input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Astium VoIP PBX 2.1 build 25399 - Multiple Vulnerabilities/Remote Command Execution | This is a webapps exploit for php platform. Description: Astium VoIP PBX 2.1 build 25399 - Multiple Vulnerabilities/Remote Command Execution. Author: xistence |
Analyze the security implications of: Astium VoIP PBX 2.1 build 25399 - Multiple Vulnerabilities/Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeBSD-SA-19:02.fd - Privilege Escalation | This is a local exploit for freebsd platform. Description: FreeBSD-SA-19:02.fd - Privilege Escalation. Author: Karsten König |
Analyze the security implications of: FreeBSD-SA-19:02.fd - Privilege Escalation | This exploit targets freebsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: ZYXEL Prestige 660H-61 ADSL Router - Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: ZYXEL Prestige 660H-61 ADSL Router - Cross-Site Scripting. Author: jose.palanco |
Analyze the security implications of: ZYXEL Prestige 660H-61 ADSL Router - Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linux Kernel 2.6.17.4 - 'proc' Local Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel 2.6.17.4 - 'proc' Local Privilege Escalation. Author: h00lyshit |
Analyze the security implications of: Linux Kernel 2.6.17.4 - 'proc' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: libvirt_proxy 0.5.1 - Local Privilege Escalation | This is a local exploit for linux platform. Description: libvirt_proxy 0.5.1 - Local Privilege Escalation. Author: Jon Oberheide |
Analyze the security implications of: libvirt_proxy 0.5.1 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DUware DUamazon Pro 3.0/3.1 - 'type.asp?iType' SQL Injection | This is a webapps exploit for php platform. Description: DUware DUamazon Pro 3.0/3.1 - 'type.asp?iType' SQL Injection. Author: Dedi Dwianto |
Analyze the security implications of: DUware DUamazon Pro 3.0/3.1 - 'type.asp?iType' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco Adaptive Security Appliance Software 9.7 - Unauthenticated Arbitrary File Deletion | This is a webapps exploit for hardware platform. Description: Cisco Adaptive Security Appliance Software 9.7 - Unauthenticated Arbitrary File Deletion. Author: 0xmmnbassel |
Analyze the security implications of: Cisco Adaptive Security Appliance Software 9.7 - Unauthenticated Arbitrary File Deletion | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linux Kernel < 2.4.20 - Module Loader Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel < 2.4.20 - Module Loader Privilege Escalation. Author: KuRaK |
Analyze the security implications of: Linux Kernel < 2.4.20 - Module Loader Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: MiCasaVerde VeraLite 1.5.408 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: MiCasaVerde VeraLite 1.5.408 - Multiple Vulnerabilities. Author: Trustwave's SpiderLabs |
Analyze the security implications of: MiCasaVerde VeraLite 1.5.408 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Motorola SBG901 Wireless Modem - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Motorola SBG901 Wireless Modem - Cross-Site Request Forgery. Author: Blessen Thomas |
Analyze the security implications of: Motorola SBG901 Wireless Modem - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: iCMS 1.1 - Admin SQL Injection / Brute Force | This is a webapps exploit for php platform. Description: iCMS 1.1 - Admin SQL Injection / Brute Force. Author: TecR0c |
Analyze the security implications of: iCMS 1.1 - Admin SQL Injection / Brute Force | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle - ctxsys.drvxtabc.create_tables | This is a local exploit for multiple platform. Description: Oracle - ctxsys.drvxtabc.create_tables. Author: Andrea Purificato |
Analyze the security implications of: Oracle - ctxsys.drvxtabc.create_tables | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PALS Library System WebPALS 1.0 - pals-cgi Traversal Arbitrary File Read | This is a remote exploit for cgi platform. Description: PALS Library System WebPALS 1.0 - pals-cgi Traversal Arbitrary File Read. Author: cuctema |
Analyze the security implications of: PALS Library System WebPALS 1.0 - pals-cgi Traversal Arbitrary File Read | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Invision Power Board 2.x - 'Signature' iFrame Security | This is a webapps exploit for php platform. Description: Invision Power Board 2.x - 'Signature' iFrame Security. Author: SHAHEE_MIRZA |
Analyze the security implications of: Invision Power Board 2.x - 'Signature' iFrame Security | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AirLive (Multiple Products) - OS Command Injection | This is a webapps exploit for hardware platform. Description: AirLive (Multiple Products) - OS Command Injection. Author: Core Security |
Analyze the security implications of: AirLive (Multiple Products) - OS Command Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: 20/20 Real Estate 3.2 - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: 20/20 Real Estate 3.2 - Multiple SQL Injections. Author: laurent gaffie |
Analyze the security implications of: 20/20 Real Estate 3.2 - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component mp3 allopass 1.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component mp3 allopass 1.0 - Remote File Inclusion. Author: NoGe |
Analyze the security implications of: Joomla! Component mp3 allopass 1.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JHotelReservation 6.0.7 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JHotelReservation 6.0.7 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JHotelReservation 6.0.7 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP Operations Dashboard 2.1 - Portal Default Manager Account Remote Security | This is a remote exploit for multiple platform. Description: HP Operations Dashboard 2.1 - Portal Default Manager Account Remote Security. Author: Intevydis |
Analyze the security implications of: HP Operations Dashboard 2.1 - Portal Default Manager Account Remote Security | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ABB Cylon Aspect 3.08.03 (CookieDB) - SQL Injection | This is a hardware exploit for multiple platform. Description: ABB Cylon Aspect 3.08.03 (CookieDB) - SQL Injection. Author: LiquidWorm |
Analyze the security implications of: ABB Cylon Aspect 3.08.03 (CookieDB) - SQL Injection | This exploit targets multiple systems. Type: hardware. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Affiliate Software Java 4.0 - Authentication Bypass | This is a webapps exploit for asp platform. Description: Affiliate Software Java 4.0 - Authentication Bypass. Author: R3d-D3V!L |
Analyze the security implications of: Affiliate Software Java 4.0 - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Alberghi 2.1.3 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Alberghi 2.1.3 - 'id' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! Component Alberghi 2.1.3 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LandShop 0.6.3 - 'ls.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: LandShop 0.6.3 - 'ls.php' Multiple SQL Injections. Author: laurent gaffie |
Analyze the security implications of: LandShop 0.6.3 - 'ls.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebkitGTK+ 2.20.3 - 'ImageBufferCairo::getImageData()' Buffer Overflow (PoC) | This is a local exploit for linux platform. Description: WebkitGTK+ 2.20.3 - 'ImageBufferCairo::getImageData()' Buffer Overflow (PoC). Author: PeregrineX |
Analyze the security implications of: WebkitGTK+ 2.20.3 - 'ImageBufferCairo::getImageData()' Buffer Overflow (PoC) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Perl 5.10 - Multiple Null Pointer Dereference Denial of Service Vulnerabilities | This is a dos exploit for multiple platform. Description: Perl 5.10 - Multiple Null Pointer Dereference Denial of Service Vulnerabilities. Author: Jonathan Brossard |
Analyze the security implications of: Perl 5.10 - Multiple Null Pointer Dereference Denial of Service Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: HP Network Node Manager (NMM) i 9.10 - 'nnm/protected/ping.jsp?nodename' Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: HP Network Node Manager (NMM) i 9.10 - 'nnm/protected/ping.jsp?nodename' Cross-Site Scripting. Author: anonymous |
Analyze the security implications of: HP Network Node Manager (NMM) i 9.10 - 'nnm/protected/ping.jsp?nodename' Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Mozilla Codesighs - Memory Corruption | This is a local exploit for linux platform. Description: Mozilla Codesighs - Memory Corruption. Author: Jeremy Brown |
Analyze the security implications of: Mozilla Codesighs - Memory Corruption | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mozilla Firefox XSL - Parsing Remote Memory Corruption (PoC) (1) | This is a dos exploit for multiple platform. Description: Mozilla Firefox XSL - Parsing Remote Memory Corruption (PoC) (1). Author: Guido Landi |
Analyze the security implications of: Mozilla Firefox XSL - Parsing Remote Memory Corruption (PoC) (1) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mambo Component Remository 3.25 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Component Remository 3.25 - Remote File Inclusion. Author: camino |
Analyze the security implications of: Mambo Component Remository 3.25 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ProFTPd 1.2 pre6 - 'snprintf' Remote Root | This is a remote exploit for linux platform. Description: ProFTPd 1.2 pre6 - 'snprintf' Remote Root. Author: Tymm Twillman |
Analyze the security implications of: ProFTPd 1.2 pre6 - 'snprintf' Remote Root | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ManageEngine ServiceDesk Plus 8.0 Build 8013 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for jsp platform. Description: ManageEngine ServiceDesk Plus 8.0 Build 8013 - Multiple Cross-Site Scripting Vulnerabilities. Author: Narendra Shinde |
Analyze the security implications of: ManageEngine ServiceDesk Plus 8.0 Build 8013 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Newsscript - Access Validation | This is a webapps exploit for cgi platform. Description: Newsscript - Access Validation. Author: adrianc23@gmail.com |
Analyze the security implications of: Newsscript - Access Validation | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: ferretCMS 1.0.4-alpha - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: ferretCMS 1.0.4-alpha - Multiple Vulnerabilities. Author: Steffen Rösemann |
Analyze the security implications of: ferretCMS 1.0.4-alpha - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Samba 3.0.21 < 3.0.24 - LSA trans names Heap Overflow (Metasploit) | This is a remote exploit for linux platform. Description: Samba 3.0.21 < 3.0.24 - LSA trans names Heap Overflow (Metasploit). Author: Adriano Lima |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.