input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Java - RMIConnectionImpl Deserialization Privilege Escalation (Metasploit) | This is a remote exploit for multiple platform. Description: Java - RMIConnectionImpl Deserialization Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Java - RMIConnectionImpl Deserialization Privilege Escalation (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: TelnetD encrypt_keyid - Function Pointer Overwrite | This is a remote exploit for linux platform. Description: TelnetD encrypt_keyid - Function Pointer Overwrite. Author: NighterMan & BatchDrake |
Analyze the security implications of: TelnetD encrypt_keyid - Function Pointer Overwrite | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Symantec Messaging Gateway 9.5.3-3 - Arbitrary File Download | This is a webapps exploit for linux platform. Description: Symantec Messaging Gateway 9.5.3-3 - Arbitrary File Download. Author: Ben Williams |
Analyze the security implications of: Symantec Messaging Gateway 9.5.3-3 - Arbitrary File Download | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: xNBD - '/tmp/xnbd.log' Insecure Temporary File Handling | This is a local exploit for linux platform. Description: xNBD - '/tmp/xnbd.log' Insecure Temporary File Handling. Author: Sebastian Pipping |
Analyze the security implications of: xNBD - '/tmp/xnbd.log' Insecure Temporary File Handling | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FuseTalk 4.0 - 'forum/include/common/comfinish.cfm?FTVAR_SCRIPTRUN' Cross-Site Scripting | This is a webapps exploit for cfm platform. Description: FuseTalk 4.0 - 'forum/include/common/comfinish.cfm?FTVAR_SCRIPTRUN' Cross-Site Scripting. Author: Ivan Almuina |
Analyze the security implications of: FuseTalk 4.0 - 'forum/include/common/comfinish.cfm?FTVAR_SCRIPTRUN' Cross-Site Scripting | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: Microsoft ASP.NET 1.x - URI Canonicalization Unauthorized Web Access | This is a webapps exploit for asp platform. Description: Microsoft ASP.NET 1.x - URI Canonicalization Unauthorized Web Access. Author: anonymous |
Analyze the security implications of: Microsoft ASP.NET 1.x - URI Canonicalization Unauthorized Web Access | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Wireshark - dissect_oml_attrs Static Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: Wireshark - dissect_oml_attrs Static Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: Wireshark - dissect_oml_attrs Static Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: 4Images 1.7 - 'details.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: 4Images 1.7 - 'details.php' Cross-Site Scripting. Author: Christian Marthen |
Analyze the security implications of: 4Images 1.7 - 'details.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Half-Life AdminMod 2.50 Plugin - Remote Format String | This is a remote exploit for linux platform. Description: Half-Life AdminMod 2.50 Plugin - Remote Format String. Author: greuff |
Analyze the security implications of: Half-Life AdminMod 2.50 Plugin - Remote Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Web Wiz Forum 6.34/7.x - 'search.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Web Wiz Forum 6.34/7.x - 'search.asp' SQL Injection. Author: almaster |
Analyze the security implications of: Web Wiz Forum 6.34/7.x - 'search.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Alstrasoft EPay Pro 2.0 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Alstrasoft EPay Pro 2.0 - Multiple Cross-Site Scripting Vulnerabilities. Author: Dcrab |
Analyze the security implications of: Alstrasoft EPay Pro 2.0 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash - Overflow in ID3 Tag Parsing | This is a dos exploit for multiple platform. Description: Adobe Flash - Overflow in ID3 Tag Parsing. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Overflow in ID3 Tag Parsing | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ZKTeco ZKBioSecurity 3.0 - Directory Traversal | This is a webapps exploit for jsp platform. Description: ZKTeco ZKBioSecurity 3.0 - Directory Traversal. Author: LiquidWorm |
Analyze the security implications of: ZKTeco ZKBioSecurity 3.0 - Directory Traversal | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Qualcomm qpopper 3.0 - 'LIST' Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Qualcomm qpopper 3.0 - 'LIST' Remote Buffer Overflow. Author: Zhodiac |
Analyze the security implications of: Qualcomm qpopper 3.0 - 'LIST' Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Symantec/Norton AntiVirus - ASPack Remote Heap/Pool Memory Corruption | This is a dos exploit for multiple platform. Description: Symantec/Norton AntiVirus - ASPack Remote Heap/Pool Memory Corruption. Author: Google Security Research |
Analyze the security implications of: Symantec/Norton AntiVirus - ASPack Remote Heap/Pool Memory Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Metabase 0.46.6 - Pre-Auth Remote Code Execution | This is a webapps exploit for linux platform. Description: Metabase 0.46.6 - Pre-Auth Remote Code Execution. Author: Musyoka Ian |
Analyze the security implications of: Metabase 0.46.6 - Pre-Auth Remote Code Execution | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BP Blog 6.0/7.0/8.0/9.0 - Remote Database Disclosure | This is a webapps exploit for asp platform. Description: BP Blog 6.0/7.0/8.0/9.0 - Remote Database Disclosure. Author: Dxil |
Analyze the security implications of: BP Blog 6.0/7.0/8.0/9.0 - Remote Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Buddy Zone 2.9.9 - SQL Injection | This is a webapps exploit for php platform. Description: Buddy Zone 2.9.9 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Buddy Zone 2.9.9 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PolarisCMS - 'WebForm_OnSubmit()' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: PolarisCMS - 'WebForm_OnSubmit()' Cross-Site Scripting. Author: Gjoko Krstic |
Analyze the security implications of: PolarisCMS - 'WebForm_OnSubmit()' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: BloofoxCMS - '/admin/index.php' Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: BloofoxCMS - '/admin/index.php' Cross-Site Request Forgery (Add Admin). Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: BloofoxCMS - '/admin/index.php' Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Complain Management System - Hard-Coded Credentials / Blind SQL injection | This is a webapps exploit for php platform. Description: Complain Management System - Hard-Coded Credentials / Blind SQL injection. Author: havysec |
Analyze the security implications of: Complain Management System - Hard-Coded Credentials / Blind SQL injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: VideoLAN VLC Media Player 0.8.6 (PPC) - 'udp://' Format String (PoC) | This is a dos exploit for osx platform. Description: VideoLAN VLC Media Player 0.8.6 (PPC) - 'udp://' Format String (PoC). Author: MoAB |
Analyze the security implications of: VideoLAN VLC Media Player 0.8.6 (PPC) - 'udp://' Format String (PoC) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: HaPe PKH 1.1 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: HaPe PKH 1.1 - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: HaPe PKH 1.1 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Easy-Clanpage 3.0b1 - 'section' Local File Inclusion | This is a webapps exploit for php platform. Description: Easy-Clanpage 3.0b1 - 'section' Local File Inclusion. Author: Loader007 |
Analyze the security implications of: Easy-Clanpage 3.0b1 - 'section' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Explore CMS 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Explore CMS 1.0 - SQL Injection. Author: Sajibe Kanti |
Analyze the security implications of: Explore CMS 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gary's Cookbook 3.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Gary's Cookbook 3.0 - 'id' SQL Injection. Author: S@BUN |
Analyze the security implications of: Gary's Cookbook 3.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebKit - Universal XSS Using Cached Pages | This is a dos exploit for multiple platform. Description: WebKit - Universal XSS Using Cached Pages. Author: Google Security Research |
Analyze the security implications of: WebKit - Universal XSS Using Cached Pages | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Aztech Modem Routers - Session Hijacking | This is a remote exploit for hardware platform. Description: Aztech Modem Routers - Session Hijacking. Author: Eric Fajardo |
Analyze the security implications of: Aztech Modem Routers - Session Hijacking | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apple Mac OSX 10.4.7 - fetchmail Privilege Escalation | This is a local exploit for osx platform. Description: Apple Mac OSX 10.4.7 - fetchmail Privilege Escalation. Author: Kevin Finisterre |
Analyze the security implications of: Apple Mac OSX 10.4.7 - fetchmail Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Joomla! Component com_hello - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_hello - SQL Injection. Author: the_cyber_nuxbie |
Analyze the security implications of: Joomla! Component com_hello - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Indexu 5.0/5.3 - 'search.php?keyword' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Indexu 5.0/5.3 - 'search.php?keyword' Cross-Site Scripting. Author: SwEET-DeViL |
Analyze the security implications of: Indexu 5.0/5.3 - 'search.php?keyword' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component CB Resume Builder - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component CB Resume Builder - SQL Injection. Author: kaMtiEz |
Analyze the security implications of: Joomla! Component CB Resume Builder - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Claroline 1.8.9 - 'exercise/exercise.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Claroline 1.8.9 - 'exercise/exercise.php' Cross-Site Scripting. Author: Digital Security Research Group |
Analyze the security implications of: Claroline 1.8.9 - 'exercise/exercise.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.4.23/2.6.0 - 'do_mremap()' Bound Checking Validator (2) | This is a local exploit for linux platform. Description: Linux Kernel 2.4.23/2.6.0 - 'do_mremap()' Bound Checking Validator (2). Author: Christophe Devine |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.