input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: RSA Authentication Manager 8.2.1.4.0-build1394922 / < 8.3 P1 - XML External Entity Injection / Cross-Site Flashing / DOM Cross-Site Scripting | This is a webapps exploit for java platform. Description: RSA Authentication Manager 8.2.1.4.0-build1394922 / < 8.3 P1 - XML External Entity Injection / Cross-Site Flashing / DOM Cross-Site Scripting. Author: SEC Consult |
Analyze the security implications of: RSA Authentication Manager 8.2.1.4.0-build1394922 / < 8.3 P1 - XML External Entity Injection / Cross-Site Flashing / DOM Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Mitrastar GPT-2541GNAC-N1 - Privilege escalation | This is a remote exploit for hardware platform. Description: Mitrastar GPT-2541GNAC-N1 - Privilege escalation. Author: Leonardo Nicolas Servalli |
Analyze the security implications of: Mitrastar GPT-2541GNAC-N1 - Privilege escalation | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ASPSiteWare RealtyListing 1.0/2.0 - SQL Injection | This is a webapps exploit for asp platform. Description: ASPSiteWare RealtyListing 1.0/2.0 - SQL Injection. Author: AlpHaNiX |
Analyze the security implications of: ASPSiteWare RealtyListing 1.0/2.0 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Fetch Softworks Fetch FTP Client 5.8 - Remote CPU Consumption (Denial of Service) | This is a local exploit for macos platform. Description: Fetch Softworks Fetch FTP Client 5.8 - Remote CPU Consumption (Denial of Service). Author: LiquidWorm |
Analyze the security implications of: Fetch Softworks Fetch FTP Client 5.8 - Remote CPU Consumption (Denial of Service) | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Agnitum Outpost Firewall 4.0 - Outpost_IPC_HDR Local Denial of Service | This is a dos exploit for multiple platform. Description: Agnitum Outpost Firewall 4.0 - Outpost_IPC_HDR Local Denial of Service. Author: Matousec Transparent security |
Analyze the security implications of: Agnitum Outpost Firewall 4.0 - Outpost_IPC_HDR Local Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_jr_tfb - 'Controller' Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_jr_tfb - 'Controller' Local File Inclusion. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_jr_tfb - 'Controller' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Claydip Airbnb Clone 1.0 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Claydip Airbnb Clone 1.0 - Arbitrary File Upload. Author: Ihsan Sencan |
Analyze the security implications of: Claydip Airbnb Clone 1.0 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eFront 3.6.10 (build 11944) - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: eFront 3.6.10 (build 11944) - Multiple Vulnerabilities. Author: EgiX |
Analyze the security implications of: eFront 3.6.10 (build 11944) - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: INCOGEN Bugport 1.x - Multiple SQL Injections | This is a webapps exploit for php platform. Description: INCOGEN Bugport 1.x - Multiple SQL Injections. Author: r0t |
Analyze the security implications of: INCOGEN Bugport 1.x - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple WebKit 10.0.2 - 'FrameLoader::clear' Universal Cross-Site Scripting | This is a webapps exploit for macos platform. Description: Apple WebKit 10.0.2 - 'FrameLoader::clear' Universal Cross-Site Scripting. Author: Google Security Research |
Analyze the security implications of: Apple WebKit 10.0.2 - 'FrameLoader::clear' Universal Cross-Site Scripting | This exploit targets macos systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: iziContents rc6 - Local/Remote File Inclusion | This is a webapps exploit for php platform. Description: iziContents rc6 - Local/Remote File Inclusion. Author: irk4z |
Analyze the security implications of: iziContents rc6 - Local/Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Huru Helpdesk - SQL Injection (1) | This is a webapps exploit for php platform. Description: Joomla! Component Huru Helpdesk - SQL Injection (1). Author: bumble_be |
Analyze the security implications of: Joomla! Component Huru Helpdesk - SQL Injection (1) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HRSALE The Ultimate HRM 1.0.2 - 'award_id' SQL Injection | This is a webapps exploit for php platform. Description: HRSALE The Ultimate HRM 1.0.2 - 'award_id' SQL Injection. Author: 8bitsec |
Analyze the security implications of: HRSALE The Ultimate HRM 1.0.2 - 'award_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PeerCast 0.1216 (Linux) - URL Handling Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: PeerCast 0.1216 (Linux) - URL Handling Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: PeerCast 0.1216 (Linux) - URL Handling Buffer Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: OpenLDAP 2.4.x - 'modrdn' NULL OldDN Remote Denial of Service | This is a dos exploit for linux platform. Description: OpenLDAP 2.4.x - 'modrdn' NULL OldDN Remote Denial of Service. Author: Serge Dubrouski |
Analyze the security implications of: OpenLDAP 2.4.x - 'modrdn' NULL OldDN Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ATCOM PBX IP01 / IP08 / IP4 / IP2G4A - Authentication Bypass | This is a webapps exploit for hardware platform. Description: ATCOM PBX IP01 / IP08 / IP4 / IP2G4A - Authentication Bypass. Author: i-Hmx |
Analyze the security implications of: ATCOM PBX IP01 / IP08 / IP4 / IP2G4A - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Roger Wilco Server 1.4.1 - UDP Datagram Handling Denial of Service | This is a dos exploit for multiple platform. Description: Roger Wilco Server 1.4.1 - UDP Datagram Handling Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Roger Wilco Server 1.4.1 - UDP Datagram Handling Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Magic Photo Storage Website - '/admin/approve_member.php?_config[site_path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/admin/approve_member.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina |
Analyze the security implications of: Magic Photo Storage Website - '/admin/approve_member.php?_config[site_path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Stanley T. Shebs Xconq 7.2.2 - xconq Buffer Overflow | This is a local exploit for linux platform. Description: Stanley T. Shebs Xconq 7.2.2 - xconq Buffer Overflow. Author: V9 |
Analyze the security implications of: Stanley T. Shebs Xconq 7.2.2 - xconq Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache OFBiz 16.11.05 - Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Apache OFBiz 16.11.05 - Cross-Site Scripting. Author: DKM |
Analyze the security implications of: Apache OFBiz 16.11.05 - Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ManageEngine Desktop Central 9 - FileUploadServlet ConnectionId (Metasploit) | This is a remote exploit for jsp platform. Description: ManageEngine Desktop Central 9 - FileUploadServlet ConnectionId (Metasploit). Author: Metasploit |
Analyze the security implications of: ManageEngine Desktop Central 9 - FileUploadServlet ConnectionId (Metasploit) | This exploit targets jsp systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Magic Photo Storage Website - '/admin/index.php?_config[site_path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/admin/index.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina |
Analyze the security implications of: Magic Photo Storage Website - '/admin/index.php?_config[site_path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Power System Of Article Management 3.0 - File Disclosure / Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Power System Of Article Management 3.0 - File Disclosure / Cross-Site Scripting. Author: Pouya_Server |
Analyze the security implications of: Power System Of Article Management 3.0 - File Disclosure / Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Allomani E-Store 1.0 - Cross-Site Request Forgery (Add Admin) (1) | This is a webapps exploit for php platform. Description: Allomani E-Store 1.0 - Cross-Site Request Forgery (Add Admin) (1). Author: G0D-F4Th3r |
Analyze the security implications of: Allomani E-Store 1.0 - Cross-Site Request Forgery (Add Admin) (1) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ManageEngine OpManager / Social IT - Arbitrary File Upload (Metasploit) | This is a remote exploit for java platform. Description: ManageEngine OpManager / Social IT - Arbitrary File Upload (Metasploit). Author: Pedro Ribeiro |
Analyze the security implications of: ManageEngine OpManager / Social IT - Arbitrary File Upload (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Enthrallweb emates 1.0 - 'newsdetail.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Enthrallweb emates 1.0 - 'newsdetail.asp' SQL Injection. Author: ajann |
Analyze the security implications of: Enthrallweb emates 1.0 - 'newsdetail.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Click&BaneX - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Click&BaneX - Multiple SQL Injections. Author: AlpHaNiX |
Analyze the security implications of: Click&BaneX - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: GNUTurk - 'Mods.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: GNUTurk - 'Mods.php' Cross-Site Scripting. Author: vagrant |
Analyze the security implications of: GNUTurk - 'Mods.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FS Crowdfunding Script 1.0 - 'latest_news_details.php?id' SQL Injection | This is a webapps exploit for php platform. Description: FS Crowdfunding Script 1.0 - 'latest_news_details.php?id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: FS Crowdfunding Script 1.0 - 'latest_news_details.php?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP OpenView Network Node Manager (OV NNM) - 'Snmp.exe' CGI Buffer Overflow (Metasploit) | This is a remote exploit for cgi platform. Description: HP OpenView Network Node Manager (OV NNM) - 'Snmp.exe' CGI Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: HP OpenView Network Node Manager (OV NNM) - 'Snmp.exe' CGI Buffer Overflow (Metasploit) | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Ekushey Project Manager CRM 3.1 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Ekushey Project Manager CRM 3.1 - Cross-Site Scripting. Author: Ismail Tasdelen |
Analyze the security implications of: Ekushey Project Manager CRM 3.1 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dolibarr 12.0.3 - SQLi to RCE | This is a webapps exploit for php platform. Description: Dolibarr 12.0.3 - SQLi to RCE. Author: coiffeur |
Analyze the security implications of: Dolibarr 12.0.3 - SQLi to RCE | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lunar CMS 3.3 - Cross-Site Request Forgery / Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Lunar CMS 3.3 - Cross-Site Request Forgery / Persistent Cross-Site Scripting. Author: LiquidWorm |
Analyze the security implications of: Lunar CMS 3.3 - Cross-Site Request Forgery / Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DynamicPAD 1.02.18 - 'HomeDir' Remote File Inclusion | This is a webapps exploit for php platform. Description: DynamicPAD 1.02.18 - 'HomeDir' Remote File Inclusion. Author: ThE TiGeR |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.