input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Cybozu Products - 'id' Arbitrary File Retrieval | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: WebFS 1.x - 'Pathname' Buffer Overrun | This is a remote exploit for linux platform. Description: WebFS 1.x - 'Pathname' Buffer Overrun. Author: jsk |
Analyze the security implications of: WebFS 1.x - 'Pathname' Buffer Overrun | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Davolink DVW 3200 Router - Password Disclosure | This is a webapps exploit for hardware platform. Description: Davolink DVW 3200 Router - Password Disclosure. Author: Ankit Anubhav |
Analyze the security implications of: Davolink DVW 3200 Router - Password Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apple macOS/IOS 10.12.2 (16C67) - 'mach_msg' Heap Overflow | This is a dos exploit for multiple platform. Description: Apple macOS/IOS 10.12.2 (16C67) - 'mach_msg' Heap Overflow. Author: Google Security Research |
Analyze the security implications of: Apple macOS/IOS 10.12.2 (16C67) - 'mach_msg' Heap Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: gMotor2 Game Engine - Multiple Vulnerabilities | This is a remote exploit for multiple platform. Description: gMotor2 Game Engine - Multiple Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: gMotor2 Game Engine - Multiple Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Karel IP Phone IP1211 Web Management Panel - Directory Traversal | This is a webapps exploit for hardware platform. Description: Karel IP Phone IP1211 Web Management Panel - Directory Traversal. Author: berat isler |
Analyze the security implications of: Karel IP Phone IP1211 Web Management Panel - Directory Traversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: eFront 3.6.10 - 'download' Directory Traversal | This is a webapps exploit for php platform. Description: eFront 3.6.10 - 'download' Directory Traversal. Author: Chokri B.A |
Analyze the security implications of: eFront 3.6.10 - 'download' Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Python 2.2/2.3 - Documentation Server Error Page Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Python 2.2/2.3 - Documentation Server Error Page Cross-Site Scripting. Author: euronymous |
Analyze the security implications of: Python 2.2/2.3 - Documentation Server Error Page Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit) | This is a remote exploit for linux platform. Description: Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit). Author: Metasploit |
Analyze the security implications of: Zimbra Collaboration - Autodiscover Servlet XXE and ProxyServlet SSRF (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: OTRS 5.0.x/6.0.x - Remote Command Execution (1) | This is a webapps exploit for perl platform. Description: OTRS 5.0.x/6.0.x - Remote Command Execution (1). Author: Bæln0rn |
Analyze the security implications of: OTRS 5.0.x/6.0.x - Remote Command Execution (1) | This exploit targets perl systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets perl platform |
What is this exploit about: Dana Portal - Remote Change Admin Password | This is a webapps exploit for asp platform. Description: Dana Portal - Remote Change Admin Password. Author: Abysssec |
Analyze the security implications of: Dana Portal - Remote Change Admin Password | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FipsCMS Light 2.1 - 'db.mdb' Remote Database Disclosure | This is a webapps exploit for asp platform. Description: FipsCMS Light 2.1 - 'db.mdb' Remote Database Disclosure. Author: ByALBAYX |
Analyze the security implications of: FipsCMS Light 2.1 - 'db.mdb' Remote Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FileCOPA FTP Server - Remote Denial of Service | This is a dos exploit for multiple platform. Description: FileCOPA FTP Server - Remote Denial of Service. Author: Chako |
Analyze the security implications of: FileCOPA FTP Server - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache OFBiz 17.12.03 - Cross-Site Request Forgery (Account Takeover) | This is a webapps exploit for java platform. Description: Apache OFBiz 17.12.03 - Cross-Site Request Forgery (Account Takeover). Author: Faiz Ahmed Zaidi |
Analyze the security implications of: Apache OFBiz 17.12.03 - Cross-Site Request Forgery (Account Takeover) | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Unreal Commander 0.92 - ZIP / RAR Archive Handling Traversal Arbitrary File Overwrite | This is a remote exploit for multiple platform. Description: Unreal Commander 0.92 - ZIP / RAR Archive Handling Traversal Arbitrary File Overwrite. Author: Gynvael Coldwind |
Analyze the security implications of: Unreal Commander 0.92 - ZIP / RAR Archive Handling Traversal Arbitrary File Overwrite | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Bontago Game Server 1.1 - Remote Nickname Buffer Overrun | This is a remote exploit for multiple platform. Description: Bontago Game Server 1.1 - Remote Nickname Buffer Overrun. Author: Luigi Auriemma |
Analyze the security implications of: Bontago Game Server 1.1 - Remote Nickname Buffer Overrun | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: bugmall shopping cart 2.5 - SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: bugmall shopping cart 2.5 - SQL Injection / Cross-Site Scripting. Author: t0pP8uZz |
Analyze the security implications of: bugmall shopping cart 2.5 - SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CSZ CMS 1.2.9 - Multiple Cross-Site Scripting | This is a webapps exploit for php platform. Description: CSZ CMS 1.2.9 - Multiple Cross-Site Scripting. Author: SunCSR |
Analyze the security implications of: CSZ CMS 1.2.9 - Multiple Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sun xVM VirtualBox 2.2 < 3.0.2 r49928 - Local Host Reboot (Denial of Service) (PoC) | This is a dos exploit for multiple platform. Description: Sun xVM VirtualBox 2.2 < 3.0.2 r49928 - Local Host Reboot (Denial of Service) (PoC). Author: Tadas Vilkeliskis |
Analyze the security implications of: Sun xVM VirtualBox 2.2 < 3.0.2 r49928 - Local Host Reboot (Denial of Service) (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: NetBSD - 'mail.local(8)' Local Privilege Escalation | This is a local exploit for bsd platform. Description: NetBSD - 'mail.local(8)' Local Privilege Escalation. Author: akat1 |
Analyze the security implications of: NetBSD - 'mail.local(8)' Local Privilege Escalation | This exploit targets bsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: FreeWebShop 2.2.7 - 'cookie' Admin Password Grabber | This is a webapps exploit for php platform. Description: FreeWebShop 2.2.7 - 'cookie' Admin Password Grabber. Author: k1tk4t |
Analyze the security implications of: FreeWebShop 2.2.7 - 'cookie' Admin Password Grabber | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gopher 3.0.9 - '+VIEWS' Client-Side Buffer Overflow | This is a local exploit for linux platform. Description: Gopher 3.0.9 - '+VIEWS' Client-Side Buffer Overflow. Author: vade79 |
Analyze the security implications of: Gopher 3.0.9 - '+VIEWS' Client-Side Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FAQRing 3.0 - 'answer.php' SQL Injection | This is a webapps exploit for php platform. Description: FAQRing 3.0 - 'answer.php' SQL Injection. Author: r0t |
Analyze the security implications of: FAQRing 3.0 - 'answer.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bitweaver 1.1/1.2 - 'Title' HTML Injection | This is a webapps exploit for php platform. Description: Bitweaver 1.1/1.2 - 'Title' HTML Injection. Author: Kiki |
Analyze the security implications of: Bitweaver 1.1/1.2 - 'Title' HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JioFi 4G M2S 1.0.2 - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: JioFi 4G M2S 1.0.2 - Cross-Site Request Forgery. Author: Vikas Chaudhary |
Analyze the security implications of: JioFi 4G M2S 1.0.2 - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Gila CMS 1.10.9 - Remote Code Execution (RCE) (Authenticated) | This is a webapps exploit for php platform. Description: Gila CMS 1.10.9 - Remote Code Execution (RCE) (Authenticated). Author: Omer Shaik |
Analyze the security implications of: Gila CMS 1.10.9 - Remote Code Execution (RCE) (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: xuucms 3 - 'keywords' SQL Injection | This is a webapps exploit for multiple platform. Description: xuucms 3 - 'keywords' SQL Injection. Author: icekam |
Analyze the security implications of: xuucms 3 - 'keywords' SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.2.4 - 'readRoleCookie()' Authentication Bypass | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.2.4 - 'readRoleCookie()' Authentication Bypass. Author: Tim Medin |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.2.4 - 'readRoleCookie()' Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 3.14-rc1 < 3.15-rc4 (x64) - Raw Mode PTY Echo Race Condition Privilege Escalation | This is a local exploit for linux_x86-64 platform. Description: Linux Kernel 3.14-rc1 < 3.15-rc4 (x64) - Raw Mode PTY Echo Race Condition Privilege Escalation. Author: Matthew Daley |
Analyze the security implications of: Linux Kernel 3.14-rc1 < 3.15-rc4 (x64) - Raw Mode PTY Echo Race Condition Privilege Escalation | This exploit targets linux_x86-64 systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux_x86-64 platform |
What is this exploit about: ZO Tech Multiple Print Servers - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: ZO Tech Multiple Print Servers - Cross-Site Scripting. Author: b0telh0 |
Analyze the security implications of: ZO Tech Multiple Print Servers - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Unreal Engine 2.5 - 'UpdateConnectingMessage()' Remote Stack Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: Unreal Engine 2.5 - 'UpdateConnectingMessage()' Remote Stack Buffer Overflow (PoC). Author: Luigi Auriemma |
Analyze the security implications of: Unreal Engine 2.5 - 'UpdateConnectingMessage()' Remote Stack Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AIOCP 1.3.x - 'cp_show_ec_products.php' SQL Injection | This is a webapps exploit for php platform. Description: AIOCP 1.3.x - 'cp_show_ec_products.php' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: AIOCP 1.3.x - 'cp_show_ec_products.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: UCOPIA Wireless Appliance < 5.1 (Captive Portal) - Root Remote Code Execution | This is a remote exploit for linux platform. Description: UCOPIA Wireless Appliance < 5.1 (Captive Portal) - Root Remote Code Execution. Author: agix |
Analyze the security implications of: UCOPIA Wireless Appliance < 5.1 (Captive Portal) - Root Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: HeffnerCMS 1.22 - 'index.php' Local File Inclusion | This is a webapps exploit for php platform. Description: HeffnerCMS 1.22 - 'index.php' Local File Inclusion. Author: MiND C0re |
Analyze the security implications of: HeffnerCMS 1.22 - 'index.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.