input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: LiteWEB Web Server 2.5 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: LiteWEB Web Server 2.5 - Authentication Bypass. Author: Ziv Kamir
|
Analyze the security implications of: LiteWEB Web Server 2.5 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Samsung - 'm2m1shot' Kernel Driver Buffer Overflow
|
This is a dos exploit for android platform. Description: Samsung - 'm2m1shot' Kernel Driver Buffer Overflow. Author: Google Security Research
|
Analyze the security implications of: Samsung - 'm2m1shot' Kernel Driver Buffer Overflow
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Cat Soft Serv-U FTP Server 2.5 - Remote Buffer Overflow
|
This is a remote exploit for linux platform. Description: Cat Soft Serv-U FTP Server 2.5 - Remote Buffer Overflow. Author: Arne Vidstrom
|
Analyze the security implications of: Cat Soft Serv-U FTP Server 2.5 - Remote Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: i-Panel Administration System 2.0 - Reflected Cross-site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: i-Panel Administration System 2.0 - Reflected Cross-site Scripting (XSS). Author: Forster Chiu
|
Analyze the security implications of: i-Panel Administration System 2.0 - Reflected Cross-site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Tenda N300 F3 12.01.01.48 - Malformed HTTP Request Header Processing
|
This is a remote exploit for hardware platform. Description: Tenda N300 F3 12.01.01.48 - Malformed HTTP Request Header Processing. Author: @h454nsec
|
Analyze the security implications of: Tenda N300 F3 12.01.01.48 - Malformed HTTP Request Header Processing
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Linux Kernel 2.0 - TCP Port Denial of Service
|
This is a dos exploit for linux platform. Description: Linux Kernel 2.0 - TCP Port Denial of Service. Author: David Schwartz
|
Analyze the security implications of: Linux Kernel 2.0 - TCP Port Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: PointDev IDEAL Migration - Buffer Overflow (Metasploit)
|
This is a dos exploit for aix platform. Description: PointDev IDEAL Migration - Buffer Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: PointDev IDEAL Migration - Buffer Overflow (Metasploit)
|
This exploit targets aix systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: Xerox Multifunction Printers (MFP) - 'Patch' DLM (Metasploit)
|
This is a remote exploit for hardware platform. Description: Xerox Multifunction Printers (MFP) - 'Patch' DLM (Metasploit). Author: Metasploit
|
Analyze the security implications of: Xerox Multifunction Printers (MFP) - 'Patch' DLM (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Adobe (Multiple Products) - XML External Entity / XML Injection
|
This is a dos exploit for multiple platform. Description: Adobe (Multiple Products) - XML External Entity / XML Injection. Author: Roberto Suggi Liverani
|
Analyze the security implications of: Adobe (Multiple Products) - XML External Entity / XML Injection
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: NetBSD 1.3.2 / SGI IRIX 6.5.1 - 'at(1)' Read File
|
This is a local exploit for netbsd_x86 platform. Description: NetBSD 1.3.2 / SGI IRIX 6.5.1 - 'at(1)' Read File. Author: Gutierrez
|
Analyze the security implications of: NetBSD 1.3.2 / SGI IRIX 6.5.1 - 'at(1)' Read File
|
This exploit targets netbsd_x86 systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets netbsd_x86 platform
|
What is this exploit about: Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass. Author: LiquidWorm
|
Analyze the security implications of: Smartwares HOME easy 1.0.9 - Client-Side Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Novell Netware Enterprise Web Server 5.1/6.0 SnoopServlet - Information Disclosure
|
This is a remote exploit for netware platform. Description: Novell Netware Enterprise Web Server 5.1/6.0 SnoopServlet - Information Disclosure. Author: Rafel Ivgi The-Insider
|
Analyze the security implications of: Novell Netware Enterprise Web Server 5.1/6.0 SnoopServlet - Information Disclosure
|
This exploit targets netware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets netware platform
|
What is this exploit about: Joomla! Component vAccount 2.0.2 - 'vid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component vAccount 2.0.2 - 'vid' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component vAccount 2.0.2 - 'vid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AMSS++ v 4.31 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: AMSS++ v 4.31 - 'id' SQL Injection. Author: indoushka
|
Analyze the security implications of: AMSS++ v 4.31 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component VehicleManager 3.9 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component VehicleManager 3.9 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component VehicleManager 3.9 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ASPPortal Free Version - 'Topic_Id' SQL Injection
|
This is a webapps exploit for asp platform. Description: ASPPortal Free Version - 'Topic_Id' SQL Injection. Author: JosS
|
Analyze the security implications of: ASPPortal Free Version - 'Topic_Id' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Kerio MailServer 5.6.3 subscribe Module - Overflow
|
This is a dos exploit for linux platform. Description: Kerio MailServer 5.6.3 subscribe Module - Overflow. Author: David F.Madrid
|
Analyze the security implications of: Kerio MailServer 5.6.3 subscribe Module - Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apache Tomcat 3/4 - JSP Engine Denial of Service
|
This is a dos exploit for linux platform. Description: Apache Tomcat 3/4 - JSP Engine Denial of Service. Author: Marc Schoenefeld
|
Analyze the security implications of: Apache Tomcat 3/4 - JSP Engine Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Operator Shell (osh) 1.7-12 - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Operator Shell (osh) 1.7-12 - Local Privilege Escalation. Author: Charles Stevenson
|
Analyze the security implications of: Operator Shell (osh) 1.7-12 - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: glibc - 'getaddrinfo' Remote Stack Buffer Overflow
|
This is a remote exploit for linux platform. Description: glibc - 'getaddrinfo' Remote Stack Buffer Overflow. Author: SpeeDr00t
|
Analyze the security implications of: glibc - 'getaddrinfo' Remote Stack Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apple WebKit - 'WebCore::toJS' Use-After-Free
|
This is a dos exploit for multiple platform. Description: Apple WebKit - 'WebCore::toJS' Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: Apple WebKit - 'WebCore::toJS' Use-After-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Axis Communications MPQT/PACS 5.20.x - Server-Side Include Daemon Remote Format String
|
This is a remote exploit for multiple platform. Description: Axis Communications MPQT/PACS 5.20.x - Server-Side Include Daemon Remote Format String. Author: bashis
|
Analyze the security implications of: Axis Communications MPQT/PACS 5.20.x - Server-Side Include Daemon Remote Format String
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: QMail Mailing List Manager 1.2 - Database Disclosure
|
This is a webapps exploit for asp platform. Description: QMail Mailing List Manager 1.2 - Database Disclosure. Author: Ghost Hacker
|
Analyze the security implications of: QMail Mailing List Manager 1.2 - Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: eCardMAX HotEditor 4.0 - 'Keyboard.php' Local File Inclusion
|
This is a webapps exploit for php platform. Description: eCardMAX HotEditor 4.0 - 'Keyboard.php' Local File Inclusion. Author: Liz0ziM
|
Analyze the security implications of: eCardMAX HotEditor 4.0 - 'Keyboard.php' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sonicwall 8.1.0.2-14sv - 'extensionsettings.cgi' Remote Command Injection (Metasploit)
|
This is a webapps exploit for hardware platform. Description: Sonicwall 8.1.0.2-14sv - 'extensionsettings.cgi' Remote Command Injection (Metasploit). Author: xort
|
Analyze the security implications of: Sonicwall 8.1.0.2-14sv - 'extensionsettings.cgi' Remote Command Injection (Metasploit)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ATutor 1.6.4 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: ATutor 1.6.4 - Multiple Cross-Site Scripting Vulnerabilities. Author: ITSecTeam
|
Analyze the security implications of: ATutor 1.6.4 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Pirelli Discus DRG A125g - Local Password Disclosure
|
This is a webapps exploit for hardware platform. Description: Pirelli Discus DRG A125g - Local Password Disclosure. Author: Sebastián Magof
|
Analyze the security implications of: Pirelli Discus DRG A125g - Local Password Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Leszek Krupinski L-Forum 2.4 - Search Script SQL Injection
|
This is a webapps exploit for php platform. Description: Leszek Krupinski L-Forum 2.4 - Search Script SQL Injection. Author: Matthew Murphy
|
Analyze the security implications of: Leszek Krupinski L-Forum 2.4 - Search Script SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: F-Secure Internet Gatekeeper 5.40 - Heap Overflow (PoC)
|
This is a webapps exploit for linux platform. Description: F-Secure Internet Gatekeeper 5.40 - Heap Overflow (PoC). Author: Kevin Joensen
|
Analyze the security implications of: F-Secure Internet Gatekeeper 5.40 - Heap Overflow (PoC)
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: MATLAB R2009b - 'dtoa' Implementation Memory Corruption
|
This is a dos exploit for linux platform. Description: MATLAB R2009b - 'dtoa' Implementation Memory Corruption. Author: Maksymilian Arciemowicz
|
Analyze the security implications of: MATLAB R2009b - 'dtoa' Implementation Memory Corruption
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Cisco RV320 and RV325 - Unauthenticated Remote Code Execution (Metasploit)
|
This is a remote exploit for hardware platform. Description: Cisco RV320 and RV325 - Unauthenticated Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Cisco RV320 and RV325 - Unauthenticated Remote Code Execution (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: IDevSpot PHPLinkExchange 1.01/1.02 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: IDevSpot PHPLinkExchange 1.01/1.02 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: sl4xUz
|
Analyze the security implications of: IDevSpot PHPLinkExchange 1.01/1.02 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Mac OSX Entitlements - 'Rootpipe' Local Privilege Escalation (Metasploit)
|
This is a local exploit for osx platform. Description: Apple Mac OSX Entitlements - 'Rootpipe' Local Privilege Escalation (Metasploit). Author: Metasploit
|
Analyze the security implications of: Apple Mac OSX Entitlements - 'Rootpipe' Local Privilege Escalation (Metasploit)
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: CuteNews 1.3.6 - 'result' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: CuteNews 1.3.6 - 'result' Cross-Site Scripting. Author: Detefix
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.