input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: HP ProCurve Threat Management Services - zl ST.1.0.090213 Module CRL Security Bypass
|
This is a remote exploit for multiple platform. Description: HP ProCurve Threat Management Services - zl ST.1.0.090213 Module CRL Security Bypass. Author: anonymous
|
Analyze the security implications of: HP ProCurve Threat Management Services - zl ST.1.0.090213 Module CRL Security Bypass
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CMME 1.12 - Local File Inclusion / Cross-Site Scripting / Cross-Site Request Forgery/Download Backup/Make Directory
|
This is a webapps exploit for php platform. Description: CMME 1.12 - Local File Inclusion / Cross-Site Scripting / Cross-Site Request Forgery/Download Backup/Make Directory. Author: SirGod
|
Analyze the security implications of: CMME 1.12 - Local File Inclusion / Cross-Site Scripting / Cross-Site Request Forgery/Download Backup/Make Directory
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AJOX Poll - 'managepoll.php' Authentication Bypass
|
This is a webapps exploit for php platform. Description: AJOX Poll - 'managepoll.php' Authentication Bypass. Author: SirGod
|
Analyze the security implications of: AJOX Poll - 'managepoll.php' Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: dotclear 2.25.3 - Remote Code Execution (RCE) (Authenticated)
|
This is a webapps exploit for php platform. Description: dotclear 2.25.3 - Remote Code Execution (RCE) (Authenticated). Author: Mirabbas Ağalarov
|
Analyze the security implications of: dotclear 2.25.3 - Remote Code Execution (RCE) (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component acctexp 0.12.x - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component acctexp 0.12.x - Blind SQL Injection. Author: His0k4
|
Analyze the security implications of: Joomla! Component acctexp 0.12.x - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Front Accounting 2.3RC2 - Multiple Persistent Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Front Accounting 2.3RC2 - Multiple Persistent Cross-Site Scripting Vulnerabilities. Author: Juan Manuel Garcia
|
Analyze the security implications of: Front Accounting 2.3RC2 - Multiple Persistent Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Atlassian Confluence 6.15.1 - Directory Traversal (Metasploit)
|
This is a webapps exploit for jsp platform. Description: Atlassian Confluence 6.15.1 - Directory Traversal (Metasploit). Author: max7253
|
Analyze the security implications of: Atlassian Confluence 6.15.1 - Directory Traversal (Metasploit)
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Mandrake 7.0/7.1 / RedHat Kon2 0.3.9 - '/usr/bin/fld' Input File Overflow
|
This is a local exploit for linux platform. Description: Mandrake 7.0/7.1 / RedHat Kon2 0.3.9 - '/usr/bin/fld' Input File Overflow. Author: E-Ligth
|
Analyze the security implications of: Mandrake 7.0/7.1 / RedHat Kon2 0.3.9 - '/usr/bin/fld' Input File Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ActivePerl 5.x / Larry Wall Perl 5.x - Duplication Operator Integer Overflow
|
This is a dos exploit for multiple platform. Description: ActivePerl 5.x / Larry Wall Perl 5.x - Duplication Operator Integer Overflow. Author: Matt Murphy
|
Analyze the security implications of: ActivePerl 5.x / Larry Wall Perl 5.x - Duplication Operator Integer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: HPSystem Management Homepage (SMH) 2.1.12 - 'message.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: HPSystem Management Homepage (SMH) 2.1.12 - 'message.php' Cross-Site Scripting. Author: Luca Carettoni
|
Analyze the security implications of: HPSystem Management Homepage (SMH) 2.1.12 - 'message.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bedeng PSP 1.1 - 'baca.php?ckode' SQL Injection
|
This is a webapps exploit for php platform. Description: Bedeng PSP 1.1 - 'baca.php?ckode' SQL Injection. Author: r0t
|
Analyze the security implications of: Bedeng PSP 1.1 - 'baca.php?ckode' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: NetData 1.13.0 - HTML Injection
|
This is a webapps exploit for multiple platform. Description: NetData 1.13.0 - HTML Injection. Author: s4vitar
|
Analyze the security implications of: NetData 1.13.0 - HTML Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Netis E1+ V1.2.32533 - Unauthenticated WiFi Password Leak
|
This is a webapps exploit for hardware platform. Description: Netis E1+ V1.2.32533 - Unauthenticated WiFi Password Leak. Author: Besim
|
Analyze the security implications of: Netis E1+ V1.2.32533 - Unauthenticated WiFi Password Leak
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Active Membership 2 - Authentication Bypass
|
This is a webapps exploit for asp platform. Description: Active Membership 2 - Authentication Bypass. Author: R3d-D3V!L
|
Analyze the security implications of: Active Membership 2 - Authentication Bypass
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Apple Mac OSX < 10.10.x - GateKeeper Bypass
|
This is a local exploit for osx platform. Description: Apple Mac OSX < 10.10.x - GateKeeper Bypass. Author: Amplia Security Research
|
Analyze the security implications of: Apple Mac OSX < 10.10.x - GateKeeper Bypass
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Active Trade 2 - 'catid' SQL Injection
|
This is a webapps exploit for asp platform. Description: Active Trade 2 - 'catid' SQL Injection. Author: CyberGhost
|
Analyze the security implications of: Active Trade 2 - 'catid' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: WBR-3406 Wireless Broadband NAT Router - Web-Console Password Change Bypass / Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: WBR-3406 Wireless Broadband NAT Router - Web-Console Password Change Bypass / Cross-Site Request Forgery. Author: Yakir Wizman
|
Analyze the security implications of: WBR-3406 Wireless Broadband NAT Router - Web-Console Password Change Bypass / Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Alpha Networks ADSL2/2+ Wireless Router ASL-26555 - Password Disclosure
|
This is a webapps exploit for hardware platform. Description: Alpha Networks ADSL2/2+ Wireless Router ASL-26555 - Password Disclosure. Author: Alberto Ortega
|
Analyze the security implications of: Alpha Networks ADSL2/2+ Wireless Router ASL-26555 - Password Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Ghostscript 9.21 - Type Confusion Arbitrary Command Execution (Metasploit)
|
This is a local exploit for linux platform. Description: Ghostscript 9.21 - Type Confusion Arbitrary Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Ghostscript 9.21 - Type Confusion Arbitrary Command Execution (Metasploit)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apache Jetspeed - Arbitrary File Upload (Metasploit)
|
This is a remote exploit for java platform. Description: Apache Jetspeed - Arbitrary File Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: Apache Jetspeed - Arbitrary File Upload (Metasploit)
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: OpenOffice 3.1 - '.slk' Null Pointer Dereference Remote Denial of Service
|
This is a dos exploit for linux platform. Description: OpenOffice 3.1 - '.slk' Null Pointer Dereference Remote Denial of Service. Author: Hellcode Research
|
Analyze the security implications of: OpenOffice 3.1 - '.slk' Null Pointer Dereference Remote Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: SGI IRIX 6.3 - cgi-bin 'webdist.cgi' Command Execution
|
This is a remote exploit for multiple platform. Description: SGI IRIX 6.3 - cgi-bin 'webdist.cgi' Command Execution. Author: anonymous
|
Analyze the security implications of: SGI IRIX 6.3 - cgi-bin 'webdist.cgi' Command Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: FreeBSD SCTP ICMPv6 - Error Processing
|
This is a dos exploit for freebsd platform. Description: FreeBSD SCTP ICMPv6 - Error Processing. Author: ptsecurity
|
Analyze the security implications of: FreeBSD SCTP ICMPv6 - Error Processing
|
This exploit targets freebsd systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: FontForge - '.BDF' Font File Stack Buffer Overflow (PoC)
|
This is a dos exploit for linux platform. Description: FontForge - '.BDF' Font File Stack Buffer Overflow (PoC). Author: Ulrik Persson
|
Analyze the security implications of: FontForge - '.BDF' Font File Stack Buffer Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apple QTJava - 'toQTPointer()' Arbitrary Memory Access (Metasploit)
|
This is a remote exploit for multiple platform. Description: Apple QTJava - 'toQTPointer()' Arbitrary Memory Access (Metasploit). Author: Metasploit
|
Analyze the security implications of: Apple QTJava - 'toQTPointer()' Arbitrary Memory Access (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Cwfm 0.9.1 - 'Language' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Cwfm 0.9.1 - 'Language' Remote File Inclusion. Author: Philipp Niedziela
|
Analyze the security implications of: Cwfm 0.9.1 - 'Language' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: tmux 1.3/1.4 - '-S' Option Incorrect SetGID Privilege Escalation
|
This is a local exploit for linux platform. Description: tmux 1.3/1.4 - '-S' Option Incorrect SetGID Privilege Escalation. Author: ph0x90bic
|
Analyze the security implications of: tmux 1.3/1.4 - '-S' Option Incorrect SetGID Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Admbook 1.2.2 - 'x-forwarded-for' Remote Command Execution
|
This is a webapps exploit for php platform. Description: Admbook 1.2.2 - 'x-forwarded-for' Remote Command Execution. Author: rgod
|
Analyze the security implications of: Admbook 1.2.2 - 'x-forwarded-for' Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Synology DSM 4.3-3810 - Directory Traversal
|
This is a webapps exploit for cgi platform. Description: Synology DSM 4.3-3810 - Directory Traversal. Author: Andrea Fabrizi
|
Analyze the security implications of: Synology DSM 4.3-3810 - Directory Traversal
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Basic-CMS - 'nav_id' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Basic-CMS - 'nav_id' Cross-Site Scripting. Author: Red-D3v1L
|
Analyze the security implications of: Basic-CMS - 'nav_id' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Spidey Blog Script 1.5 - 'proje_goster.asp' SQL Injection (1)
|
This is a webapps exploit for asp platform. Description: Spidey Blog Script 1.5 - 'proje_goster.asp' SQL Injection (1). Author: ASIANEAGLE
|
Analyze the security implications of: Spidey Blog Script 1.5 - 'proje_goster.asp' SQL Injection (1)
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: WebTrends Enterprise Reporting Server 3.1 c/3.5 - Source Code Disclosure
|
This is a remote exploit for cgi platform. Description: WebTrends Enterprise Reporting Server 3.1 c/3.5 - Source Code Disclosure. Author: Auriemma Luigi
|
Analyze the security implications of: WebTrends Enterprise Reporting Server 3.1 c/3.5 - Source Code Disclosure
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Evernew Free Joke Script - 'viewjokes.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Evernew Free Joke Script - 'viewjokes.php' SQL Injection. Author: Hamza 'MizoZ' N.
|
Analyze the security implications of: Evernew Free Joke Script - 'viewjokes.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: jCore - '/admin/index.php?path' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: jCore - '/admin/index.php?path' Cross-Site Scripting. Author: High-Tech Bridge
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.