input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: KDE Konqueror 4.1 - Multiple Cross-Site Scripting / Denial of Service Vulnerabilities | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ShopCartCGI 2.3 - genindexpage.cgi Traversal Arbitrary File Access | This is a webapps exploit for cgi platform. Description: ShopCartCGI 2.3 - genindexpage.cgi Traversal Arbitrary File Access. Author: G00db0y |
Analyze the security implications of: ShopCartCGI 2.3 - genindexpage.cgi Traversal Arbitrary File Access | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Linux Kernel 2.2.12/2.2.14/2.3.99 (RedHat 6.x) - Socket Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.2.12/2.2.14/2.3.99 (RedHat 6.x) - Socket Denial of Service. Author: Jay Fenlason |
Analyze the security implications of: Linux Kernel 2.2.12/2.2.14/2.3.99 (RedHat 6.x) - Socket Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Man Program 1.5 - Unsafe Return Value Command Execution | This is a local exploit for linux platform. Description: Man Program 1.5 - Unsafe Return Value Command Execution. Author: Jack Lloyd |
Analyze the security implications of: Man Program 1.5 - Unsafe Return Value Command Execution | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Java - 'Statement.invoke()' Trusted Method Chain (Metasploit) | This is a remote exploit for multiple platform. Description: Java - 'Statement.invoke()' Trusted Method Chain (Metasploit). Author: Metasploit |
Analyze the security implications of: Java - 'Statement.invoke()' Trusted Method Chain (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GlobalNoteScript 4.20 - 'Read.cgi' Remote Command Execution | This is a webapps exploit for cgi platform. Description: GlobalNoteScript 4.20 - 'Read.cgi' Remote Command Execution. Author: AcidCrash |
Analyze the security implications of: GlobalNoteScript 4.20 - 'Read.cgi' Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Apple Mac OSX 10.3.8 - 'CF_CHARSET_PATH' Local Buffer Overflow / Local Privilege Escalation | This is a local exploit for osx platform. Description: Apple Mac OSX 10.3.8 - 'CF_CHARSET_PATH' Local Buffer Overflow / Local Privilege Escalation. Author: vade79 |
Analyze the security implications of: Apple Mac OSX 10.3.8 - 'CF_CHARSET_PATH' Local Buffer Overflow / Local Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Lynx 2.8.x - Command Line URL CRLF Injection | This is a remote exploit for linux platform. Description: Lynx 2.8.x - Command Line URL CRLF Injection. Author: Ulf Harnhammar |
Analyze the security implications of: Lynx 2.8.x - Command Line URL CRLF Injection | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CyberArk PSMP 10.9.1 - Policy Restriction Bypass | This is a remote exploit for multiple platform. Description: CyberArk PSMP 10.9.1 - Policy Restriction Bypass. Author: LAHBAL Said |
Analyze the security implications of: CyberArk PSMP 10.9.1 - Policy Restriction Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BigBlueButton 2.2.25 - Arbitrary File Disclosure and Server-Side Request Forgery | This is a webapps exploit for multiple platform. Description: BigBlueButton 2.2.25 - Arbitrary File Disclosure and Server-Side Request Forgery. Author: RedTeam Pentesting GmbH |
Analyze the security implications of: BigBlueButton 2.2.25 - Arbitrary File Disclosure and Server-Side Request Forgery | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Legrand BTicino Driver Manager F454 1.0.51 - Cross-Site Request Forgery / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Legrand BTicino Driver Manager F454 1.0.51 - Cross-Site Request Forgery / Cross-Site Scripting. Author: LiquidWorm |
Analyze the security implications of: Legrand BTicino Driver Manager F454 1.0.51 - Cross-Site Request Forgery / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SQL-Ledger 2.8.33 - (Authenticated) Local File Inclusion / Edit | This is a webapps exploit for multiple platform. Description: SQL-Ledger 2.8.33 - (Authenticated) Local File Inclusion / Edit. Author: bitform |
Analyze the security implications of: SQL-Ledger 2.8.33 - (Authenticated) Local File Inclusion / Edit | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Hacks List phpBB Mod 1.21 - SQL Injection | This is a webapps exploit for php platform. Description: Hacks List phpBB Mod 1.21 - SQL Injection. Author: the master |
Analyze the security implications of: Hacks List phpBB Mod 1.21 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gr8 Multiple Search Engine Script 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Gr8 Multiple Search Engine Script 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Gr8 Multiple Search Engine Script 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sun Java System Delegated Administrator 6.x - HTTP Response Splitting | This is a webapps exploit for java platform. Description: Sun Java System Delegated Administrator 6.x - HTTP Response Splitting. Author: SCS team |
Analyze the security implications of: Sun Java System Delegated Administrator 6.x - HTTP Response Splitting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: JAMM CMS - 'id' Blind SQL Injection | This is a webapps exploit for php platform. Description: JAMM CMS - 'id' Blind SQL Injection. Author: anonymous |
Analyze the security implications of: JAMM CMS - 'id' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EZ Webitor - Authentication Bypass | This is a webapps exploit for php platform. Description: EZ Webitor - Authentication Bypass. Author: snakespc |
Analyze the security implications of: EZ Webitor - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 427BB 2.2 - 'showthread.php' SQL Injection | This is a webapps exploit for php platform. Description: 427BB 2.2 - 'showthread.php' SQL Injection. Author: Aliaksandr Hartsuyeu |
Analyze the security implications of: 427BB 2.2 - 'showthread.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Slackware Linux 3.1/3.2 - 'color_xterm' Local Buffer Overflow (2) | This is a local exploit for linux platform. Description: Slackware Linux 3.1/3.2 - 'color_xterm' Local Buffer Overflow (2). Author: Solar Designer |
Analyze the security implications of: Slackware Linux 3.1/3.2 - 'color_xterm' Local Buffer Overflow (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CentOS Web Panel 0.9.8.12 - 'row_id' / 'domain' SQL Injection | This is a webapps exploit for php platform. Description: CentOS Web Panel 0.9.8.12 - 'row_id' / 'domain' SQL Injection. Author: Vulnerability-Lab |
Analyze the security implications of: CentOS Web Panel 0.9.8.12 - 'row_id' / 'domain' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Magic Photo Storage Website - '/user/logout.php?_config[site_path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/user/logout.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina |
Analyze the security implications of: Magic Photo Storage Website - '/user/logout.php?_config[site_path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Log1 CMS - 'writeInfo()' PHP Code Injection (Metasploit) | This is a webapps exploit for php platform. Description: Log1 CMS - 'writeInfo()' PHP Code Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Log1 CMS - 'writeInfo()' PHP Code Injection (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TestDisk 6.14 - 'Check_OS2MB' Stack Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: TestDisk 6.14 - 'Check_OS2MB' Stack Buffer Overflow (PoC). Author: Security-Assessment.com |
Analyze the security implications of: TestDisk 6.14 - 'Check_OS2MB' Stack Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Google Chrome 70 - SQLite Magellan Crash (PoC) | This is a dos exploit for multiple platform. Description: Google Chrome 70 - SQLite Magellan Crash (PoC). Author: zhuowei |
Analyze the security implications of: Google Chrome 70 - SQLite Magellan Crash (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: MAARCH 1.4 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: MAARCH 1.4 - Arbitrary File Upload. Author: Adrien Thierry |
Analyze the security implications of: MAARCH 1.4 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sun Java Runtime Environment 1.x Java Plugin - JavaScript Security Restriction Bypass | This is a dos exploit for multiple platform. Description: Sun Java Runtime Environment 1.x Java Plugin - JavaScript Security Restriction Bypass. Author: Jouko Pynnonen |
Analyze the security implications of: Sun Java Runtime Environment 1.x Java Plugin - JavaScript Security Restriction Bypass | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: HelpCenter Live! 1.0/1.2.x - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: HelpCenter Live! 1.0/1.2.x - Multiple Input Validation Vulnerabilities. Author: GulfTech Security |
Analyze the security implications of: HelpCenter Live! 1.0/1.2.x - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LibreHealth 2.0.0 - (Authenticated) Arbitrary File Actions | This is a webapps exploit for php platform. Description: LibreHealth 2.0.0 - (Authenticated) Arbitrary File Actions. Author: Carlos Avila |
Analyze the security implications of: LibreHealth 2.0.0 - (Authenticated) Arbitrary File Actions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Drupal Module Cumulus 5.x-1.1/6.x-1.4 - 'tagcloud' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Drupal Module Cumulus 5.x-1.1/6.x-1.4 - 'tagcloud' Cross-Site Scripting. Author: MustLive |
Analyze the security implications of: Drupal Module Cumulus 5.x-1.1/6.x-1.4 - 'tagcloud' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sahi pro 8.x - SQL Injection | This is a webapps exploit for multiple platform. Description: Sahi pro 8.x - SQL Injection. Author: Goutham Madhwaraj |
Analyze the security implications of: Sahi pro 8.x - SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: sendtemp.pl - Read Access to Files | This is a webapps exploit for cgi platform. Description: sendtemp.pl - Read Access to Files. Author: Tom Parker |
Analyze the security implications of: sendtemp.pl - Read Access to Files | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Harlandscripts Pro Traffic One - 'mypage.php' SQL Injection | This is a webapps exploit for php platform. Description: Harlandscripts Pro Traffic One - 'mypage.php' SQL Injection. Author: Beenu Arora |
Analyze the security implications of: Harlandscripts Pro Traffic One - 'mypage.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Made Simple 2.2.5 - (Authenticated) Remote Code Execution | This is a webapps exploit for php platform. Description: CMS Made Simple 2.2.5 - (Authenticated) Remote Code Execution. Author: Mustafa Hasan |
Analyze the security implications of: CMS Made Simple 2.2.5 - (Authenticated) Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GeekLog 2.x - 'ImageImageMagick.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: GeekLog 2.x - 'ImageImageMagick.php' Remote File Inclusion. Author: diesl0w |
Analyze the security implications of: GeekLog 2.x - 'ImageImageMagick.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.