input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Text File Search Classic - 'TextFileSearch.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Eibiz i-Media Server Digital Signage 3.8.0 - Directory Traversal | This is a webapps exploit for multiple platform. Description: Eibiz i-Media Server Digital Signage 3.8.0 - Directory Traversal. Author: LiquidWorm |
Analyze the security implications of: Eibiz i-Media Server Digital Signage 3.8.0 - Directory Traversal | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution | This is a webapps exploit for php platform. Description: Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution. Author: Julien Ahrens |
Analyze the security implications of: Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: agorum core Pro 7.8.1.4-251 - Persistent Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: agorum core Pro 7.8.1.4-251 - Persistent Cross-Site Scripting. Author: SySS GmbH |
Analyze the security implications of: agorum core Pro 7.8.1.4-251 - Persistent Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ECOA Building Automation System - Cookie Poisoning Authentication Bypass | This is a webapps exploit for hardware platform. Description: ECOA Building Automation System - Cookie Poisoning Authentication Bypass. Author: Neurogenesia |
Analyze the security implications of: ECOA Building Automation System - Cookie Poisoning Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Drupal avatar_uploader v7.x-1.0-beta8 - Cross Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Drupal avatar_uploader v7.x-1.0-beta8 - Cross Site Scripting (XSS). Author: Milad karimi |
Analyze the security implications of: Drupal avatar_uploader v7.x-1.0-beta8 - Cross Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Corda Highwire - 'Highwire.ashx' Full Path Disclosure | This is a webapps exploit for asp platform. Description: Corda Highwire - 'Highwire.ashx' Full Path Disclosure. Author: Adam Willard |
Analyze the security implications of: Corda Highwire - 'Highwire.ashx' Full Path Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: BIG-IP 15.0.0 < 15.1.0.3 / 14.1.0 < 14.1.2.5 / 13.1.0 < 13.1.3.3 / 12.1.0 < 12.1.5.1 / 11.6.1 < 11.6.5.1 - Traffic Management User Interface 'TMUI' Remote Code Execution (PoC) | This is a webapps exploit for linux platform. Description: BIG-IP 15.0.0 < 15.1.0.3 / 14.1.0 < 14.1.2.5 / 13.1.0 < 13.1.3.3 / 12.1.0 < 12.1.5.1 / 11.6.1 < 11.6.5.1 - Traffic Management User Interface 'TMUI' Remote Code Execution (PoC). Author: Budi Khoirudin |
Analyze the security implications of: BIG-IP 15.0.0 < 15.1.0.3 / 14.1.0 < 14.1.2.5 / 13.1.0 < 13.1.3.3 / 12.1.0 < 12.1.5.1 / 11.6.1 < 11.6.5.1 - Traffic Management User Interface 'TMUI' R | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Maian Music 1.0 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Maian Music 1.0 - Insecure Cookie Handling. Author: Saime |
Analyze the security implications of: Maian Music 1.0 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: xorg-x11-server < 1.20.3 - 'modulepath' Local Privilege Escalation | This is a local exploit for multiple platform. Description: xorg-x11-server < 1.20.3 - 'modulepath' Local Privilege Escalation. Author: Marco Ivaldi |
Analyze the security implications of: xorg-x11-server < 1.20.3 - 'modulepath' Local Privilege Escalation | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_frontenduseraccess - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_frontenduseraccess - Local File Inclusion. Author: wishnusakti |
Analyze the security implications of: Joomla! Component com_frontenduseraccess - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Webmin 1.920 - Remote Code Execution | This is a webapps exploit for linux platform. Description: Webmin 1.920 - Remote Code Execution. Author: Fernando A. Lagos B |
Analyze the security implications of: Webmin 1.920 - Remote Code Execution | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: RarCrack 0.2 - 'Filename init() .bss' (PoC) | This is a dos exploit for linux platform. Description: RarCrack 0.2 - 'Filename init() .bss' (PoC). Author: Stoke |
Analyze the security implications of: RarCrack 0.2 - 'Filename init() .bss' (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FreeBSD 5.4-RELEASE ftpd 6.00LS - 'sendfile' Memory Leak | This is a local exploit for freebsd platform. Description: FreeBSD 5.4-RELEASE ftpd 6.00LS - 'sendfile' Memory Leak. Author: kingcope |
Analyze the security implications of: FreeBSD 5.4-RELEASE ftpd 6.00LS - 'sendfile' Memory Leak | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Funeral Script PHP - Cross-Site Scripting / SQL Injection | This is a webapps exploit for php platform. Description: Funeral Script PHP - Cross-Site Scripting / SQL Injection. Author: snup |
Analyze the security implications of: Funeral Script PHP - Cross-Site Scripting / SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Axis Communications 207W Network Camera - Web Interface axis-cgi/admin/restart.cgi Cross-Site Request Forgery | This is a webapps exploit for cgi platform. Description: Axis Communications 207W Network Camera - Web Interface axis-cgi/admin/restart.cgi Cross-Site Request Forgery. Author: Seth Fogie |
Analyze the security implications of: Axis Communications 207W Network Camera - Web Interface axis-cgi/admin/restart.cgi Cross-Site Request Forgery | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Apache 1.3 + PHP 3 - File Disclosure | This is a remote exploit for multiple platform. Description: Apache 1.3 + PHP 3 - File Disclosure. Author: china nsl |
Analyze the security implications of: Apache 1.3 + PHP 3 - File Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple iOS Mobile Safari - LibTIFF Buffer Overflow (Metasploit) | This is a remote exploit for ios platform. Description: Apple iOS Mobile Safari - LibTIFF Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Apple iOS Mobile Safari - LibTIFF Buffer Overflow (Metasploit) | This exploit targets ios systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: RSA WebID 5.3 - 'IISWebAgentIF.dll' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: RSA WebID 5.3 - 'IISWebAgentIF.dll' Cross-Site Scripting. Author: quentin.berdugo |
Analyze the security implications of: RSA WebID 5.3 - 'IISWebAgentIF.dll' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: LifeSize Room 5.0.9 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: LifeSize Room 5.0.9 - Multiple Vulnerabilities. Author: Xiphos Research Ltd |
Analyze the security implications of: LifeSize Room 5.0.9 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: KimsQ 040109 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: KimsQ 040109 - Multiple Remote File Inclusions. Author: mat |
Analyze the security implications of: KimsQ 040109 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Loko Media - Local File Download | This is a webapps exploit for php platform. Description: CMS Loko Media - Local File Download. Author: Xr0b0t |
Analyze the security implications of: CMS Loko Media - Local File Download | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Diesel Pay Script - 'area' SQL Injection | This is a webapps exploit for php platform. Description: Diesel Pay Script - 'area' SQL Injection. Author: ZoRLu |
Analyze the security implications of: Diesel Pay Script - 'area' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cygnus Network Security 4.0/KerbNet 5.0 / MIT Kerberos 4/5 / RedHat 6.2 - Compatibility 'krb_rd_req()' Remote Buffer Overflow (1) | This is a remote exploit for bsd platform. Description: Cygnus Network Security 4.0/KerbNet 5.0 / MIT Kerberos 4/5 / RedHat 6.2 - Compatibility 'krb_rd_req()' Remote Buffer Overflow (1). Author: duke |
Analyze the security implications of: Cygnus Network Security 4.0/KerbNet 5.0 / MIT Kerberos 4/5 / RedHat 6.2 - Compatibility 'krb_rd_req()' Remote Buffer Overflow (1) | This exploit targets bsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: PyPAM Python bindings for PAM - Double-Free Corruption | This is a dos exploit for linux platform. Description: PyPAM Python bindings for PAM - Double-Free Corruption. Author: Markus Vervier |
Analyze the security implications of: PyPAM Python bindings for PAM - Double-Free Corruption | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AppFusions Doxygen for Atlassian Confluence 1.3.2 - Cross-Site Scripting | This is a webapps exploit for java platform. Description: AppFusions Doxygen for Atlassian Confluence 1.3.2 - Cross-Site Scripting. Author: Julien Ahrens |
Analyze the security implications of: AppFusions Doxygen for Atlassian Confluence 1.3.2 - Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: D-Link DSL-2640B ADSL Router - Authentication Bypass | This is a webapps exploit for hardware platform. Description: D-Link DSL-2640B ADSL Router - Authentication Bypass. Author: Ivano Binetti |
Analyze the security implications of: D-Link DSL-2640B ADSL Router - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: HP Insight Diagnostics Online Edition 8.4 - 'idstatusframe.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: HP Insight Diagnostics Online Edition 8.4 - 'idstatusframe.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Mr Teatime |
Analyze the security implications of: HP Insight Diagnostics Online Edition 8.4 - 'idstatusframe.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BitchX 1.0 - Remote 'Send_CTCP()' Memory Corruption | This is a remote exploit for linux platform. Description: BitchX 1.0 - Remote 'Send_CTCP()' Memory Corruption. Author: eSDee |
Analyze the security implications of: BitchX 1.0 - Remote 'Send_CTCP()' Memory Corruption | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apache Tomcat 6.0.16 - 'HttpServletResponse.sendError()' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Apache Tomcat 6.0.16 - 'HttpServletResponse.sendError()' Cross-Site Scripting. Author: Konstantin Kolinko |
Analyze the security implications of: Apache Tomcat 6.0.16 - 'HttpServletResponse.sendError()' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: QNAP myQNAPcloud Connect 1.3.4.0317 - 'Username/Password' Denial of Service | This is a dos exploit for hardware platform. Description: QNAP myQNAPcloud Connect 1.3.4.0317 - 'Username/Password' Denial of Service. Author: Dino Covotsos |
Analyze the security implications of: QNAP myQNAPcloud Connect 1.3.4.0317 - 'Username/Password' Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Sun Calendar Express Web Server - Denial of Service / Cross-Site Scripting | This is a dos exploit for multiple platform. Description: Sun Calendar Express Web Server - Denial of Service / Cross-Site Scripting. Author: Core Security |
Analyze the security implications of: Sun Calendar Express Web Server - Denial of Service / Cross-Site Scripting | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: OpenJournal 2.0 - Authentication Bypassing | This is a webapps exploit for cgi platform. Description: OpenJournal 2.0 - Authentication Bypassing. Author: Tri Huynh |
Analyze the security implications of: OpenJournal 2.0 - Authentication Bypassing | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: amoeba CMS 1.01 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: amoeba CMS 1.01 - Multiple Vulnerabilities. Author: mr_me |
Analyze the security implications of: amoeba CMS 1.01 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.