input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Drupal 4.x - URL-Encoded Input HTML Injection
|
This is a webapps exploit for php platform. Description: Drupal 4.x - URL-Encoded Input HTML Injection. Author: liz0
|
Analyze the security implications of: Drupal 4.x - URL-Encoded Input HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Debian OpenSSH - (Authenticated) Remote SELinux Privilege Escalation
|
This is a remote exploit for linux platform. Description: Debian OpenSSH - (Authenticated) Remote SELinux Privilege Escalation. Author: eliteboy
|
Analyze the security implications of: Debian OpenSSH - (Authenticated) Remote SELinux Privilege Escalation
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Samsung Devices KNOX Extensions - OTP Service Heap Overflow
|
This is a dos exploit for android platform. Description: Samsung Devices KNOX Extensions - OTP Service Heap Overflow. Author: Google Security Research
|
Analyze the security implications of: Samsung Devices KNOX Extensions - OTP Service Heap Overflow
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Seagate BlackArmor NAS sg2000-2000.1331 - Multiple Persistent Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Seagate BlackArmor NAS sg2000-2000.1331 - Multiple Persistent Cross-Site Scripting Vulnerabilities. Author: Jeroen - IT Nerdbox
|
Analyze the security implications of: Seagate BlackArmor NAS sg2000-2000.1331 - Multiple Persistent Cross-Site Scripting Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: GoAhead Web Server 5.1.1 - Digest Authentication Capture Replay Nonce Reuse
|
This is a remote exploit for hardware platform. Description: GoAhead Web Server 5.1.1 - Digest Authentication Capture Replay Nonce Reuse. Author: LiquidWorm
|
Analyze the security implications of: GoAhead Web Server 5.1.1 - Digest Authentication Capture Replay Nonce Reuse
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Rogue 5.3 - Local Buffer Overflow
|
This is a local exploit for bsd platform. Description: Rogue 5.3 - Local Buffer Overflow. Author: stanojr@iserver.sk
|
Analyze the security implications of: Rogue 5.3 - Local Buffer Overflow
|
This exploit targets bsd systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets bsd platform
|
What is this exploit about: WordPress Plugin Freshmail 1.5.8 - SQL Injection
|
This is a webapps exploit for multiple platform. Description: WordPress Plugin Freshmail 1.5.8 - SQL Injection. Author: Felipe Molina
|
Analyze the security implications of: WordPress Plugin Freshmail 1.5.8 - SQL Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Tomcat 3.2.1/4.0 / Weblogic Server 5.1 - URL JSP Request Source Code Disclosure
|
This is a remote exploit for multiple platform. Description: Tomcat 3.2.1/4.0 / Weblogic Server 5.1 - URL JSP Request Source Code Disclosure. Author: Sverre H. Huseby
|
Analyze the security implications of: Tomcat 3.2.1/4.0 / Weblogic Server 5.1 - URL JSP Request Source Code Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Linux Kernel 3.10.0 (CentOS / RHEL 7.1) - visor 'treo_attach' Nullpointer Dereference
|
This is a dos exploit for linux platform. Description: Linux Kernel 3.10.0 (CentOS / RHEL 7.1) - visor 'treo_attach' Nullpointer Dereference. Author: OpenSource Security
|
Analyze the security implications of: Linux Kernel 3.10.0 (CentOS / RHEL 7.1) - visor 'treo_attach' Nullpointer Dereference
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Linux Kernel 2.6.32 < 3.x (CentOS 5/6) - 'PERF_EVENTS' Local Privilege Escalation (1)
|
This is a local exploit for linux platform. Description: Linux Kernel 2.6.32 < 3.x (CentOS 5/6) - 'PERF_EVENTS' Local Privilege Escalation (1). Author: sd
|
Analyze the security implications of: Linux Kernel 2.6.32 < 3.x (CentOS 5/6) - 'PERF_EVENTS' Local Privilege Escalation (1)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Nginx 0.7.64 - Terminal Escape Sequence in Logs Command Injection
|
This is a remote exploit for multiple platform. Description: Nginx 0.7.64 - Terminal Escape Sequence in Logs Command Injection. Author: evilaliv3
|
Analyze the security implications of: Nginx 0.7.64 - Terminal Escape Sequence in Logs Command Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Binary Board System 0.2.5 - 'stats.pl' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for cgi platform. Description: Binary Board System 0.2.5 - 'stats.pl' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t3d3Vil
|
Analyze the security implications of: Binary Board System 0.2.5 - 'stats.pl' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: BSD - SHMAT System Call Privilege Escalation
|
This is a local exploit for bsd platform. Description: BSD - SHMAT System Call Privilege Escalation. Author: Joost Pol
|
Analyze the security implications of: BSD - SHMAT System Call Privilege Escalation
|
This exploit targets bsd systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets bsd platform
|
What is this exploit about: Joomla! Component EXP Shop - 'catid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component EXP Shop - 'catid' SQL Injection. Author: His0k4
|
Analyze the security implications of: Joomla! Component EXP Shop - 'catid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cobalt 2.0 - 'adminler.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: Cobalt 2.0 - 'adminler.asp' SQL Injection. Author: U238
|
Analyze the security implications of: Cobalt 2.0 - 'adminler.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: The Net Guys ASPired2Poll - Remote Database Disclosure
|
This is a webapps exploit for asp platform. Description: The Net Guys ASPired2Poll - Remote Database Disclosure. Author: AlpHaNiX
|
Analyze the security implications of: The Net Guys ASPired2Poll - Remote Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: DirectTopics 2 - 'topic.php' SQL Injection
|
This is a webapps exploit for php platform. Description: DirectTopics 2 - 'topic.php' SQL Injection. Author: Morinex Eneco
|
Analyze the security implications of: DirectTopics 2 - 'topic.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ASP Folder Gallery - 'Download_Script.asp' Arbitrary File Download
|
This is a webapps exploit for asp platform. Description: ASP Folder Gallery - 'Download_Script.asp' Arbitrary File Download. Author: freeprotect.net
|
Analyze the security implications of: ASP Folder Gallery - 'Download_Script.asp' Arbitrary File Download
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Dazzle Blast - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Dazzle Blast - Remote File Inclusion. Author: NoGe
|
Analyze the security implications of: Dazzle Blast - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MiniNuke 2.1 - 'uid' SQL Injection
|
This is a webapps exploit for asp platform. Description: MiniNuke 2.1 - 'uid' SQL Injection. Author: S@BUN
|
Analyze the security implications of: MiniNuke 2.1 - 'uid' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Fastweb FASTGate 0.00.47 - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: Fastweb FASTGate 0.00.47 - Cross-Site Request Forgery. Author: Raffaele Sabato
|
Analyze the security implications of: Fastweb FASTGate 0.00.47 - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: mICQ 0.4.6 - Remote Buffer Overflow
|
This is a remote exploit for linux platform. Description: mICQ 0.4.6 - Remote Buffer Overflow. Author: tHE rECIdjVO
|
Analyze the security implications of: mICQ 0.4.6 - Remote Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Websense 7.6 Products - 'favorites.exe' Authentication Bypass
|
This is a webapps exploit for cgi platform. Description: Websense 7.6 Products - 'favorites.exe' Authentication Bypass. Author: Ben Williams
|
Analyze the security implications of: Websense 7.6 Products - 'favorites.exe' Authentication Bypass
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Apple Safari 4.0.2 - WebKit Parsing of Floating Point Numbers Buffer Overflow (PoC)
|
This is a dos exploit for multiple platform. Description: Apple Safari 4.0.2 - WebKit Parsing of Floating Point Numbers Buffer Overflow (PoC). Author: Leon Juranic
|
Analyze the security implications of: Apple Safari 4.0.2 - WebKit Parsing of Floating Point Numbers Buffer Overflow (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: JETIK-WEB Software - 'kat' SQL Injection
|
This is a webapps exploit for php platform. Description: JETIK-WEB Software - 'kat' SQL Injection. Author: d3v1l
|
Analyze the security implications of: JETIK-WEB Software - 'kat' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Borland Interbase 2007/2007 SP2 - 'jrd8_create_database' Remote Buffer Overflow (Metasploit)
|
This is a remote exploit for linux platform. Description: Borland Interbase 2007/2007 SP2 - 'jrd8_create_database' Remote Buffer Overflow (Metasploit). Author: Adriano Lima
|
Analyze the security implications of: Borland Interbase 2007/2007 SP2 - 'jrd8_create_database' Remote Buffer Overflow (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Advanced Matrimonial Script 2.0.3 - SQL Injection
|
This is a webapps exploit for php platform. Description: Advanced Matrimonial Script 2.0.3 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Advanced Matrimonial Script 2.0.3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Local Services Search Engine Management System (LSSMES) 1.0 - 'name' Persistent Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Local Services Search Engine Management System (LSSMES) 1.0 - 'name' Persistent Cross-Site Scripting (XSS). Author: Tushar Vaidya
|
Analyze the security implications of: Local Services Search Engine Management System (LSSMES) 1.0 - 'name' Persistent Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Caner Hikaye Script - SQL Injection
|
This is a webapps exploit for asp platform. Description: Caner Hikaye Script - SQL Injection. Author: v0calist
|
Analyze the security implications of: Caner Hikaye Script - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Spring Cloud Config 2.1.x - Path Traversal (Metasploit)
|
This is a webapps exploit for java platform. Description: Spring Cloud Config 2.1.x - Path Traversal (Metasploit). Author: Dhiraj Mishra
|
Analyze the security implications of: Spring Cloud Config 2.1.x - Path Traversal (Metasploit)
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: iScripts AutoHoster - 'fname' Local File Inclusion
|
This is a webapps exploit for php platform. Description: iScripts AutoHoster - 'fname' Local File Inclusion. Author: i-Hmx
|
Analyze the security implications of: iScripts AutoHoster - 'fname' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Java Applet - Method Handle Remote Code Execution (Metasploit)
|
This is a remote exploit for multiple platform. Description: Java Applet - Method Handle Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Java Applet - Method Handle Remote Code Execution (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: BASE 1.2.4 - melissa Snort Frontend Remote File Inclusion
|
This is a webapps exploit for php platform. Description: BASE 1.2.4 - melissa Snort Frontend Remote File Inclusion. Author: str0ke
|
Analyze the security implications of: BASE 1.2.4 - melissa Snort Frontend Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Invision Gallery 2.0.7 - 'index.php?IMG' SQL Injection
|
This is a webapps exploit for php platform. Description: Invision Gallery 2.0.7 - 'index.php?IMG' SQL Injection. Author: infection
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.