input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Corel Linux OS 1.0 - 'setxconf' Local Privilege Escalation | This is a local exploit for linux platform. Description: Corel Linux OS 1.0 - 'setxconf' Local Privilege Escalation. Author: suid |
Analyze the security implications of: Corel Linux OS 1.0 - 'setxconf' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ManageEngine OpManager / Social IT Plus / IT360 - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: ManageEngine OpManager / Social IT Plus / IT360 - Multiple Vulnerabilities. Author: Pedro Ribeiro |
Analyze the security implications of: ManageEngine OpManager / Social IT Plus / IT360 - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Dahua Generation 2/3 - Backdoor Access | This is a remote exploit for multiple platform. Description: Dahua Generation 2/3 - Backdoor Access. Author: bashis |
Analyze the security implications of: Dahua Generation 2/3 - Backdoor Access | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation. Author: Andrey Konovalov |
Analyze the security implications of: Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Novell Netware Enterprise Web Server 5.1/6.0 - Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for netware platform. Description: Novell Netware Enterprise Web Server 5.1/6.0 - Multiple Cross-Site Scripting Vulnerabilities. Author: Rafel Ivgi The-Insider |
Analyze the security implications of: Novell Netware Enterprise Web Server 5.1/6.0 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets netware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets netware platform |
What is this exploit about: Facile Forms 1.x - 'catid' SQL Injection | This is a webapps exploit for php platform. Description: Facile Forms 1.x - 'catid' SQL Injection. Author: S@BUN |
Analyze the security implications of: Facile Forms 1.x - 'catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Vik Rent Car 1.11 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Vik Rent Car 1.11 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Vik Rent Car 1.11 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple macOS 10.12 - Double vm_deallocate in Userspace MIG Code Use-After-Free | This is a dos exploit for macos platform. Description: Apple macOS 10.12 - Double vm_deallocate in Userspace MIG Code Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Apple macOS 10.12 - Double vm_deallocate in Userspace MIG Code Use-After-Free | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Dasan Networks GPON ONT WiFi Router H64X Series - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Dasan Networks GPON ONT WiFi Router H64X Series - Authentication Bypass. Author: LiquidWorm |
Analyze the security implications of: Dasan Networks GPON ONT WiFi Router H64X Series - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CMS WebManager-Pro - Multiple SQL Injections | This is a webapps exploit for php platform. Description: CMS WebManager-Pro - Multiple SQL Injections. Author: dun |
Analyze the security implications of: CMS WebManager-Pro - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cacti 1.2.8 - Remote Code Execution | This is a webapps exploit for php platform. Description: Cacti 1.2.8 - Remote Code Execution. Author: Askar |
Analyze the security implications of: Cacti 1.2.8 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Knowledgeroot (fckeditor) - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Knowledgeroot (fckeditor) - Arbitrary File Upload. Author: eidelweiss |
Analyze the security implications of: Knowledgeroot (fckeditor) - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: QiHang Media Web Digital Signage 3.0.9 - Unauthenticated Arbitrary File Disclosure | This is a webapps exploit for hardware platform. Description: QiHang Media Web Digital Signage 3.0.9 - Unauthenticated Arbitrary File Disclosure. Author: LiquidWorm |
Analyze the security implications of: QiHang Media Web Digital Signage 3.0.9 - Unauthenticated Arbitrary File Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component Percha Multicategory Article 0.6 - 'Controller' Arbitrary File Access | This is a webapps exploit for php platform. Description: Joomla! Component Percha Multicategory Article 0.6 - 'Controller' Arbitrary File Access. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Percha Multicategory Article 0.6 - 'Controller' Arbitrary File Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Uniview NVR301-04S2-P4 - Reflected Cross-Site Scripting (XSS) | This is a webapps exploit for hardware platform. Description: Uniview NVR301-04S2-P4 - Reflected Cross-Site Scripting (XSS). Author: Bleron Rrustemi |
Analyze the security implications of: Uniview NVR301-04S2-P4 - Reflected Cross-Site Scripting (XSS) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apache Tomcat 6.0.18 - Form Authentication Existing/Non-Existing 'Username' Enumeration | This is a remote exploit for multiple platform. Description: Apache Tomcat 6.0.18 - Form Authentication Existing/Non-Existing 'Username' Enumeration. Author: D. Matscheko |
Analyze the security implications of: Apache Tomcat 6.0.18 - Form Authentication Existing/Non-Existing 'Username' Enumeration | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CRESUS - 'recette_detail.php' SQL Injection | This is a webapps exploit for php platform. Description: CRESUS - 'recette_detail.php' SQL Injection. Author: GrayHatz Security Group |
Analyze the security implications of: CRESUS - 'recette_detail.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Glub Tech Secure FTP 2.5.15 - 'LIST' Directory Traversal | This is a remote exploit for multiple platform. Description: Glub Tech Secure FTP 2.5.15 - 'LIST' Directory Traversal. Author: Tan Chew Keong |
Analyze the security implications of: Glub Tech Secure FTP 2.5.15 - 'LIST' Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Compro Technology IP Camera - 'Multiple' Credential Disclosure | This is a webapps exploit for hardware platform. Description: Compro Technology IP Camera - 'Multiple' Credential Disclosure. Author: icekam |
Analyze the security implications of: Compro Technology IP Camera - 'Multiple' Credential Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Sitecore 8.x - Deserialization Remote Code Execution | This is a webapps exploit for aspx platform. Description: Sitecore 8.x - Deserialization Remote Code Execution. Author: Jarad Kopf |
Analyze the security implications of: Sitecore 8.x - Deserialization Remote Code Execution | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: IBM Websphere Portal 6.0.1.5 Build wp6015 - Portlet Palette Search HTML Injection | This is a remote exploit for multiple platform. Description: IBM Websphere Portal 6.0.1.5 Build wp6015 - Portlet Palette Search HTML Injection. Author: Sjoerd Resink |
Analyze the security implications of: IBM Websphere Portal 6.0.1.5 Build wp6015 - Portlet Palette Search HTML Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux Kernel 2.2.x 2.4.0-test1 (SGI ProPack 1.2/1.3) - Sendmail Capabilities Privilege Escalation(1) | This is a local exploit for linux platform. Description: Linux Kernel 2.2.x 2.4.0-test1 (SGI ProPack 1.2/1.3) - Sendmail Capabilities Privilege Escalation(1). Author: Florian Heinz |
Analyze the security implications of: Linux Kernel 2.2.x 2.4.0-test1 (SGI ProPack 1.2/1.3) - Sendmail Capabilities Privilege Escalation(1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Kimai 2 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Kimai 2 - Persistent Cross-Site Scripting. Author: osamaalaa |
Analyze the security implications of: Kimai 2 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kwok Information Server - Multiple SQL Injections | This is a webapps exploit for cgi platform. Description: Kwok Information Server - Multiple SQL Injections. Author: Yogesh Phadtare |
Analyze the security implications of: Kwok Information Server - Multiple SQL Injections | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Cerberus Helpdesk 3.2.1 - 'Rpc.php' Unauthorized Access | This is a webapps exploit for php platform. Description: Cerberus Helpdesk 3.2.1 - 'Rpc.php' Unauthorized Access. Author: jonepet |
Analyze the security implications of: Cerberus Helpdesk 3.2.1 - 'Rpc.php' Unauthorized Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Chrome - Integer Overflow when Processing WebAssembly Locals | This is a dos exploit for multiple platform. Description: Google Chrome - Integer Overflow when Processing WebAssembly Locals. Author: Google Security Research |
Analyze the security implications of: Google Chrome - Integer Overflow when Processing WebAssembly Locals | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CMS Lite 1.3.1 - SQL Injection | This is a webapps exploit for php platform. Description: CMS Lite 1.3.1 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: CMS Lite 1.3.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Virtual Programming VP-ASP 5.00 - 'shopexd.asp' SQL Injection (2) | This is a webapps exploit for asp platform. Description: Virtual Programming VP-ASP 5.00 - 'shopexd.asp' SQL Injection (2). Author: Bosen & TioEuy |
Analyze the security implications of: Virtual Programming VP-ASP 5.00 - 'shopexd.asp' SQL Injection (2) | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: JASmine 0.0.2 - 'index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: JASmine 0.0.2 - 'index.php' Remote File Inclusion. Author: DarkFig |
Analyze the security implications of: JASmine 0.0.2 - 'index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: exponentcms 2.0.5 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: exponentcms 2.0.5 - Multiple Vulnerabilities. Author: Onur Yılmaz |
Analyze the security implications of: exponentcms 2.0.5 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linksys WRT110 - Remote Command Execution (Metasploit) | This is a remote exploit for hardware platform. Description: Linksys WRT110 - Remote Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Linksys WRT110 - Remote Command Execution (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Microsoft FrontPage - Server Extensions Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Microsoft FrontPage - Server Extensions Cross-Site Scripting. Author: Esteban Martinez Fayo |
Analyze the security implications of: Microsoft FrontPage - Server Extensions Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: OpenSMTPD - OOB Read Local Privilege Escalation (Metasploit) | This is a local exploit for linux platform. Description: OpenSMTPD - OOB Read Local Privilege Escalation (Metasploit). Author: Metasploit |
Analyze the security implications of: OpenSMTPD - OOB Read Local Privilege Escalation (Metasploit) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Pingtel Xpressa 1.2.x/2.0/2.1 - Handset Remote Denial of Service | This is a dos exploit for multiple platform. Description: Pingtel Xpressa 1.2.x/2.0/2.1 - Handset Remote Denial of Service. Author: @stake |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.