input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CMS Made Simple Module Download Manager 1.4.1 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: CMS Made Simple Module Download Manager 1.4.1 - Arbitrary File Upload. Author: John Leitch |
Analyze the security implications of: CMS Made Simple Module Download Manager 1.4.1 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Agent Tesla Botnet - Arbitrary Code Execution | This is a remote exploit for php platform. Description: Agent Tesla Botnet - Arbitrary Code Execution. Author: prsecurity |
Analyze the security implications of: Agent Tesla Botnet - Arbitrary Code Execution | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gobbl CMS 1.0 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Gobbl CMS 1.0 - Insecure Cookie Handling. Author: x0r |
Analyze the security implications of: Gobbl CMS 1.0 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Postfix 2.6-20080814 - 'symlink' Local Privilege Escalation | This is a local exploit for linux platform. Description: Postfix 2.6-20080814 - 'symlink' Local Privilege Escalation. Author: RoMaNSoFt |
Analyze the security implications of: Postfix 2.6-20080814 - 'symlink' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BIND 9.5.0-P2 - 'Randomized Ports' Remote DNS Cache Poisoning | This is a remote exploit for multiple platform. Description: BIND 9.5.0-P2 - 'Randomized Ports' Remote DNS Cache Poisoning. Author: Zbr |
Analyze the security implications of: BIND 9.5.0-P2 - 'Randomized Ports' Remote DNS Cache Poisoning | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Thyme 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Thyme 1.0 - SQL Injection. Author: Ded MustD!e |
Analyze the security implications of: Joomla! Component Thyme 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Easy Search System 1.1 - 'search.cgi' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Easy Search System 1.1 - 'search.cgi' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: Easy Search System 1.1 - 'search.cgi' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Netgear R7000 / R6400 - 'cgi-bin' Command Injection (Metasploit) | This is a remote exploit for cgi platform. Description: Netgear R7000 / R6400 - 'cgi-bin' Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: Netgear R7000 / R6400 - 'cgi-bin' Command Injection (Metasploit) | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: OpenSSH 4.3 p1 - Duplicated Block Remote Denial of Service | This is a dos exploit for multiple platform. Description: OpenSSH 4.3 p1 - Duplicated Block Remote Denial of Service. Author: Tavis Ormandy |
Analyze the security implications of: OpenSSH 4.3 p1 - Duplicated Block Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Sitefinity CMS 9.2 - Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Sitefinity CMS 9.2 - Cross-Site Scripting. Author: Pralhad Chaskar |
Analyze the security implications of: Sitefinity CMS 9.2 - Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: F5 FirePass 6.0.2.3 - '/vdesk/admincon/webyfiers.php?css_exceptions' Cross-Site Scripting | This is a remote exploit for hardware platform. Description: F5 FirePass 6.0.2.3 - '/vdesk/admincon/webyfiers.php?css_exceptions' Cross-Site Scripting. Author: nnposter |
Analyze the security implications of: F5 FirePass 6.0.2.3 - '/vdesk/admincon/webyfiers.php?css_exceptions' Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FlexNet Publisher 11.12.1 - Cross-Site Request Forgery (Add Local Admin) | This is a webapps exploit for php platform. Description: FlexNet Publisher 11.12.1 - Cross-Site Request Forgery (Add Local Admin). Author: Ismail Tasdelen |
Analyze the security implications of: FlexNet Publisher 11.12.1 - Cross-Site Request Forgery (Add Local Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sitefinity 15.0 - Cross-Site Scripting (XSS) | This is a webapps exploit for multiple platform. Description: Sitefinity 15.0 - Cross-Site Scripting (XSS). Author: Aldi Saputra Wahyudi |
Analyze the security implications of: Sitefinity 15.0 - Cross-Site Scripting (XSS) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Palo Alto Networks PanOS - 'root_reboot' Local Privilege Escalation | This is a local exploit for linux platform. Description: Palo Alto Networks PanOS - 'root_reboot' Local Privilege Escalation. Author: Google Security Research |
Analyze the security implications of: Palo Alto Networks PanOS - 'root_reboot' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Oracle Application Server 9i Webcache - Arbitrary File Corruption | This is a remote exploit for multiple platform. Description: Oracle Application Server 9i Webcache - Arbitrary File Corruption. Author: Alexander Kornbrust |
Analyze the security implications of: Oracle Application Server 9i Webcache - Arbitrary File Corruption | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Kentico Xperience 13.0.178 - Cross Site Scripting (XSS) | This is a webapps exploit for multiple platform. Description: Kentico Xperience 13.0.178 - Cross Site Scripting (XSS). Author: Alex Messham |
Analyze the security implications of: Kentico Xperience 13.0.178 - Cross Site Scripting (XSS) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Java-springboot-codebase 1.1 - Arbitrary File Read | This is a webapps exploit for java platform. Description: Java-springboot-codebase 1.1 - Arbitrary File Read. Author: d3sca |
Analyze the security implications of: Java-springboot-codebase 1.1 - Arbitrary File Read | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Advaced-Clan-Script 3.4 - 'mcf.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Advaced-Clan-Script 3.4 - 'mcf.php' Remote File Inclusion. Author: xdh |
Analyze the security implications of: Advaced-Clan-Script 3.4 - 'mcf.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebKit 1.2.x - Right-to-Left Displayed Text Handling Memory Corruption | This is a remote exploit for linux platform. Description: WebKit 1.2.x - Right-to-Left Displayed Text Handling Memory Corruption. Author: wushi |
Analyze the security implications of: WebKit 1.2.x - Right-to-Left Displayed Text Handling Memory Corruption | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Chrome V8 JIT - JSBuiltinReducer::ReduceObjectCreate Fails to Ensure that the Prototype is _null_ | This is a dos exploit for multiple platform. Description: Chrome V8 JIT - JSBuiltinReducer::ReduceObjectCreate Fails to Ensure that the Prototype is _null_. Author: Google Security Research |
Analyze the security implications of: Chrome V8 JIT - JSBuiltinReducer::ReduceObjectCreate Fails to Ensure that the Prototype is _null_ | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: McAfee Web Gateway 7.1.5.x - 'Host' HTTP Header Security Bypass | This is a remote exploit for multiple platform. Description: McAfee Web Gateway 7.1.5.x - 'Host' HTTP Header Security Bypass. Author: Gabriel Menezes Nunes |
Analyze the security implications of: McAfee Web Gateway 7.1.5.x - 'Host' HTTP Header Security Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ZTE ZXHN H108N R1A / ZXV10 W300 Routers - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: ZTE ZXHN H108N R1A / ZXV10 W300 Routers - Multiple Vulnerabilities. Author: Karn Ganeshen |
Analyze the security implications of: ZTE ZXHN H108N R1A / ZXV10 W300 Routers - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ae2 - 'standart.inc.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: ae2 - 'standart.inc.php' Remote File Inclusion. Author: k1tk4t |
Analyze the security implications of: ae2 - 'standart.inc.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ZyWALL 100 HTTP Referer Header - Cross-Site Scripting | This is a remote exploit for multiple platform. Description: ZyWALL 100 HTTP Referer Header - Cross-Site Scripting. Author: Deniz Cevik |
Analyze the security implications of: ZyWALL 100 HTTP Referer Header - Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Horde Groupware Webmail 3/4/5 - Multiple Remote Code Executions | This is a webapps exploit for php platform. Description: Horde Groupware Webmail 3/4/5 - Multiple Remote Code Executions. Author: SecuriTeam |
Analyze the security implications of: Horde Groupware Webmail 3/4/5 - Multiple Remote Code Executions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.x - 'SYS_EPoll_Wait' Local Integer Overflow / Local Privilege Escalation (1) | This is a local exploit for linux platform. Description: Linux Kernel 2.6.x - 'SYS_EPoll_Wait' Local Integer Overflow / Local Privilege Escalation (1). Author: sd |
Analyze the security implications of: Linux Kernel 2.6.x - 'SYS_EPoll_Wait' Local Integer Overflow / Local Privilege Escalation (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache Geronimo 2.1.3 - Multiple Directory Traversal Vulnerabilities | This is a remote exploit for multiple platform. Description: Apache Geronimo 2.1.3 - Multiple Directory Traversal Vulnerabilities. Author: DSecRG |
Analyze the security implications of: Apache Geronimo 2.1.3 - Multiple Directory Traversal Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Drake CMS 0.4.11 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Drake CMS 0.4.11 - Blind SQL Injection. Author: EgiX |
Analyze the security implications of: Drake CMS 0.4.11 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: StanWeb.CMS - SQL Injection | This is a webapps exploit for asp platform. Description: StanWeb.CMS - SQL Injection. Author: JosS |
Analyze the security implications of: StanWeb.CMS - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component redSHOP 1.2 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component redSHOP 1.2 - SQL Injection. Author: Matias Fontanini |
Analyze the security implications of: Joomla! Component redSHOP 1.2 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component EasyBook 2.0.0rc4 - Multiple HTML Injection Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component EasyBook 2.0.0rc4 - Multiple HTML Injection Vulnerabilities. Author: Jeff Channell |
Analyze the security implications of: Joomla! Component EasyBook 2.0.0rc4 - Multiple HTML Injection Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Intellinet NFC-30IR Camera - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Intellinet NFC-30IR Camera - Multiple Vulnerabilities. Author: Dimitri Fousekis |
Analyze the security implications of: Intellinet NFC-30IR Camera - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: H2O-CMS 3.4 - PHP Code Injection / Cookie Authentication Bypass | This is a webapps exploit for php platform. Description: H2O-CMS 3.4 - PHP Code Injection / Cookie Authentication Bypass. Author: StAkeR |
Analyze the security implications of: H2O-CMS 3.4 - PHP Code Injection / Cookie Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.