input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: NCM Content Management System - content.pl Input Validation
|
This is a remote exploit for cgi platform. Description: NCM Content Management System - content.pl Input Validation. Author: RA-Soft Security
|
Analyze the security implications of: NCM Content Management System - content.pl Input Validation
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Real Networks Real Server 5.0 - ramgen Denial of Service
|
This is a dos exploit for freebsd platform. Description: Real Networks Real Server 5.0 - ramgen Denial of Service. Author: bow
|
Analyze the security implications of: Real Networks Real Server 5.0 - ramgen Denial of Service
|
This exploit targets freebsd systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: Mozilla Firefox 1.0.x - JavaScript Handler Race Condition Memory Corruption
|
This is a dos exploit for linux platform. Description: Mozilla Firefox 1.0.x - JavaScript Handler Race Condition Memory Corruption. Author: Michal Zalewski
|
Analyze the security implications of: Mozilla Firefox 1.0.x - JavaScript Handler Race Condition Memory Corruption
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joke Website Script - SQL Injection / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Joke Website Script - SQL Injection / Cross-Site Scripting. Author: Valentin
|
Analyze the security implications of: Joke Website Script - SQL Injection / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IG Shop 1.4 - 'Change_Pass.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: IG Shop 1.4 - 'Change_Pass.php' Cross-Site Scripting. Author: SnipEr.X
|
Analyze the security implications of: IG Shop 1.4 - 'Change_Pass.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP Fuzzer Framework - Default Location Insecure Temporary File Creation
|
This is a local exploit for linux platform. Description: PHP Fuzzer Framework - Default Location Insecure Temporary File Creation. Author: Melissa Elliott
|
Analyze the security implications of: PHP Fuzzer Framework - Default Location Insecure Temporary File Creation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: NetWin DMail 2.x / SurgeFTP 1.0/2.0 - Weak Password Encryption
|
This is a local exploit for multiple platform. Description: NetWin DMail 2.x / SurgeFTP 1.0/2.0 - Weak Password Encryption. Author: byterage
|
Analyze the security implications of: NetWin DMail 2.x / SurgeFTP 1.0/2.0 - Weak Password Encryption
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Altova MobileTogether Server 7.3 - XML External Entity Injection (XXE)
|
This is a webapps exploit for multiple platform. Description: Altova MobileTogether Server 7.3 - XML External Entity Injection (XXE). Author: RedTeam Pentesting GmbH
|
Analyze the security implications of: Altova MobileTogether Server 7.3 - XML External Entity Injection (XXE)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Links Directory 1.1 - 'cat_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Links Directory 1.1 - 'cat_id' SQL Injection. Author: t0pP8uZz
|
Analyze the security implications of: Links Directory 1.1 - 'cat_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IkonBoard 3.1 - Lang Cookie Arbitrary Command Execution (2)
|
This is a webapps exploit for cgi platform. Description: IkonBoard 3.1 - Lang Cookie Arbitrary Command Execution (2). Author: snooq
|
Analyze the security implications of: IkonBoard 3.1 - Lang Cookie Arbitrary Command Execution (2)
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Real Web Pentesting Tutorial Step by Step - [Persian]
|
This is a webapps exploit for multiple platform. Description: Real Web Pentesting Tutorial Step by Step - [Persian]. Author: Meisam Monsef
|
Analyze the security implications of: Real Web Pentesting Tutorial Step by Step - [Persian]
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Absolute Podcast 1.0 - Remote Insecure Cookie Handling
|
This is a webapps exploit for php platform. Description: Absolute Podcast 1.0 - Remote Insecure Cookie Handling. Author: Hakxer
|
Analyze the security implications of: Absolute Podcast 1.0 - Remote Insecure Cookie Handling
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Symantec Web Gateway 5.0.2 - Local/Remote File Inclusion / Remote Code Execution
|
This is a webapps exploit for linux platform. Description: Symantec Web Gateway 5.0.2 - Local/Remote File Inclusion / Remote Code Execution. Author: muts
|
Analyze the security implications of: Symantec Web Gateway 5.0.2 - Local/Remote File Inclusion / Remote Code Execution
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Check Point FW-1 Syslog Daemon - Unfiltered Escape Sequence
|
This is a remote exploit for hardware platform. Description: Check Point FW-1 Syslog Daemon - Unfiltered Escape Sequence. Author: Dr. Peter Bieringer
|
Analyze the security implications of: Check Point FW-1 Syslog Daemon - Unfiltered Escape Sequence
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Gemitel 3.50 - '/affich.php' Remote File Inclusion / Command Injection
|
This is a webapps exploit for php platform. Description: Gemitel 3.50 - '/affich.php' Remote File Inclusion / Command Injection. Author: jaguar
|
Analyze the security implications of: Gemitel 3.50 - '/affich.php' Remote File Inclusion / Command Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OpenNMS 1.5.x - HTTP Response Splitting
|
This is a remote exploit for multiple platform. Description: OpenNMS 1.5.x - HTTP Response Splitting. Author: BugSec LTD
|
Analyze the security implications of: OpenNMS 1.5.x - HTTP Response Splitting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Hashicorp vagrant-vmware-fusion 4.0.23 - Local Privilege Escalation
|
This is a local exploit for macos platform. Description: Hashicorp vagrant-vmware-fusion 4.0.23 - Local Privilege Escalation. Author: Mark Wadham
|
Analyze the security implications of: Hashicorp vagrant-vmware-fusion 4.0.23 - Local Privilege Escalation
|
This exploit targets macos systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: LibreNMS 1.46 - 'search' SQL Injection
|
This is a webapps exploit for multiple platform. Description: LibreNMS 1.46 - 'search' SQL Injection. Author: Punt
|
Analyze the security implications of: LibreNMS 1.46 - 'search' SQL Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Gamespy Software Development Kit - CD-Key Validation Buffer Overflow
|
This is a dos exploit for linux platform. Description: Gamespy Software Development Kit - CD-Key Validation Buffer Overflow. Author: Luigi Auriemma
|
Analyze the security implications of: Gamespy Software Development Kit - CD-Key Validation Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: BMC Compuware iStrobe Web - 20.13 - Pre-auth RCE
|
This is a webapps exploit for jsp platform. Description: BMC Compuware iStrobe Web - 20.13 - Pre-auth RCE. Author: trancap
|
Analyze the security implications of: BMC Compuware iStrobe Web - 20.13 - Pre-auth RCE
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: RedHat 9.0 / Slackware 8.1 - '/bin/mail' Carbon Copy Field Buffer Overrun
|
This is a local exploit for linux platform. Description: RedHat 9.0 / Slackware 8.1 - '/bin/mail' Carbon Copy Field Buffer Overrun. Author: mark@vulndev.org
|
Analyze the security implications of: RedHat 9.0 / Slackware 8.1 - '/bin/mail' Carbon Copy Field Buffer Overrun
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AVerCaster Pro RS3400 Web Server - Directory Traversal
|
This is a webapps exploit for hardware platform. Description: AVerCaster Pro RS3400 Web Server - Directory Traversal. Author: Patrick Saladino
|
Analyze the security implications of: AVerCaster Pro RS3400 Web Server - Directory Traversal
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: BSD 2 / CND 1 / Sendmail 8.x / FreeBSD 2.1.x / HP-UX 10.x / AIX 4 / RedHat 4 - Sendmail Daemon
|
This is a local exploit for multiple platform. Description: BSD 2 / CND 1 / Sendmail 8.x / FreeBSD 2.1.x / HP-UX 10.x / AIX 4 / RedHat 4 - Sendmail Daemon. Author: Leshka Zakharoff
|
Analyze the security implications of: BSD 2 / CND 1 / Sendmail 8.x / FreeBSD 2.1.x / HP-UX 10.x / AIX 4 / RedHat 4 - Sendmail Daemon
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Haudenschilt Family Connections 0.8 - 'index.php' Authentication Bypass
|
This is a webapps exploit for php platform. Description: Haudenschilt Family Connections 0.8 - 'index.php' Authentication Bypass. Author: ilker Kandemir
|
Analyze the security implications of: Haudenschilt Family Connections 0.8 - 'index.php' Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FlexAir Access Control 2.4.9api3 - Remote Code Execution
|
This is a webapps exploit for hardware platform. Description: FlexAir Access Control 2.4.9api3 - Remote Code Execution. Author: LiquidWorm
|
Analyze the security implications of: FlexAir Access Control 2.4.9api3 - Remote Code Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Aptina AR0130 960P 1.3MP Camera - Remote Configuration Disclosure
|
This is a webapps exploit for hardware platform. Description: Aptina AR0130 960P 1.3MP Camera - Remote Configuration Disclosure. Author: Todor Donev
|
Analyze the security implications of: Aptina AR0130 960P 1.3MP Camera - Remote Configuration Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Samba 3.3.12 (Linux x86) - 'chain_reply' Memory Corruption (Metasploit)
|
This is a remote exploit for linux_x86 platform. Description: Samba 3.3.12 (Linux x86) - 'chain_reply' Memory Corruption (Metasploit). Author: Metasploit
|
Analyze the security implications of: Samba 3.3.12 (Linux x86) - 'chain_reply' Memory Corruption (Metasploit)
|
This exploit targets linux_x86 systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux_x86 platform
|
What is this exploit about: Open Wiki 0.78 - 'ow.asp' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Open Wiki 0.78 - 'ow.asp' Cross-Site Scripting. Author: LiNuX_rOOt
|
Analyze the security implications of: Open Wiki 0.78 - 'ow.asp' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: DomainMOD 4.11.01 - Owner name Field Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DomainMOD 4.11.01 - Owner name Field Cross-Site Scripting. Author: Mohammed Abdul Raheem
|
Analyze the security implications of: DomainMOD 4.11.01 - Owner name Field Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CuteNews 2.1.2 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: CuteNews 2.1.2 - Remote Code Execution. Author: Musyoka Ian
|
Analyze the security implications of: CuteNews 2.1.2 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco IOS 11.x/12.0 - ILMI SNMP Community String
|
This is a remote exploit for hardware platform. Description: Cisco IOS 11.x/12.0 - ILMI SNMP Community String. Author: pask
|
Analyze the security implications of: Cisco IOS 11.x/12.0 - ILMI SNMP Community String
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component com_ticketbook - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_ticketbook - Local File Inclusion. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component com_ticketbook - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Horde 3.3.5 - '/Administration Interface admin/sqlshell.php?PATH_INFO' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Horde 3.3.5 - '/Administration Interface admin/sqlshell.php?PATH_INFO' Cross-Site Scripting. Author: Juan Galiana Lara
|
Analyze the security implications of: Horde 3.3.5 - '/Administration Interface admin/sqlshell.php?PATH_INFO' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: pdfresurrect 0.15 - Buffer Overflow
|
This is a dos exploit for linux platform. Description: pdfresurrect 0.15 - Buffer Overflow. Author: j0lama
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.