input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Wyse Rapport Hagent Fake Hserver - Command Execution (Metasploit)
|
This is a remote exploit for multiple platform. Description: Wyse Rapport Hagent Fake Hserver - Command Execution (Metasploit). Author: kf
|
Analyze the security implications of: Wyse Rapport Hagent Fake Hserver - Command Execution (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Mozilla Firefox - view-source:JavaScript url Code Execution
|
This is a remote exploit for multiple platform. Description: Mozilla Firefox - view-source:JavaScript url Code Execution. Author: mikx
|
Analyze the security implications of: Mozilla Firefox - view-source:JavaScript url Code Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: WebKit - 'Element::setAttributeNodeNS' Use-After-Free
|
This is a dos exploit for multiple platform. Description: WebKit - 'Element::setAttributeNodeNS' Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: WebKit - 'Element::setAttributeNodeNS' Use-After-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: BrewBlogger 1.3.1 - 'printLog.php' SQL Injection
|
This is a webapps exploit for php platform. Description: BrewBlogger 1.3.1 - 'printLog.php' SQL Injection. Author: Craig Heffner
|
Analyze the security implications of: BrewBlogger 1.3.1 - 'printLog.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Centreon IT & Network Monitoring 2.1.5 - SQL Injection
|
This is a webapps exploit for php platform. Description: Centreon IT & Network Monitoring 2.1.5 - SQL Injection. Author: Jonathan Salwan
|
Analyze the security implications of: Centreon IT & Network Monitoring 2.1.5 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Empire CMS 47 - SQL Injection
|
This is a webapps exploit for php platform. Description: Empire CMS 47 - SQL Injection. Author: Securitylab Security Research
|
Analyze the security implications of: Empire CMS 47 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mambo 4.5.2.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: Mambo 4.5.2.1 - SQL Injection. Author: RusH
|
Analyze the security implications of: Mambo 4.5.2.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Counter Strike: GO - '.bsp' Memory Control (PoC)
|
This is a local exploit for multiple platform. Description: Counter Strike: GO - '.bsp' Memory Control (PoC). Author: 0day enthusiast
|
Analyze the security implications of: Counter Strike: GO - '.bsp' Memory Control (PoC)
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component JoomRecipe 1.0.3 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JoomRecipe 1.0.3 - SQL Injection. Author: EziBilisim
|
Analyze the security implications of: Joomla! Component JoomRecipe 1.0.3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Creative Software UK Community Portal 1.1 - 'DiscView.php?forum_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Creative Software UK Community Portal 1.1 - 'DiscView.php?forum_id' SQL Injection. Author: r0t
|
Analyze the security implications of: Creative Software UK Community Portal 1.1 - 'DiscView.php?forum_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Schneider Electric U.Motion Builder 1.3.4 - Authenticated Command Injection
|
This is a webapps exploit for hardware platform. Description: Schneider Electric U.Motion Builder 1.3.4 - Authenticated Command Injection. Author: Cosmin Craciun
|
Analyze the security implications of: Schneider Electric U.Motion Builder 1.3.4 - Authenticated Command Injection
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Apache James Server 2.3.2 - Remote Command Execution
|
This is a remote exploit for linux platform. Description: Apache James Server 2.3.2 - Remote Command Execution. Author: Jakub Palaczynski
|
Analyze the security implications of: Apache James Server 2.3.2 - Remote Command Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Crysis 1.21 - HTTP/XML-RPC Service Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Crysis 1.21 - HTTP/XML-RPC Service Remote Denial of Service. Author: Luigi Auriemma
|
Analyze the security implications of: Crysis 1.21 - HTTP/XML-RPC Service Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: D-Link DSL-2750u ME_1.09 - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: D-Link DSL-2750u ME_1.09 - Cross-Site Request Forgery. Author: FIGHTERx war
|
Analyze the security implications of: D-Link DSL-2750u ME_1.09 - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Consumer Complaints Clone Script 1.0 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Consumer Complaints Clone Script 1.0 - 'id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Consumer Complaints Clone Script 1.0 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: McAfee Network Security Manager 5.1.7 - Information Disclosure
|
This is a webapps exploit for jsp platform. Description: McAfee Network Security Manager 5.1.7 - Information Disclosure. Author: Daniel King
|
Analyze the security implications of: McAfee Network Security Manager 5.1.7 - Information Disclosure
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: UseModWiki 1.0 - Wiki.pl Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: UseModWiki 1.0 - Wiki.pl Cross-Site Scripting. Author: Jeremy Bae
|
Analyze the security implications of: UseModWiki 1.0 - Wiki.pl Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Mtp-Target 1.2.2 Client - Remote Format String
|
This is a remote exploit for multiple platform. Description: Mtp-Target 1.2.2 Client - Remote Format String. Author: Luigi Auriemma
|
Analyze the security implications of: Mtp-Target 1.2.2 Client - Remote Format String
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: EggBlog 3.1.10 - Cross-Site Request Forgery (Change Admin Password)
|
This is a webapps exploit for php platform. Description: EggBlog 3.1.10 - Cross-Site Request Forgery (Change Admin Password). Author: x0r
|
Analyze the security implications of: EggBlog 3.1.10 - Cross-Site Request Forgery (Change Admin Password)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Citrix Application Delivery Controller and Citrix Gateway - Remote Code Execution
|
This is a webapps exploit for multiple platform. Description: Citrix Application Delivery Controller and Citrix Gateway - Remote Code Execution. Author: TrustedSec
|
Analyze the security implications of: Citrix Application Delivery Controller and Citrix Gateway - Remote Code Execution
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit)
|
This is a remote exploit for php platform. Description: Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ClipperCMS 1.3.0 - Code Execution
|
This is a remote exploit for php platform. Description: ClipperCMS 1.3.0 - Code Execution. Author: Curesec Research Team
|
Analyze the security implications of: ClipperCMS 1.3.0 - Code Execution
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ghostscript 'CCITTFax' Decoding Filter - Denial of Service
|
This is a dos exploit for multiple platform. Description: Ghostscript 'CCITTFax' Decoding Filter - Denial of Service. Author: Red Hat
|
Analyze the security implications of: Ghostscript 'CCITTFax' Decoding Filter - Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: D-Link DSL-2640U - DNS Change
|
This is a webapps exploit for hardware platform. Description: D-Link DSL-2640U - DNS Change. Author: Todor Donev
|
Analyze the security implications of: D-Link DSL-2640U - DNS Change
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: D-Park Pro 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: D-Park Pro 1.0 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: D-Park Pro 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AllMyGuests 0.4.1 - 'AMG_id' SQL Injection
|
This is a webapps exploit for php platform. Description: AllMyGuests 0.4.1 - 'AMG_id' SQL Injection. Author: Player
|
Analyze the security implications of: AllMyGuests 0.4.1 - 'AMG_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Pirelli DRG A115 ADSL Router - DNS Change
|
This is a webapps exploit for hardware platform. Description: Pirelli DRG A115 ADSL Router - DNS Change. Author: Todor Donev
|
Analyze the security implications of: Pirelli DRG A115 ADSL Router - DNS Change
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Bubla 1.0.0rc2 - '/bu/process.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Bubla 1.0.0rc2 - '/bu/process.php' Remote File Inclusion. Author: DeltahackingTEAM
|
Analyze the security implications of: Bubla 1.0.0rc2 - '/bu/process.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SOOP Portal Raven 1.0b - Arbitrary File Upload
|
This is a webapps exploit for asp platform. Description: SOOP Portal Raven 1.0b - Arbitrary File Upload. Author: Sun Army
|
Analyze the security implications of: SOOP Portal Raven 1.0b - Arbitrary File Upload
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: DNSTracer 1.8.1 - Buffer Overflow (PoC)
|
This is a dos exploit for linux platform. Description: DNSTracer 1.8.1 - Buffer Overflow (PoC). Author: FarazPajohan
|
Analyze the security implications of: DNSTracer 1.8.1 - Buffer Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: CommunityPortals 1.0 - 'bug.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: CommunityPortals 1.0 - 'bug.php' Remote File Inclusion. Author: Nima Salehi
|
Analyze the security implications of: CommunityPortals 1.0 - 'bug.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AMember Pro 2.3.4 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: AMember Pro 2.3.4 - Remote File Inclusion. Author: NewAngels Team
|
Analyze the security implications of: AMember Pro 2.3.4 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Blink1Control2 2.2.7 - Weak Password Encryption
|
This is a local exploit for multiple platform. Description: Blink1Control2 2.2.7 - Weak Password Encryption. Author: p1ckzi
|
Analyze the security implications of: Blink1Control2 2.2.7 - Weak Password Encryption
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Kamailio 4.3.4 - Heap Buffer Overflow
|
This is a dos exploit for linux platform. Description: Kamailio 4.3.4 - Heap Buffer Overflow. Author: Stelios Tsampas
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.