input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: DeleGate 7.8.x/8.x - SSLway Filter Remote Stack Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: DeleGate 7.8.x/8.x - SSLway Filter Remote Stack Buffer Overflow (PoC). Author: Joel Eriksson |
Analyze the security implications of: DeleGate 7.8.x/8.x - SSLway Filter Remote Stack Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Wyrestorm Apollo VX20 < 1.3.58 - Incorrect Access Control 'Credentials Disclosure' | This is a remote exploit for multiple platform. Description: Wyrestorm Apollo VX20 < 1.3.58 - Incorrect Access Control 'Credentials Disclosure'. Author: hyp3rlinx |
Analyze the security implications of: Wyrestorm Apollo VX20 < 1.3.58 - Incorrect Access Control 'Credentials Disclosure' | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ZamFoo - Multiple Remote Command Execution Vulnerabilities | This is a webapps exploit for cgi platform. Description: ZamFoo - Multiple Remote Command Execution Vulnerabilities. Author: Al-Shabaab |
Analyze the security implications of: ZamFoo - Multiple Remote Command Execution Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: YaBB 9.1.2000 - Cross-Agent Scripting | This is a webapps exploit for cgi platform. Description: YaBB 9.1.2000 - Cross-Agent Scripting. Author: Obscure |
Analyze the security implications of: YaBB 9.1.2000 - Cross-Agent Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Nortel SSL VPN 4.2.1.6 - Web Interface Input Validation | This is a webapps exploit for cgi platform. Description: Nortel SSL VPN 4.2.1.6 - Web Interface Input Validation. Author: Daniel Fabian |
Analyze the security implications of: Nortel SSL VPN 4.2.1.6 - Web Interface Input Validation | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Leif M. Wright Web Blog 1.1 - Remote Command Execution | This is a webapps exploit for cgi platform. Description: Leif M. Wright Web Blog 1.1 - Remote Command Execution. Author: ActualMInd |
Analyze the security implications of: Leif M. Wright Web Blog 1.1 - Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Lotus Domino Enterprise Server 5.0.1/5.0.2/5.0.3 / Mail Server 5.0.1/5.0.2/5.0.3 - Remote Buffer Overflow | This is a remote exploit for multiple platform. Description: Lotus Domino Enterprise Server 5.0.1/5.0.2/5.0.3 / Mail Server 5.0.1/5.0.2/5.0.3 - Remote Buffer Overflow. Author: smiler |
Analyze the security implications of: Lotus Domino Enterprise Server 5.0.1/5.0.2/5.0.3 / Mail Server 5.0.1/5.0.2/5.0.3 - Remote Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component IRCm Basic - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component IRCm Basic - SQL Injection. Author: kaMtiEz |
Analyze the security implications of: Joomla! Component IRCm Basic - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: b2ePms 1.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: b2ePms 1.0 - Authentication Bypass. Author: Jean Pascal Pereira |
Analyze the security implications of: b2ePms 1.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple qlmanage - SceneKit::daeElement::setElementName Heap Overflow | This is a dos exploit for osx platform. Description: Apple qlmanage - SceneKit::daeElement::setElementName Heap Overflow. Author: Google Security Research |
Analyze the security implications of: Apple qlmanage - SceneKit::daeElement::setElementName Heap Overflow | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Joomla! Component com_route - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_route - SQL Injection. Author: N2n-Hacker |
Analyze the security implications of: Joomla! Component com_route - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mitsubishi Electric & INEA SmartRTU - Source Code Disclosure | This is a webapps exploit for hardware platform. Description: Mitsubishi Electric & INEA SmartRTU - Source Code Disclosure. Author: Hamit CİBO |
Analyze the security implications of: Mitsubishi Electric & INEA SmartRTU - Source Code Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: IntelBras TELEFONE IP TIP200/200 LITE 60.61.75.15 - Arbitrary File Read | This is a remote exploit for hardware platform. Description: IntelBras TELEFONE IP TIP200/200 LITE 60.61.75.15 - Arbitrary File Read. Author: Todor Donev |
Analyze the security implications of: IntelBras TELEFONE IP TIP200/200 LITE 60.61.75.15 - Arbitrary File Read | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: 2BGal 3.0 - '/admin/configuration.inc.php' Local File Inclusion | This is a webapps exploit for php platform. Description: 2BGal 3.0 - '/admin/configuration.inc.php' Local File Inclusion. Author: Kw3[R]Ln |
Analyze the security implications of: 2BGal 3.0 - '/admin/configuration.inc.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Angular-Base64-Upload Library 0.1.20 - Remote Code Execution (RCE) | This is a remote exploit for multiple platform. Description: Angular-Base64-Upload Library 0.1.20 - Remote Code Execution (RCE). Author: Ravindu Wickramasinghe |
Analyze the security implications of: Angular-Base64-Upload Library 0.1.20 - Remote Code Execution (RCE) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mozilla Firefox 3.0.10 - 'KEYGEN' Remote Denial of Service | This is a dos exploit for multiple platform. Description: Mozilla Firefox 3.0.10 - 'KEYGEN' Remote Denial of Service. Author: Thierry Zoller |
Analyze the security implications of: Mozilla Firefox 3.0.10 - 'KEYGEN' Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DzzOffice 2.02.1 - 'Multiple' Cross-Site Scripting (XSS) | This is a webapps exploit for multiple platform. Description: DzzOffice 2.02.1 - 'Multiple' Cross-Site Scripting (XSS). Author: nu11secur1ty |
Analyze the security implications of: DzzOffice 2.02.1 - 'Multiple' Cross-Site Scripting (XSS) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ImageMagick 6.9.3-9 / 7.0.1-0 - 'ImageTragick' Delegate Arbitrary Command Execution (Metasploit) | This is a local exploit for multiple platform. Description: ImageMagick 6.9.3-9 / 7.0.1-0 - 'ImageTragick' Delegate Arbitrary Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: ImageMagick 6.9.3-9 / 7.0.1-0 - 'ImageTragick' Delegate Arbitrary Command Execution (Metasploit) | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component MS Comment 0.8.0b - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component MS Comment 0.8.0b - Local File Inclusion. Author: Xr0b0t |
Analyze the security implications of: Joomla! Component MS Comment 0.8.0b - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: jakcms 2.0 pro rc5 - Persistent Cross-Site Scripting via useragent http header Injection | This is a webapps exploit for php platform. Description: jakcms 2.0 pro rc5 - Persistent Cross-Site Scripting via useragent http header Injection. Author: Saif El-Sherei |
Analyze the security implications of: jakcms 2.0 pro rc5 - Persistent Cross-Site Scripting via useragent http header Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fenice Oms 1.10 - GET Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Fenice Oms 1.10 - GET Remote Buffer Overflow. Author: c0d3r |
Analyze the security implications of: Fenice Oms 1.10 - GET Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: eFront 3.6.9 - 'submitScore.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: eFront 3.6.9 - 'submitScore.php' Cross-Site Scripting. Author: John Leitch |
Analyze the security implications of: eFront 3.6.9 - 'submitScore.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! 1.5.22 / 1.6.0 - 'com_mailto' Spam Mail Relay | This is a webapps exploit for php platform. Description: Joomla! 1.5.22 / 1.6.0 - 'com_mailto' Spam Mail Relay. Author: Jeff Channell |
Analyze the security implications of: Joomla! 1.5.22 / 1.6.0 - 'com_mailto' Spam Mail Relay | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Faethon 1.3.2 - 'mainpath' Remote File Inclusion | This is a webapps exploit for php platform. Description: CMS Faethon 1.3.2 - 'mainpath' Remote File Inclusion. Author: K-159 |
Analyze the security implications of: CMS Faethon 1.3.2 - 'mainpath' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BibCiter 1.4 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: BibCiter 1.4 - Multiple SQL Injections. Author: nuclear |
Analyze the security implications of: BibCiter 1.4 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CrushFTP 7.2.0 - Multiple Vulnerabilities | This is a webapps exploit for multiple platform. Description: CrushFTP 7.2.0 - Multiple Vulnerabilities. Author: Rehan Ahmed |
Analyze the security implications of: CrushFTP 7.2.0 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component EContent - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component EContent - Local File Inclusion. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component EContent - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Websphere/JBoss/OpenNMS/Symantec Endpoint Protection Manager - Java Deserialization Remote Code Execution | This is a remote exploit for multiple platform. Description: Websphere/JBoss/OpenNMS/Symantec Endpoint Protection Manager - Java Deserialization Remote Code Execution. Author: Nikhil Sreekumar |
Analyze the security implications of: Websphere/JBoss/OpenNMS/Symantec Endpoint Protection Manager - Java Deserialization Remote Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ad Manager Pro 2.6 - 'ipath' Remote File Inclusion | This is a webapps exploit for php platform. Description: Ad Manager Pro 2.6 - 'ipath' Remote File Inclusion. Author: Basti |
Analyze the security implications of: Ad Manager Pro 2.6 - 'ipath' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Madirish Webmail 2.01 - 'baseDir' Local/Remote File Inclusion | This is a webapps exploit for php platform. Description: Madirish Webmail 2.01 - 'baseDir' Local/Remote File Inclusion. Author: eidelweiss |
Analyze the security implications of: Madirish Webmail 2.01 - 'baseDir' Local/Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: The Campus Request Repairs System 1.2 - 'sentout.asp' Unauthorized Access | This is a webapps exploit for asp platform. Description: The Campus Request Repairs System 1.2 - 'sentout.asp' Unauthorized Access. Author: Unohope |
Analyze the security implications of: The Campus Request Repairs System 1.2 - 'sentout.asp' Unauthorized Access | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Minix 3.1.2a - Remote TTY Panic (Denial of Service) | This is a dos exploit for minix platform. Description: Minix 3.1.2a - Remote TTY Panic (Denial of Service). Author: kokanin |
Analyze the security implications of: Minix 3.1.2a - Remote TTY Panic (Denial of Service) | This exploit targets minix systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets minix platform |
What is this exploit about: clickartweb Design - SQL Injection | This is a webapps exploit for php platform. Description: clickartweb Design - SQL Injection. Author: cyberlog |
Analyze the security implications of: clickartweb Design - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Budget Management System 1.0 - 'Budget title' Stored XSS | This is a webapps exploit for php platform. Description: Budget Management System 1.0 - 'Budget title' Stored XSS. Author: Jitendra Kumar Tripathi |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.