input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Dell EMC Avamar and Integrated Data Protection Appliance Installation Manager - Invalid Access Control | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: dotProject 2.0 - '/includes/db_connect.php?baseDir' Remote File Inclusion | This is a webapps exploit for php platform. Description: dotProject 2.0 - '/includes/db_connect.php?baseDir' Remote File Inclusion. Author: r.verton |
Analyze the security implications of: dotProject 2.0 - '/includes/db_connect.php?baseDir' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Novell Netware Enterprise Web Server 5.1/6.0 - env.bas Information Disclosure | This is a remote exploit for netware platform. Description: Novell Netware Enterprise Web Server 5.1/6.0 - env.bas Information Disclosure. Author: Rafel Ivgi The-Insider |
Analyze the security implications of: Novell Netware Enterprise Web Server 5.1/6.0 - env.bas Information Disclosure | This exploit targets netware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets netware platform |
What is this exploit about: Adobe Flash - Info Leak in Image Inflation | This is a dos exploit for multiple platform. Description: Adobe Flash - Info Leak in Image Inflation. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Info Leak in Image Inflation | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PHP 4.x/5.0/5.1 - 'mb_send_mail()' Restriction Bypass | This is a local exploit for php platform. Description: PHP 4.x/5.0/5.1 - 'mb_send_mail()' Restriction Bypass. Author: ced.clerget@free.fr |
Analyze the security implications of: PHP 4.x/5.0/5.1 - 'mb_send_mail()' Restriction Bypass | This exploit targets php systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: APNGDis 2.8 - 'chunk size descriptor' Heap Buffer Overflow | This is a dos exploit for multiple platform. Description: APNGDis 2.8 - 'chunk size descriptor' Heap Buffer Overflow. Author: Alwin Peppels |
Analyze the security implications of: APNGDis 2.8 - 'chunk size descriptor' Heap Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Gelato - 'index.php?post' SQL Injection | This is a webapps exploit for php platform. Description: Gelato - 'index.php?post' SQL Injection. Author: s0cratex |
Analyze the security implications of: Gelato - 'index.php?post' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Greeting card 1.1 - SQL Injection | This is a webapps exploit for php platform. Description: Greeting card 1.1 - SQL Injection. Author: Net.Edit0r |
Analyze the security implications of: Greeting card 1.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Open Source 4.6.2 - '/mambots/editors/mostlyce/' PHP/connector.php?Query String Cross-Site Scripting | This is a webapps exploit for php platform. Description: Mambo Open Source 4.6.2 - '/mambots/editors/mostlyce/' PHP/connector.php?Query String Cross-Site Scripting. Author: Khashayar Fereidani |
Analyze the security implications of: Mambo Open Source 4.6.2 - '/mambots/editors/mostlyce/' PHP/connector.php?Query String Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) | This is a local exploit for freebsd_x86-64 platform. Description: FreeBSD - Intel SYSRET Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) | This exploit targets freebsd_x86-64 systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd_x86-64 platform |
What is this exploit about: D-Link HNAP - Request Remote Buffer Overflow (Metasploit) | This is a remote exploit for hardware platform. Description: D-Link HNAP - Request Remote Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: D-Link HNAP - Request Remote Buffer Overflow (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Caucho Resin 2.0/2.1 - Multiple HTML Injection / Cross-Site Scripting Vulnerabilities | This is a webapps exploit for jsp platform. Description: Caucho Resin 2.0/2.1 - Multiple HTML Injection / Cross-Site Scripting Vulnerabilities. Author: Donnie Werner |
Analyze the security implications of: Caucho Resin 2.0/2.1 - Multiple HTML Injection / Cross-Site Scripting Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Freeway 1.4.1.171 - '/templates/Freeway/boxes/whos_online.php?language' Traversal Local File Inclusion | This is a webapps exploit for php platform. Description: Freeway 1.4.1.171 - '/templates/Freeway/boxes/whos_online.php?language' Traversal Local File Inclusion. Author: Digital Security Research Group |
Analyze the security implications of: Freeway 1.4.1.171 - '/templates/Freeway/boxes/whos_online.php?language' Traversal Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Litespeed 2.1.5 - 'ConfMgr.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Litespeed 2.1.5 - 'ConfMgr.php' Cross-Site Scripting. Author: Gama Sec |
Analyze the security implications of: Litespeed 2.1.5 - 'ConfMgr.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Instagram Auto Follow - Authentication Bypass | This is a webapps exploit for php platform. Description: Instagram Auto Follow - Authentication Bypass. Author: Veyselxan |
Analyze the security implications of: Instagram Auto Follow - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: QIP 2005 - Malformed Rich Text Message Remote Denial of Service | This is a dos exploit for multiple platform. Description: QIP 2005 - Malformed Rich Text Message Remote Denial of Service. Author: ShineShadow |
Analyze the security implications of: QIP 2005 - Malformed Rich Text Message Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ethereal 0.8.4/0.8.5/0.8.6 / tcpdump 3.4/3.5 alpha - DNS Decode (1) | This is a remote exploit for linux platform. Description: Ethereal 0.8.4/0.8.5/0.8.6 / tcpdump 3.4/3.5 alpha - DNS Decode (1). Author: Hugo Breton |
Analyze the security implications of: Ethereal 0.8.4/0.8.5/0.8.6 / tcpdump 3.4/3.5 alpha - DNS Decode (1) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: TP-Link TL-WR841N - Command Injection | This is a webapps exploit for hardware platform. Description: TP-Link TL-WR841N - Command Injection. Author: Koh You Liang |
Analyze the security implications of: TP-Link TL-WR841N - Command Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Fonality trixbox - SQL Injection | This is a webapps exploit for php platform. Description: Fonality trixbox - SQL Injection. Author: Sc4nX |
Analyze the security implications of: Fonality trixbox - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eFront 3.5.1 / build 2710 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: eFront 3.5.1 / build 2710 - Arbitrary File Upload. Author: Pepelux |
Analyze the security implications of: eFront 3.5.1 / build 2710 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Helpdezk 1.1.1 - 'query' SQL Injection | This is a webapps exploit for php platform. Description: Helpdezk 1.1.1 - 'query' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Helpdezk 1.1.1 - 'query' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Tektronix Phaser 740/750/850/930 - Network Printer Administration Interface | This is a remote exploit for hardware platform. Description: Tektronix Phaser 740/750/850/930 - Network Printer Administration Interface. Author: Ltlw0lf |
Analyze the security implications of: Tektronix Phaser 740/750/850/930 - Network Printer Administration Interface | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: JIRA and HipChat for JIRA Plugin - Velocity Template Injection | This is a webapps exploit for java platform. Description: JIRA and HipChat for JIRA Plugin - Velocity Template Injection. Author: Chris Wood |
Analyze the security implications of: JIRA and HipChat for JIRA Plugin - Velocity Template Injection | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: WebKit - 'WebCore::SVGPatternElement::collectPatternAttributes' Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: WebKit - 'WebCore::SVGPatternElement::collectPatternAttributes' Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: WebKit - 'WebCore::SVGPatternElement::collectPatternAttributes' Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ECI Telecom B-FOCuS Router 312+ - Unauthorized Access | This is a remote exploit for hardware platform. Description: ECI Telecom B-FOCuS Router 312+ - Unauthorized Access. Author: d.is.evil |
Analyze the security implications of: ECI Telecom B-FOCuS Router 312+ - Unauthorized Access | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DD-WRT v24-sp1 - Cross-Site Reference Forgery | This is a remote exploit for hardware platform. Description: DD-WRT v24-sp1 - Cross-Site Reference Forgery. Author: Michael Brooks |
Analyze the security implications of: DD-WRT v24-sp1 - Cross-Site Reference Forgery | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Huawei HG866 - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Huawei HG866 - Authentication Bypass. Author: hkm |
Analyze the security implications of: Huawei HG866 - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: cPanel 10 - 'newuser.html' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: cPanel 10 - 'newuser.html' Multiple Cross-Site Scripting Vulnerabilities. Author: Aria-Security Team |
Analyze the security implications of: cPanel 10 - 'newuser.html' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link Devices - UPNP Stack Overflow Denial of Service (PoC) | This is a dos exploit for hardware platform. Description: D-Link Devices - UPNP Stack Overflow Denial of Service (PoC). Author: ub3rst4r |
Analyze the security implications of: D-Link Devices - UPNP Stack Overflow Denial of Service (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Comersus Open Technologies Comersus Cart 6.0.41 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: Comersus Open Technologies Comersus Cart 6.0.41 - Multiple Cross-Site Scripting Vulnerabilities. Author: Diabolic Crab |
Analyze the security implications of: Comersus Open Technologies Comersus Cart 6.0.41 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Libxine 1.14 - MPEG Stream Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: Libxine 1.14 - MPEG Stream Buffer Overflow (PoC). Author: Federico L. Bossi Bonin |
Analyze the security implications of: Libxine 1.14 - MPEG Stream Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Sambar Server 4.4/5.0 - 'pagecount' File Overwrite | This is a remote exploit for multiple platform. Description: Sambar Server 4.4/5.0 - 'pagecount' File Overwrite. Author: kyprizel |
Analyze the security implications of: Sambar Server 4.4/5.0 - 'pagecount' File Overwrite | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cars Portal 1.1 - 'index.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: Cars Portal 1.1 - 'index.php' Multiple SQL Injections. Author: r0t |
Analyze the security implications of: Cars Portal 1.1 - 'index.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Prolink PRN2001 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Prolink PRN2001 - Multiple Vulnerabilities. Author: Herman Groeneveld |
Analyze the security implications of: Prolink PRN2001 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.