input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Ricon Industrial Cellular Router S9922XL - Remote Command Execution (RCE)
|
This is a webapps exploit for hardware platform. Description: Ricon Industrial Cellular Router S9922XL - Remote Command Execution (RCE). Author: LiquidWorm
|
Analyze the security implications of: Ricon Industrial Cellular Router S9922XL - Remote Command Execution (RCE)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: MySQL 3.22.27/3.22.29/3.23.8 - GRANT Global Password Changing
|
This is a local exploit for multiple platform. Description: MySQL 3.22.27/3.22.29/3.23.8 - GRANT Global Password Changing. Author: Viktor Fougstedt
|
Analyze the security implications of: MySQL 3.22.27/3.22.29/3.23.8 - GRANT Global Password Changing
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Seyon 2.1 rev. 4b i586-Linux (RedHat 4.0/5.1) - Local Overflow
|
This is a local exploit for linux platform. Description: Seyon 2.1 rev. 4b i586-Linux (RedHat 4.0/5.1) - Local Overflow. Author: teleh0r
|
Analyze the security implications of: Seyon 2.1 rev. 4b i586-Linux (RedHat 4.0/5.1) - Local Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_personal - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_personal - SQL Injection. Author: DevilZ TM
|
Analyze the security implications of: Joomla! Component com_personal - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 3Com OfficeConnect DSL Router 812 1.1.7/840 1.1.7 - HTTP Port Router Denial of Service
|
This is a dos exploit for hardware platform. Description: 3Com OfficeConnect DSL Router 812 1.1.7/840 1.1.7 - HTTP Port Router Denial of Service. Author: Sniffer
|
Analyze the security implications of: 3Com OfficeConnect DSL Router 812 1.1.7/840 1.1.7 - HTTP Port Router Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Interspire Knowledge Manager 5 - 'p' Directory Traversal
|
This is a webapps exploit for php platform. Description: Interspire Knowledge Manager 5 - 'p' Directory Traversal. Author: Infected Web
|
Analyze the security implications of: Interspire Knowledge Manager 5 - 'p' Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component pcchess 0.8 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component pcchess 0.8 - SQL Injection. Author: S@BUN
|
Analyze the security implications of: Joomla! Component pcchess 0.8 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Omilen Photo Gallery 0.5b - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Omilen Photo Gallery 0.5b - Local File Inclusion. Author: ByALBAYX
|
Analyze the security implications of: Joomla! Component Omilen Photo Gallery 0.5b - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP 5.3 - 'mail.log' Configuration Option 'open_basedir' Restriction Bypass
|
This is a local exploit for php platform. Description: PHP 5.3 - 'mail.log' Configuration Option 'open_basedir' Restriction Bypass. Author: Maksymilian Arciemowicz
|
Analyze the security implications of: PHP 5.3 - 'mail.log' Configuration Option 'open_basedir' Restriction Bypass
|
This exploit targets php systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LibreOffice 3.5.2.2 - Memory Corruption
|
This is a dos exploit for multiple platform. Description: LibreOffice 3.5.2.2 - Memory Corruption. Author: shinnai
|
Analyze the security implications of: LibreOffice 3.5.2.2 - Memory Corruption
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: id Software Quake II Server 3.20/3.21 - Remote Information Disclosure
|
This is a remote exploit for multiple platform. Description: id Software Quake II Server 3.20/3.21 - Remote Information Disclosure. Author: Redix
|
Analyze the security implications of: id Software Quake II Server 3.20/3.21 - Remote Information Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Doctor Patient Project 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Doctor Patient Project 1.0 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Doctor Patient Project 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ozeki SMS Gateway 10.3.208 - Arbitrary File Read (Unauthenticated)
|
This is a webapps exploit for multiple platform. Description: Ozeki SMS Gateway 10.3.208 - Arbitrary File Read (Unauthenticated). Author: Ahmet Ümit BAYRAM
|
Analyze the security implications of: Ozeki SMS Gateway 10.3.208 - Arbitrary File Read (Unauthenticated)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: usersctp - Out-of-Bounds Reads in sctp_load_addresses_from_init
|
This is a dos exploit for linux platform. Description: usersctp - Out-of-Bounds Reads in sctp_load_addresses_from_init. Author: Google Security Research
|
Analyze the security implications of: usersctp - Out-of-Bounds Reads in sctp_load_addresses_from_init
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Advanced Bus Booking Script 2.04 - SQL Injection
|
This is a webapps exploit for php platform. Description: Advanced Bus Booking Script 2.04 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Advanced Bus Booking Script 2.04 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cacti 0.8.7e - SQL Injection
|
This is a webapps exploit for php platform. Description: Cacti 0.8.7e - SQL Injection. Author: Nahuel Grisolia
|
Analyze the security implications of: Cacti 0.8.7e - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! / Mambo Component com_iomezun - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_iomezun - 'id' SQL Injection. Author: S@BUN
|
Analyze the security implications of: Joomla! / Mambo Component com_iomezun - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_jajobboard - Multiple Local File Inclusions
|
This is a webapps exploit for php platform. Description: Joomla! Component com_jajobboard - Multiple Local File Inclusions. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component com_jajobboard - Multiple Local File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: File Roller v3.4.1 - Denial of Service (PoC)
|
This is a dos exploit for linux platform. Description: File Roller v3.4.1 - Denial of Service (PoC). Author: Arsyntex
|
Analyze the security implications of: File Roller v3.4.1 - Denial of Service (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AJ Auction 1.0 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: AJ Auction 1.0 - 'id' SQL Injection. Author: Hussin X
|
Analyze the security implications of: AJ Auction 1.0 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Hikvision Digital Video Recorder - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: Hikvision Digital Video Recorder - Cross-Site Request Forgery. Author: LiquidWorm
|
Analyze the security implications of: Hikvision Digital Video Recorder - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Linux Kernel 4.4.x (Ubuntu 16.04) - 'double-fdput()' bpf(BPF_PROG_LOAD) Privilege Escalation
|
This is a local exploit for linux platform. Description: Linux Kernel 4.4.x (Ubuntu 16.04) - 'double-fdput()' bpf(BPF_PROG_LOAD) Privilege Escalation. Author: Google Security Research
|
Analyze the security implications of: Linux Kernel 4.4.x (Ubuntu 16.04) - 'double-fdput()' bpf(BPF_PROG_LOAD) Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Icecast 2.x - XSL Parser Multiple Vulnerabilities
|
This is a remote exploit for multiple platform. Description: Icecast 2.x - XSL Parser Multiple Vulnerabilities. Author: patrick
|
Analyze the security implications of: Icecast 2.x - XSL Parser Multiple Vulnerabilities
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ManageEngine Firewall Analyzer 8.0 - Directory Traversal / Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: ManageEngine Firewall Analyzer 8.0 - Directory Traversal / Cross-Site Scripting. Author: Ertebat Gostar Co
|
Analyze the security implications of: ManageEngine Firewall Analyzer 8.0 - Directory Traversal / Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: HP Insight Diagnostics Online Edition 8.4 - 'parameters.php?device' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: HP Insight Diagnostics Online Edition 8.4 - 'parameters.php?device' Cross-Site Scripting. Author: Mr Teatime
|
Analyze the security implications of: HP Insight Diagnostics Online Edition 8.4 - 'parameters.php?device' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ntfs-3g (Debian 9) - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: ntfs-3g (Debian 9) - Local Privilege Escalation. Author: Kristian Erik Hermansen
|
Analyze the security implications of: ntfs-3g (Debian 9) - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Active Price Comparison 4 - Authentication Bypass
|
This is a webapps exploit for asp platform. Description: Active Price Comparison 4 - Authentication Bypass. Author: R3d-D3V!L
|
Analyze the security implications of: Active Price Comparison 4 - Authentication Bypass
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Campsite 2.6.1 - 'LocalizerLanguage.php?g_documentRoot' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'LocalizerLanguage.php?g_documentRoot' Remote File Inclusion. Author: anonymous
|
Analyze the security implications of: Campsite 2.6.1 - 'LocalizerLanguage.php?g_documentRoot' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: VelotiSmart WiFi B-380 Camera - Directory Traversal
|
This is a webapps exploit for hardware platform. Description: VelotiSmart WiFi B-380 Camera - Directory Traversal. Author: Miguel Mendez Z
|
Analyze the security implications of: VelotiSmart WiFi B-380 Camera - Directory Traversal
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CPA Site Solutions - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: CPA Site Solutions - Arbitrary File Upload. Author: R3VAN_BASTARD
|
Analyze the security implications of: CPA Site Solutions - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Appsource School Management System 1.0 - 'student_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Appsource School Management System 1.0 - 'student_id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Appsource School Management System 1.0 - 'student_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ASP-Nuke 2.0.7 - 'gotourl.asp' Open Redirect
|
This is a webapps exploit for asp platform. Description: ASP-Nuke 2.0.7 - 'gotourl.asp' Open Redirect. Author: felipe andrian
|
Analyze the security implications of: ASP-Nuke 2.0.7 - 'gotourl.asp' Open Redirect
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Wireshark 1.0.x - '.ncf' Packet Capture Local Denial of Service
|
This is a dos exploit for multiple platform. Description: Wireshark 1.0.x - '.ncf' Packet Capture Local Denial of Service. Author: Shinnok
|
Analyze the security implications of: Wireshark 1.0.x - '.ncf' Packet Capture Local Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: KiviCare Clinic & Patient Management System (EHR) 3.6.4 - Unauthenticated SQL Injection
|
This is a webapps exploit for php platform. Description: KiviCare Clinic & Patient Management System (EHR) 3.6.4 - Unauthenticated SQL Injection. Author: samogod
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.