input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Alcatel-Lucent OmniSwitch - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Alcatel-Lucent OmniSwitch - Cross-Site Request Forgery. Author: RedTeam Pentesting |
Analyze the security implications of: Alcatel-Lucent OmniSwitch - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Xen 64bit PV Guest - pagetable use-after-type-change Breakout | This is a local exploit for linux platform. Description: Xen 64bit PV Guest - pagetable use-after-type-change Breakout. Author: Google Security Research |
Analyze the security implications of: Xen 64bit PV Guest - pagetable use-after-type-change Breakout | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Intermec PM43 Industrial Printer - Local Privilege Escalation | This is a local exploit for hardware platform. Description: Intermec PM43 Industrial Printer - Local Privilege Escalation. Author: Jean-Marie Bourbon |
Analyze the security implications of: Intermec PM43 Industrial Printer - Local Privilege Escalation | This exploit targets hardware systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: HP Laser Jet - JavaScript Persistent Cross-Site Scripting via PJL Directory Traversal | This is a webapps exploit for hardware platform. Description: HP Laser Jet - JavaScript Persistent Cross-Site Scripting via PJL Directory Traversal. Author: @0x00string |
Analyze the security implications of: HP Laser Jet - JavaScript Persistent Cross-Site Scripting via PJL Directory Traversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Distributed Ruby - send syscall (Metasploit) | This is a remote exploit for linux platform. Description: Distributed Ruby - send syscall (Metasploit). Author: Metasploit |
Analyze the security implications of: Distributed Ruby - send syscall (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CuteNews 0.88/1.3.x - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CuteNews 0.88/1.3.x - 'index.php' Cross-Site Scripting. Author: Exoduks |
Analyze the security implications of: CuteNews 0.88/1.3.x - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kemana Directory 1.5.6 - kemana_admin_passwd Cookie User Password Hash Disclosure | This is a webapps exploit for php platform. Description: Kemana Directory 1.5.6 - kemana_admin_passwd Cookie User Password Hash Disclosure. Author: LiquidWorm |
Analyze the security implications of: Kemana Directory 1.5.6 - kemana_admin_passwd Cookie User Password Hash Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WhoDomLite 1.1.3 - 'wholite.cgi' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: WhoDomLite 1.1.3 - 'wholite.cgi' Cross-Site Scripting. Author: Ghost Hacker |
Analyze the security implications of: WhoDomLite 1.1.3 - 'wholite.cgi' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Humhub 0.10.0-rc.1 - SQL Injection | This is a webapps exploit for php platform. Description: Humhub 0.10.0-rc.1 - SQL Injection. Author: Jos Wetzels_ Emiel Florijn |
Analyze the security implications of: Humhub 0.10.0-rc.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ManageEngine Application Manager 10 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: ManageEngine Application Manager 10 - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: ManageEngine Application Manager 10 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Mamboleto 2.0 RC3 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Mamboleto 2.0 RC3 - Remote File Inclusion. Author: Don Tukulesto |
Analyze the security implications of: Joomla! Component Mamboleto 2.0 RC3 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Galmeta Post 0.2 - 'Upload_Config.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Galmeta Post 0.2 - 'Upload_Config.php' Remote File Inclusion. Author: arfis project |
Analyze the security implications of: Galmeta Post 0.2 - 'Upload_Config.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel < 4.17-rc1 - 'AF_LLC' Double Free | This is a dos exploit for linux platform. Description: Linux Kernel < 4.17-rc1 - 'AF_LLC' Double Free. Author: SecuriTeam |
Analyze the security implications of: Linux Kernel < 4.17-rc1 - 'AF_LLC' Double Free | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_bca-rss-syndicator - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_bca-rss-syndicator - Local File Inclusion. Author: Vrs-hCk |
Analyze the security implications of: Joomla! Component com_bca-rss-syndicator - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FotoWeb 6.0 - 'Grid.fwx?search' Cross-Site Scripting | This is a webapps exploit for php platform. Description: FotoWeb 6.0 - 'Grid.fwx?search' Cross-Site Scripting. Author: Stelios Tigkas |
Analyze the security implications of: FotoWeb 6.0 - 'Grid.fwx?search' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lyrics Script - 'search_results.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Lyrics Script - 'search_results.php' Cross-Site Scripting. Author: Ghost Hacker |
Analyze the security implications of: Lyrics Script - 'search_results.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CakePHP 1.3.5/1.2.8 - Cache Corruption (Metasploit) | This is a webapps exploit for php platform. Description: CakePHP 1.3.5/1.2.8 - Cache Corruption (Metasploit). Author: Metasploit |
Analyze the security implications of: CakePHP 1.3.5/1.2.8 - Cache Corruption (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Batavi - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Batavi - 'index.php' Cross-Site Scripting. Author: Dognaedis |
Analyze the security implications of: Batavi - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IPSwitch MOVEit 8.1 < 9.4 - Cross-Site Scripting | This is a webapps exploit for aspx platform. Description: IPSwitch MOVEit 8.1 < 9.4 - Cross-Site Scripting. Author: 1n3 |
Analyze the security implications of: IPSwitch MOVEit 8.1 < 9.4 - Cross-Site Scripting | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Sudo 1.8.20 - 'get_process_ttyname()' Local Privilege Escalation | This is a local exploit for linux platform. Description: Sudo 1.8.20 - 'get_process_ttyname()' Local Privilege Escalation. Author: Qualys Corporation |
Analyze the security implications of: Sudo 1.8.20 - 'get_process_ttyname()' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: iScripts easybiller 1.1 - SQL Injection | This is a webapps exploit for php platform. Description: iScripts easybiller 1.1 - SQL Injection. Author: Sid3^effects |
Analyze the security implications of: iScripts easybiller 1.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 3.13.1 - 'Recvmmsg' Local Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: Linux Kernel 3.13.1 - 'Recvmmsg' Local Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Linux Kernel 3.13.1 - 'Recvmmsg' Local Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: MySQL 5.1.13 - INFORMATION_SCHEMA Remote Denial of Service | This is a dos exploit for linux platform. Description: MySQL 5.1.13 - INFORMATION_SCHEMA Remote Denial of Service. Author: Masaaki HIROSE |
Analyze the security implications of: MySQL 5.1.13 - INFORMATION_SCHEMA Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Supra Smart Cloud TV - 'openLiveURL()' Remote File Inclusion | This is a webapps exploit for hardware platform. Description: Supra Smart Cloud TV - 'openLiveURL()' Remote File Inclusion. Author: Dhiraj Mishra |
Analyze the security implications of: Supra Smart Cloud TV - 'openLiveURL()' Remote File Inclusion | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ArabCMS - 'rss.php' Local File Inclusion | This is a webapps exploit for php platform. Description: ArabCMS - 'rss.php' Local File Inclusion. Author: JIKO |
Analyze the security implications of: ArabCMS - 'rss.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Clipbucket 2.6 - 'videos.php?time' SQL Injection | This is a webapps exploit for php platform. Description: Clipbucket 2.6 - 'videos.php?time' SQL Injection. Author: YaDoY666 |
Analyze the security implications of: Clipbucket 2.6 - 'videos.php?time' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FD Script 1.3.x - 'FName' Information Disclosure | This is a webapps exploit for php platform. Description: FD Script 1.3.x - 'FName' Information Disclosure. Author: ajann |
Analyze the security implications of: FD Script 1.3.x - 'FName' Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BloofoxCMS - 'index.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: BloofoxCMS - 'index.php' Arbitrary File Upload. Author: CWH Underground |
Analyze the security implications of: BloofoxCMS - 'index.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeBSD 3.3 - 'gdc' Local Buffer Overflow | This is a local exploit for freebsd platform. Description: FreeBSD 3.3 - 'gdc' Local Buffer Overflow. Author: Brock Tellier |
Analyze the security implications of: FreeBSD 3.3 - 'gdc' Local Buffer Overflow | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Katalog Stron Hurricane 1.3.5 - Remote File Inclusion / SQL Injection | This is a webapps exploit for php platform. Description: Katalog Stron Hurricane 1.3.5 - Remote File Inclusion / SQL Injection. Author: kaMtiEz |
Analyze the security implications of: Katalog Stron Hurricane 1.3.5 - Remote File Inclusion / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: pdfium - opj_t2_read_packet_header 'libopenjpeg' Heap Use-After-Free | This is a dos exploit for multiple platform. Description: pdfium - opj_t2_read_packet_header 'libopenjpeg' Heap Use-After-Free. Author: Google Security Research |
Analyze the security implications of: pdfium - opj_t2_read_packet_header 'libopenjpeg' Heap Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CMS Made Simple 1.0.2 - 'SearchInput' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CMS Made Simple 1.0.2 - 'SearchInput' Cross-Site Scripting. Author: Nicokiller |
Analyze the security implications of: CMS Made Simple 1.0.2 - 'SearchInput' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BigACE 1.8.2 - 'download.cmd.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: BigACE 1.8.2 - 'download.cmd.php' Remote File Inclusion. Author: Vampire |
Analyze the security implications of: BigACE 1.8.2 - 'download.cmd.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KDE Konqueror 4.1 - Multiple Cross-Site Scripting / Denial of Service Vulnerabilities | This is a dos exploit for linux platform. Description: KDE Konqueror 4.1 - Multiple Cross-Site Scripting / Denial of Service Vulnerabilities. Author: athos |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.