input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: ZKTeco ZKBioSecurity 3.0 - Hard-Coded Credentials SYSTEM Remote Code Execution | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: AWStats 6.95/7.0 - 'awredir.pl' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: AWStats 6.95/7.0 - 'awredir.pl' Multiple Cross-Site Scripting Vulnerabilities. Author: MustLive |
Analyze the security implications of: AWStats 6.95/7.0 - 'awredir.pl' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sendmail 8.11/8.12 Debugger - Arbitrary Code Execution (4) | This is a local exploit for linux platform. Description: Sendmail 8.11/8.12 Debugger - Arbitrary Code Execution (4). Author: RoMaN SoFt |
Analyze the security implications of: Sendmail 8.11/8.12 Debugger - Arbitrary Code Execution (4) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AEwebworks aeDating 3.2/4.0 - 'search_result.php' SQL Injection | This is a webapps exploit for php platform. Description: AEwebworks aeDating 3.2/4.0 - 'search_result.php' SQL Injection. Author: alexsrb |
Analyze the security implications of: AEwebworks aeDating 3.2/4.0 - 'search_result.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Meteocontrol WEB’log - Admin Password Disclosure (Metasploit) | This is a webapps exploit for multiple platform. Description: Meteocontrol WEB’log - Admin Password Disclosure (Metasploit). Author: Karn Ganeshen |
Analyze the security implications of: Meteocontrol WEB’log - Admin Password Disclosure (Metasploit) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Flatnux 2009-03-27 - Arbitrary File Upload / Information Disclosure | This is a webapps exploit for php platform. Description: Flatnux 2009-03-27 - Arbitrary File Upload / Information Disclosure. Author: girex |
Analyze the security implications of: Flatnux 2009-03-27 - Arbitrary File Upload / Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WAGO 750-8212 PFC200 G2 2ETH RS - Privilege Escalation | This is a remote exploit for hardware platform. Description: WAGO 750-8212 PFC200 G2 2ETH RS - Privilege Escalation. Author: Momen Eldawakhly |
Analyze the security implications of: WAGO 750-8212 PFC200 G2 2ETH RS - Privilege Escalation | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GeoVision GV-ASManager 6.1.0.0 - Broken Access Control | This is a webapps exploit for multiple platform. Description: GeoVision GV-ASManager 6.1.0.0 - Broken Access Control. Author: Giorgi Dograshvili |
Analyze the security implications of: GeoVision GV-ASManager 6.1.0.0 - Broken Access Control | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache Tomcat - 'WebDAV' Remote File Disclosure | This is a remote exploit for multiple platform. Description: Apache Tomcat - 'WebDAV' Remote File Disclosure. Author: eliteboy |
Analyze the security implications of: Apache Tomcat - 'WebDAV' Remote File Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: orangescrum 1.8.0 - 'Multiple' SQL Injection (Authenticated) | This is a webapps exploit for multiple platform. Description: orangescrum 1.8.0 - 'Multiple' SQL Injection (Authenticated). Author: Hubert Wojciechowski |
Analyze the security implications of: orangescrum 1.8.0 - 'Multiple' SQL Injection (Authenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: e107 website system 0.7.5 - 'download.php?Query String (PATH_INFO)' Cross-Site Scripting | This is a webapps exploit for php platform. Description: e107 website system 0.7.5 - 'download.php?Query String (PATH_INFO)' Cross-Site Scripting. Author: zark0vac |
Analyze the security implications of: e107 website system 0.7.5 - 'download.php?Query String (PATH_INFO)' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: blogplus 1.0 - Multiple Local File Inclusions | This is a webapps exploit for php platform. Description: blogplus 1.0 - Multiple Local File Inclusions. Author: ahmadbady |
Analyze the security implications of: blogplus 1.0 - Multiple Local File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Addonics NAS Adapter FTP - Remote Denial of Service | This is a dos exploit for hardware platform. Description: Addonics NAS Adapter FTP - Remote Denial of Service. Author: h00die |
Analyze the security implications of: Addonics NAS Adapter FTP - Remote Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GNU Bash 4.0 - 'ls' Control Character Command Injection | This is a local exploit for linux platform. Description: GNU Bash 4.0 - 'ls' Control Character Command Injection. Author: Eric Piel |
Analyze the security implications of: GNU Bash 4.0 - 'ls' Control Character Command Injection | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Solare Datensysteme Solar-Log Devices 2.8.4-56/3.5.2-85 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Solare Datensysteme Solar-Log Devices 2.8.4-56/3.5.2-85 - Multiple Vulnerabilities. Author: SEC Consult |
Analyze the security implications of: Solare Datensysteme Solar-Log Devices 2.8.4-56/3.5.2-85 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AuraCMS 2.2 - 'albums' Pramater SQL Injection | This is a webapps exploit for php platform. Description: AuraCMS 2.2 - 'albums' Pramater SQL Injection. Author: DNX |
Analyze the security implications of: AuraCMS 2.2 - 'albums' Pramater SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JoomBlog 1.3.1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JoomBlog 1.3.1 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JoomBlog 1.3.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ublog Reload 1.0.5 - 'index.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Ublog Reload 1.0.5 - 'index.asp' Multiple SQL Injections. Author: Dedi Dwianto |
Analyze the security implications of: Ublog Reload 1.0.5 - 'index.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Rhythmbox - '.m3u' Local Crash (PoC) | This is a dos exploit for linux platform. Description: Rhythmbox - '.m3u' Local Crash (PoC). Author: Caddy-Dz |
Analyze the security implications of: Rhythmbox - '.m3u' Local Crash (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Google Android - getpidcon Usage binder Service Replacement Race Condition | This is a dos exploit for android platform. Description: Google Android - getpidcon Usage binder Service Replacement Race Condition. Author: Google Security Research |
Analyze the security implications of: Google Android - getpidcon Usage binder Service Replacement Race Condition | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: McMurtrey/Whitaker & Associates Cart32 3.0/3.1/3.5 - Full Path Disclosure | This is a remote exploit for cgi platform. Description: McMurtrey/Whitaker & Associates Cart32 3.0/3.1/3.5 - Full Path Disclosure. Author: sozni |
Analyze the security implications of: McMurtrey/Whitaker & Associates Cart32 3.0/3.1/3.5 - Full Path Disclosure | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: ARYADAD - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: ARYADAD - Multiple Vulnerabilities. Author: Red Security TEAM |
Analyze the security implications of: ARYADAD - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Cygnus Network Security 4.0/KerbNet 5.0 / MIT Kerberos 4/5 / RedHat 6.2 - Compatibility 'krb_rd_req()' Local Buffer Overflow (2) | This is a local exploit for linux platform. Description: Cygnus Network Security 4.0/KerbNet 5.0 / MIT Kerberos 4/5 / RedHat 6.2 - Compatibility 'krb_rd_req()' Local Buffer Overflow (2). Author: Jim Paris |
Analyze the security implications of: Cygnus Network Security 4.0/KerbNet 5.0 / MIT Kerberos 4/5 / RedHat 6.2 - Compatibility 'krb_rd_req()' Local Buffer Overflow (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: aMSN - Remote Denial of Service | This is a dos exploit for multiple platform. Description: aMSN - Remote Denial of Service. Author: Braulio Miguel Suarez Urquijo |
Analyze the security implications of: aMSN - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: HP Compaq Insight Manager - Web Interface Cross-Site Scripting | This is a remote exploit for hardware platform. Description: HP Compaq Insight Manager - Web Interface Cross-Site Scripting. Author: Taylor Huff |
Analyze the security implications of: HP Compaq Insight Manager - Web Interface Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apache Shiro - Directory Traversal | This is a remote exploit for multiple platform. Description: Apache Shiro - Directory Traversal. Author: Luke Taylor |
Analyze the security implications of: Apache Shiro - Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ZPanel 10.0.1 - Cross-Site Request Forgery / Cross-Site Scripting / SQL Injection / Password Reset | This is a webapps exploit for multiple platform. Description: ZPanel 10.0.1 - Cross-Site Request Forgery / Cross-Site Scripting / SQL Injection / Password Reset. Author: pcsjj |
Analyze the security implications of: ZPanel 10.0.1 - Cross-Site Request Forgery / Cross-Site Scripting / SQL Injection / Password Reset | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PWebServer 0.3.x - Directory Traversal | This is a remote exploit for linux platform. Description: PWebServer 0.3.x - Directory Traversal. Author: Donato Ferrante |
Analyze the security implications of: PWebServer 0.3.x - Directory Traversal | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_adsmanager - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_adsmanager - Remote File Inclusion. Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Joomla! Component com_adsmanager - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ModSecurity < 2.5.9 - Remote Denial of Service | This is a dos exploit for multiple platform. Description: ModSecurity < 2.5.9 - Remote Denial of Service. Author: Juan Galiana Lara |
Analyze the security implications of: ModSecurity < 2.5.9 - Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Macs CMS 1.1.4 - Cross-Site Scripting / Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Macs CMS 1.1.4 - Cross-Site Scripting / Cross-Site Request Forgery. Author: 10n1z3d |
Analyze the security implications of: Macs CMS 1.1.4 - Cross-Site Scripting / Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Siemens SIMATIC S7-300 CPU - Remote Denial of Service | This is a dos exploit for linux platform. Description: Siemens SIMATIC S7-300 CPU - Remote Denial of Service. Author: t4rkd3vilz |
Analyze the security implications of: Siemens SIMATIC S7-300 CPU - Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: B2 0.6 - 'b2edit.showposts.php?b2inc' Remote File Inclusion | This is a webapps exploit for php platform. Description: B2 0.6 - 'b2edit.showposts.php?b2inc' Remote File Inclusion. Author: Frank |
Analyze the security implications of: B2 0.6 - 'b2edit.showposts.php?b2inc' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NetAuctionHelp 4.1 - 'nsearch' SQL Injection | This is a webapps exploit for asp platform. Description: NetAuctionHelp 4.1 - 'nsearch' SQL Injection. Author: Aria-Security Team |
Analyze the security implications of: NetAuctionHelp 4.1 - 'nsearch' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.