input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Wyse Rapport Hagent Fake Hserver - Command Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Wyse Rapport Hagent Fake Hserver - Command Execution (Metasploit). Author: kf |
Analyze the security implications of: Wyse Rapport Hagent Fake Hserver - Command Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mozilla Firefox - view-source:JavaScript url Code Execution | This is a remote exploit for multiple platform. Description: Mozilla Firefox - view-source:JavaScript url Code Execution. Author: mikx |
Analyze the security implications of: Mozilla Firefox - view-source:JavaScript url Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: WebKit - 'Element::setAttributeNodeNS' Use-After-Free | This is a dos exploit for multiple platform. Description: WebKit - 'Element::setAttributeNodeNS' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: WebKit - 'Element::setAttributeNodeNS' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BrewBlogger 1.3.1 - 'printLog.php' SQL Injection | This is a webapps exploit for php platform. Description: BrewBlogger 1.3.1 - 'printLog.php' SQL Injection. Author: Craig Heffner |
Analyze the security implications of: BrewBlogger 1.3.1 - 'printLog.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Centreon IT & Network Monitoring 2.1.5 - SQL Injection | This is a webapps exploit for php platform. Description: Centreon IT & Network Monitoring 2.1.5 - SQL Injection. Author: Jonathan Salwan |
Analyze the security implications of: Centreon IT & Network Monitoring 2.1.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Empire CMS 47 - SQL Injection | This is a webapps exploit for php platform. Description: Empire CMS 47 - SQL Injection. Author: Securitylab Security Research |
Analyze the security implications of: Empire CMS 47 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo 4.5.2.1 - SQL Injection | This is a webapps exploit for php platform. Description: Mambo 4.5.2.1 - SQL Injection. Author: RusH |
Analyze the security implications of: Mambo 4.5.2.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Counter Strike: GO - '.bsp' Memory Control (PoC) | This is a local exploit for multiple platform. Description: Counter Strike: GO - '.bsp' Memory Control (PoC). Author: 0day enthusiast |
Analyze the security implications of: Counter Strike: GO - '.bsp' Memory Control (PoC) | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component JoomRecipe 1.0.3 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JoomRecipe 1.0.3 - SQL Injection. Author: EziBilisim |
Analyze the security implications of: Joomla! Component JoomRecipe 1.0.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Creative Software UK Community Portal 1.1 - 'DiscView.php?forum_id' SQL Injection | This is a webapps exploit for php platform. Description: Creative Software UK Community Portal 1.1 - 'DiscView.php?forum_id' SQL Injection. Author: r0t |
Analyze the security implications of: Creative Software UK Community Portal 1.1 - 'DiscView.php?forum_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Schneider Electric U.Motion Builder 1.3.4 - Authenticated Command Injection | This is a webapps exploit for hardware platform. Description: Schneider Electric U.Motion Builder 1.3.4 - Authenticated Command Injection. Author: Cosmin Craciun |
Analyze the security implications of: Schneider Electric U.Motion Builder 1.3.4 - Authenticated Command Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apache James Server 2.3.2 - Remote Command Execution | This is a remote exploit for linux platform. Description: Apache James Server 2.3.2 - Remote Command Execution. Author: Jakub Palaczynski |
Analyze the security implications of: Apache James Server 2.3.2 - Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Crysis 1.21 - HTTP/XML-RPC Service Remote Denial of Service | This is a dos exploit for multiple platform. Description: Crysis 1.21 - HTTP/XML-RPC Service Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Crysis 1.21 - HTTP/XML-RPC Service Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: D-Link DSL-2750u ME_1.09 - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: D-Link DSL-2750u ME_1.09 - Cross-Site Request Forgery. Author: FIGHTERx war |
Analyze the security implications of: D-Link DSL-2750u ME_1.09 - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Consumer Complaints Clone Script 1.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Consumer Complaints Clone Script 1.0 - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Consumer Complaints Clone Script 1.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: McAfee Network Security Manager 5.1.7 - Information Disclosure | This is a webapps exploit for jsp platform. Description: McAfee Network Security Manager 5.1.7 - Information Disclosure. Author: Daniel King |
Analyze the security implications of: McAfee Network Security Manager 5.1.7 - Information Disclosure | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: UseModWiki 1.0 - Wiki.pl Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: UseModWiki 1.0 - Wiki.pl Cross-Site Scripting. Author: Jeremy Bae |
Analyze the security implications of: UseModWiki 1.0 - Wiki.pl Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Mtp-Target 1.2.2 Client - Remote Format String | This is a remote exploit for multiple platform. Description: Mtp-Target 1.2.2 Client - Remote Format String. Author: Luigi Auriemma |
Analyze the security implications of: Mtp-Target 1.2.2 Client - Remote Format String | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: EggBlog 3.1.10 - Cross-Site Request Forgery (Change Admin Password) | This is a webapps exploit for php platform. Description: EggBlog 3.1.10 - Cross-Site Request Forgery (Change Admin Password). Author: x0r |
Analyze the security implications of: EggBlog 3.1.10 - Cross-Site Request Forgery (Change Admin Password) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Citrix Application Delivery Controller and Citrix Gateway - Remote Code Execution | This is a webapps exploit for multiple platform. Description: Citrix Application Delivery Controller and Citrix Gateway - Remote Code Execution. Author: TrustedSec |
Analyze the security implications of: Citrix Application Delivery Controller and Citrix Gateway - Remote Code Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) | This is a remote exploit for php platform. Description: Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ClipperCMS 1.3.0 - Code Execution | This is a remote exploit for php platform. Description: ClipperCMS 1.3.0 - Code Execution. Author: Curesec Research Team |
Analyze the security implications of: ClipperCMS 1.3.0 - Code Execution | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ghostscript 'CCITTFax' Decoding Filter - Denial of Service | This is a dos exploit for multiple platform. Description: Ghostscript 'CCITTFax' Decoding Filter - Denial of Service. Author: Red Hat |
Analyze the security implications of: Ghostscript 'CCITTFax' Decoding Filter - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: D-Link DSL-2640U - DNS Change | This is a webapps exploit for hardware platform. Description: D-Link DSL-2640U - DNS Change. Author: Todor Donev |
Analyze the security implications of: D-Link DSL-2640U - DNS Change | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: D-Park Pro 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: D-Park Pro 1.0 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: D-Park Pro 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AllMyGuests 0.4.1 - 'AMG_id' SQL Injection | This is a webapps exploit for php platform. Description: AllMyGuests 0.4.1 - 'AMG_id' SQL Injection. Author: Player |
Analyze the security implications of: AllMyGuests 0.4.1 - 'AMG_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pirelli DRG A115 ADSL Router - DNS Change | This is a webapps exploit for hardware platform. Description: Pirelli DRG A115 ADSL Router - DNS Change. Author: Todor Donev |
Analyze the security implications of: Pirelli DRG A115 ADSL Router - DNS Change | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Bubla 1.0.0rc2 - '/bu/process.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Bubla 1.0.0rc2 - '/bu/process.php' Remote File Inclusion. Author: DeltahackingTEAM |
Analyze the security implications of: Bubla 1.0.0rc2 - '/bu/process.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SOOP Portal Raven 1.0b - Arbitrary File Upload | This is a webapps exploit for asp platform. Description: SOOP Portal Raven 1.0b - Arbitrary File Upload. Author: Sun Army |
Analyze the security implications of: SOOP Portal Raven 1.0b - Arbitrary File Upload | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: DNSTracer 1.8.1 - Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: DNSTracer 1.8.1 - Buffer Overflow (PoC). Author: FarazPajohan |
Analyze the security implications of: DNSTracer 1.8.1 - Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CommunityPortals 1.0 - 'bug.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: CommunityPortals 1.0 - 'bug.php' Remote File Inclusion. Author: Nima Salehi |
Analyze the security implications of: CommunityPortals 1.0 - 'bug.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AMember Pro 2.3.4 - Remote File Inclusion | This is a webapps exploit for php platform. Description: AMember Pro 2.3.4 - Remote File Inclusion. Author: NewAngels Team |
Analyze the security implications of: AMember Pro 2.3.4 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Blink1Control2 2.2.7 - Weak Password Encryption | This is a local exploit for multiple platform. Description: Blink1Control2 2.2.7 - Weak Password Encryption. Author: p1ckzi |
Analyze the security implications of: Blink1Control2 2.2.7 - Weak Password Encryption | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Kamailio 4.3.4 - Heap Buffer Overflow | This is a dos exploit for linux platform. Description: Kamailio 4.3.4 - Heap Buffer Overflow. Author: Stelios Tsampas |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.