input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Huawei (Multiple Products) - Password Encryption | This is a remote exploit for hardware platform. Description: Huawei (Multiple Products) - Password Encryption. Author: Roberto Paleari |
Analyze the security implications of: Huawei (Multiple Products) - Password Encryption | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Gallery Kys 1.0 - Admin Password Disclosure / Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Gallery Kys 1.0 - Admin Password Disclosure / Persistent Cross-Site Scripting. Author: Osirys |
Analyze the security implications of: Gallery Kys 1.0 - Admin Password Disclosure / Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GeoBlog MOD_1.0 - 'viewcat.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: GeoBlog MOD_1.0 - 'viewcat.php' Cross-Site Scripting. Author: SubjectZero |
Analyze the security implications of: GeoBlog MOD_1.0 - 'viewcat.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: macOS - 'sysctl_vfs_generic_conf' Stack Leak Through Struct Padding | This is a dos exploit for macos platform. Description: macOS - 'sysctl_vfs_generic_conf' Stack Leak Through Struct Padding. Author: Google Security Research |
Analyze the security implications of: macOS - 'sysctl_vfs_generic_conf' Stack Leak Through Struct Padding | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: RXGoogle.CGI 1.0/2.5 - Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: RXGoogle.CGI 1.0/2.5 - Cross-Site Scripting. Author: Shaun Colley |
Analyze the security implications of: RXGoogle.CGI 1.0/2.5 - Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Mozilla Firefox/Thunderbird/SeaMonkey - Multiple HTML Injection Vulnerabilities | This is a remote exploit for linux platform. Description: Mozilla Firefox/Thunderbird/SeaMonkey - Multiple HTML Injection Vulnerabilities. Author: Yosuke Hasegawa |
Analyze the security implications of: Mozilla Firefox/Thunderbird/SeaMonkey - Multiple HTML Injection Vulnerabilities | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: kervinet forum 1.1 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: kervinet forum 1.1 - Multiple Vulnerabilities. Author: eLwaux |
Analyze the security implications of: kervinet forum 1.1 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Campsite CMS 3.4.0 - Multiple Cross-Site Request Forgery Vulnerabilities | This is a webapps exploit for php platform. Description: Campsite CMS 3.4.0 - Multiple Cross-Site Request Forgery Vulnerabilities. Author: 10n1z3d |
Analyze the security implications of: Campsite CMS 3.4.0 - Multiple Cross-Site Request Forgery Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenBSD 4.x - Portmap Remote Denial of Service | This is a dos exploit for bsd platform. Description: OpenBSD 4.x - Portmap Remote Denial of Service. Author: auto236751 |
Analyze the security implications of: OpenBSD 4.x - Portmap Remote Denial of Service | This exploit targets bsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Seowonintech Routers fw: 2.3.9 - File Disclosure | This is a webapps exploit for hardware platform. Description: Seowonintech Routers fw: 2.3.9 - File Disclosure. Author: Todor Donev |
Analyze the security implications of: Seowonintech Routers fw: 2.3.9 - File Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Wireless Tools 26 (IWConfig) - ARGV Local Command Line Buffer Overflow (2) | This is a local exploit for linux platform. Description: Wireless Tools 26 (IWConfig) - ARGV Local Command Line Buffer Overflow (2). Author: heka |
Analyze the security implications of: Wireless Tools 26 (IWConfig) - ARGV Local Command Line Buffer Overflow (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Multiple OEM - 'nsd' Remote Stack Format String (PoC) | This is a dos exploit for multiple platform. Description: Multiple OEM - 'nsd' Remote Stack Format String (PoC). Author: bashis |
Analyze the security implications of: Multiple OEM - 'nsd' Remote Stack Format String (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GNU glibc - Multiple Local Stack Buffer Overflow Vulnerabilities | This is a local exploit for linux platform. Description: GNU glibc - Multiple Local Stack Buffer Overflow Vulnerabilities. Author: Joseph S. Myer |
Analyze the security implications of: GNU glibc - Multiple Local Stack Buffer Overflow Vulnerabilities | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Reliable Datagram Sockets (RDS) - rds_atomic_free_op NULL pointer dereference Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: Reliable Datagram Sockets (RDS) - rds_atomic_free_op NULL pointer dereference Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: Reliable Datagram Sockets (RDS) - rds_atomic_free_op NULL pointer dereference Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: TANne 0.6.17 - Session Manager SysLog Format String | This is a remote exploit for linux platform. Description: TANne 0.6.17 - Session Manager SysLog Format String. Author: dong-h0un yoU |
Analyze the security implications of: TANne 0.6.17 - Session Manager SysLog Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: VMware Hyperic HQ Groovy Script-Console - Java Execution (Metasploit) | This is a remote exploit for multiple platform. Description: VMware Hyperic HQ Groovy Script-Console - Java Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: VMware Hyperic HQ Groovy Script-Console - Java Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Belkin F5D8233-4 Wireless N Router (Multiple Scripts) - Authentication Bypass | This is a remote exploit for hardware platform. Description: Belkin F5D8233-4 Wireless N Router (Multiple Scripts) - Authentication Bypass. Author: Craig Heffner |
Analyze the security implications of: Belkin F5D8233-4 Wireless N Router (Multiple Scripts) - Authentication Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Airlive IP Cameras - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Airlive IP Cameras - Multiple Vulnerabilities. Author: Sánchez_ Lopez_ Castillo |
Analyze the security implications of: Airlive IP Cameras - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Fullaspsite Asp Hosting Sitesi - 'tr' SQL Injection | This is a webapps exploit for asp platform. Description: Fullaspsite Asp Hosting Sitesi - 'tr' SQL Injection. Author: cl24zy |
Analyze the security implications of: Fullaspsite Asp Hosting Sitesi - 'tr' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FreeBSD 3.4/4.0/5.0 / NetBSD 1.4 - Unaligned IP Option Denial of Service | This is a dos exploit for bsd platform. Description: FreeBSD 3.4/4.0/5.0 / NetBSD 1.4 - Unaligned IP Option Denial of Service. Author: y3t1 |
Analyze the security implications of: FreeBSD 3.4/4.0/5.0 / NetBSD 1.4 - Unaligned IP Option Denial of Service | This exploit targets bsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Adobe ColdFusion Server 8.0.1 - '/administrator/enter.cfm' Query String Cross-Site Scripting | This is a webapps exploit for cfm platform. Description: Adobe ColdFusion Server 8.0.1 - '/administrator/enter.cfm' Query String Cross-Site Scripting. Author: Alexander Polyakov |
Analyze the security implications of: Adobe ColdFusion Server 8.0.1 - '/administrator/enter.cfm' Query String Cross-Site Scripting | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: Kerio MailServer 5.6.3 - Web Mail DO_MAP Module Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Kerio MailServer 5.6.3 - Web Mail DO_MAP Module Cross-Site Scripting. Author: David F.Madrid |
Analyze the security implications of: Kerio MailServer 5.6.3 - Web Mail DO_MAP Module Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: LogicalDOC Enterprise 7.7.4 - User Enumeration | This is a webapps exploit for java platform. Description: LogicalDOC Enterprise 7.7.4 - User Enumeration. Author: LiquidWorm |
Analyze the security implications of: LogicalDOC Enterprise 7.7.4 - User Enumeration | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: HP-UX 11i - 'swask' Format String Privilege Escalation | This is a local exploit for hp-ux platform. Description: HP-UX 11i - 'swask' Format String Privilege Escalation. Author: prdelka |
Analyze the security implications of: HP-UX 11i - 'swask' Format String Privilege Escalation | This exploit targets hp-ux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: ClientExec 3.0 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: ClientExec 3.0 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t |
Analyze the security implications of: ClientExec 3.0 - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GestArt Beta 1 - 'aide.php?aide' Remote File Inclusion | This is a webapps exploit for php platform. Description: GestArt Beta 1 - 'aide.php?aide' Remote File Inclusion. Author: Dj7xpl |
Analyze the security implications of: GestArt Beta 1 - 'aide.php?aide' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Router ZTE-H108NS - Authentication Bypass | This is a remote exploit for hardware platform. Description: Router ZTE-H108NS - Authentication Bypass. Author: George Tsimpidas |
Analyze the security implications of: Router ZTE-H108NS - Authentication Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: IBM DB2 - 'DT_RPATH' Insecure Library Loading Arbitrary Code Execution | This is a remote exploit for multiple platform. Description: IBM DB2 - 'DT_RPATH' Insecure Library Loading Arbitrary Code Execution. Author: Tim Brown |
Analyze the security implications of: IBM DB2 - 'DT_RPATH' Insecure Library Loading Arbitrary Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: e107 website system 0.7.5 - 'signup.php?Query String (PATH_INFO)' Cross-Site Scripting | This is a webapps exploit for php platform. Description: e107 website system 0.7.5 - 'signup.php?Query String (PATH_INFO)' Cross-Site Scripting. Author: zark0vac |
Analyze the security implications of: e107 website system 0.7.5 - 'signup.php?Query String (PATH_INFO)' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.30 - 'atalk_getname()' 8-bytes Stack Disclosure (1) | This is a local exploit for linux platform. Description: Linux Kernel 2.6.30 - 'atalk_getname()' 8-bytes Stack Disclosure (1). Author: Clément Lecigne |
Analyze the security implications of: Linux Kernel 2.6.30 - 'atalk_getname()' 8-bytes Stack Disclosure (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CMS Made Simple 2.2.15 - 'title' Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: CMS Made Simple 2.2.15 - 'title' Cross-Site Scripting (XSS). Author: bt0 |
Analyze the security implications of: CMS Made Simple 2.2.15 - 'title' Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: RealNetworks (Multiple Products) - Multiple Buffer Overflow Vulnerabilities | This is a dos exploit for multiple platform. Description: RealNetworks (Multiple Products) - Multiple Buffer Overflow Vulnerabilities. Author: Federico L. Bossi Bonin |
Analyze the security implications of: RealNetworks (Multiple Products) - Multiple Buffer Overflow Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cash Back Comparison Script 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Cash Back Comparison Script 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Cash Back Comparison Script 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: xtokkaetama 1.0b (RedHat 9.0) - Local Game | This is a local exploit for linux platform. Description: xtokkaetama 1.0b (RedHat 9.0) - Local Game. Author: brahma |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.