input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: HP ProCurve Threat Management Services - zl ST.1.0.090213 Module CRL Security Bypass | This is a remote exploit for multiple platform. Description: HP ProCurve Threat Management Services - zl ST.1.0.090213 Module CRL Security Bypass. Author: anonymous |
Analyze the security implications of: HP ProCurve Threat Management Services - zl ST.1.0.090213 Module CRL Security Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CMME 1.12 - Local File Inclusion / Cross-Site Scripting / Cross-Site Request Forgery/Download Backup/Make Directory | This is a webapps exploit for php platform. Description: CMME 1.12 - Local File Inclusion / Cross-Site Scripting / Cross-Site Request Forgery/Download Backup/Make Directory. Author: SirGod |
Analyze the security implications of: CMME 1.12 - Local File Inclusion / Cross-Site Scripting / Cross-Site Request Forgery/Download Backup/Make Directory | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AJOX Poll - 'managepoll.php' Authentication Bypass | This is a webapps exploit for php platform. Description: AJOX Poll - 'managepoll.php' Authentication Bypass. Author: SirGod |
Analyze the security implications of: AJOX Poll - 'managepoll.php' Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: dotclear 2.25.3 - Remote Code Execution (RCE) (Authenticated) | This is a webapps exploit for php platform. Description: dotclear 2.25.3 - Remote Code Execution (RCE) (Authenticated). Author: Mirabbas Ağalarov |
Analyze the security implications of: dotclear 2.25.3 - Remote Code Execution (RCE) (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component acctexp 0.12.x - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component acctexp 0.12.x - Blind SQL Injection. Author: His0k4 |
Analyze the security implications of: Joomla! Component acctexp 0.12.x - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Front Accounting 2.3RC2 - Multiple Persistent Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Front Accounting 2.3RC2 - Multiple Persistent Cross-Site Scripting Vulnerabilities. Author: Juan Manuel Garcia |
Analyze the security implications of: Front Accounting 2.3RC2 - Multiple Persistent Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Atlassian Confluence 6.15.1 - Directory Traversal (Metasploit) | This is a webapps exploit for jsp platform. Description: Atlassian Confluence 6.15.1 - Directory Traversal (Metasploit). Author: max7253 |
Analyze the security implications of: Atlassian Confluence 6.15.1 - Directory Traversal (Metasploit) | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Mandrake 7.0/7.1 / RedHat Kon2 0.3.9 - '/usr/bin/fld' Input File Overflow | This is a local exploit for linux platform. Description: Mandrake 7.0/7.1 / RedHat Kon2 0.3.9 - '/usr/bin/fld' Input File Overflow. Author: E-Ligth |
Analyze the security implications of: Mandrake 7.0/7.1 / RedHat Kon2 0.3.9 - '/usr/bin/fld' Input File Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ActivePerl 5.x / Larry Wall Perl 5.x - Duplication Operator Integer Overflow | This is a dos exploit for multiple platform. Description: ActivePerl 5.x / Larry Wall Perl 5.x - Duplication Operator Integer Overflow. Author: Matt Murphy |
Analyze the security implications of: ActivePerl 5.x / Larry Wall Perl 5.x - Duplication Operator Integer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: HPSystem Management Homepage (SMH) 2.1.12 - 'message.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: HPSystem Management Homepage (SMH) 2.1.12 - 'message.php' Cross-Site Scripting. Author: Luca Carettoni |
Analyze the security implications of: HPSystem Management Homepage (SMH) 2.1.12 - 'message.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bedeng PSP 1.1 - 'baca.php?ckode' SQL Injection | This is a webapps exploit for php platform. Description: Bedeng PSP 1.1 - 'baca.php?ckode' SQL Injection. Author: r0t |
Analyze the security implications of: Bedeng PSP 1.1 - 'baca.php?ckode' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NetData 1.13.0 - HTML Injection | This is a webapps exploit for multiple platform. Description: NetData 1.13.0 - HTML Injection. Author: s4vitar |
Analyze the security implications of: NetData 1.13.0 - HTML Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Netis E1+ V1.2.32533 - Unauthenticated WiFi Password Leak | This is a webapps exploit for hardware platform. Description: Netis E1+ V1.2.32533 - Unauthenticated WiFi Password Leak. Author: Besim |
Analyze the security implications of: Netis E1+ V1.2.32533 - Unauthenticated WiFi Password Leak | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Active Membership 2 - Authentication Bypass | This is a webapps exploit for asp platform. Description: Active Membership 2 - Authentication Bypass. Author: R3d-D3V!L |
Analyze the security implications of: Active Membership 2 - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apple Mac OSX < 10.10.x - GateKeeper Bypass | This is a local exploit for osx platform. Description: Apple Mac OSX < 10.10.x - GateKeeper Bypass. Author: Amplia Security Research |
Analyze the security implications of: Apple Mac OSX < 10.10.x - GateKeeper Bypass | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Active Trade 2 - 'catid' SQL Injection | This is a webapps exploit for asp platform. Description: Active Trade 2 - 'catid' SQL Injection. Author: CyberGhost |
Analyze the security implications of: Active Trade 2 - 'catid' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: WBR-3406 Wireless Broadband NAT Router - Web-Console Password Change Bypass / Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: WBR-3406 Wireless Broadband NAT Router - Web-Console Password Change Bypass / Cross-Site Request Forgery. Author: Yakir Wizman |
Analyze the security implications of: WBR-3406 Wireless Broadband NAT Router - Web-Console Password Change Bypass / Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Alpha Networks ADSL2/2+ Wireless Router ASL-26555 - Password Disclosure | This is a webapps exploit for hardware platform. Description: Alpha Networks ADSL2/2+ Wireless Router ASL-26555 - Password Disclosure. Author: Alberto Ortega |
Analyze the security implications of: Alpha Networks ADSL2/2+ Wireless Router ASL-26555 - Password Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Ghostscript 9.21 - Type Confusion Arbitrary Command Execution (Metasploit) | This is a local exploit for linux platform. Description: Ghostscript 9.21 - Type Confusion Arbitrary Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Ghostscript 9.21 - Type Confusion Arbitrary Command Execution (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache Jetspeed - Arbitrary File Upload (Metasploit) | This is a remote exploit for java platform. Description: Apache Jetspeed - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: Apache Jetspeed - Arbitrary File Upload (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: OpenOffice 3.1 - '.slk' Null Pointer Dereference Remote Denial of Service | This is a dos exploit for linux platform. Description: OpenOffice 3.1 - '.slk' Null Pointer Dereference Remote Denial of Service. Author: Hellcode Research |
Analyze the security implications of: OpenOffice 3.1 - '.slk' Null Pointer Dereference Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SGI IRIX 6.3 - cgi-bin 'webdist.cgi' Command Execution | This is a remote exploit for multiple platform. Description: SGI IRIX 6.3 - cgi-bin 'webdist.cgi' Command Execution. Author: anonymous |
Analyze the security implications of: SGI IRIX 6.3 - cgi-bin 'webdist.cgi' Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FreeBSD SCTP ICMPv6 - Error Processing | This is a dos exploit for freebsd platform. Description: FreeBSD SCTP ICMPv6 - Error Processing. Author: ptsecurity |
Analyze the security implications of: FreeBSD SCTP ICMPv6 - Error Processing | This exploit targets freebsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: FontForge - '.BDF' Font File Stack Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: FontForge - '.BDF' Font File Stack Buffer Overflow (PoC). Author: Ulrik Persson |
Analyze the security implications of: FontForge - '.BDF' Font File Stack Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple QTJava - 'toQTPointer()' Arbitrary Memory Access (Metasploit) | This is a remote exploit for multiple platform. Description: Apple QTJava - 'toQTPointer()' Arbitrary Memory Access (Metasploit). Author: Metasploit |
Analyze the security implications of: Apple QTJava - 'toQTPointer()' Arbitrary Memory Access (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cwfm 0.9.1 - 'Language' Remote File Inclusion | This is a webapps exploit for php platform. Description: Cwfm 0.9.1 - 'Language' Remote File Inclusion. Author: Philipp Niedziela |
Analyze the security implications of: Cwfm 0.9.1 - 'Language' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: tmux 1.3/1.4 - '-S' Option Incorrect SetGID Privilege Escalation | This is a local exploit for linux platform. Description: tmux 1.3/1.4 - '-S' Option Incorrect SetGID Privilege Escalation. Author: ph0x90bic |
Analyze the security implications of: tmux 1.3/1.4 - '-S' Option Incorrect SetGID Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Admbook 1.2.2 - 'x-forwarded-for' Remote Command Execution | This is a webapps exploit for php platform. Description: Admbook 1.2.2 - 'x-forwarded-for' Remote Command Execution. Author: rgod |
Analyze the security implications of: Admbook 1.2.2 - 'x-forwarded-for' Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Synology DSM 4.3-3810 - Directory Traversal | This is a webapps exploit for cgi platform. Description: Synology DSM 4.3-3810 - Directory Traversal. Author: Andrea Fabrizi |
Analyze the security implications of: Synology DSM 4.3-3810 - Directory Traversal | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Basic-CMS - 'nav_id' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Basic-CMS - 'nav_id' Cross-Site Scripting. Author: Red-D3v1L |
Analyze the security implications of: Basic-CMS - 'nav_id' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Spidey Blog Script 1.5 - 'proje_goster.asp' SQL Injection (1) | This is a webapps exploit for asp platform. Description: Spidey Blog Script 1.5 - 'proje_goster.asp' SQL Injection (1). Author: ASIANEAGLE |
Analyze the security implications of: Spidey Blog Script 1.5 - 'proje_goster.asp' SQL Injection (1) | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: WebTrends Enterprise Reporting Server 3.1 c/3.5 - Source Code Disclosure | This is a remote exploit for cgi platform. Description: WebTrends Enterprise Reporting Server 3.1 c/3.5 - Source Code Disclosure. Author: Auriemma Luigi |
Analyze the security implications of: WebTrends Enterprise Reporting Server 3.1 c/3.5 - Source Code Disclosure | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Evernew Free Joke Script - 'viewjokes.php' SQL Injection | This is a webapps exploit for php platform. Description: Evernew Free Joke Script - 'viewjokes.php' SQL Injection. Author: Hamza 'MizoZ' N. |
Analyze the security implications of: Evernew Free Joke Script - 'viewjokes.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: jCore - '/admin/index.php?path' Cross-Site Scripting | This is a webapps exploit for php platform. Description: jCore - '/admin/index.php?path' Cross-Site Scripting. Author: High-Tech Bridge |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.