input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Zyxel_ EMG2926 < V1.00(AAQT.4)b8 - OS Command Injection | This is a webapps exploit for hardware platform. Description: Zyxel_ EMG2926 < V1.00(AAQT.4)b8 - OS Command Injection. Author: trevor Hough |
Analyze the security implications of: Zyxel_ EMG2926 < V1.00(AAQT.4)b8 - OS Command Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: iphone/ipad phone drive 1.1.1 - Directory Traversal | This is a remote exploit for hardware platform. Description: iphone/ipad phone drive 1.1.1 - Directory Traversal. Author: Khashayar Fereidani |
Analyze the security implications of: iphone/ipad phone drive 1.1.1 - Directory Traversal | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: IBM AIX 6.1/7.1/7.2 - 'Bellmail' Local Privilege Escalation | This is a local exploit for aix platform. Description: IBM AIX 6.1/7.1/7.2 - 'Bellmail' Local Privilege Escalation. Author: Hector X. Monsegur |
Analyze the security implications of: IBM AIX 6.1/7.1/7.2 - 'Bellmail' Local Privilege Escalation | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: IBM Security Verify Access 10.0.0 - Open Redirect during OAuth Flow | This is a webapps exploit for multiple platform. Description: IBM Security Verify Access 10.0.0 - Open Redirect during OAuth Flow. Author: Giulio Garzia |
Analyze the security implications of: IBM Security Verify Access 10.0.0 - Open Redirect during OAuth Flow | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: KeepNote 0.7.8 - Command Execution | This is a local exploit for multiple platform. Description: KeepNote 0.7.8 - Command Execution. Author: R-73eN |
Analyze the security implications of: KeepNote 0.7.8 - Command Execution | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Nethack 3 - Local Buffer Overflow (2) | This is a local exploit for linux platform. Description: Nethack 3 - Local Buffer Overflow (2). Author: bob@dtors.net |
Analyze the security implications of: Nethack 3 - Local Buffer Overflow (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: NEC Univerge SV9100/SV8100 WebPro 10.0 - Configuration Download | This is a webapps exploit for multiple platform. Description: NEC Univerge SV9100/SV8100 WebPro 10.0 - Configuration Download. Author: LiquidWorm |
Analyze the security implications of: NEC Univerge SV9100/SV8100 WebPro 10.0 - Configuration Download | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Fuzzylime Forum 1.0 - 'low.php?topic' SQL Injection | This is a webapps exploit for php platform. Description: Fuzzylime Forum 1.0 - 'low.php?topic' SQL Injection. Author: Silentz |
Analyze the security implications of: Fuzzylime Forum 1.0 - 'low.php?topic' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wavlink WN533A8 - Password Disclosure | This is a webapps exploit for hardware platform. Description: Wavlink WN533A8 - Password Disclosure. Author: Ahmed Alroky |
Analyze the security implications of: Wavlink WN533A8 - Password Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apache Httpd mod_proxy - Error Page Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Apache Httpd mod_proxy - Error Page Cross-Site Scripting. Author: Sebastian Neef |
Analyze the security implications of: Apache Httpd mod_proxy - Error Page Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Oracle HTTP Server - Cross-Site Scripting Header Injection | This is a webapps exploit for multiple platform. Description: Oracle HTTP Server - Cross-Site Scripting Header Injection. Author: Yasser ABOUKIR |
Analyze the security implications of: Oracle HTTP Server - Cross-Site Scripting Header Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Real-time ASP Calendar - SQL Injection | This is a webapps exploit for asp platform. Description: Real-time ASP Calendar - SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: Real-time ASP Calendar - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: CMS Made Simple 2.2.15 - RCE (Authenticated) | This is a webapps exploit for php platform. Description: CMS Made Simple 2.2.15 - RCE (Authenticated). Author: Andrey Stoykov |
Analyze the security implications of: CMS Made Simple 2.2.15 - RCE (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DIR-615 Wireless Router - Persistent Cross Site Scripting | This is a remote exploit for hardware platform. Description: D-Link DIR-615 Wireless Router - Persistent Cross Site Scripting. Author: Sayan Chatterjee |
Analyze the security implications of: D-Link DIR-615 Wireless Router - Persistent Cross Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Siemens SIPROTEC 4 and SIPROTEC Compact EN100 Ethernet Module < 4.25 - Denial of Service | This is a dos exploit for hardware platform. Description: Siemens SIPROTEC 4 and SIPROTEC Compact EN100 Ethernet Module < 4.25 - Denial of Service. Author: M. Can Kurnaz |
Analyze the security implications of: Siemens SIPROTEC 4 and SIPROTEC Compact EN100 Ethernet Module < 4.25 - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BugTracker.NET 3.4.4 - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: BugTracker.NET 3.4.4 - Multiple Vulnerabilities. Author: Core Security |
Analyze the security implications of: BugTracker.NET 3.4.4 - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Free File Hosting System 1.1 - 'login.php?AD_BODY_TEMP' Remote File Inclusion | This is a webapps exploit for php platform. Description: Free File Hosting System 1.1 - 'login.php?AD_BODY_TEMP' Remote File Inclusion. Author: IbnuSina |
Analyze the security implications of: Free File Hosting System 1.1 - 'login.php?AD_BODY_TEMP' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Community 5.0.6 - Remote Code Execution (RCE) | This is a remote exploit for multiple platform. Description: Invision Community 5.0.6 - Remote Code Execution (RCE). Author: Egidio Romano |
Analyze the security implications of: Invision Community 5.0.6 - Remote Code Execution (RCE) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Opera Web Browser 11.11 - Denial of Service | This is a dos exploit for multiple platform. Description: Opera Web Browser 11.11 - Denial of Service. Author: echo |
Analyze the security implications of: Opera Web Browser 11.11 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ezylog Photovoltaic Management Server - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Ezylog Photovoltaic Management Server - Multiple Vulnerabilities. Author: Roberto Paleari |
Analyze the security implications of: Ezylog Photovoltaic Management Server - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hunk Companion Plugin 1.9.0 - Unauthenticated Plugin Installation | This is a webapps exploit for multiple platform. Description: Hunk Companion Plugin 1.9.0 - Unauthenticated Plugin Installation. Author: Jun Takemura |
Analyze the security implications of: Hunk Companion Plugin 1.9.0 - Unauthenticated Plugin Installation | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BigDump 0.29b and 0.32b - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: BigDump 0.29b and 0.32b - Multiple Vulnerabilities. Author: Ur0b0r0x |
Analyze the security implications of: BigDump 0.29b and 0.32b - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JSupport 1.5.6 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JSupport 1.5.6 - SQL Injection. Author: Valentin |
Analyze the security implications of: Joomla! Component JSupport 1.5.6 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Python - Untrusted Search Path/Code Execution | This is a local exploit for linux platform. Description: Python - Untrusted Search Path/Code Execution. Author: rogueclown |
Analyze the security implications of: Python - Untrusted Search Path/Code Execution | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PHP 5.0.0 - 'snmpwalk()' Local Denial of Service | This is a dos exploit for php platform. Description: PHP 5.0.0 - 'snmpwalk()' Local Denial of Service. Author: Yakir Wizman |
Analyze the security implications of: PHP 5.0.0 - 'snmpwalk()' Local Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Huawei Home Gateway UPnP/1.0 IGD/1.00 - Password Change | This is a webapps exploit for hardware platform. Description: Huawei Home Gateway UPnP/1.0 IGD/1.00 - Password Change. Author: Fady Mohammed Osman |
Analyze the security implications of: Huawei Home Gateway UPnP/1.0 IGD/1.00 - Password Change | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Ay System CMS 2.6 - 'main.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Ay System CMS 2.6 - 'main.php' Remote File Inclusion. Author: SHiKaA |
Analyze the security implications of: Ay System CMS 2.6 - 'main.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenVAS Manager 4.0 - Authentication Bypass | This is a remote exploit for linux platform. Description: OpenVAS Manager 4.0 - Authentication Bypass. Author: EccE |
Analyze the security implications of: OpenVAS Manager 4.0 - Authentication Bypass | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Asn Guestbook 1.5 - 'footer.php?version' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Asn Guestbook 1.5 - 'footer.php?version' Cross-Site Scripting. Author: rgod |
Analyze the security implications of: Asn Guestbook 1.5 - 'footer.php?version' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Discuz! 6.0 - 'uid' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Discuz! 6.0 - 'uid' Cross-Site Scripting. Author: lis cker |
Analyze the security implications of: Discuz! 6.0 - 'uid' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Android - getpidcon() Usage in Hardware binder ServiceManager Permits ACL Bypass | This is a dos exploit for android platform. Description: Android - getpidcon() Usage in Hardware binder ServiceManager Permits ACL Bypass. Author: Google Security Research |
Analyze the security implications of: Android - getpidcon() Usage in Hardware binder ServiceManager Permits ACL Bypass | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: CMSsite 1.0 - 'search' SQL Injection | This is a webapps exploit for php platform. Description: CMSsite 1.0 - 'search' SQL Injection. Author: Majid kalantari |
Analyze the security implications of: CMSsite 1.0 - 'search' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: d.net CMS - Local File Inclusion / SQL Injection | This is a webapps exploit for php platform. Description: d.net CMS - Local File Inclusion / SQL Injection. Author: SirGod |
Analyze the security implications of: d.net CMS - Local File Inclusion / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: a-ConMan 3.2b - 'common.inc.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: a-ConMan 3.2b - 'common.inc.php' Remote File Inclusion. Author: Matdhule |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.