input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: ModSecurity - 'POST' Security Bypass | This is a remote exploit for linux platform. Description: ModSecurity - 'POST' Security Bypass. Author: Bernhard Mueller |
Analyze the security implications of: ModSecurity - 'POST' Security Bypass | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ESCAM QD-900 WIFI HD Camera - Remote Configuration Disclosure | This is a webapps exploit for hardware platform. Description: ESCAM QD-900 WIFI HD Camera - Remote Configuration Disclosure. Author: Todor Donev |
Analyze the security implications of: ESCAM QD-900 WIFI HD Camera - Remote Configuration Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Symantec Web Gateway 5.0.2.8 - Command Execution (Metasploit) | This is a remote exploit for linux platform. Description: Symantec Web Gateway 5.0.2.8 - Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Symantec Web Gateway 5.0.2.8 - Command Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cisco IOS 12.2 < 12.4 / 15.0 < 15.6 - Security Association Negotiation Request Device Memory | This is a remote exploit for hardware platform. Description: Cisco IOS 12.2 < 12.4 / 15.0 < 15.6 - Security Association Negotiation Request Device Memory. Author: nixawk |
Analyze the security implications of: Cisco IOS 12.2 < 12.4 / 15.0 < 15.6 - Security Association Negotiation Request Device Memory | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BMForum 5.6 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: BMForum 5.6 - 'index.php' Cross-Site Scripting. Author: CWH Underground |
Analyze the security implications of: BMForum 5.6 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Skybox Platform < 7.0.611 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Skybox Platform < 7.0.611 - Multiple Vulnerabilities. Author: SEC Consult |
Analyze the security implications of: Skybox Platform < 7.0.611 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Airsensor M520 - HTTPd Remote Denial of Service / Buffer Overflow (PoC) | This is a dos exploit for hardware platform. Description: Airsensor M520 - HTTPd Remote Denial of Service / Buffer Overflow (PoC). Author: Alex Hernandez |
Analyze the security implications of: Airsensor M520 - HTTPd Remote Denial of Service / Buffer Overflow (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Adcycle 0.77/0.78 - AdLibrary.pm Session Access | This is a remote exploit for cgi platform. Description: Adcycle 0.77/0.78 - AdLibrary.pm Session Access. Author: Neil K |
Analyze the security implications of: Adcycle 0.77/0.78 - AdLibrary.pm Session Access | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: PHP 4.x - Transparent Session ID Cross-Site Scripting | This is a remote exploit for php platform. Description: PHP 4.x - Transparent Session ID Cross-Site Scripting. Author: Sverre H. Huseby |
Analyze the security implications of: PHP 4.x - Transparent Session ID Cross-Site Scripting | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JVC IP-Camera VN-T216VPRU - Local File Disclosure | This is a webapps exploit for cgi platform. Description: JVC IP-Camera VN-T216VPRU - Local File Disclosure. Author: Yakir Wizman |
Analyze the security implications of: JVC IP-Camera VN-T216VPRU - Local File Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! Component JCal Pro Calendar - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JCal Pro Calendar - SQL Injection. Author: Taurus Omar |
Analyze the security implications of: Joomla! Component JCal Pro Calendar - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Camtron CMNC-200 IP Camera - Directory Traversal | This is a remote exploit for hardware platform. Description: Camtron CMNC-200 IP Camera - Directory Traversal. Author: Trustwave's SpiderLabs |
Analyze the security implications of: Camtron CMNC-200 IP Camera - Directory Traversal | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Camiro-CMS_beta-0.1 - 'FCKeditor' Arbitrary File Upload | This is a webapps exploit for php platform. Description: Camiro-CMS_beta-0.1 - 'FCKeditor' Arbitrary File Upload. Author: eidelweiss |
Analyze the security implications of: Camiro-CMS_beta-0.1 - 'FCKeditor' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BloofoxCMS 0.5.2.1 - 'text' Stored Cross Site Scripting | This is a webapps exploit for php platform. Description: BloofoxCMS 0.5.2.1 - 'text' Stored Cross Site Scripting. Author: LiPeiYi |
Analyze the security implications of: BloofoxCMS 0.5.2.1 - 'text' Stored Cross Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Disconnect.me Mac OSX Client 2.0 - Local Privilege Escalation | This is a local exploit for osx platform. Description: Disconnect.me Mac OSX Client 2.0 - Local Privilege Escalation. Author: Kristian Erik Hermansen |
Analyze the security implications of: Disconnect.me Mac OSX Client 2.0 - Local Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Adobe Flash - Pointer Crash in Button Handling | This is a dos exploit for linux platform. Description: Adobe Flash - Pointer Crash in Button Handling. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Pointer Crash in Button Handling | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Solaris Recommended Patch Cluster 6/19 (x86) - Local Privilege Escalation | This is a local exploit for linux_x86 platform. Description: Solaris Recommended Patch Cluster 6/19 (x86) - Local Privilege Escalation. Author: Larry W. Cashdollar |
Analyze the security implications of: Solaris Recommended Patch Cluster 6/19 (x86) - Local Privilege Escalation | This exploit targets linux_x86 systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux_x86 platform |
What is this exploit about: MySQL 3.x/4.0.x - Weak Password Encryption | This is a local exploit for linux platform. Description: MySQL 3.x/4.0.x - Weak Password Encryption. Author: Secret Squirrel |
Analyze the security implications of: MySQL 3.x/4.0.x - Weak Password Encryption | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Oracle PeopleSoft - Server-Side Request Forgery | This is a webapps exploit for java platform. Description: Oracle PeopleSoft - Server-Side Request Forgery. Author: ERPScan |
Analyze the security implications of: Oracle PeopleSoft - Server-Side Request Forgery | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Content Management System 1.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Content Management System 1.0 - 'id' SQL Injection. Author: Zhaiyi |
Analyze the security implications of: Content Management System 1.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_seyret - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_seyret - Blind SQL Injection. Author: RoAd_KiLlEr |
Analyze the security implications of: Joomla! Component com_seyret - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Joomla! Flickr 1.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Joomla! Flickr 1.0 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Joomla! Flickr 1.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle MySQL < 5.1.50 - Privilege Escalation | This is a remote exploit for multiple platform. Description: Oracle MySQL < 5.1.50 - Privilege Escalation. Author: Libing Song |
Analyze the security implications of: Oracle MySQL < 5.1.50 - Privilege Escalation | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: D-Link Central WiFiManager Software Controller 1.03 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: D-Link Central WiFiManager Software Controller 1.03 - Multiple Vulnerabilities. Author: Core Security |
Analyze the security implications of: D-Link Central WiFiManager Software Controller 1.03 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Motorola Bootloader - Kernel Cmdline Injection Secure Boot and Device Locking Bypass | This is a local exploit for android platform. Description: Motorola Bootloader - Kernel Cmdline Injection Secure Boot and Device Locking Bypass. Author: Roee Hay |
Analyze the security implications of: Motorola Bootloader - Kernel Cmdline Injection Secure Boot and Device Locking Bypass | This exploit targets android systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: LiveCart 1.0.1 - 'return' Cross-Site Scripting (2) | This is a webapps exploit for php platform. Description: LiveCart 1.0.1 - 'return' Cross-Site Scripting (2). Author: Doz |
Analyze the security implications of: LiveCart 1.0.1 - 'return' Cross-Site Scripting (2) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hosting Controller 1.x - 'error.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Hosting Controller 1.x - 'error.asp' Cross-Site Scripting. Author: Dea7h |
Analyze the security implications of: Hosting Controller 1.x - 'error.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FreeBSD 7.1 - libc Berkley DB Interface Uninitialized Memory Local Information Disclosure | This is a local exploit for freebsd platform. Description: FreeBSD 7.1 - libc Berkley DB Interface Uninitialized Memory Local Information Disclosure. Author: Jaakko Heinonen |
Analyze the security implications of: FreeBSD 7.1 - libc Berkley DB Interface Uninitialized Memory Local Information Disclosure | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: BoastMachine 3.1 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: BoastMachine 3.1 - Arbitrary File Upload. Author: alnjm33 |
Analyze the security implications of: BoastMachine 3.1 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LANDesk Management Suite 8.80.1.1 - PXE TFTP Service Directory Traversal | This is a remote exploit for linux platform. Description: LANDesk Management Suite 8.80.1.1 - PXE TFTP Service Directory Traversal. Author: Luigi Auriemma |
Analyze the security implications of: LANDesk Management Suite 8.80.1.1 - PXE TFTP Service Directory Traversal | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_szallasok - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_szallasok - 'id' SQL Injection. Author: CoBRa_21 |
Analyze the security implications of: Joomla! Component com_szallasok - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BandSite CMS 1.1 - 'footer.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: BandSite CMS 1.1 - 'footer.php' Cross-Site Scripting. Author: HACKERS PAL |
Analyze the security implications of: BandSite CMS 1.1 - 'footer.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ultimate HelpDesk - Cross-Site Scripting / Local File Disclosure | This is a webapps exploit for asp platform. Description: Ultimate HelpDesk - Cross-Site Scripting / Local File Disclosure. Author: ajann |
Analyze the security implications of: Ultimate HelpDesk - Cross-Site Scripting / Local File Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Redis 4.x / 5.x - Unauthenticated Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: Redis 4.x / 5.x - Unauthenticated Code Execution (Metasploit). Author: Metasploit |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.