatter WebLog 1.21d - Remote Command Execution (2) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Achievo 1.3.2 - 'atknodetype' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Achievo 1.3.2 - 'atknodetype' Cross-Site Scripting. Author: Rohit Bansal |
Analyze the security implications of: Achievo 1.3.2 - 'atknodetype' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Unreal Engine - 'UnChan.cpp' Failed Assertion Remote Denial of Service | This is a dos exploit for multiple platform. Description: Unreal Engine - 'UnChan.cpp' Failed Assertion Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Unreal Engine - 'UnChan.cpp' Failed Assertion Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux Kernel 2.6.x - Proc dentry_unused Corruption Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - Proc dentry_unused Corruption Local Denial of Service. Author: Tony Griffiths |
Analyze the security implications of: Linux Kernel 2.6.x - Proc dentry_unused Corruption Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache mod_session_crypto - Padding Oracle | This is a webapps exploit for multiple platform. Description: Apache mod_session_crypto - Padding Oracle. Author: RedTeam Pentesting GmbH |
Analyze the security implications of: Apache mod_session_crypto - Padding Oracle | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ISDN4Linux 3.1 - IPPPD Device String SysLog Format String (1) | This is a local exploit for linux platform. Description: ISDN4Linux 3.1 - IPPPD Device String SysLog Format String (1). Author: Gobbles Security |
Analyze the security implications of: ISDN4Linux 3.1 - IPPPD Device String SysLog Format String (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticketreply.php' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticketreply.php' SQL Injection. Author: qw3rTyTy |
Analyze the security implications of: Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticketreply.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNU binutils - 'aarch64_ext_ldst_reglist' Buffer Overflow | This is a dos exploit for linux platform. Description: GNU binutils - 'aarch64_ext_ldst_reglist' Buffer Overflow. Author: Alexandre Adamski |
Analyze the security implications of: GNU binutils - 'aarch64_ext_ldst_reglist' Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: IBM AIX eNetwork Firewall 3.2/3.3 - Insecure Temporary File Creation | This is a local exploit for aix platform. Description: IBM AIX eNetwork Firewall 3.2/3.3 - Insecure Temporary File Creation. Author: Paul Cammidge |
Analyze the security implications of: IBM AIX eNetwork Firewall 3.2/3.3 - Insecure Temporary File Creation | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Pre Classified Listings 1.0 - 'detailad.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Pre Classified Listings 1.0 - 'detailad.asp' SQL Injection. Author: Pouya_Server |
Analyze the security implications of: Pre Classified Listings 1.0 - 'detailad.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Linux Kernel 2.6.x - 'net/ipv6/ip6_output.c' Null Pointer Dereference Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - 'net/ipv6/ip6_output.c' Null Pointer Dereference Denial of Service. Author: Rémi Denis-Courmont |
Analyze the security implications of: Linux Kernel 2.6.x - 'net/ipv6/ip6_output.c' Null Pointer Dereference Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Graugon Forum 1.3 - SQL Injection | This is a webapps exploit for php platform. Description: Graugon Forum 1.3 - SQL Injection. Author: AutoSec Tools |
Analyze the security implications of: Graugon Forum 1.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: perfSONAR v4.4.5 - Partial Blind CSRF | This is a webapps exploit for multiple platform. Description: perfSONAR v4.4.5 - Partial Blind CSRF. Author: Ryan Moore |
Analyze the security implications of: perfSONAR v4.4.5 - Partial Blind CSRF | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Wireshark - 'get_t61_string' Heap Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: Wireshark - 'get_t61_string' Heap Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: Wireshark - 'get_t61_string' Heap Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Airbnb Crashpadder Clone Script - SQL Injection | This is a webapps exploit for php platform. Description: Airbnb Crashpadder Clone Script - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Airbnb Crashpadder Clone Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link/TRENDnet - NCC Service Command Injection (Metasploit) | This is a webapps exploit for linux platform. Description: D-Link/TRENDnet - NCC Service Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: D-Link/TRENDnet - NCC Service Command Injection (Metasploit) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! / Mambo Component com_most - 'secid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_most - 'secid' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! / Mambo Component com_most - 'secid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 4Images 1.7.8 - Remote File Inclusion | This is a webapps exploit for php platform. Description: 4Images 1.7.8 - Remote File Inclusion. Author: LoSt.HaCkEr |
Analyze the security implications of: 4Images 1.7.8 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Magnolia CMS 6.2.19 - Stored Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Magnolia CMS 6.2.19 - Stored Cross-Site Scripting (XSS). Author: Giulio Garzia Ozozuz |
Analyze the security implications of: Magnolia CMS 6.2.19 - Stored Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Beerwin's PHPLinkAdmin 1.0 - Remote File Inclusion / SQL Injection | This is a webapps exploit for php platform. Description: Beerwin's PHPLinkAdmin 1.0 - Remote File Inclusion / SQL Injection. Author: SirGod |
Analyze the security implications of: Beerwin's PHPLinkAdmin 1.0 - Remote File Inclusion / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Platform Load Sharing Facility 4/5 - 'LSF_ENVDIR' Local Command Execution | This is a local exploit for multiple platform. Description: Platform Load Sharing Facility 4/5 - 'LSF_ENVDIR' Local Command Execution. Author: Tomasz Grabowski |
Analyze the security implications of: Platform Load Sharing Facility 4/5 - 'LSF_ENVDIR' Local Command Execution | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component FlashGames 1.5.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component FlashGames 1.5.0 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component FlashGames 1.5.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.x - fs/eventpoll.c epoll Data Structure File Descriptor Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - fs/eventpoll.c epoll Data Structure File Descriptor Local Denial of Service. Author: Nelson Elhage |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.