input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Gnews Publisher .NET - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: 4Images 1.7.1 - Local File Inclusion / Remote Code Execution | This is a webapps exploit for php platform. Description: 4Images 1.7.1 - Local File Inclusion / Remote Code Execution. Author: rgod |
Analyze the security implications of: 4Images 1.7.1 - Local File Inclusion / Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MinIO < 2024-01-31T20-20-33Z - Privilege Escalation | This is a remote exploit for go platform. Description: MinIO < 2024-01-31T20-20-33Z - Privilege Escalation. Author: Jenson Zhao |
Analyze the security implications of: MinIO < 2024-01-31T20-20-33Z - Privilege Escalation | This exploit targets go systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets go platform |
What is this exploit about: Joomla! Component com_xmap 1.2.11 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_xmap 1.2.11 - Blind SQL Injection. Author: jdc |
Analyze the security implications of: Joomla! Component com_xmap 1.2.11 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: @Mail 4.0/4.13 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cgi platform. Description: @Mail 4.0/4.13 - Multiple Cross-Site Scripting Vulnerabilities. Author: Lostmon |
Analyze the security implications of: @Mail 4.0/4.13 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: D-Link DKVM-IP8 - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: D-Link DKVM-IP8 - Cross-Site Scripting. Author: POPCORN |
Analyze the security implications of: D-Link DKVM-IP8 - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: IBM Tivoli Directory Server 6.0 - LDAP Memory Corruption | This is a dos exploit for multiple platform. Description: IBM Tivoli Directory Server 6.0 - LDAP Memory Corruption. Author: Evgeny Legerov |
Analyze the security implications of: IBM Tivoli Directory Server 6.0 - LDAP Memory Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Garbage Collection Management System 1.0 - SQL Injection + Arbitrary File Upload | This is a webapps exploit for php platform. Description: Garbage Collection Management System 1.0 - SQL Injection + Arbitrary File Upload. Author: Luca Bernardi |
Analyze the security implications of: Garbage Collection Management System 1.0 - SQL Injection + Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle VM VirtualBox 4.0 - 'tracepath' Local Denial of Service | This is a dos exploit for multiple platform. Description: Oracle VM VirtualBox 4.0 - 'tracepath' Local Denial of Service. Author: Thomas Dreibholz |
Analyze the security implications of: Oracle VM VirtualBox 4.0 - 'tracepath' Local Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Class-1 Forum 0.24.4 - Remote Code Execution | This is a webapps exploit for php platform. Description: Class-1 Forum 0.24.4 - Remote Code Execution. Author: rgod |
Analyze the security implications of: Class-1 Forum 0.24.4 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IISWorks ASPKnowledgeBase 2.0 - 'KB.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: IISWorks ASPKnowledgeBase 2.0 - 'KB.asp' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: IISWorks ASPKnowledgeBase 2.0 - 'KB.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Advertisement Board 3.0.4 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Advertisement Board 3.0.4 - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Advertisement Board 3.0.4 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jenzabar 9.2.2 - 'query' Reflected XSS. | This is a webapps exploit for multiple platform. Description: Jenzabar 9.2.2 - 'query' Reflected XSS.. Author: y0ung_dst |
Analyze the security implications of: Jenzabar 9.2.2 - 'query' Reflected XSS. | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CMS Galaxie Software - 'category_id' SQL Injection | This is a webapps exploit for php platform. Description: CMS Galaxie Software - 'category_id' SQL Injection. Author: MurderSkillz |
Analyze the security implications of: CMS Galaxie Software - 'category_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DeDeCMS 5.1 - SQL Injection | This is a webapps exploit for php platform. Description: DeDeCMS 5.1 - SQL Injection. Author: Securitylab Security Research |
Analyze the security implications of: DeDeCMS 5.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Campsite 2.6.1 - 'UrlType.php?g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'UrlType.php?g_documentRoot' Remote File Inclusion. Author: anonymous |
Analyze the security implications of: Campsite 2.6.1 - 'UrlType.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Web Wiz Forums 9.64 - Database Disclosure | This is a webapps exploit for asp platform. Description: Web Wiz Forums 9.64 - Database Disclosure. Author: ViRuSMaN |
Analyze the security implications of: Web Wiz Forums 9.64 - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: GnuPG 1.x - Detached Signature Verification Bypass | This is a local exploit for linux platform. Description: GnuPG 1.x - Detached Signature Verification Bypass. Author: taviso |
Analyze the security implications of: GnuPG 1.x - Detached Signature Verification Bypass | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Sun Java System Communications Express 6.3 - 'search.xml' Cross-Site Scripting | This is a webapps exploit for java platform. Description: Sun Java System Communications Express 6.3 - 'search.xml' Cross-Site Scripting. Author: SCS team |
Analyze the security implications of: Sun Java System Communications Express 6.3 - 'search.xml' Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Joomla! Convert Forms version 2.0.3 - Formula Injection (CSV Injection) | This is a webapps exploit for php platform. Description: Joomla! Convert Forms version 2.0.3 - Formula Injection (CSV Injection). Author: Sairam Jetty |
Analyze the security implications of: Joomla! Convert Forms version 2.0.3 - Formula Injection (CSV Injection) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX Kernel - Use-After-Free and Double Delete Due to Incorrect Locking in Intel GPU Driver | This is a dos exploit for osx platform. Description: Apple Mac OSX Kernel - Use-After-Free and Double Delete Due to Incorrect Locking in Intel GPU Driver. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX Kernel - Use-After-Free and Double Delete Due to Incorrect Locking in Intel GPU Driver | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: SolarWinds Storage Manager - Authentication Bypass (Metasploit) | This is a remote exploit for java platform. Description: SolarWinds Storage Manager - Authentication Bypass (Metasploit). Author: Metasploit |
Analyze the security implications of: SolarWinds Storage Manager - Authentication Bypass (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: CubeCart 3.0.20 - Multiple Script 'redir' Arbitrary Site Redirects | This is a webapps exploit for php platform. Description: CubeCart 3.0.20 - Multiple Script 'redir' Arbitrary Site Redirects. Author: Aung Khant |
Analyze the security implications of: CubeCart 3.0.20 - Multiple Script 'redir' Arbitrary Site Redirects | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX Safari 2.0.3 (417.9.2) - Multiple Vulnerabilities | This is a dos exploit for osx platform. Description: Apple Mac OSX Safari 2.0.3 (417.9.2) - Multiple Vulnerabilities. Author: Tom Ferris |
Analyze the security implications of: Apple Mac OSX Safari 2.0.3 (417.9.2) - Multiple Vulnerabilities | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Home Owners Collection Management System 1.0 - 'id' Blind SQL Injection | This is a webapps exploit for php platform. Description: Home Owners Collection Management System 1.0 - 'id' Blind SQL Injection. Author: Saud Alenazi |
Analyze the security implications of: Home Owners Collection Management System 1.0 - 'id' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lotus Domino Server 5.0.x - Directory Traversal (2) | This is a remote exploit for multiple platform. Description: Lotus Domino Server 5.0.x - Directory Traversal (2). Author: Georgi Guninski |
Analyze the security implications of: Lotus Domino Server 5.0.x - Directory Traversal (2) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Land Down Under 800/801 - 'journal.php?m' SQL Injection | This is a webapps exploit for php platform. Description: Land Down Under 800/801 - 'journal.php?m' SQL Injection. Author: bl2k |
Analyze the security implications of: Land Down Under 800/801 - 'journal.php?m' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jewelry Cart Software - 'product.php' SQL Injection | This is a webapps exploit for php platform. Description: Jewelry Cart Software - 'product.php' SQL Injection. Author: Asyraf |
Analyze the security implications of: Jewelry Cart Software - 'product.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WU-FTPD 2.6.2 - 'wuftpd-freezer.c' Remote Denial of Service | This is a dos exploit for linux platform. Description: WU-FTPD 2.6.2 - 'wuftpd-freezer.c' Remote Denial of Service. Author: Angelo Rosiello |
Analyze the security implications of: WU-FTPD 2.6.2 - 'wuftpd-freezer.c' Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: G-WAN 2.10.6 - Buffer Overflow (Denial of Service) (PoC) | This is a dos exploit for multiple platform. Description: G-WAN 2.10.6 - Buffer Overflow (Denial of Service) (PoC). Author: Fredrik Widlund |
Analyze the security implications of: G-WAN 2.10.6 - Buffer Overflow (Denial of Service) (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AWStats Totals 1.14 multisort - Remote Command Execution (Metasploit) | This is a webapps exploit for php platform. Description: AWStats Totals 1.14 multisort - Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: AWStats Totals 1.14 multisort - Remote Command Execution (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: McAfee VirusScan for Mac (Virex) 7.7 - Local Privilege Escalation | This is a local exploit for osx platform. Description: McAfee VirusScan for Mac (Virex) 7.7 - Local Privilege Escalation. Author: Kevin Finisterre |
Analyze the security implications of: McAfee VirusScan for Mac (Virex) 7.7 - Local Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Hrsale 2.0.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Hrsale 2.0.0 - Local File Inclusion. Author: Sosecure |
Analyze the security implications of: Hrsale 2.0.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ghostscript - Failed Restore Command Execution (Metasploit) | This is a local exploit for linux platform. Description: Ghostscript - Failed Restore Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Ghostscript - Failed Restore Command Execution (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.