input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: sudo 1.8.27 - Security Bypass | This is a local exploit for linux platform. Description: sudo 1.8.27 - Security Bypass. Author: Mohin Paramasivam |
Analyze the security implications of: sudo 1.8.27 - Security Bypass | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: D-Link DKVM-IP8 - 'auth.asp' Cross-Site Scripting | This is a remote exploit for hardware platform. Description: D-Link DKVM-IP8 - 'auth.asp' Cross-Site Scripting. Author: POPCORN |
Analyze the security implications of: D-Link DKVM-IP8 - 'auth.asp' Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DomainMOD 4.11.01 - 'ssl-provider-name' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DomainMOD 4.11.01 - 'ssl-provider-name' Cross-Site Scripting. Author: Mohammed Abdul Raheem |
Analyze the security implications of: DomainMOD 4.11.01 - 'ssl-provider-name' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: K9 Kreativity Design - 'pages.php' SQL Injection | This is a webapps exploit for php platform. Description: K9 Kreativity Design - 'pages.php' SQL Injection. Author: Newbie_Campuz |
Analyze the security implications of: K9 Kreativity Design - 'pages.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6 - Console Keymap Local Command Injection | This is a local exploit for linux platform. Description: Linux Kernel 2.6 - Console Keymap Local Command Injection. Author: Rudolf Polzer |
Analyze the security implications of: Linux Kernel 2.6 - Console Keymap Local Command Injection | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Alstrasoft AskMe Pro 2.1 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Alstrasoft AskMe Pro 2.1 - Multiple SQL Injections. Author: t0pP8uZz |
Analyze the security implications of: Alstrasoft AskMe Pro 2.1 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP - 'openssl_x509_parse()' Memory Corruption | This is a dos exploit for php platform. Description: PHP - 'openssl_x509_parse()' Memory Corruption. Author: Stefan Esser |
Analyze the security implications of: PHP - 'openssl_x509_parse()' Memory Corruption | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Knowledge Base Enterprise Edition 4.62.0 - SQL Injection | This is a webapps exploit for asp platform. Description: Knowledge Base Enterprise Edition 4.62.0 - SQL Injection. Author: Vulnerability-Lab |
Analyze the security implications of: Knowledge Base Enterprise Edition 4.62.0 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Hastymail2 - 'rs' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Hastymail2 - 'rs' Cross-Site Scripting. Author: HTrovao |
Analyze the security implications of: Hastymail2 - 'rs' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: e107 0.7.16 - Referer header Cross-Site Scripting | This is a webapps exploit for php platform. Description: e107 0.7.16 - Referer header Cross-Site Scripting. Author: MustLive |
Analyze the security implications of: e107 0.7.16 - Referer header Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sunbelt Kerio Personal Firewall 4.3.426 - CreateRemoteThread Denial of Service | This is a dos exploit for hardware platform. Description: Sunbelt Kerio Personal Firewall 4.3.426 - CreateRemoteThread Denial of Service. Author: David Matousek |
Analyze the security implications of: Sunbelt Kerio Personal Firewall 4.3.426 - CreateRemoteThread Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CS-Guestbook 0.1 - Login Credentials Information Disclosure | This is a webapps exploit for php platform. Description: CS-Guestbook 0.1 - Login Credentials Information Disclosure. Author: Cr@zy_King |
Analyze the security implications of: CS-Guestbook 0.1 - Login Credentials Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache - Arbitrary Long HTTP Headers Denial of Service | This is a dos exploit for linux platform. Description: Apache - Arbitrary Long HTTP Headers Denial of Service. Author: anonymous |
Analyze the security implications of: Apache - Arbitrary Long HTTP Headers Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Acme thttpd HTTP Server - Directory Traversal | This is a remote exploit for linux platform. Description: Acme thttpd HTTP Server - Directory Traversal. Author: Metropolis |
Analyze the security implications of: Acme thttpd HTTP Server - Directory Traversal | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: DT Centrepiece 4.5 - Cross-Site Scripting / Security Bypass | This is a webapps exploit for asp platform. Description: DT Centrepiece 4.5 - Cross-Site Scripting / Security Bypass. Author: High-Tech Bridge SA |
Analyze the security implications of: DT Centrepiece 4.5 - Cross-Site Scripting / Security Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Katello (RedHat Satellite) - users/update_roles Missing Authorisation (Metasploit) | This is a remote exploit for linux platform. Description: Katello (RedHat Satellite) - users/update_roles Missing Authorisation (Metasploit). Author: Metasploit |
Analyze the security implications of: Katello (RedHat Satellite) - users/update_roles Missing Authorisation (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Libopt.a 3.1x - Error Logging Buffer Overflow (1) | This is a dos exploit for linux platform. Description: Libopt.a 3.1x - Error Logging Buffer Overflow (1). Author: kf |
Analyze the security implications of: Libopt.a 3.1x - Error Logging Buffer Overflow (1) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Icinga Web 2.10 - Arbitrary File Disclosure | This is a webapps exploit for php platform. Description: Icinga Web 2.10 - Arbitrary File Disclosure. Author: Jacob Ebben |
Analyze the security implications of: Icinga Web 2.10 - Arbitrary File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kayako Live Response 2.0 - 'index.php' Calendar Feature Multiple SQL Injections | This is a webapps exploit for php platform. Description: Kayako Live Response 2.0 - 'index.php' Calendar Feature Multiple SQL Injections. Author: GulfTech Security |
Analyze the security implications of: Kayako Live Response 2.0 - 'index.php' Calendar Feature Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Endpoint Protector 4.0.4.0 - Multiple Vulnerabilities | This is a webapps exploit for multiple platform. Description: Endpoint Protector 4.0.4.0 - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: Endpoint Protector 4.0.4.0 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DragDropCart - '/includes/ajax/getstate.php?prefix' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DragDropCart - '/includes/ajax/getstate.php?prefix' Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: DragDropCart - '/includes/ajax/getstate.php?prefix' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Concrete5 CMS 5.5.2.1 - Information Disclosure / SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Concrete5 CMS 5.5.2.1 - Information Disclosure / SQL Injection / Cross-Site Scripting. Author: Jakub Galczyk |
Analyze the security implications of: Concrete5 CMS 5.5.2.1 - Information Disclosure / SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Justice Guestbook 1.3 - Full Path Disclosure | This is a webapps exploit for php platform. Description: Justice Guestbook 1.3 - Full Path Disclosure. Author: euronymous |
Analyze the security implications of: Justice Guestbook 1.3 - Full Path Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ManageEngin AMP 4.3.0 - File-path-traversal | This is a webapps exploit for multiple platform. Description: ManageEngin AMP 4.3.0 - File-path-traversal. Author: nu11secur1ty |
Analyze the security implications of: ManageEngin AMP 4.3.0 - File-path-traversal | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CMS Balitbang - Multiple HTML Injection / Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: CMS Balitbang - Multiple HTML Injection / Cross-Site Scripting Vulnerabilities. Author: TheCyberNuxbie |
Analyze the security implications of: CMS Balitbang - Multiple HTML Injection / Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Concrete5 8.5.4 - 'name' Stored XSS | This is a webapps exploit for php platform. Description: Concrete5 8.5.4 - 'name' Stored XSS. Author: Quadron Research Lab |
Analyze the security implications of: Concrete5 8.5.4 - 'name' Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component versioning 1.0.2 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component versioning 1.0.2 - 'id' SQL Injection. Author: DarkMatter Crew |
Analyze the security implications of: Joomla! Component versioning 1.0.2 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebIf - 'OutConfig' Local File Inclusion | This is a webapps exploit for cgi platform. Description: WebIf - 'OutConfig' Local File Inclusion. Author: maiosyet |
Analyze the security implications of: WebIf - 'OutConfig' Local File Inclusion | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: GNU CFEngine 2.0.x/2.1 - AuthenticationDialogue Remote Heap Buffer Overrun (1) | This is a dos exploit for linux platform. Description: GNU CFEngine 2.0.x/2.1 - AuthenticationDialogue Remote Heap Buffer Overrun (1). Author: Juan Pablo Martinez Kuhn |
Analyze the security implications of: GNU CFEngine 2.0.x/2.1 - AuthenticationDialogue Remote Heap Buffer Overrun (1) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple Mac OSX / iOS Kernel - UAF Racing getProperty on IOHDIXController and testNetBootMethod on IOHDIXControllerUserClient | This is a dos exploit for multiple platform. Description: Apple Mac OSX / iOS Kernel - UAF Racing getProperty on IOHDIXController and testNetBootMethod on IOHDIXControllerUserClient. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX / iOS Kernel - UAF Racing getProperty on IOHDIXController and testNetBootMethod on IOHDIXControllerUserClient | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: TP-Link TL-WR740N - Buffer Overflow 'DOS' | This is a webapps exploit for hardware platform. Description: TP-Link TL-WR740N - Buffer Overflow 'DOS'. Author: Anish Feroz |
Analyze the security implications of: TP-Link TL-WR740N - Buffer Overflow 'DOS' | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PHP 5.4SVN-2012-02-03 - htmlspecialchars/entities Buffer Overflow | This is a dos exploit for php platform. Description: PHP 5.4SVN-2012-02-03 - htmlspecialchars/entities Buffer Overflow. Author: cataphract |
Analyze the security implications of: PHP 5.4SVN-2012-02-03 - htmlspecialchars/entities Buffer Overflow | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Livefyre LiveComments Plugin - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Livefyre LiveComments Plugin - Persistent Cross-Site Scripting. Author: Brij Kishore Mishra |
Analyze the security implications of: Livefyre LiveComments Plugin - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bus Pass Management System 1.0 - Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Bus Pass Management System 1.0 - Cross-Site Scripting (XSS). Author: Ali Alipour |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.