input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Drupal 4.x - URL-Encoded Input HTML Injection | This is a webapps exploit for php platform. Description: Drupal 4.x - URL-Encoded Input HTML Injection. Author: liz0 |
Analyze the security implications of: Drupal 4.x - URL-Encoded Input HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Debian OpenSSH - (Authenticated) Remote SELinux Privilege Escalation | This is a remote exploit for linux platform. Description: Debian OpenSSH - (Authenticated) Remote SELinux Privilege Escalation. Author: eliteboy |
Analyze the security implications of: Debian OpenSSH - (Authenticated) Remote SELinux Privilege Escalation | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Samsung Devices KNOX Extensions - OTP Service Heap Overflow | This is a dos exploit for android platform. Description: Samsung Devices KNOX Extensions - OTP Service Heap Overflow. Author: Google Security Research |
Analyze the security implications of: Samsung Devices KNOX Extensions - OTP Service Heap Overflow | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Seagate BlackArmor NAS sg2000-2000.1331 - Multiple Persistent Cross-Site Scripting Vulnerabilities | This is a webapps exploit for hardware platform. Description: Seagate BlackArmor NAS sg2000-2000.1331 - Multiple Persistent Cross-Site Scripting Vulnerabilities. Author: Jeroen - IT Nerdbox |
Analyze the security implications of: Seagate BlackArmor NAS sg2000-2000.1331 - Multiple Persistent Cross-Site Scripting Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GoAhead Web Server 5.1.1 - Digest Authentication Capture Replay Nonce Reuse | This is a remote exploit for hardware platform. Description: GoAhead Web Server 5.1.1 - Digest Authentication Capture Replay Nonce Reuse. Author: LiquidWorm |
Analyze the security implications of: GoAhead Web Server 5.1.1 - Digest Authentication Capture Replay Nonce Reuse | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Rogue 5.3 - Local Buffer Overflow | This is a local exploit for bsd platform. Description: Rogue 5.3 - Local Buffer Overflow. Author: stanojr@iserver.sk |
Analyze the security implications of: Rogue 5.3 - Local Buffer Overflow | This exploit targets bsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: WordPress Plugin Freshmail 1.5.8 - SQL Injection | This is a webapps exploit for multiple platform. Description: WordPress Plugin Freshmail 1.5.8 - SQL Injection. Author: Felipe Molina |
Analyze the security implications of: WordPress Plugin Freshmail 1.5.8 - SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Tomcat 3.2.1/4.0 / Weblogic Server 5.1 - URL JSP Request Source Code Disclosure | This is a remote exploit for multiple platform. Description: Tomcat 3.2.1/4.0 / Weblogic Server 5.1 - URL JSP Request Source Code Disclosure. Author: Sverre H. Huseby |
Analyze the security implications of: Tomcat 3.2.1/4.0 / Weblogic Server 5.1 - URL JSP Request Source Code Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux Kernel 3.10.0 (CentOS / RHEL 7.1) - visor 'treo_attach' Nullpointer Dereference | This is a dos exploit for linux platform. Description: Linux Kernel 3.10.0 (CentOS / RHEL 7.1) - visor 'treo_attach' Nullpointer Dereference. Author: OpenSource Security |
Analyze the security implications of: Linux Kernel 3.10.0 (CentOS / RHEL 7.1) - visor 'treo_attach' Nullpointer Dereference | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux Kernel 2.6.32 < 3.x (CentOS 5/6) - 'PERF_EVENTS' Local Privilege Escalation (1) | This is a local exploit for linux platform. Description: Linux Kernel 2.6.32 < 3.x (CentOS 5/6) - 'PERF_EVENTS' Local Privilege Escalation (1). Author: sd |
Analyze the security implications of: Linux Kernel 2.6.32 < 3.x (CentOS 5/6) - 'PERF_EVENTS' Local Privilege Escalation (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Nginx 0.7.64 - Terminal Escape Sequence in Logs Command Injection | This is a remote exploit for multiple platform. Description: Nginx 0.7.64 - Terminal Escape Sequence in Logs Command Injection. Author: evilaliv3 |
Analyze the security implications of: Nginx 0.7.64 - Terminal Escape Sequence in Logs Command Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Binary Board System 0.2.5 - 'stats.pl' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for cgi platform. Description: Binary Board System 0.2.5 - 'stats.pl' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t3d3Vil |
Analyze the security implications of: Binary Board System 0.2.5 - 'stats.pl' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: BSD - SHMAT System Call Privilege Escalation | This is a local exploit for bsd platform. Description: BSD - SHMAT System Call Privilege Escalation. Author: Joost Pol |
Analyze the security implications of: BSD - SHMAT System Call Privilege Escalation | This exploit targets bsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Joomla! Component EXP Shop - 'catid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component EXP Shop - 'catid' SQL Injection. Author: His0k4 |
Analyze the security implications of: Joomla! Component EXP Shop - 'catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cobalt 2.0 - 'adminler.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Cobalt 2.0 - 'adminler.asp' SQL Injection. Author: U238 |
Analyze the security implications of: Cobalt 2.0 - 'adminler.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: The Net Guys ASPired2Poll - Remote Database Disclosure | This is a webapps exploit for asp platform. Description: The Net Guys ASPired2Poll - Remote Database Disclosure. Author: AlpHaNiX |
Analyze the security implications of: The Net Guys ASPired2Poll - Remote Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: DirectTopics 2 - 'topic.php' SQL Injection | This is a webapps exploit for php platform. Description: DirectTopics 2 - 'topic.php' SQL Injection. Author: Morinex Eneco |
Analyze the security implications of: DirectTopics 2 - 'topic.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASP Folder Gallery - 'Download_Script.asp' Arbitrary File Download | This is a webapps exploit for asp platform. Description: ASP Folder Gallery - 'Download_Script.asp' Arbitrary File Download. Author: freeprotect.net |
Analyze the security implications of: ASP Folder Gallery - 'Download_Script.asp' Arbitrary File Download | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Dazzle Blast - Remote File Inclusion | This is a webapps exploit for php platform. Description: Dazzle Blast - Remote File Inclusion. Author: NoGe |
Analyze the security implications of: Dazzle Blast - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MiniNuke 2.1 - 'uid' SQL Injection | This is a webapps exploit for asp platform. Description: MiniNuke 2.1 - 'uid' SQL Injection. Author: S@BUN |
Analyze the security implications of: MiniNuke 2.1 - 'uid' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Fastweb FASTGate 0.00.47 - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Fastweb FASTGate 0.00.47 - Cross-Site Request Forgery. Author: Raffaele Sabato |
Analyze the security implications of: Fastweb FASTGate 0.00.47 - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: mICQ 0.4.6 - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: mICQ 0.4.6 - Remote Buffer Overflow. Author: tHE rECIdjVO |
Analyze the security implications of: mICQ 0.4.6 - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Websense 7.6 Products - 'favorites.exe' Authentication Bypass | This is a webapps exploit for cgi platform. Description: Websense 7.6 Products - 'favorites.exe' Authentication Bypass. Author: Ben Williams |
Analyze the security implications of: Websense 7.6 Products - 'favorites.exe' Authentication Bypass | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Apple Safari 4.0.2 - WebKit Parsing of Floating Point Numbers Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: Apple Safari 4.0.2 - WebKit Parsing of Floating Point Numbers Buffer Overflow (PoC). Author: Leon Juranic |
Analyze the security implications of: Apple Safari 4.0.2 - WebKit Parsing of Floating Point Numbers Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: JETIK-WEB Software - 'kat' SQL Injection | This is a webapps exploit for php platform. Description: JETIK-WEB Software - 'kat' SQL Injection. Author: d3v1l |
Analyze the security implications of: JETIK-WEB Software - 'kat' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Borland Interbase 2007/2007 SP2 - 'jrd8_create_database' Remote Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: Borland Interbase 2007/2007 SP2 - 'jrd8_create_database' Remote Buffer Overflow (Metasploit). Author: Adriano Lima |
Analyze the security implications of: Borland Interbase 2007/2007 SP2 - 'jrd8_create_database' Remote Buffer Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Advanced Matrimonial Script 2.0.3 - SQL Injection | This is a webapps exploit for php platform. Description: Advanced Matrimonial Script 2.0.3 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Advanced Matrimonial Script 2.0.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Local Services Search Engine Management System (LSSMES) 1.0 - 'name' Persistent Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Local Services Search Engine Management System (LSSMES) 1.0 - 'name' Persistent Cross-Site Scripting (XSS). Author: Tushar Vaidya |
Analyze the security implications of: Local Services Search Engine Management System (LSSMES) 1.0 - 'name' Persistent Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Caner Hikaye Script - SQL Injection | This is a webapps exploit for asp platform. Description: Caner Hikaye Script - SQL Injection. Author: v0calist |
Analyze the security implications of: Caner Hikaye Script - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Spring Cloud Config 2.1.x - Path Traversal (Metasploit) | This is a webapps exploit for java platform. Description: Spring Cloud Config 2.1.x - Path Traversal (Metasploit). Author: Dhiraj Mishra |
Analyze the security implications of: Spring Cloud Config 2.1.x - Path Traversal (Metasploit) | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: iScripts AutoHoster - 'fname' Local File Inclusion | This is a webapps exploit for php platform. Description: iScripts AutoHoster - 'fname' Local File Inclusion. Author: i-Hmx |
Analyze the security implications of: iScripts AutoHoster - 'fname' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Java Applet - Method Handle Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Java Applet - Method Handle Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Java Applet - Method Handle Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BASE 1.2.4 - melissa Snort Frontend Remote File Inclusion | This is a webapps exploit for php platform. Description: BASE 1.2.4 - melissa Snort Frontend Remote File Inclusion. Author: str0ke |
Analyze the security implications of: BASE 1.2.4 - melissa Snort Frontend Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Gallery 2.0.7 - 'index.php?IMG' SQL Injection | This is a webapps exploit for php platform. Description: Invision Gallery 2.0.7 - 'index.php?IMG' SQL Injection. Author: infection |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.