input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: NCM Content Management System - content.pl Input Validation | This is a remote exploit for cgi platform. Description: NCM Content Management System - content.pl Input Validation. Author: RA-Soft Security |
Analyze the security implications of: NCM Content Management System - content.pl Input Validation | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Real Networks Real Server 5.0 - ramgen Denial of Service | This is a dos exploit for freebsd platform. Description: Real Networks Real Server 5.0 - ramgen Denial of Service. Author: bow |
Analyze the security implications of: Real Networks Real Server 5.0 - ramgen Denial of Service | This exploit targets freebsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Mozilla Firefox 1.0.x - JavaScript Handler Race Condition Memory Corruption | This is a dos exploit for linux platform. Description: Mozilla Firefox 1.0.x - JavaScript Handler Race Condition Memory Corruption. Author: Michal Zalewski |
Analyze the security implications of: Mozilla Firefox 1.0.x - JavaScript Handler Race Condition Memory Corruption | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joke Website Script - SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joke Website Script - SQL Injection / Cross-Site Scripting. Author: Valentin |
Analyze the security implications of: Joke Website Script - SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IG Shop 1.4 - 'Change_Pass.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: IG Shop 1.4 - 'Change_Pass.php' Cross-Site Scripting. Author: SnipEr.X |
Analyze the security implications of: IG Shop 1.4 - 'Change_Pass.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP Fuzzer Framework - Default Location Insecure Temporary File Creation | This is a local exploit for linux platform. Description: PHP Fuzzer Framework - Default Location Insecure Temporary File Creation. Author: Melissa Elliott |
Analyze the security implications of: PHP Fuzzer Framework - Default Location Insecure Temporary File Creation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: NetWin DMail 2.x / SurgeFTP 1.0/2.0 - Weak Password Encryption | This is a local exploit for multiple platform. Description: NetWin DMail 2.x / SurgeFTP 1.0/2.0 - Weak Password Encryption. Author: byterage |
Analyze the security implications of: NetWin DMail 2.x / SurgeFTP 1.0/2.0 - Weak Password Encryption | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Altova MobileTogether Server 7.3 - XML External Entity Injection (XXE) | This is a webapps exploit for multiple platform. Description: Altova MobileTogether Server 7.3 - XML External Entity Injection (XXE). Author: RedTeam Pentesting GmbH |
Analyze the security implications of: Altova MobileTogether Server 7.3 - XML External Entity Injection (XXE) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Links Directory 1.1 - 'cat_id' SQL Injection | This is a webapps exploit for php platform. Description: Links Directory 1.1 - 'cat_id' SQL Injection. Author: t0pP8uZz |
Analyze the security implications of: Links Directory 1.1 - 'cat_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IkonBoard 3.1 - Lang Cookie Arbitrary Command Execution (2) | This is a webapps exploit for cgi platform. Description: IkonBoard 3.1 - Lang Cookie Arbitrary Command Execution (2). Author: snooq |
Analyze the security implications of: IkonBoard 3.1 - Lang Cookie Arbitrary Command Execution (2) | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Real Web Pentesting Tutorial Step by Step - [Persian] | This is a webapps exploit for multiple platform. Description: Real Web Pentesting Tutorial Step by Step - [Persian]. Author: Meisam Monsef |
Analyze the security implications of: Real Web Pentesting Tutorial Step by Step - [Persian] | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Absolute Podcast 1.0 - Remote Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Absolute Podcast 1.0 - Remote Insecure Cookie Handling. Author: Hakxer |
Analyze the security implications of: Absolute Podcast 1.0 - Remote Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Symantec Web Gateway 5.0.2 - Local/Remote File Inclusion / Remote Code Execution | This is a webapps exploit for linux platform. Description: Symantec Web Gateway 5.0.2 - Local/Remote File Inclusion / Remote Code Execution. Author: muts |
Analyze the security implications of: Symantec Web Gateway 5.0.2 - Local/Remote File Inclusion / Remote Code Execution | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Check Point FW-1 Syslog Daemon - Unfiltered Escape Sequence | This is a remote exploit for hardware platform. Description: Check Point FW-1 Syslog Daemon - Unfiltered Escape Sequence. Author: Dr. Peter Bieringer |
Analyze the security implications of: Check Point FW-1 Syslog Daemon - Unfiltered Escape Sequence | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Gemitel 3.50 - '/affich.php' Remote File Inclusion / Command Injection | This is a webapps exploit for php platform. Description: Gemitel 3.50 - '/affich.php' Remote File Inclusion / Command Injection. Author: jaguar |
Analyze the security implications of: Gemitel 3.50 - '/affich.php' Remote File Inclusion / Command Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenNMS 1.5.x - HTTP Response Splitting | This is a remote exploit for multiple platform. Description: OpenNMS 1.5.x - HTTP Response Splitting. Author: BugSec LTD |
Analyze the security implications of: OpenNMS 1.5.x - HTTP Response Splitting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Hashicorp vagrant-vmware-fusion 4.0.23 - Local Privilege Escalation | This is a local exploit for macos platform. Description: Hashicorp vagrant-vmware-fusion 4.0.23 - Local Privilege Escalation. Author: Mark Wadham |
Analyze the security implications of: Hashicorp vagrant-vmware-fusion 4.0.23 - Local Privilege Escalation | This exploit targets macos systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: LibreNMS 1.46 - 'search' SQL Injection | This is a webapps exploit for multiple platform. Description: LibreNMS 1.46 - 'search' SQL Injection. Author: Punt |
Analyze the security implications of: LibreNMS 1.46 - 'search' SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Gamespy Software Development Kit - CD-Key Validation Buffer Overflow | This is a dos exploit for linux platform. Description: Gamespy Software Development Kit - CD-Key Validation Buffer Overflow. Author: Luigi Auriemma |
Analyze the security implications of: Gamespy Software Development Kit - CD-Key Validation Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BMC Compuware iStrobe Web - 20.13 - Pre-auth RCE | This is a webapps exploit for jsp platform. Description: BMC Compuware iStrobe Web - 20.13 - Pre-auth RCE. Author: trancap |
Analyze the security implications of: BMC Compuware iStrobe Web - 20.13 - Pre-auth RCE | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: RedHat 9.0 / Slackware 8.1 - '/bin/mail' Carbon Copy Field Buffer Overrun | This is a local exploit for linux platform. Description: RedHat 9.0 / Slackware 8.1 - '/bin/mail' Carbon Copy Field Buffer Overrun. Author: mark@vulndev.org |
Analyze the security implications of: RedHat 9.0 / Slackware 8.1 - '/bin/mail' Carbon Copy Field Buffer Overrun | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AVerCaster Pro RS3400 Web Server - Directory Traversal | This is a webapps exploit for hardware platform. Description: AVerCaster Pro RS3400 Web Server - Directory Traversal. Author: Patrick Saladino |
Analyze the security implications of: AVerCaster Pro RS3400 Web Server - Directory Traversal | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BSD 2 / CND 1 / Sendmail 8.x / FreeBSD 2.1.x / HP-UX 10.x / AIX 4 / RedHat 4 - Sendmail Daemon | This is a local exploit for multiple platform. Description: BSD 2 / CND 1 / Sendmail 8.x / FreeBSD 2.1.x / HP-UX 10.x / AIX 4 / RedHat 4 - Sendmail Daemon. Author: Leshka Zakharoff |
Analyze the security implications of: BSD 2 / CND 1 / Sendmail 8.x / FreeBSD 2.1.x / HP-UX 10.x / AIX 4 / RedHat 4 - Sendmail Daemon | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Haudenschilt Family Connections 0.8 - 'index.php' Authentication Bypass | This is a webapps exploit for php platform. Description: Haudenschilt Family Connections 0.8 - 'index.php' Authentication Bypass. Author: ilker Kandemir |
Analyze the security implications of: Haudenschilt Family Connections 0.8 - 'index.php' Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FlexAir Access Control 2.4.9api3 - Remote Code Execution | This is a webapps exploit for hardware platform. Description: FlexAir Access Control 2.4.9api3 - Remote Code Execution. Author: LiquidWorm |
Analyze the security implications of: FlexAir Access Control 2.4.9api3 - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Aptina AR0130 960P 1.3MP Camera - Remote Configuration Disclosure | This is a webapps exploit for hardware platform. Description: Aptina AR0130 960P 1.3MP Camera - Remote Configuration Disclosure. Author: Todor Donev |
Analyze the security implications of: Aptina AR0130 960P 1.3MP Camera - Remote Configuration Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Samba 3.3.12 (Linux x86) - 'chain_reply' Memory Corruption (Metasploit) | This is a remote exploit for linux_x86 platform. Description: Samba 3.3.12 (Linux x86) - 'chain_reply' Memory Corruption (Metasploit). Author: Metasploit |
Analyze the security implications of: Samba 3.3.12 (Linux x86) - 'chain_reply' Memory Corruption (Metasploit) | This exploit targets linux_x86 systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux_x86 platform |
What is this exploit about: Open Wiki 0.78 - 'ow.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Open Wiki 0.78 - 'ow.asp' Cross-Site Scripting. Author: LiNuX_rOOt |
Analyze the security implications of: Open Wiki 0.78 - 'ow.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: DomainMOD 4.11.01 - Owner name Field Cross-Site Scripting | This is a webapps exploit for php platform. Description: DomainMOD 4.11.01 - Owner name Field Cross-Site Scripting. Author: Mohammed Abdul Raheem |
Analyze the security implications of: DomainMOD 4.11.01 - Owner name Field Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CuteNews 2.1.2 - Remote Code Execution | This is a webapps exploit for php platform. Description: CuteNews 2.1.2 - Remote Code Execution. Author: Musyoka Ian |
Analyze the security implications of: CuteNews 2.1.2 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco IOS 11.x/12.0 - ILMI SNMP Community String | This is a remote exploit for hardware platform. Description: Cisco IOS 11.x/12.0 - ILMI SNMP Community String. Author: pask |
Analyze the security implications of: Cisco IOS 11.x/12.0 - ILMI SNMP Community String | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component com_ticketbook - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_ticketbook - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component com_ticketbook - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Horde 3.3.5 - '/Administration Interface admin/sqlshell.php?PATH_INFO' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Horde 3.3.5 - '/Administration Interface admin/sqlshell.php?PATH_INFO' Cross-Site Scripting. Author: Juan Galiana Lara |
Analyze the security implications of: Horde 3.3.5 - '/Administration Interface admin/sqlshell.php?PATH_INFO' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: pdfresurrect 0.15 - Buffer Overflow | This is a dos exploit for linux platform. Description: pdfresurrect 0.15 - Buffer Overflow. Author: j0lama |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.