input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Spring Cloud Config 2.1.x - Path Traversal (Metasploit) | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Zoho ManageEngine ServiceDesk Plus MSP 9.4 - User Enumeration | This is a webapps exploit for java platform. Description: Zoho ManageEngine ServiceDesk Plus MSP 9.4 - User Enumeration. Author: Ricardo Ruiz |
Analyze the security implications of: Zoho ManageEngine ServiceDesk Plus MSP 9.4 - User Enumeration | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: FAQ System 1.1 - 'index.php?category_id' SQL Injection | This is a webapps exploit for php platform. Description: FAQ System 1.1 - 'index.php?category_id' SQL Injection. Author: r0t |
Analyze the security implications of: FAQ System 1.1 - 'index.php?category_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Classic FTP 1.02 - 'LIST' Directory Traversal | This is a remote exploit for multiple platform. Description: Classic FTP 1.02 - 'LIST' Directory Traversal. Author: Tan Chew Keong |
Analyze the security implications of: Classic FTP 1.02 - 'LIST' Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component NS Download Shop 2.2.6 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component NS Download Shop 2.2.6 - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component NS Download Shop 2.2.6 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ReyeeOS 1.204.1614 - MITM Remote Code Execution (RCE) | This is a remote exploit for hardware platform. Description: ReyeeOS 1.204.1614 - MITM Remote Code Execution (RCE). Author: Riyan Firmansyah of Seclab |
Analyze the security implications of: ReyeeOS 1.204.1614 - MITM Remote Code Execution (RCE) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linux - 'userfaultfd' Bypasses tmpfs File Permissions | This is a dos exploit for linux platform. Description: Linux - 'userfaultfd' Bypasses tmpfs File Permissions. Author: Google Security Research |
Analyze the security implications of: Linux - 'userfaultfd' Bypasses tmpfs File Permissions | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component AlphaUserPoints - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component AlphaUserPoints - SQL Injection. Author: jdc |
Analyze the security implications of: Joomla! Component AlphaUserPoints - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Laundry CMS - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Laundry CMS - Multiple Vulnerabilities. Author: Mehmet EMIROGLU |
Analyze the security implications of: Laundry CMS - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hospitals Patient Records Management System 1.0 - 'id' SQL Injection (Authenticated) | This is a webapps exploit for php platform. Description: Hospitals Patient Records Management System 1.0 - 'id' SQL Injection (Authenticated). Author: twseptian |
Analyze the security implications of: Hospitals Patient Records Management System 1.0 - 'id' SQL Injection (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: e107 Website System 0.6 - Nested BBCode URL Tag Script Injection | This is a webapps exploit for php platform. Description: e107 Website System 0.6 - Nested BBCode URL Tag Script Injection. Author: Nick Griffin |
Analyze the security implications of: e107 Website System 0.6 - Nested BBCode URL Tag Script Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: reNgine 2.2.0 - Command Injection (Authenticated) | This is a webapps exploit for multiple platform. Description: reNgine 2.2.0 - Command Injection (Authenticated). Author: Caner Tercan |
Analyze the security implications of: reNgine 2.2.0 - Command Injection (Authenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: KGB 1.9 - 'sesskglogadmin.php' Local File Inclusion | This is a webapps exploit for php platform. Description: KGB 1.9 - 'sesskglogadmin.php' Local File Inclusion. Author: Kacper |
Analyze the security implications of: KGB 1.9 - 'sesskglogadmin.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Snom IP Phone Web Interface < 8 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Snom IP Phone Web Interface < 8 - Multiple Vulnerabilities. Author: Yakir Wizman |
Analyze the security implications of: Snom IP Phone Web Interface < 8 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DCI-Designs Dawaween 1.03 - 'Poems.php' SQL Injection | This is a webapps exploit for php platform. Description: DCI-Designs Dawaween 1.03 - 'Poems.php' SQL Injection. Author: sherba |
Analyze the security implications of: DCI-Designs Dawaween 1.03 - 'Poems.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Siemens ADSL SL2-141 - Cross-Site Request Forgery | This is a remote exploit for hardware platform. Description: Siemens ADSL SL2-141 - Cross-Site Request Forgery. Author: spdr |
Analyze the security implications of: Siemens ADSL SL2-141 - Cross-Site Request Forgery | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Tenda W316R Wireless Router 5.07.50 - Remote DNS Change | This is a webapps exploit for asp platform. Description: Tenda W316R Wireless Router 5.07.50 - Remote DNS Change. Author: Todor Donev |
Analyze the security implications of: Tenda W316R Wireless Router 5.07.50 - Remote DNS Change | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Netgear Wireless Management System 2.1.4.15 (Build 1236) - Privilege Escalation | This is a webapps exploit for hardware platform. Description: Netgear Wireless Management System 2.1.4.15 (Build 1236) - Privilege Escalation. Author: Elliott Lewis |
Analyze the security implications of: Netgear Wireless Management System 2.1.4.15 (Build 1236) - Privilege Escalation | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Dating Pro Genie 2015.7 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Dating Pro Genie 2015.7 - Cross-Site Request Forgery. Author: High-Tech Bridge SA |
Analyze the security implications of: Dating Pro Genie 2015.7 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BlueSoft Social Networking CMS - SQL Injection | This is a webapps exploit for php platform. Description: BlueSoft Social Networking CMS - SQL Injection. Author: Lazmania61 |
Analyze the security implications of: BlueSoft Social Networking CMS - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eSyndiCat Directory Software - Multiple SQL Injections | This is a webapps exploit for php platform. Description: eSyndiCat Directory Software - Multiple SQL Injections. Author: d3v1l |
Analyze the security implications of: eSyndiCat Directory Software - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel < 2.6.31-rc7 - 'AF_IRDA' 29-Byte Stack Disclosure (2) | This is a local exploit for linux platform. Description: Linux Kernel < 2.6.31-rc7 - 'AF_IRDA' 29-Byte Stack Disclosure (2). Author: Jon Oberheide |
Analyze the security implications of: Linux Kernel < 2.6.31-rc7 - 'AF_IRDA' 29-Byte Stack Disclosure (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Gazelle CMS 1.0 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Gazelle CMS 1.0 - Arbitrary File Upload. Author: RoMaNcYxHaCkEr |
Analyze the security implications of: Gazelle CMS 1.0 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TP-Link TL-WR741N / TL-WR741ND Routers - Multiple Denial of Service Vulnerabilities | This is a dos exploit for hardware platform. Description: TP-Link TL-WR741N / TL-WR741ND Routers - Multiple Denial of Service Vulnerabilities. Author: W1ckerMan |
Analyze the security implications of: TP-Link TL-WR741N / TL-WR741ND Routers - Multiple Denial of Service Vulnerabilities | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: MySQL 5.0.18 - Query Logging Bypass | This is a remote exploit for linux platform. Description: MySQL 5.0.18 - Query Logging Bypass. Author: 1dt.w0lf |
Analyze the security implications of: MySQL 5.0.18 - Query Logging Bypass | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Maian Search 1.1 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Maian Search 1.1 - Insecure Cookie Handling. Author: S.W.A.T. |
Analyze the security implications of: Maian Search 1.1 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeBSD 3.3 - Seyon SetGID Dialer | This is a local exploit for freebsd platform. Description: FreeBSD 3.3 - Seyon SetGID Dialer. Author: Brock Tellier |
Analyze the security implications of: FreeBSD 3.3 - Seyon SetGID Dialer | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Ez Album - Blind SQL Injection | This is a webapps exploit for php platform. Description: Ez Album - Blind SQL Injection. Author: Red Security TEAM |
Analyze the security implications of: Ez Album - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Barracuda Web Firewall 660 Firmware 7.3.1.007 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Barracuda Web Firewall 660 Firmware 7.3.1.007 - Multiple Vulnerabilities. Author: Global-Evolution |
Analyze the security implications of: Barracuda Web Firewall 660 Firmware 7.3.1.007 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: snap - seccomp BBlacklist for TIOCSTI can be Circumvented | This is a dos exploit for linux platform. Description: snap - seccomp BBlacklist for TIOCSTI can be Circumvented. Author: Google Security Research |
Analyze the security implications of: snap - seccomp BBlacklist for TIOCSTI can be Circumvented | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link - Authentication Bypass. Author: LiquidWorm |
Analyze the security implications of: Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component com_vehiclemanager 1.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_vehiclemanager 1.0 - Remote File Inclusion. Author: Mehmet Ince |
Analyze the security implications of: Joomla! Component com_vehiclemanager 1.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SETI@home Clients - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: SETI@home Clients - Remote Buffer Overflow. Author: zillion |
Analyze the security implications of: SETI@home Clients - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: OpenSSH SCP Client - Write Arbitrary Files | This is a remote exploit for multiple platform. Description: OpenSSH SCP Client - Write Arbitrary Files. Author: Harry Sintonen |
Analyze the security implications of: OpenSSH SCP Client - Write Arbitrary Files | This exploit targets multiple systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.