input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Apache Geronimo 2.1.x - Cross-Site Request Forgery (Multiple Admin Function) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: LG DVR LE6016D - Remote Users/Passwords Disclosure | This is a remote exploit for hardware platform. Description: LG DVR LE6016D - Remote Users/Passwords Disclosure. Author: Todor Donev |
Analyze the security implications of: LG DVR LE6016D - Remote Users/Passwords Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: OpenVAS Manager - Command Injection | This is a local exploit for linux platform. Description: OpenVAS Manager - Command Injection. Author: Tim Brown |
Analyze the security implications of: OpenVAS Manager - Command Injection | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WatchGuard Fireware AD Helper Component 5.8.5.10317 - Credential Disclosure | This is a webapps exploit for java platform. Description: WatchGuard Fireware AD Helper Component 5.8.5.10317 - Credential Disclosure. Author: RedTeam Pentesting GmbH |
Analyze the security implications of: WatchGuard Fireware AD Helper Component 5.8.5.10317 - Credential Disclosure | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Planet FPS-1101 - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: Planet FPS-1101 - Cross-Site Scripting. Author: b0telh0 |
Analyze the security implications of: Planet FPS-1101 - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linux Kernel 2.6.31 - 'perf_counter_open()' Local Buffer Overflow | This is a dos exploit for linux platform. Description: Linux Kernel 2.6.31 - 'perf_counter_open()' Local Buffer Overflow. Author: Xiao Guangrong |
Analyze the security implications of: Linux Kernel 2.6.31 - 'perf_counter_open()' Local Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ABG Blocking Script 1.0a - 'abg_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: ABG Blocking Script 1.0a - 'abg_path' Remote File Inclusion. Author: Lo$er |
Analyze the security implications of: ABG Blocking Script 1.0a - 'abg_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Telesquare TLR-2855KS6 - Arbitrary File Creation | This is a webapps exploit for hardware platform. Description: Telesquare TLR-2855KS6 - Arbitrary File Creation. Author: Momen Eldawakhly |
Analyze the security implications of: Telesquare TLR-2855KS6 - Arbitrary File Creation | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Trend Micro Deep Discovery Inspector IDS - Security Bypass | This is a remote exploit for multiple platform. Description: Trend Micro Deep Discovery Inspector IDS - Security Bypass. Author: hyp3rlinx |
Analyze the security implications of: Trend Micro Deep Discovery Inspector IDS - Security Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AS-GasTracker 1.0.0 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: AS-GasTracker 1.0.0 - Insecure Cookie Handling. Author: t0pP8uZz |
Analyze the security implications of: AS-GasTracker 1.0.0 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GenesisTrader 1.0 - 'form.php' Arbitrary File Source Disclosure | This is a webapps exploit for php platform. Description: GenesisTrader 1.0 - 'form.php' Arbitrary File Source Disclosure. Author: Mr_KaLiMaN |
Analyze the security implications of: GenesisTrader 1.0 - 'form.php' Arbitrary File Source Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (2) (DTLS Support) | This is a remote exploit for multiple platform. Description: OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (2) (DTLS Support). Author: Ayman Sagy |
Analyze the security implications of: OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (2) (DTLS Support) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CMScontrol (Content Management Portal Solutions) - SQL Injection | This is a webapps exploit for multiple platform. Description: CMScontrol (Content Management Portal Solutions) - SQL Injection. Author: ph1l1ster |
Analyze the security implications of: CMScontrol (Content Management Portal Solutions) - SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Wirtualna Polska WPKontakt 3.0.1 - Remote Script Execution | This is a webapps exploit for cgi platform. Description: Wirtualna Polska WPKontakt 3.0.1 - Remote Script Execution. Author: Poznan Supercomputing |
Analyze the security implications of: Wirtualna Polska WPKontakt 3.0.1 - Remote Script Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Inmostore 4.0 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: Inmostore 4.0 - 'index.php' SQL Injection. Author: Keniobats |
Analyze the security implications of: Inmostore 4.0 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gekko Web Builder 9.0 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Gekko Web Builder 9.0 - 'index.php' Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: Gekko Web Builder 9.0 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ActivDesk 3.0 - Multiple Vulnerabilities | This is a webapps exploit for cgi platform. Description: ActivDesk 3.0 - Multiple Vulnerabilities. Author: Brendan Coles |
Analyze the security implications of: ActivDesk 3.0 - Multiple Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: CyberArk Password Vault < 9.7 / < 10 - Memory Disclosure | This is a dos exploit for linux platform. Description: CyberArk Password Vault < 9.7 / < 10 - Memory Disclosure. Author: RedTeam Pentesting |
Analyze the security implications of: CyberArk Password Vault < 9.7 / < 10 - Memory Disclosure | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Novell ZENworks Patch Management 6.0.52 - '/reports/default.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Novell ZENworks Patch Management 6.0.52 - '/reports/default.asp' Multiple SQL Injections. Author: Dennis Rand |
Analyze the security implications of: Novell ZENworks Patch Management 6.0.52 - '/reports/default.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Fonality trixbox 2.2.4 - 'PhonecDirectory.php' SQL Injection | This is a webapps exploit for php platform. Description: Fonality trixbox 2.2.4 - 'PhonecDirectory.php' SQL Injection. Author: NorSlacker |
Analyze the security implications of: Fonality trixbox 2.2.4 - 'PhonecDirectory.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GENU CMS - SQL Injection | This is a webapps exploit for php platform. Description: GENU CMS - SQL Injection. Author: hordcode security |
Analyze the security implications of: GENU CMS - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GC Auction Platinum - 'cate_id' SQL Injection | This is a webapps exploit for php platform. Description: GC Auction Platinum - 'cate_id' SQL Injection. Author: Hussin X |
Analyze the security implications of: GC Auction Platinum - 'cate_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ntop-ng < 3.4.180617 - Authentication Bypass | This is a webapps exploit for lua platform. Description: ntop-ng < 3.4.180617 - Authentication Bypass. Author: Ioannis Profetis |
Analyze the security implications of: ntop-ng < 3.4.180617 - Authentication Bypass | This exploit targets lua systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets lua platform |
What is this exploit about: Adobe Flash - Type Confusion in Serialization with ObjectEncoder.dynamicPropertyWriter | This is a dos exploit for multiple platform. Description: Adobe Flash - Type Confusion in Serialization with ObjectEncoder.dynamicPropertyWriter. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Type Confusion in Serialization with ObjectEncoder.dynamicPropertyWriter | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Blog:CMS 4.0.0k - SQL Injection | This is a webapps exploit for php platform. Description: Blog:CMS 4.0.0k - SQL Injection. Author: rgod |
Analyze the security implications of: Blog:CMS 4.0.0k - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: hustoj - 'FCKeditor' Arbitrary File Upload | This is a webapps exploit for php platform. Description: hustoj - 'FCKeditor' Arbitrary File Upload. Author: eidelweiss |
Analyze the security implications of: hustoj - 'FCKeditor' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Expinion.net News Manager Lite 2.5 - 'category_news_headline.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Expinion.net News Manager Lite 2.5 - 'category_news_headline.asp' Cross-Site Scripting. Author: Manuel Lopez |
Analyze the security implications of: Expinion.net News Manager Lite 2.5 - 'category_news_headline.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FAQ System 1.1 - 'viewFAQ.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: FAQ System 1.1 - 'viewFAQ.php' Multiple SQL Injections. Author: r0t |
Analyze the security implications of: FAQ System 1.1 - 'viewFAQ.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LEPTON 1.1.3 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: LEPTON 1.1.3 - Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: LEPTON 1.1.3 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DM FileManager 3.9.4 - Remote File Disclosure | This is a webapps exploit for php platform. Description: DM FileManager 3.9.4 - Remote File Disclosure. Author: Stack |
Analyze the security implications of: DM FileManager 3.9.4 - Remote File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LDAP Account Manager 3.4.0 - 'selfserviceSaveOk' Cross-Site Scripting | This is a webapps exploit for php platform. Description: LDAP Account Manager 3.4.0 - 'selfserviceSaveOk' Cross-Site Scripting. Author: AutoSec Tools |
Analyze the security implications of: LDAP Account Manager 3.4.0 - 'selfserviceSaveOk' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CodeAvalanche Articles - Database Disclosure | This is a webapps exploit for asp platform. Description: CodeAvalanche Articles - Database Disclosure. Author: Pouya_Server |
Analyze the security implications of: CodeAvalanche Articles - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component spidervideoplayer - 'theme' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component spidervideoplayer - 'theme' SQL Injection. Author: Claudio Viviani |
Analyze the security implications of: Joomla! Component spidervideoplayer - 'theme' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Inktomi Search Software 3.0 - Source Disclosure | This is a remote exploit for multiple platform. Description: Inktomi Search Software 3.0 - Source Disclosure. Author: china nsl |
Analyze the security implications of: Inktomi Search Software 3.0 - Source Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.