input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Apache Geronimo 2.1.x - Cross-Site Request Forgery (Multiple Admin Function)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: LG DVR LE6016D - Remote Users/Passwords Disclosure
|
This is a remote exploit for hardware platform. Description: LG DVR LE6016D - Remote Users/Passwords Disclosure. Author: Todor Donev
|
Analyze the security implications of: LG DVR LE6016D - Remote Users/Passwords Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: OpenVAS Manager - Command Injection
|
This is a local exploit for linux platform. Description: OpenVAS Manager - Command Injection. Author: Tim Brown
|
Analyze the security implications of: OpenVAS Manager - Command Injection
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: WatchGuard Fireware AD Helper Component 5.8.5.10317 - Credential Disclosure
|
This is a webapps exploit for java platform. Description: WatchGuard Fireware AD Helper Component 5.8.5.10317 - Credential Disclosure. Author: RedTeam Pentesting GmbH
|
Analyze the security implications of: WatchGuard Fireware AD Helper Component 5.8.5.10317 - Credential Disclosure
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Planet FPS-1101 - Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: Planet FPS-1101 - Cross-Site Scripting. Author: b0telh0
|
Analyze the security implications of: Planet FPS-1101 - Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Linux Kernel 2.6.31 - 'perf_counter_open()' Local Buffer Overflow
|
This is a dos exploit for linux platform. Description: Linux Kernel 2.6.31 - 'perf_counter_open()' Local Buffer Overflow. Author: Xiao Guangrong
|
Analyze the security implications of: Linux Kernel 2.6.31 - 'perf_counter_open()' Local Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ABG Blocking Script 1.0a - 'abg_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: ABG Blocking Script 1.0a - 'abg_path' Remote File Inclusion. Author: Lo$er
|
Analyze the security implications of: ABG Blocking Script 1.0a - 'abg_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Telesquare TLR-2855KS6 - Arbitrary File Creation
|
This is a webapps exploit for hardware platform. Description: Telesquare TLR-2855KS6 - Arbitrary File Creation. Author: Momen Eldawakhly
|
Analyze the security implications of: Telesquare TLR-2855KS6 - Arbitrary File Creation
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Trend Micro Deep Discovery Inspector IDS - Security Bypass
|
This is a remote exploit for multiple platform. Description: Trend Micro Deep Discovery Inspector IDS - Security Bypass. Author: hyp3rlinx
|
Analyze the security implications of: Trend Micro Deep Discovery Inspector IDS - Security Bypass
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: AS-GasTracker 1.0.0 - Insecure Cookie Handling
|
This is a webapps exploit for php platform. Description: AS-GasTracker 1.0.0 - Insecure Cookie Handling. Author: t0pP8uZz
|
Analyze the security implications of: AS-GasTracker 1.0.0 - Insecure Cookie Handling
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GenesisTrader 1.0 - 'form.php' Arbitrary File Source Disclosure
|
This is a webapps exploit for php platform. Description: GenesisTrader 1.0 - 'form.php' Arbitrary File Source Disclosure. Author: Mr_KaLiMaN
|
Analyze the security implications of: GenesisTrader 1.0 - 'form.php' Arbitrary File Source Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (2) (DTLS Support)
|
This is a remote exploit for multiple platform. Description: OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (2) (DTLS Support). Author: Ayman Sagy
|
Analyze the security implications of: OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (2) (DTLS Support)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CMScontrol (Content Management Portal Solutions) - SQL Injection
|
This is a webapps exploit for multiple platform. Description: CMScontrol (Content Management Portal Solutions) - SQL Injection. Author: ph1l1ster
|
Analyze the security implications of: CMScontrol (Content Management Portal Solutions) - SQL Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Wirtualna Polska WPKontakt 3.0.1 - Remote Script Execution
|
This is a webapps exploit for cgi platform. Description: Wirtualna Polska WPKontakt 3.0.1 - Remote Script Execution. Author: Poznan Supercomputing
|
Analyze the security implications of: Wirtualna Polska WPKontakt 3.0.1 - Remote Script Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Inmostore 4.0 - 'index.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Inmostore 4.0 - 'index.php' SQL Injection. Author: Keniobats
|
Analyze the security implications of: Inmostore 4.0 - 'index.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gekko Web Builder 9.0 - 'index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Gekko Web Builder 9.0 - 'index.php' Cross-Site Scripting. Author: High-Tech Bridge SA
|
Analyze the security implications of: Gekko Web Builder 9.0 - 'index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ActivDesk 3.0 - Multiple Vulnerabilities
|
This is a webapps exploit for cgi platform. Description: ActivDesk 3.0 - Multiple Vulnerabilities. Author: Brendan Coles
|
Analyze the security implications of: ActivDesk 3.0 - Multiple Vulnerabilities
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: CyberArk Password Vault < 9.7 / < 10 - Memory Disclosure
|
This is a dos exploit for linux platform. Description: CyberArk Password Vault < 9.7 / < 10 - Memory Disclosure. Author: RedTeam Pentesting
|
Analyze the security implications of: CyberArk Password Vault < 9.7 / < 10 - Memory Disclosure
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Novell ZENworks Patch Management 6.0.52 - '/reports/default.asp' Multiple SQL Injections
|
This is a webapps exploit for asp platform. Description: Novell ZENworks Patch Management 6.0.52 - '/reports/default.asp' Multiple SQL Injections. Author: Dennis Rand
|
Analyze the security implications of: Novell ZENworks Patch Management 6.0.52 - '/reports/default.asp' Multiple SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Fonality trixbox 2.2.4 - 'PhonecDirectory.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Fonality trixbox 2.2.4 - 'PhonecDirectory.php' SQL Injection. Author: NorSlacker
|
Analyze the security implications of: Fonality trixbox 2.2.4 - 'PhonecDirectory.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GENU CMS - SQL Injection
|
This is a webapps exploit for php platform. Description: GENU CMS - SQL Injection. Author: hordcode security
|
Analyze the security implications of: GENU CMS - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GC Auction Platinum - 'cate_id' SQL Injection
|
This is a webapps exploit for php platform. Description: GC Auction Platinum - 'cate_id' SQL Injection. Author: Hussin X
|
Analyze the security implications of: GC Auction Platinum - 'cate_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ntop-ng < 3.4.180617 - Authentication Bypass
|
This is a webapps exploit for lua platform. Description: ntop-ng < 3.4.180617 - Authentication Bypass. Author: Ioannis Profetis
|
Analyze the security implications of: ntop-ng < 3.4.180617 - Authentication Bypass
|
This exploit targets lua systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets lua platform
|
What is this exploit about: Adobe Flash - Type Confusion in Serialization with ObjectEncoder.dynamicPropertyWriter
|
This is a dos exploit for multiple platform. Description: Adobe Flash - Type Confusion in Serialization with ObjectEncoder.dynamicPropertyWriter. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - Type Confusion in Serialization with ObjectEncoder.dynamicPropertyWriter
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Blog:CMS 4.0.0k - SQL Injection
|
This is a webapps exploit for php platform. Description: Blog:CMS 4.0.0k - SQL Injection. Author: rgod
|
Analyze the security implications of: Blog:CMS 4.0.0k - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: hustoj - 'FCKeditor' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: hustoj - 'FCKeditor' Arbitrary File Upload. Author: eidelweiss
|
Analyze the security implications of: hustoj - 'FCKeditor' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Expinion.net News Manager Lite 2.5 - 'category_news_headline.asp' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Expinion.net News Manager Lite 2.5 - 'category_news_headline.asp' Cross-Site Scripting. Author: Manuel Lopez
|
Analyze the security implications of: Expinion.net News Manager Lite 2.5 - 'category_news_headline.asp' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: FAQ System 1.1 - 'viewFAQ.php' Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: FAQ System 1.1 - 'viewFAQ.php' Multiple SQL Injections. Author: r0t
|
Analyze the security implications of: FAQ System 1.1 - 'viewFAQ.php' Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LEPTON 1.1.3 - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: LEPTON 1.1.3 - Cross-Site Scripting. Author: High-Tech Bridge SA
|
Analyze the security implications of: LEPTON 1.1.3 - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DM FileManager 3.9.4 - Remote File Disclosure
|
This is a webapps exploit for php platform. Description: DM FileManager 3.9.4 - Remote File Disclosure. Author: Stack
|
Analyze the security implications of: DM FileManager 3.9.4 - Remote File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LDAP Account Manager 3.4.0 - 'selfserviceSaveOk' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: LDAP Account Manager 3.4.0 - 'selfserviceSaveOk' Cross-Site Scripting. Author: AutoSec Tools
|
Analyze the security implications of: LDAP Account Manager 3.4.0 - 'selfserviceSaveOk' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CodeAvalanche Articles - Database Disclosure
|
This is a webapps exploit for asp platform. Description: CodeAvalanche Articles - Database Disclosure. Author: Pouya_Server
|
Analyze the security implications of: CodeAvalanche Articles - Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component spidervideoplayer - 'theme' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component spidervideoplayer - 'theme' SQL Injection. Author: Claudio Viviani
|
Analyze the security implications of: Joomla! Component spidervideoplayer - 'theme' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Inktomi Search Software 3.0 - Source Disclosure
|
This is a remote exploit for multiple platform. Description: Inktomi Search Software 3.0 - Source Disclosure. Author: china nsl
|
Analyze the security implications of: Inktomi Search Software 3.0 - Source Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.