input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Ghostscript - Failed Restore Command Execution (Metasploit) | This is a local exploit for linux platform. Description: Ghostscript - Failed Restore Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Ghostscript - Failed Restore Command Execution (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux Kernel (Ubuntu 17.04) - 'XFRM' Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel (Ubuntu 17.04) - 'XFRM' Local Privilege Escalation. Author: SecuriTeam |
Analyze the security implications of: Linux Kernel (Ubuntu 17.04) - 'XFRM' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cart Software - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Cart Software - Multiple Vulnerabilities. Author: hosinn |
Analyze the security implications of: Cart Software - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AIX 4.2 - '/usr/dt/bin/dtterm' Local Buffer Overflow | This is a local exploit for aix platform. Description: AIX 4.2 - '/usr/dt/bin/dtterm' Local Buffer Overflow. Author: Georgi Guninski |
Analyze the security implications of: AIX 4.2 - '/usr/dt/bin/dtterm' Local Buffer Overflow | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: NVMS 1000 - Directory Traversal | This is a webapps exploit for hardware platform. Description: NVMS 1000 - Directory Traversal. Author: numan türle |
Analyze the security implications of: NVMS 1000 - Directory Traversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Algo 8028 Control Panel - Remote Code Execution (RCE) (Authenticated) | This is a remote exploit for hardware platform. Description: Algo 8028 Control Panel - Remote Code Execution (RCE) (Authenticated). Author: Filip Carlsson |
Analyze the security implications of: Algo 8028 Control Panel - Remote Code Execution (RCE) (Authenticated) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit) | This is a remote exploit for linux platform. Description: Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit). Author: Metasploit |
Analyze the security implications of: Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Adobe ColdFusion Server 8.0.1 - 'administrator/logviewer/searchlog.cfm?startRow' Cross-Site Scripting | This is a webapps exploit for cfm platform. Description: Adobe ColdFusion Server 8.0.1 - 'administrator/logviewer/searchlog.cfm?startRow' Cross-Site Scripting. Author: Alexander Polyakov |
Analyze the security implications of: Adobe ColdFusion Server 8.0.1 - 'administrator/logviewer/searchlog.cfm?startRow' Cross-Site Scripting | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: Joomla! Component MaQma Helpdesk 4.2.7 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component MaQma Helpdesk 4.2.7 - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component MaQma Helpdesk 4.2.7 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: T-dreams Announcement Script - SQL Injection | This is a webapps exploit for asp platform. Description: T-dreams Announcement Script - SQL Injection. Author: Br0wn Sug4r |
Analyze the security implications of: T-dreams Announcement Script - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: BoidCMS v2.0.0 - authenticated file upload vulnerability | This is a webapps exploit for php platform. Description: BoidCMS v2.0.0 - authenticated file upload vulnerability. Author: 1337kid |
Analyze the security implications of: BoidCMS v2.0.0 - authenticated file upload vulnerability | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HYIP Manager Pro - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: HYIP Manager Pro - Multiple Remote File Inclusions. Author: alijsb |
Analyze the security implications of: HYIP Manager Pro - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BSD 'lpr' 0.54 -4 - Arbitrary Command Execution | This is a local exploit for linux platform. Description: BSD 'lpr' 0.54 -4 - Arbitrary Command Execution. Author: zenith parsec |
Analyze the security implications of: BSD 'lpr' 0.54 -4 - Arbitrary Command Execution | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Media Player Classic (MPC) 1.5 - WebServer Request Handling Remote Denial of Service | This is a dos exploit for multiple platform. Description: Media Player Classic (MPC) 1.5 - WebServer Request Handling Remote Denial of Service. Author: X-Cisadane |
Analyze the security implications of: Media Player Classic (MPC) 1.5 - WebServer Request Handling Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mambo < 4.5.3h - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Mambo < 4.5.3h - Multiple Vulnerabilities. Author: GulfTech Security |
Analyze the security implications of: Mambo < 4.5.3h - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FileZilla 3.40.0 - 'Local search' / 'Local site' Denial of Service (PoC) | This is a dos exploit for linux platform. Description: FileZilla 3.40.0 - 'Local search' / 'Local site' Denial of Service (PoC). Author: Mr Winst0n |
Analyze the security implications of: FileZilla 3.40.0 - 'Local search' / 'Local site' Denial of Service (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: LinPHA 0.9.x/1.0 - 'sec_stage_install.php' Local File Inclusion | This is a webapps exploit for php platform. Description: LinPHA 0.9.x/1.0 - 'sec_stage_install.php' Local File Inclusion. Author: rgod |
Analyze the security implications of: LinPHA 0.9.x/1.0 - 'sec_stage_install.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flash Quiz Beta 2 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Flash Quiz Beta 2 - Multiple SQL Injections. Author: YEnH4ckEr |
Analyze the security implications of: Flash Quiz Beta 2 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fortinet Fortigate - CRLF Characters URL Filtering Bypass | This is a remote exploit for hardware platform. Description: Fortinet Fortigate - CRLF Characters URL Filtering Bypass. Author: Danux |
Analyze the security implications of: Fortinet Fortigate - CRLF Characters URL Filtering Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Mambo Component mambads 1.0 RC1 Beta - SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component mambads 1.0 RC1 Beta - SQL Injection. Author: Houssamix |
Analyze the security implications of: Mambo Component mambads 1.0 RC1 Beta - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ATutor 1.5.x - 'create_course.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: ATutor 1.5.x - 'create_course.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Security News |
Analyze the security implications of: ATutor 1.5.x - 'create_course.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 2DayBiz Photo Sharing Script - SQL Injection (1) | This is a webapps exploit for php platform. Description: 2DayBiz Photo Sharing Script - SQL Injection (1). Author: JaMbA |
Analyze the security implications of: 2DayBiz Photo Sharing Script - SQL Injection (1) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: changedetection < 0.45.20 - Remote Code Execution (RCE) | This is a webapps exploit for multiple platform. Description: changedetection < 0.45.20 - Remote Code Execution (RCE). Author: Zach Crosman (zcrosman) |
Analyze the security implications of: changedetection < 0.45.20 - Remote Code Execution (RCE) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Perl 5.x - Digest Module 'Digest->new()' Code Injection | This is a remote exploit for linux platform. Description: Perl 5.x - Digest Module 'Digest->new()' Code Injection. Author: anonymous |
Analyze the security implications of: Perl 5.x - Digest Module 'Digest->new()' Code Injection | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Limbo CMS Module event 1.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Limbo CMS Module event 1.0 - Remote File Inclusion. Author: Mehmet Ince |
Analyze the security implications of: Limbo CMS Module event 1.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: @lex Guestbook 5.0 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: @lex Guestbook 5.0 - Multiple Cross-Site Scripting Vulnerabilities. Author: D3V!L FUCKER |
Analyze the security implications of: @lex Guestbook 5.0 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Netis WF2419 Router - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Netis WF2419 Router - Cross-Site Scripting. Author: Sajibe Kanti |
Analyze the security implications of: Netis WF2419 Router - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DMXReady Secure Document Library 1.1 - SQL Injection | This is a webapps exploit for php platform. Description: DMXReady Secure Document Library 1.1 - SQL Injection. Author: ajann |
Analyze the security implications of: DMXReady Secure Document Library 1.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Abe Timmerman - 'zml.cgi' File Disclosure | This is a remote exploit for cgi platform. Description: Abe Timmerman - 'zml.cgi' File Disclosure. Author: blackshell |
Analyze the security implications of: Abe Timmerman - 'zml.cgi' File Disclosure | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: AFCommerce - 'controlheader.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: AFCommerce - 'controlheader.php' Remote File Inclusion. Author: NoGe |
Analyze the security implications of: AFCommerce - 'controlheader.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Almond Classifieds 5.6.2 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Almond Classifieds 5.6.2 - Blind SQL Injection. Author: InjEctOr5 |
Analyze the security implications of: Joomla! Component Almond Classifieds 5.6.2 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Xserver 0.1 Alpha - 'POST' Remote Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: Xserver 0.1 Alpha - 'POST' Remote Buffer Overflow (PoC). Author: deusconstruct |
Analyze the security implications of: Xserver 0.1 Alpha - 'POST' Remote Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Lumension Security Lumension Device Control 4.x - Memory Corruption | This is a remote exploit for multiple platform. Description: Lumension Security Lumension Device Control 4.x - Memory Corruption. Author: Andy Davis |
Analyze the security implications of: Lumension Security Lumension Device Control 4.x - Memory Corruption | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Nuxeo 6.0/7.1/7.2/7.3 - Remote Code Execution (Metasploit) | This is a webapps exploit for jsp platform. Description: Nuxeo 6.0/7.1/7.2/7.3 - Remote Code Execution (Metasploit). Author: Sysdream |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.