input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Multiple Vendor - PF Null Pointer Dereference | This exploit targets bsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Juniper Junos 8.5/9.0 J - Web Interface (Multiple Script) 'm[]' Cross-Site Scripting | This is a remote exploit for hardware platform. Description: Juniper Junos 8.5/9.0 J - Web Interface (Multiple Script) 'm[]' Cross-Site Scripting. Author: Amir Azam |
Analyze the security implications of: Juniper Junos 8.5/9.0 J - Web Interface (Multiple Script) 'm[]' Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Pydio Cells 4.1.2 - Server-Side Request Forgery | This is a webapps exploit for go platform. Description: Pydio Cells 4.1.2 - Server-Side Request Forgery. Author: RedTeam Pentesting GmbH |
Analyze the security implications of: Pydio Cells 4.1.2 - Server-Side Request Forgery | This exploit targets go systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets go platform |
What is this exploit about: CaLogic Calendars 1.2.2 - 'langsel' SQL Injection | This is a webapps exploit for php platform. Description: CaLogic Calendars 1.2.2 - 'langsel' SQL Injection. Author: His0k4 |
Analyze the security implications of: CaLogic Calendars 1.2.2 - 'langsel' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cain & Abel 4.9.24 - RDP Buffer Overflow (Metasploit) | This is a local exploit for aix platform. Description: Cain & Abel 4.9.24 - RDP Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Cain & Abel 4.9.24 - RDP Buffer Overflow (Metasploit) | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Naenara Browser 3.5 (RedStar 3.0 Desktop) - 'JACKRABBIT' Client-Side Command Execution | This is a local exploit for linux platform. Description: Naenara Browser 3.5 (RedStar 3.0 Desktop) - 'JACKRABBIT' Client-Side Command Execution. Author: Hacker Fantastic |
Analyze the security implications of: Naenara Browser 3.5 (RedStar 3.0 Desktop) - 'JACKRABBIT' Client-Side Command Execution | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common() | This is a dos exploit for macos platform. Description: macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common(). Author: Google Security Research |
Analyze the security implications of: macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common() | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - '/help/base_setup_help.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - '/help/base_setup_help.php?base_path' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - '/help/base_setup_help.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASTPP VoIP 4.0.1 - Remote Code Execution | This is a remote exploit for linux platform. Description: ASTPP VoIP 4.0.1 - Remote Code Execution. Author: Fabien AUNAY |
Analyze the security implications of: ASTPP VoIP 4.0.1 - Remote Code Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_event - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_event - SQL Injection. Author: anonymous |
Analyze the security implications of: Joomla! Component com_event - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: vBulletin 5 - 'index.php/ajax/api/reputation/vote?nodeid' SQL Injection (Metasploit) | This is a remote exploit for php platform. Description: vBulletin 5 - 'index.php/ajax/api/reputation/vote?nodeid' SQL Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: vBulletin 5 - 'index.php/ajax/api/reputation/vote?nodeid' SQL Injection (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Samba < 3.0.20 - Remote Heap Overflow | This is a remote exploit for linux platform. Description: Samba < 3.0.20 - Remote Heap Overflow. Author: zuc |
Analyze the security implications of: Samba < 3.0.20 - Remote Heap Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FreeBSD 3.0/3.1/3.2 - 'vfs_cache' Denial of Service | This is a dos exploit for freebsd platform. Description: FreeBSD 3.0/3.1/3.2 - 'vfs_cache' Denial of Service. Author: Charles M. Hannum |
Analyze the security implications of: FreeBSD 3.0/3.1/3.2 - 'vfs_cache' Denial of Service | This exploit targets freebsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Fortinet FCM-MB40 - Cross-Site Request Forgery / Remote Command Execution | This is a webapps exploit for hardware platform. Description: Fortinet FCM-MB40 - Cross-Site Request Forgery / Remote Command Execution. Author: XORcat |
Analyze the security implications of: Fortinet FCM-MB40 - Cross-Site Request Forgery / Remote Command Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Borland Interbase - 'jrd8_create_database()' Remote Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: Borland Interbase - 'jrd8_create_database()' Remote Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Borland Interbase - 'jrd8_create_database()' Remote Buffer Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Adiscon LogAnalyzer < 4.1.7 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Adiscon LogAnalyzer < 4.1.7 - Cross-Site Scripting. Author: Gustavo Sorondo |
Analyze the security implications of: Adiscon LogAnalyzer < 4.1.7 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eXtremail 2.1.1 - Remote Heap Overflow (PoC) | This is a dos exploit for linux platform. Description: eXtremail 2.1.1 - Remote Heap Overflow (PoC). Author: mu-b |
Analyze the security implications of: eXtremail 2.1.1 - Remote Heap Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Netgear R7000 - Command Injection | This is a webapps exploit for cgi platform. Description: Netgear R7000 - Command Injection. Author: Acew0rm |
Analyze the security implications of: Netgear R7000 - Command Injection | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Symantec PCAnywhere32 8.0 - Denial of Service | This is a dos exploit for multiple platform. Description: Symantec PCAnywhere32 8.0 - Denial of Service. Author: Chris Radigan |
Analyze the security implications of: Symantec PCAnywhere32 8.0 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Campsite 2.6.1 - 'UserType.php?g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'UserType.php?g_documentRoot' Remote File Inclusion. Author: anonymous |
Analyze the security implications of: Campsite 2.6.1 - 'UserType.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Enterprise Payroll Systems 1.1 - 'footer' Remote File Inclusion | This is a webapps exploit for php platform. Description: Enterprise Payroll Systems 1.1 - 'footer' Remote File Inclusion. Author: Kacper |
Analyze the security implications of: Enterprise Payroll Systems 1.1 - 'footer' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RabbitMQ Web Management < 3.7.6 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for linux platform. Description: RabbitMQ Web Management < 3.7.6 - Cross-Site Request Forgery (Add Admin). Author: Dolev Farhi |
Analyze the security implications of: RabbitMQ Web Management < 3.7.6 - Cross-Site Request Forgery (Add Admin) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cosign 2.0.1/2.9.4a - CGI Check Cookie Command Remote Authentication Bypass | This is a webapps exploit for cgi platform. Description: Cosign 2.0.1/2.9.4a - CGI Check Cookie Command Remote Authentication Bypass. Author: Jon Oberheide |
Analyze the security implications of: Cosign 2.0.1/2.9.4a - CGI Check Cookie Command Remote Authentication Bypass | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: 2DayBiz Freelance Script - SQL Injection | This is a webapps exploit for php platform. Description: 2DayBiz Freelance Script - SQL Injection. Author: JaMbA |
Analyze the security implications of: 2DayBiz Freelance Script - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Chrome OS 10820.0.0 dev-channel - app->VM via garcon TCP Command Socket | This is a local exploit for linux platform. Description: Chrome OS 10820.0.0 dev-channel - app->VM via garcon TCP Command Socket. Author: Google Security Research |
Analyze the security implications of: Chrome OS 10820.0.0 dev-channel - app->VM via garcon TCP Command Socket | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DCP-Portal 6.1.1 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: DCP-Portal 6.1.1 - Multiple SQL Injections. Author: Exoduks |
Analyze the security implications of: DCP-Portal 6.1.1 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IRIX 6.2/6.3 - '/bin/lpstat' Local Buffer Overflow | This is a local exploit for irix platform. Description: IRIX 6.2/6.3 - '/bin/lpstat' Local Buffer Overflow. Author: Last Stage of Delirium |
Analyze the security implications of: IRIX 6.2/6.3 - '/bin/lpstat' Local Buffer Overflow | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: Joomla! Component user_id com_sqlreport - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component user_id com_sqlreport - Blind SQL Injection. Author: snakespc |
Analyze the security implications of: Joomla! Component user_id com_sqlreport - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenBSD - Dynamic Loader chpass Privilege Escalation (Metasploit) | This is a local exploit for openbsd platform. Description: OpenBSD - Dynamic Loader chpass Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: OpenBSD - Dynamic Loader chpass Privilege Escalation (Metasploit) | This exploit targets openbsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets openbsd platform |
What is this exploit about: jQuery 3.3.1 - Prototype Pollution & XSS Exploit | This is a webapps exploit for multiple platform. Description: jQuery 3.3.1 - Prototype Pollution & XSS Exploit. Author: xOryus |
Analyze the security implications of: jQuery 3.3.1 - Prototype Pollution & XSS Exploit | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: TerraMaster TOS 4.2.06 - RCE (Unauthenticated) | This is a webapps exploit for linux platform. Description: TerraMaster TOS 4.2.06 - RCE (Unauthenticated). Author: IHTeam |
Analyze the security implications of: TerraMaster TOS 4.2.06 - RCE (Unauthenticated) | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Free Simple CMS 1.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Free Simple CMS 1.0 - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: Free Simple CMS 1.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CubeCart 3.0.x - Arbitrary File Upload | This is a webapps exploit for php platform. Description: CubeCart 3.0.x - Arbitrary File Upload. Author: NSA Group |
Analyze the security implications of: CubeCart 3.0.x - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KwsPHP 1.0 Member_Space Module - SQL Injection | This is a webapps exploit for php platform. Description: KwsPHP 1.0 Member_Space Module - SQL Injection. Author: s4mi |
Analyze the security implications of: KwsPHP 1.0 Member_Space Module - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.