input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Redmine SCM Repository 0.9.x/1.0.x - Arbitrary Command Execution (Metasploit) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Invision Power Board (IP.Board) 2.3.5 - Multiple Vulnerabilities (2) | This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) 2.3.5 - Multiple Vulnerabilities (2). Author: DarkFig |
Analyze the security implications of: Invision Power Board (IP.Board) 2.3.5 - Multiple Vulnerabilities (2) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KDE 3.0.x - KPF Icon Option File Disclosure | This is a remote exploit for linux platform. Description: KDE 3.0.x - KPF Icon Option File Disclosure. Author: Ajay R Ramjatan |
Analyze the security implications of: KDE 3.0.x - KPF Icon Option File Disclosure | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Wireshark - dissect_pktc_rekey Heap Out-of-Bounds Read | This is a dos exploit for multiple platform. Description: Wireshark - dissect_pktc_rekey Heap Out-of-Bounds Read. Author: Google Security Research |
Analyze the security implications of: Wireshark - dissect_pktc_rekey Heap Out-of-Bounds Read | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cisco IOS 12 - Software '?/' HTTP Request Denial of Service | This is a dos exploit for hardware platform. Description: Cisco IOS 12 - Software '?/' HTTP Request Denial of Service. Author: Alberto Solino |
Analyze the security implications of: Cisco IOS 12 - Software '?/' HTTP Request Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FLIR AX8 Thermal Camera 1.32.16 - Remote Code Execution | This is a webapps exploit for hardware platform. Description: FLIR AX8 Thermal Camera 1.32.16 - Remote Code Execution. Author: LiquidWorm |
Analyze the security implications of: FLIR AX8 Thermal Camera 1.32.16 - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ManageEngine ADSelfService Plus 4.4 - 'EmployeeSearch.cc' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: ManageEngine ADSelfService Plus 4.4 - 'EmployeeSearch.cc' Multiple Cross-Site Scripting Vulnerabilities. Author: Core Security |
Analyze the security implications of: ManageEngine ADSelfService Plus 4.4 - 'EmployeeSearch.cc' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SIEMENS IP Cameras (Multiple Models) - Credential Disclosure / Configuration Download | This is a webapps exploit for cgi platform. Description: SIEMENS IP Cameras (Multiple Models) - Credential Disclosure / Configuration Download. Author: Todor Donev |
Analyze the security implications of: SIEMENS IP Cameras (Multiple Models) - Credential Disclosure / Configuration Download | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: XFree86 X11R6 3.3.2 XMan - ManPath Environment Variable Buffer Overflow | This is a local exploit for linux platform. Description: XFree86 X11R6 3.3.2 XMan - ManPath Environment Variable Buffer Overflow. Author: kf |
Analyze the security implications of: XFree86 X11R6 3.3.2 XMan - ManPath Environment Variable Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Maximus SchoolMAX 4.0.1 - 'Error_msg' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Maximus SchoolMAX 4.0.1 - 'Error_msg' Cross-Site Scripting. Author: Charles Hooper |
Analyze the security implications of: Maximus SchoolMAX 4.0.1 - 'Error_msg' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: DreamLevels Dream Poll 3.0 - 'View_Results.php' SQL Injection | This is a webapps exploit for php platform. Description: DreamLevels Dream Poll 3.0 - 'View_Results.php' SQL Injection. Author: r0t3d3Vil |
Analyze the security implications of: DreamLevels Dream Poll 3.0 - 'View_Results.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Isshue Shopping Cart 3.5 - 'Title' Cross Site Scripting (XSS) | This is a webapps exploit for multiple platform. Description: Isshue Shopping Cart 3.5 - 'Title' Cross Site Scripting (XSS). Author: Vulnerability-Lab |
Analyze the security implications of: Isshue Shopping Cart 3.5 - 'Title' Cross Site Scripting (XSS) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Hospitals Patient Records Management System 1.0 - 'room_types' Stored Cross Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Hospitals Patient Records Management System 1.0 - 'room_types' Stored Cross Site Scripting (XSS). Author: Sant268 |
Analyze the security implications of: Hospitals Patient Records Management System 1.0 - 'room_types' Stored Cross Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: VideoLAN VLC Media Player 0.8.6 (x86) - 'udp://' Format String | This is a local exploit for osx platform. Description: VideoLAN VLC Media Player 0.8.6 (x86) - 'udp://' Format String. Author: MoAB |
Analyze the security implications of: VideoLAN VLC Media Player 0.8.6 (x86) - 'udp://' Format String | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: DWebPro - Command Injection | This is a webapps exploit for asp platform. Description: DWebPro - Command Injection. Author: Rafael Sousa |
Analyze the security implications of: DWebPro - Command Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: File Thingie 2.5.7 - Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: File Thingie 2.5.7 - Remote Code Execution (RCE). Author: Maurice Fielenbach |
Analyze the security implications of: File Thingie 2.5.7 - Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: VMware - Setuid VMware-mount Popen lsb_release Privilege Escalation | This is a local exploit for linux platform. Description: VMware - Setuid VMware-mount Popen lsb_release Privilege Escalation. Author: Tavis Ormandy |
Analyze the security implications of: VMware - Setuid VMware-mount Popen lsb_release Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: i-doit Open Source CMDB 1.14.1 - Arbitrary File Deletion | This is a webapps exploit for php platform. Description: i-doit Open Source CMDB 1.14.1 - Arbitrary File Deletion. Author: Besim |
Analyze the security implications of: i-doit Open Source CMDB 1.14.1 - Arbitrary File Deletion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DIR-615 T1 20.10 - CAPTCHA Bypass | This is a webapps exploit for hardware platform. Description: D-Link DIR-615 T1 20.10 - CAPTCHA Bypass. Author: huzaifa hussain |
Analyze the security implications of: D-Link DIR-615 T1 20.10 - CAPTCHA Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Sun Microsystems Java Virtual Machine 1.x - Security Manager Denial of Service | This is a dos exploit for multiple platform. Description: Sun Microsystems Java Virtual Machine 1.x - Security Manager Denial of Service. Author: Marc Schoenefeld |
Analyze the security implications of: Sun Microsystems Java Virtual Machine 1.x - Security Manager Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Wordit Logbook 098b3 - Logbook.pl Remote Command Execution | This is a webapps exploit for cgi platform. Description: Wordit Logbook 098b3 - Logbook.pl Remote Command Execution. Author: Aleksey Sintsov |
Analyze the security implications of: Wordit Logbook 098b3 - Logbook.pl Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: LnBlog 0.9.0 - 'plugin' Local File Inclusion | This is a webapps exploit for php platform. Description: LnBlog 0.9.0 - 'plugin' Local File Inclusion. Author: dun |
Analyze the security implications of: LnBlog 0.9.0 - 'plugin' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Novell Netware eDirectory - Denial of Service | This is a dos exploit for netware platform. Description: Novell Netware eDirectory - Denial of Service. Author: nSense |
Analyze the security implications of: Novell Netware eDirectory - Denial of Service | This exploit targets netware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets netware platform |
What is this exploit about: Distributed Ruby - Send instance_eval/syscall Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: Distributed Ruby - Send instance_eval/syscall Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Distributed Ruby - Send instance_eval/syscall Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cyber Cafe Management System Project (CCMS) 1.0 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Cyber Cafe Management System Project (CCMS) 1.0 - Persistent Cross-Site Scripting. Author: Pruthvi Nekkanti |
Analyze the security implications of: Cyber Cafe Management System Project (CCMS) 1.0 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SureMDM On-premise < 6.31 - CAPTCHA Bypass User Enumeration | This is a webapps exploit for multiple platform. Description: SureMDM On-premise < 6.31 - CAPTCHA Bypass User Enumeration. Author: Jonas Benjamin Friedli |
Analyze the security implications of: SureMDM On-premise < 6.31 - CAPTCHA Bypass User Enumeration | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ICMLM 2.1 - 'key' SQL Injection | This is a webapps exploit for php platform. Description: ICMLM 2.1 - 'key' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: ICMLM 2.1 - 'key' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DAP-1160 Wireless Access Point - DCC Protocol Security Bypass | This is a remote exploit for hardware platform. Description: D-Link DAP-1160 Wireless Access Point - DCC Protocol Security Bypass. Author: Cristofaro Mune |
Analyze the security implications of: D-Link DAP-1160 Wireless Access Point - DCC Protocol Security Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: WebKitGTK+ < 2.21.3 - Crash (PoC) | This is a local exploit for linux platform. Description: WebKitGTK+ < 2.21.3 - Crash (PoC). Author: Dhiraj Mishra |
Analyze the security implications of: WebKitGTK+ < 2.21.3 - Crash (PoC) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache OFBiz 10.4.x - Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for multiple platform. Description: Apache OFBiz 10.4.x - Multiple Cross-Site Scripting Vulnerabilities. Author: Juan Caillava |
Analyze the security implications of: Apache OFBiz 10.4.x - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BT Home Hub - 'uuid' Buffer Overflow | This is a dos exploit for multiple platform. Description: BT Home Hub - 'uuid' Buffer Overflow. Author: Zachary Cutlip |
Analyze the security implications of: BT Home Hub - 'uuid' Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: LE.CMS 1.4 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: LE.CMS 1.4 - Arbitrary File Upload. Author: t0pP8uZz |
Analyze the security implications of: LE.CMS 1.4 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: banana dance b.2.6 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: banana dance b.2.6 - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: banana dance b.2.6 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jaws 0.8.14 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Jaws 0.8.14 - Multiple Remote File Inclusions. Author: indoushka |
Analyze the security implications of: Jaws 0.8.14 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.