input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Barracuda Networks Spam & Virus Firewall 4.1.1.021 - Remote Configuration Retrieval | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: cPanel 10.8.x - cpwrap via MySQLAdmin Privilege Escalation | This is a local exploit for linux platform. Description: cPanel 10.8.x - cpwrap via MySQLAdmin Privilege Escalation. Author: Clint Torrez |
Analyze the security implications of: cPanel 10.8.x - cpwrap via MySQLAdmin Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Sophos Web Protection Appliance - Multiple Vulnerabilities | This is a webapps exploit for linux platform. Description: Sophos Web Protection Appliance - Multiple Vulnerabilities. Author: Core Security |
Analyze the security implications of: Sophos Web Protection Appliance - Multiple Vulnerabilities | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: QuickerSite Easy CMS - Database Disclosure | This is a webapps exploit for asp platform. Description: QuickerSite Easy CMS - Database Disclosure. Author: AlpHaNiX |
Analyze the security implications of: QuickerSite Easy CMS - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: DBHcms 1.1.4 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: DBHcms 1.1.4 - Persistent Cross-Site Scripting. Author: ITSecTeam |
Analyze the security implications of: DBHcms 1.1.4 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component AJAX Search for K2 2.2 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component AJAX Search for K2 2.2 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component AJAX Search for K2 2.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ICQ For Mac OSX 2.6 Client - Denial of Service | This is a dos exploit for osx platform. Description: ICQ For Mac OSX 2.6 Client - Denial of Service. Author: Stephen |
Analyze the security implications of: ICQ For Mac OSX 2.6 Client - Denial of Service | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Wyse Winterm 1125SE 4.2/4.4 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: Wyse Winterm 1125SE 4.2/4.4 - Remote Denial of Service. Author: Piotr Chytla |
Analyze the security implications of: Wyse Winterm 1125SE 4.2/4.4 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Aardvark Topsites PHP 4.2.2 - 'lostpw.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Aardvark Topsites PHP 4.2.2 - 'lostpw.php' Remote File Inclusion. Author: cijfer |
Analyze the security implications of: Aardvark Topsites PHP 4.2.2 - 'lostpw.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: dhclient 4.1 - Bash Environment Variable Command Injection (Shellshock) | This is a remote exploit for linux platform. Description: dhclient 4.1 - Bash Environment Variable Command Injection (Shellshock). Author: fdiskyou |
Analyze the security implications of: dhclient 4.1 - Bash Environment Variable Command Injection (Shellshock) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Jaow CMS 2.3 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Jaow CMS 2.3 - Blind SQL Injection. Author: loneferret |
Analyze the security implications of: Jaow CMS 2.3 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flat Calendar 1.1 - Multiple Administrative Scripts Authentication Bypass Vulnerabilities | This is a webapps exploit for php platform. Description: Flat Calendar 1.1 - Multiple Administrative Scripts Authentication Bypass Vulnerabilities. Author: Crackers_Child |
Analyze the security implications of: Flat Calendar 1.1 - Multiple Administrative Scripts Authentication Bypass Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Power Board (IP.Board) 1.3 - 'Pop' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) 1.3 - 'Pop' Cross-Site Scripting. Author: Rafel Ivgi The-Insider |
Analyze the security implications of: Invision Power Board (IP.Board) 1.3 - 'Pop' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: dB Masters MultiMedia - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: dB Masters MultiMedia - Insecure Cookie Handling. Author: indoushka |
Analyze the security implications of: dB Masters MultiMedia - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: VWD-CMS - Cross-Site Request Forgery | This is a webapps exploit for asp platform. Description: VWD-CMS - Cross-Site Request Forgery. Author: Abysssec |
Analyze the security implications of: VWD-CMS - Cross-Site Request Forgery | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Adobe Flash Player 23.0.0.162 - '.SWF' ConstantPool Critical Memory Corruption | This is a dos exploit for multiple platform. Description: Adobe Flash Player 23.0.0.162 - '.SWF' ConstantPool Critical Memory Corruption. Author: COSIG |
Analyze the security implications of: Adobe Flash Player 23.0.0.162 - '.SWF' ConstantPool Critical Memory Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Portech MV-372 VoIP Gateway - Multiple Vulnerabilities | This is a remote exploit for hardware platform. Description: Portech MV-372 VoIP Gateway - Multiple Vulnerabilities. Author: Zsolt Imre |
Analyze the security implications of: Portech MV-372 VoIP Gateway - Multiple Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CMS WebManager-Pro - 'c.php' SQL Injection | This is a webapps exploit for php platform. Description: CMS WebManager-Pro - 'c.php' SQL Injection. Author: MustLive |
Analyze the security implications of: CMS WebManager-Pro - 'c.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ADC2000 NG Pro 1.2 - SQL Injection | This is a webapps exploit for php platform. Description: ADC2000 NG Pro 1.2 - SQL Injection. Author: r0t |
Analyze the security implications of: ADC2000 NG Pro 1.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Manage Engine Applications Manager 12 - Multiple Vulnerabilities | This is a webapps exploit for multiple platform. Description: Manage Engine Applications Manager 12 - Multiple Vulnerabilities. Author: Bikramaditya Guha |
Analyze the security implications of: Manage Engine Applications Manager 12 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GeekLog 1.3.8 (filemgmt) - SQL Injection | This is a webapps exploit for php platform. Description: GeekLog 1.3.8 (filemgmt) - SQL Injection. Author: Gamoscu |
Analyze the security implications of: GeekLog 1.3.8 (filemgmt) - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ele Medios CMS - SQL Injection | This is a webapps exploit for php platform. Description: Ele Medios CMS - SQL Injection. Author: Dr.0rYX & Cr3W-DZ |
Analyze the security implications of: Ele Medios CMS - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Collectric CMU 1.0 - 'lang' Hard-Coded Credentials / SQL injection | This is a webapps exploit for hardware platform. Description: Collectric CMU 1.0 - 'lang' Hard-Coded Credentials / SQL injection. Author: Simon Brannstrom |
Analyze the security implications of: Collectric CMU 1.0 - 'lang' Hard-Coded Credentials / SQL injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Thomson CableHome Gateway (DWG849) Cable Modem Gateway - Information Exposure | This is a remote exploit for hardware platform. Description: Thomson CableHome Gateway (DWG849) Cable Modem Gateway - Information Exposure. Author: Matthew Dunlap |
Analyze the security implications of: Thomson CableHome Gateway (DWG849) Cable Modem Gateway - Information Exposure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Cayman 3220-H DSL Router 1.0/GatorSurf 5.3 - Denial of Service | This is a dos exploit for hardware platform. Description: Cayman 3220-H DSL Router 1.0/GatorSurf 5.3 - Denial of Service. Author: cassius |
Analyze the security implications of: Cayman 3220-H DSL Router 1.0/GatorSurf 5.3 - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Tinycontrol LAN Controller v3 (LK3) 1.58a - Remote Denial Of Service | This is a dos exploit for hardware platform. Description: Tinycontrol LAN Controller v3 (LK3) 1.58a - Remote Denial Of Service. Author: LiquidWorm |
Analyze the security implications of: Tinycontrol LAN Controller v3 (LK3) 1.58a - Remote Denial Of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AppleFileServer (OSX) - LoginExt PathName Overflow (Metasploit) | This is a remote exploit for osx platform. Description: AppleFileServer (OSX) - LoginExt PathName Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: AppleFileServer (OSX) - LoginExt PathName Overflow (Metasploit) | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: dislocate 1.3 - Local i386 | This is a local exploit for linux platform. Description: dislocate 1.3 - Local i386. Author: Michel Kaempf |
Analyze the security implications of: dislocate 1.3 - Local i386 | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WU-FTPD 2.6.2 - Off-by-One Remote Command Execution | This is a remote exploit for linux platform. Description: WU-FTPD 2.6.2 - Off-by-One Remote Command Execution. Author: Xpl017Elz |
Analyze the security implications of: WU-FTPD 2.6.2 - Off-by-One Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: LEPTON 2.2.2 - SQL Injection | This is a webapps exploit for php platform. Description: LEPTON 2.2.2 - SQL Injection. Author: Curesec Research Team |
Analyze the security implications of: LEPTON 2.2.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: id3lib ID3 Tags - Buffer Overflow | This is a dos exploit for multiple platform. Description: id3lib ID3 Tags - Buffer Overflow. Author: Luigi Auriemma |
Analyze the security implications of: id3lib ID3 Tags - Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Billing Management System 2.0 - 'email' SQL injection Auth Bypass | This is a webapps exploit for php platform. Description: Billing Management System 2.0 - 'email' SQL injection Auth Bypass. Author: Pintu Solanki |
Analyze the security implications of: Billing Management System 2.0 - 'email' SQL injection Auth Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple macOS 10.13 - 'workq_kernreturn' Denial of Service (PoC) | This is a dos exploit for macos platform. Description: Apple macOS 10.13 - 'workq_kernreturn' Denial of Service (PoC). Author: Fabiano Anemone |
Analyze the security implications of: Apple macOS 10.13 - 'workq_kernreturn' Denial of Service (PoC) | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Metasploit Web UI 4.1.0 - Persistent Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Metasploit Web UI 4.1.0 - Persistent Cross-Site Scripting. Author: Stefan Schurtz |
Analyze the security implications of: Metasploit Web UI 4.1.0 - Persistent Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.