input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Dell EMC Avamar and Integrated Data Protection Appliance Installation Manager - Invalid Access Control
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: dotProject 2.0 - '/includes/db_connect.php?baseDir' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: dotProject 2.0 - '/includes/db_connect.php?baseDir' Remote File Inclusion. Author: r.verton
|
Analyze the security implications of: dotProject 2.0 - '/includes/db_connect.php?baseDir' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Novell Netware Enterprise Web Server 5.1/6.0 - env.bas Information Disclosure
|
This is a remote exploit for netware platform. Description: Novell Netware Enterprise Web Server 5.1/6.0 - env.bas Information Disclosure. Author: Rafel Ivgi The-Insider
|
Analyze the security implications of: Novell Netware Enterprise Web Server 5.1/6.0 - env.bas Information Disclosure
|
This exploit targets netware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets netware platform
|
What is this exploit about: Adobe Flash - Info Leak in Image Inflation
|
This is a dos exploit for multiple platform. Description: Adobe Flash - Info Leak in Image Inflation. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - Info Leak in Image Inflation
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: PHP 4.x/5.0/5.1 - 'mb_send_mail()' Restriction Bypass
|
This is a local exploit for php platform. Description: PHP 4.x/5.0/5.1 - 'mb_send_mail()' Restriction Bypass. Author: ced.clerget@free.fr
|
Analyze the security implications of: PHP 4.x/5.0/5.1 - 'mb_send_mail()' Restriction Bypass
|
This exploit targets php systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: APNGDis 2.8 - 'chunk size descriptor' Heap Buffer Overflow
|
This is a dos exploit for multiple platform. Description: APNGDis 2.8 - 'chunk size descriptor' Heap Buffer Overflow. Author: Alwin Peppels
|
Analyze the security implications of: APNGDis 2.8 - 'chunk size descriptor' Heap Buffer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Gelato - 'index.php?post' SQL Injection
|
This is a webapps exploit for php platform. Description: Gelato - 'index.php?post' SQL Injection. Author: s0cratex
|
Analyze the security implications of: Gelato - 'index.php?post' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Greeting card 1.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: Greeting card 1.1 - SQL Injection. Author: Net.Edit0r
|
Analyze the security implications of: Greeting card 1.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mambo Open Source 4.6.2 - '/mambots/editors/mostlyce/' PHP/connector.php?Query String Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Mambo Open Source 4.6.2 - '/mambots/editors/mostlyce/' PHP/connector.php?Query String Cross-Site Scripting. Author: Khashayar Fereidani
|
Analyze the security implications of: Mambo Open Source 4.6.2 - '/mambots/editors/mostlyce/' PHP/connector.php?Query String Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FreeBSD - Intel SYSRET Privilege Escalation (Metasploit)
|
This is a local exploit for freebsd_x86-64 platform. Description: FreeBSD - Intel SYSRET Privilege Escalation (Metasploit). Author: Metasploit
|
Analyze the security implications of: FreeBSD - Intel SYSRET Privilege Escalation (Metasploit)
|
This exploit targets freebsd_x86-64 systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets freebsd_x86-64 platform
|
What is this exploit about: D-Link HNAP - Request Remote Buffer Overflow (Metasploit)
|
This is a remote exploit for hardware platform. Description: D-Link HNAP - Request Remote Buffer Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: D-Link HNAP - Request Remote Buffer Overflow (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Caucho Resin 2.0/2.1 - Multiple HTML Injection / Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: Caucho Resin 2.0/2.1 - Multiple HTML Injection / Cross-Site Scripting Vulnerabilities. Author: Donnie Werner
|
Analyze the security implications of: Caucho Resin 2.0/2.1 - Multiple HTML Injection / Cross-Site Scripting Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Freeway 1.4.1.171 - '/templates/Freeway/boxes/whos_online.php?language' Traversal Local File Inclusion
|
This is a webapps exploit for php platform. Description: Freeway 1.4.1.171 - '/templates/Freeway/boxes/whos_online.php?language' Traversal Local File Inclusion. Author: Digital Security Research Group
|
Analyze the security implications of: Freeway 1.4.1.171 - '/templates/Freeway/boxes/whos_online.php?language' Traversal Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Litespeed 2.1.5 - 'ConfMgr.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Litespeed 2.1.5 - 'ConfMgr.php' Cross-Site Scripting. Author: Gama Sec
|
Analyze the security implications of: Litespeed 2.1.5 - 'ConfMgr.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Instagram Auto Follow - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Instagram Auto Follow - Authentication Bypass. Author: Veyselxan
|
Analyze the security implications of: Instagram Auto Follow - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: QIP 2005 - Malformed Rich Text Message Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: QIP 2005 - Malformed Rich Text Message Remote Denial of Service. Author: ShineShadow
|
Analyze the security implications of: QIP 2005 - Malformed Rich Text Message Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Ethereal 0.8.4/0.8.5/0.8.6 / tcpdump 3.4/3.5 alpha - DNS Decode (1)
|
This is a remote exploit for linux platform. Description: Ethereal 0.8.4/0.8.5/0.8.6 / tcpdump 3.4/3.5 alpha - DNS Decode (1). Author: Hugo Breton
|
Analyze the security implications of: Ethereal 0.8.4/0.8.5/0.8.6 / tcpdump 3.4/3.5 alpha - DNS Decode (1)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: TP-Link TL-WR841N - Command Injection
|
This is a webapps exploit for hardware platform. Description: TP-Link TL-WR841N - Command Injection. Author: Koh You Liang
|
Analyze the security implications of: TP-Link TL-WR841N - Command Injection
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Fonality trixbox - SQL Injection
|
This is a webapps exploit for php platform. Description: Fonality trixbox - SQL Injection. Author: Sc4nX
|
Analyze the security implications of: Fonality trixbox - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eFront 3.5.1 / build 2710 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: eFront 3.5.1 / build 2710 - Arbitrary File Upload. Author: Pepelux
|
Analyze the security implications of: eFront 3.5.1 / build 2710 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Helpdezk 1.1.1 - 'query' SQL Injection
|
This is a webapps exploit for php platform. Description: Helpdezk 1.1.1 - 'query' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Helpdezk 1.1.1 - 'query' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Tektronix Phaser 740/750/850/930 - Network Printer Administration Interface
|
This is a remote exploit for hardware platform. Description: Tektronix Phaser 740/750/850/930 - Network Printer Administration Interface. Author: Ltlw0lf
|
Analyze the security implications of: Tektronix Phaser 740/750/850/930 - Network Printer Administration Interface
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: JIRA and HipChat for JIRA Plugin - Velocity Template Injection
|
This is a webapps exploit for java platform. Description: JIRA and HipChat for JIRA Plugin - Velocity Template Injection. Author: Chris Wood
|
Analyze the security implications of: JIRA and HipChat for JIRA Plugin - Velocity Template Injection
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: WebKit - 'WebCore::SVGPatternElement::collectPatternAttributes' Out-of-Bounds Read
|
This is a dos exploit for multiple platform. Description: WebKit - 'WebCore::SVGPatternElement::collectPatternAttributes' Out-of-Bounds Read. Author: Google Security Research
|
Analyze the security implications of: WebKit - 'WebCore::SVGPatternElement::collectPatternAttributes' Out-of-Bounds Read
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ECI Telecom B-FOCuS Router 312+ - Unauthorized Access
|
This is a remote exploit for hardware platform. Description: ECI Telecom B-FOCuS Router 312+ - Unauthorized Access. Author: d.is.evil
|
Analyze the security implications of: ECI Telecom B-FOCuS Router 312+ - Unauthorized Access
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: DD-WRT v24-sp1 - Cross-Site Reference Forgery
|
This is a remote exploit for hardware platform. Description: DD-WRT v24-sp1 - Cross-Site Reference Forgery. Author: Michael Brooks
|
Analyze the security implications of: DD-WRT v24-sp1 - Cross-Site Reference Forgery
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Huawei HG866 - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Huawei HG866 - Authentication Bypass. Author: hkm
|
Analyze the security implications of: Huawei HG866 - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: cPanel 10 - 'newuser.html' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: cPanel 10 - 'newuser.html' Multiple Cross-Site Scripting Vulnerabilities. Author: Aria-Security Team
|
Analyze the security implications of: cPanel 10 - 'newuser.html' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link Devices - UPNP Stack Overflow Denial of Service (PoC)
|
This is a dos exploit for hardware platform. Description: D-Link Devices - UPNP Stack Overflow Denial of Service (PoC). Author: ub3rst4r
|
Analyze the security implications of: D-Link Devices - UPNP Stack Overflow Denial of Service (PoC)
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Comersus Open Technologies Comersus Cart 6.0.41 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for asp platform. Description: Comersus Open Technologies Comersus Cart 6.0.41 - Multiple Cross-Site Scripting Vulnerabilities. Author: Diabolic Crab
|
Analyze the security implications of: Comersus Open Technologies Comersus Cart 6.0.41 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Libxine 1.14 - MPEG Stream Buffer Overflow (PoC)
|
This is a dos exploit for linux platform. Description: Libxine 1.14 - MPEG Stream Buffer Overflow (PoC). Author: Federico L. Bossi Bonin
|
Analyze the security implications of: Libxine 1.14 - MPEG Stream Buffer Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Sambar Server 4.4/5.0 - 'pagecount' File Overwrite
|
This is a remote exploit for multiple platform. Description: Sambar Server 4.4/5.0 - 'pagecount' File Overwrite. Author: kyprizel
|
Analyze the security implications of: Sambar Server 4.4/5.0 - 'pagecount' File Overwrite
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Cars Portal 1.1 - 'index.php' Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Cars Portal 1.1 - 'index.php' Multiple SQL Injections. Author: r0t
|
Analyze the security implications of: Cars Portal 1.1 - 'index.php' Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Prolink PRN2001 - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Prolink PRN2001 - Multiple Vulnerabilities. Author: Herman Groeneveld
|
Analyze the security implications of: Prolink PRN2001 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.