input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: HP System Management - Anonymous Access Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: HP System Management - Anonymous Access Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: HP System Management - Anonymous Access Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Xine 0.9.x and Xine-Lib 1 - Multiple Remote File Overwrite Vulnerabilities | This is a remote exploit for linux platform. Description: Xine 0.9.x and Xine-Lib 1 - Multiple Remote File Overwrite Vulnerabilities. Author: anonymous |
Analyze the security implications of: Xine 0.9.x and Xine-Lib 1 - Multiple Remote File Overwrite Vulnerabilities | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: IceWarp Mail Server 10.3.2 server/webmail.php Soap Message Parsing - Arbitrary File Disclosure | This is a webapps exploit for php platform. Description: IceWarp Mail Server 10.3.2 server/webmail.php Soap Message Parsing - Arbitrary File Disclosure. Author: David Kirkpatrick |
Analyze the security implications of: IceWarp Mail Server 10.3.2 server/webmail.php Soap Message Parsing - Arbitrary File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JE Classify Ads 1.2 - 'pro_id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JE Classify Ads 1.2 - 'pro_id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JE Classify Ads 1.2 - 'pro_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fusion News 1.0 (fil_config) - Remote File Inclusion | This is a webapps exploit for php platform. Description: Fusion News 1.0 (fil_config) - Remote File Inclusion. Author: X0r_1 |
Analyze the security implications of: Fusion News 1.0 (fil_config) - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BSD / Linux - 'lpr' Local Privilege Escalation | This is a local exploit for linux platform. Description: BSD / Linux - 'lpr' Local Privilege Escalation. Author: Vadim Kolontsov |
Analyze the security implications of: BSD / Linux - 'lpr' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PD9 Software MegaBBS 2.0/2.1 - 'view-profile.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: PD9 Software MegaBBS 2.0/2.1 - 'view-profile.asp' Multiple SQL Injections. Author: pigrelax |
Analyze the security implications of: PD9 Software MegaBBS 2.0/2.1 - 'view-profile.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: WebKit - Floating Point Number Remote Buffer Overflow | This is a remote exploit for multiple platform. Description: WebKit - Floating Point Number Remote Buffer Overflow. Author: Apple |
Analyze the security implications of: WebKit - Floating Point Number Remote Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: agXchange ESM - 'ucschcancelproc.jsp' Open Redirection | This is a webapps exploit for jsp platform. Description: agXchange ESM - 'ucschcancelproc.jsp' Open Redirection. Author: Lament |
Analyze the security implications of: agXchange ESM - 'ucschcancelproc.jsp' Open Redirection | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Cobalt 0.1 - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Cobalt 0.1 - Multiple SQL Injections. Author: U238 |
Analyze the security implications of: Cobalt 0.1 - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: iOS < 11.1 / tvOS < 11.1 / watchOS < 4.1 - Denial of Service | This is a dos exploit for ios platform. Description: iOS < 11.1 / tvOS < 11.1 / watchOS < 4.1 - Denial of Service. Author: Russian Otter |
Analyze the security implications of: iOS < 11.1 / tvOS < 11.1 / watchOS < 4.1 - Denial of Service | This exploit targets ios systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: EZContents 2.0.3 - 'showlinks.php?GLOBALS[admin_home]' Remote File Inclusion | This is a webapps exploit for php platform. Description: EZContents 2.0.3 - 'showlinks.php?GLOBALS[admin_home]' Remote File Inclusion. Author: DarkFig |
Analyze the security implications of: EZContents 2.0.3 - 'showlinks.php?GLOBALS[admin_home]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Stormy Studios KNet 1.x - Remote Buffer Overflow | This is a dos exploit for multiple platform. Description: Stormy Studios KNet 1.x - Remote Buffer Overflow. Author: Expanders |
Analyze the security implications of: Stormy Studios KNet 1.x - Remote Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_wmtpic 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_wmtpic 1.0 - SQL Injection. Author: RoAd_KiLlEr |
Analyze the security implications of: Joomla! Component com_wmtpic 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: libxmlInvalid 2.7.x - XPath Multiple Memory Corruption Vulnerabilities | This is a remote exploit for linux platform. Description: libxmlInvalid 2.7.x - XPath Multiple Memory Corruption Vulnerabilities. Author: Chris Evans |
Analyze the security implications of: libxmlInvalid 2.7.x - XPath Multiple Memory Corruption Vulnerabilities | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DLINK DAP-1620 A1 v1.01 - Directory Traversal | This is a remote exploit for hardware platform. Description: DLINK DAP-1620 A1 v1.01 - Directory Traversal. Author: Momen Eldawakhly |
Analyze the security implications of: DLINK DAP-1620 A1 v1.01 - Directory Traversal | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apple OS X Kernel - IOBluetoothFamily.kext Use-After-Free | This is a dos exploit for osx platform. Description: Apple OS X Kernel - IOBluetoothFamily.kext Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Apple OS X Kernel - IOBluetoothFamily.kext Use-After-Free | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Active Web Mail 4 - Authentication Bypass | This is a webapps exploit for asp platform. Description: Active Web Mail 4 - Authentication Bypass. Author: R3d-D3V!L |
Analyze the security implications of: Active Web Mail 4 - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Owlfiles File Manager 12.0.1 - Multiple Vulnerabilities | This is a webapps exploit for ios platform. Description: Owlfiles File Manager 12.0.1 - Multiple Vulnerabilities. Author: Chokri Hammedi |
Analyze the security implications of: Owlfiles File Manager 12.0.1 - Multiple Vulnerabilities | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: HTMPL 1.11 - Command Execution | This is a webapps exploit for cgi platform. Description: HTMPL 1.11 - Command Execution. Author: ZeN |
Analyze the security implications of: HTMPL 1.11 - Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: HostBill - 'cpupdate.php' Authentication Bypass | This is a webapps exploit for php platform. Description: HostBill - 'cpupdate.php' Authentication Bypass. Author: localhost.re |
Analyze the security implications of: HostBill - 'cpupdate.php' Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Burning Board 3.1.5 - Full Path Disclosure | This is a webapps exploit for php platform. Description: Burning Board 3.1.5 - Full Path Disclosure. Author: linc0ln.dll |
Analyze the security implications of: Burning Board 3.1.5 - Full Path Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Tandberg E & EX & C Series Endpoints - Default Root Account Credentials | This is a remote exploit for hardware platform. Description: Tandberg E & EX & C Series Endpoints - Default Root Account Credentials. Author: Cisco Security |
Analyze the security implications of: Tandberg E & EX & C Series Endpoints - Default Root Account Credentials | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: RealPlayer 10.5 (6.0.12.1040-1348) - SWF Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: RealPlayer 10.5 (6.0.12.1040-1348) - SWF Buffer Overflow (PoC). Author: Federico L. Bossi Bonin |
Analyze the security implications of: RealPlayer 10.5 (6.0.12.1040-1348) - SWF Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Beauty Parlour Management System 1.0 - 'sername' SQL Injection | This is a webapps exploit for php platform. Description: Beauty Parlour Management System 1.0 - 'sername' SQL Injection. Author: Thinkland Security Team |
Analyze the security implications of: Beauty Parlour Management System 1.0 - 'sername' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Campsite 2.6.1 - 'user.php?g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'user.php?g_documentRoot' Remote File Inclusion. Author: anonymous |
Analyze the security implications of: Campsite 2.6.1 - 'user.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Auction 1.3m - 'phpbb_root_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Auction 1.3m - 'phpbb_root_path' Remote File Inclusion. Author: webDEViL |
Analyze the security implications of: Auction 1.3m - 'phpbb_root_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.x - '/drivers/net/r8169.c' Out-of-IOMMU Error Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.x - '/drivers/net/r8169.c' Out-of-IOMMU Error Local Denial of Service. Author: Alistair Strachan |
Analyze the security implications of: Linux Kernel 2.6.x - '/drivers/net/r8169.c' Out-of-IOMMU Error Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Novell NetWare 6.5 SP2-SP7 - LSASS CIFS.NLM Overflow (Metasploit) | This is a remote exploit for novell platform. Description: Novell NetWare 6.5 SP2-SP7 - LSASS CIFS.NLM Overflow (Metasploit). Author: toto |
Analyze the security implications of: Novell NetWare 6.5 SP2-SP7 - LSASS CIFS.NLM Overflow (Metasploit) | This exploit targets novell systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: Fashione E-Commerce Webshop - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Fashione E-Commerce Webshop - Multiple SQL Injections. Author: secret |
Analyze the security implications of: Fashione E-Commerce Webshop - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SAP SOAP RFC - SXPG_CALL_SYSTEM Remote Command Execution (Metasploit) | This is a remote exploit for multiple platform. Description: SAP SOAP RFC - SXPG_CALL_SYSTEM Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: SAP SOAP RFC - SXPG_CALL_SYSTEM Remote Command Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Jupiter CMS 1.1.4/1.1.5 - '/modules/search.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Jupiter CMS 1.1.4/1.1.5 - '/modules/search.php' Multiple Cross-Site Scripting Vulnerabilities. Author: HACKERS PAL |
Analyze the security implications of: Jupiter CMS 1.1.4/1.1.5 - '/modules/search.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PostgreSQL - 'bitsubstr' Buffer Overflow | This is a dos exploit for linux platform. Description: PostgreSQL - 'bitsubstr' Buffer Overflow. Author: Intevydis |
Analyze the security implications of: PostgreSQL - 'bitsubstr' Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cybozu Products - 'id' Arbitrary File Retrieval | This is a webapps exploit for cgi platform. Description: Cybozu Products - 'id' Arbitrary File Retrieval. Author: Tan Chew Keong |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.