input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Armidale Software Yapp Conferencing System 2.2 - Local Buffer Overflow | This is a local exploit for linux platform. Description: Armidale Software Yapp Conferencing System 2.2 - Local Buffer Overflow. Author: satan |
Analyze the security implications of: Armidale Software Yapp Conferencing System 2.2 - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple QuickTime 7.1.5 - Information Disclosure / Multiple Code Execution Vulnerabilities | This is a remote exploit for multiple platform. Description: Apple QuickTime 7.1.5 - Information Disclosure / Multiple Code Execution Vulnerabilities. Author: Wolf |
Analyze the security implications of: Apple QuickTime 7.1.5 - Information Disclosure / Multiple Code Execution Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Samba 3.0.10 (OSX) - 'lsa_io_trans_names' Heap Overflow (Metasploit) | This is a remote exploit for osx platform. Description: Samba 3.0.10 (OSX) - 'lsa_io_trans_names' Heap Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Samba 3.0.10 (OSX) - 'lsa_io_trans_names' Heap Overflow (Metasploit) | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: OpenVPN 2.2.29 - 'Shellshock' Remote Command Injection | This is a remote exploit for linux platform. Description: OpenVPN 2.2.29 - 'Shellshock' Remote Command Injection. Author: hobbily plunt |
Analyze the security implications of: OpenVPN 2.2.29 - 'Shellshock' Remote Command Injection | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ICSiteBuilder 1.1 - SQL Injection | This is a webapps exploit for php platform. Description: ICSiteBuilder 1.1 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: ICSiteBuilder 1.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Unreal Tournament 2004 - 'Secure' Remote Overflow (Metasploit) | This is a remote exploit for linux platform. Description: Unreal Tournament 2004 - 'Secure' Remote Overflow (Metasploit). Author: onetwo |
Analyze the security implications of: Unreal Tournament 2004 - 'Secure' Remote Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: xweb 1.0 - Directory Traversal | This is a remote exploit for linux platform. Description: xweb 1.0 - Directory Traversal. Author: Donato Ferrante |
Analyze the security implications of: xweb 1.0 - Directory Traversal | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: In-link 2.3.4/5.1.3 RC1 - 'cat' SQL Injection | This is a webapps exploit for php platform. Description: In-link 2.3.4/5.1.3 RC1 - 'cat' SQL Injection. Author: SubhashDasyam |
Analyze the security implications of: In-link 2.3.4/5.1.3 RC1 - 'cat' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: actSite 1.56 - 'news.php' Local File Inclusion | This is a webapps exploit for php platform. Description: actSite 1.56 - 'news.php' Local File Inclusion. Author: DNX |
Analyze the security implications of: actSite 1.56 - 'news.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DSL-526B ADSL2+ AU_2.01 - Remote DNS Change | This is a webapps exploit for hardware platform. Description: D-Link DSL-526B ADSL2+ AU_2.01 - Remote DNS Change. Author: Todor Donev |
Analyze the security implications of: D-Link DSL-526B ADSL2+ AU_2.01 - Remote DNS Change | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: SeaMonkey 1.1.8 - Remote Array Overrun | This is a dos exploit for bsd platform. Description: SeaMonkey 1.1.8 - Remote Array Overrun. Author: Maksymilian Arciemowicz & sp3x |
Analyze the security implications of: SeaMonkey 1.1.8 - Remote Array Overrun | This exploit targets bsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Jenkins Software RakNet 3.72 - Remote Integer Underflow | This is a remote exploit for multiple platform. Description: Jenkins Software RakNet 3.72 - Remote Integer Underflow. Author: Luigi Auriemma |
Analyze the security implications of: Jenkins Software RakNet 3.72 - Remote Integer Underflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mambo Component zOOm Media Gallery 2.5 Beta 2 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Component zOOm Media Gallery 2.5 Beta 2 - Remote File Inclusion. Author: iskorpitx |
Analyze the security implications of: Mambo Component zOOm Media Gallery 2.5 Beta 2 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! 3.4.6 - 'configuration.php' Remote Code Execution | This is a webapps exploit for php platform. Description: Joomla! 3.4.6 - 'configuration.php' Remote Code Execution. Author: Alessandro Groppo |
Analyze the security implications of: Joomla! 3.4.6 - 'configuration.php' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dorsa CMS - 'Default_.aspx' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Dorsa CMS - 'Default_.aspx' Cross-Site Scripting. Author: Pouya_Server |
Analyze the security implications of: Dorsa CMS - 'Default_.aspx' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Huge-IT Portfolio Gallery Plugin 1.0.6 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Huge-IT Portfolio Gallery Plugin 1.0.6 - SQL Injection. Author: Larry W. Cashdollar |
Analyze the security implications of: Joomla! Component Huge-IT Portfolio Gallery Plugin 1.0.6 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache Rave 0.11 < 0.20 - User Information Disclosure | This is a webapps exploit for multiple platform. Description: Apache Rave 0.11 < 0.20 - User Information Disclosure. Author: Andreas Guth |
Analyze the security implications of: Apache Rave 0.11 < 0.20 - User Information Disclosure | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Emby MediaServer 3.2.5 - Directory Traversal | This is a webapps exploit for multiple platform. Description: Emby MediaServer 3.2.5 - Directory Traversal. Author: LiquidWorm |
Analyze the security implications of: Emby MediaServer 3.2.5 - Directory Traversal | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Pars Design CMS - Arbitrary File Upload | This is a webapps exploit for asp platform. Description: Pars Design CMS - Arbitrary File Upload. Author: Securitylab.ir |
Analyze the security implications of: Pars Design CMS - Arbitrary File Upload | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! 3.4.4 < 3.6.4 - Account Creation / Privilege Escalation | This is a webapps exploit for php platform. Description: Joomla! 3.4.4 < 3.6.4 - Account Creation / Privilege Escalation. Author: Xiphos Research Ltd |
Analyze the security implications of: Joomla! 3.4.4 < 3.6.4 - Account Creation / Privilege Escalation | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: events Calendar 1.1 - Remote File Inclusion | This is a webapps exploit for php platform. Description: events Calendar 1.1 - Remote File Inclusion. Author: k3vin mitnick |
Analyze the security implications of: events Calendar 1.1 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Tower Toppler 0.96 - 'HOME Environment' Local Buffer Overflow | This is a local exploit for linux platform. Description: Tower Toppler 0.96 - 'HOME Environment' Local Buffer Overflow. Author: FBHowns |
Analyze the security implications of: Tower Toppler 0.96 - 'HOME Environment' Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Bash 5.0 Patch 11 - SUID Priv Drop Exploit | This is a local exploit for linux platform. Description: Bash 5.0 Patch 11 - SUID Priv Drop Exploit. Author: Mohin Paramasivam |
Analyze the security implications of: Bash 5.0 Patch 11 - SUID Priv Drop Exploit | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: OpenBSD - 'ibcs2_exec' Kernel Code Execution | This is a local exploit for bsd platform. Description: OpenBSD - 'ibcs2_exec' Kernel Code Execution. Author: Scott Bartram |
Analyze the security implications of: OpenBSD - 'ibcs2_exec' Kernel Code Execution | This exploit targets bsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Mozilla Spidermonkey - IonMonkey 'Array.prototype.pop' Type Confusion | This is a dos exploit for multiple platform. Description: Mozilla Spidermonkey - IonMonkey 'Array.prototype.pop' Type Confusion. Author: Google Security Research |
Analyze the security implications of: Mozilla Spidermonkey - IonMonkey 'Array.prototype.pop' Type Confusion | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Samba 2.0.x - Insecure TMP File Symbolic Link | This is a local exploit for linux platform. Description: Samba 2.0.x - Insecure TMP File Symbolic Link. Author: Gabriel Maggiotti |
Analyze the security implications of: Samba 2.0.x - Insecure TMP File Symbolic Link | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FileThingie 2.5.7 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: FileThingie 2.5.7 - Arbitrary File Upload. Author: cakes |
Analyze the security implications of: FileThingie 2.5.7 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Pre Hotels&Resorts Management System - Authentication Bypass | This is a webapps exploit for asp platform. Description: Pre Hotels&Resorts Management System - Authentication Bypass. Author: R3d-D3V!L |
Analyze the security implications of: Pre Hotels&Resorts Management System - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: GNU C Library 2.x (libc6) - Dynamic Linker LD_AUDIT Arbitrary DSO Load Privilege Escalation | This is a local exploit for linux platform. Description: GNU C Library 2.x (libc6) - Dynamic Linker LD_AUDIT Arbitrary DSO Load Privilege Escalation. Author: Tavis Ormandy |
Analyze the security implications of: GNU C Library 2.x (libc6) - Dynamic Linker LD_AUDIT Arbitrary DSO Load Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Limbo CMS 1.0.4.2 - Cross-Site Request Forgery / Privilege Escalation | This is a webapps exploit for php platform. Description: Limbo CMS 1.0.4.2 - Cross-Site Request Forgery / Privilege Escalation. Author: Alfons Luja |
Analyze the security implications of: Limbo CMS 1.0.4.2 - Cross-Site Request Forgery / Privilege Escalation | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KDE Konqueror 3.0.3 - Malformed HTML Page Denial of Service | This is a dos exploit for linux platform. Description: KDE Konqueror 3.0.3 - Malformed HTML Page Denial of Service. Author: Joachim_Strombergson |
Analyze the security implications of: KDE Konqueror 3.0.3 - Malformed HTML Page Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple macOS 10.12 16A323 XNU Kernel / iOS 10.1.1 - 'set_dp_control_port' Lack of Locking Use-After-Free | This is a local exploit for multiple platform. Description: Apple macOS 10.12 16A323 XNU Kernel / iOS 10.1.1 - 'set_dp_control_port' Lack of Locking Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Apple macOS 10.12 16A323 XNU Kernel / iOS 10.1.1 - 'set_dp_control_port' Lack of Locking Use-After-Free | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BatmanPorTaL - 'profil.asp?id' SQL Injection | This is a webapps exploit for php platform. Description: BatmanPorTaL - 'profil.asp?id' SQL Injection. Author: U238 |
Analyze the security implications of: BatmanPorTaL - 'profil.asp?id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sagemcom F@ST 3890 (50_10_19-T1) Cable Modem - 'Cable Haunt' Remote Code Execution | This is a remote exploit for hardware platform. Description: Sagemcom F@ST 3890 (50_10_19-T1) Cable Modem - 'Cable Haunt' Remote Code Execution. Author: Lyrebirds |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.