input
stringlengths
39
228
output
stringlengths
32
324
What is this exploit about: Armidale Software Yapp Conferencing System 2.2 - Local Buffer Overflow
This is a local exploit for linux platform. Description: Armidale Software Yapp Conferencing System 2.2 - Local Buffer Overflow. Author: satan
Analyze the security implications of: Armidale Software Yapp Conferencing System 2.2 - Local Buffer Overflow
This exploit targets linux systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Apple QuickTime 7.1.5 - Information Disclosure / Multiple Code Execution Vulnerabilities
This is a remote exploit for multiple platform. Description: Apple QuickTime 7.1.5 - Information Disclosure / Multiple Code Execution Vulnerabilities. Author: Wolf
Analyze the security implications of: Apple QuickTime 7.1.5 - Information Disclosure / Multiple Code Execution Vulnerabilities
This exploit targets multiple systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Samba 3.0.10 (OSX) - 'lsa_io_trans_names' Heap Overflow (Metasploit)
This is a remote exploit for osx platform. Description: Samba 3.0.10 (OSX) - 'lsa_io_trans_names' Heap Overflow (Metasploit). Author: Metasploit
Analyze the security implications of: Samba 3.0.10 (OSX) - 'lsa_io_trans_names' Heap Overflow (Metasploit)
This exploit targets osx systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets osx platform
What is this exploit about: OpenVPN 2.2.29 - 'Shellshock' Remote Command Injection
This is a remote exploit for linux platform. Description: OpenVPN 2.2.29 - 'Shellshock' Remote Command Injection. Author: hobbily plunt
Analyze the security implications of: OpenVPN 2.2.29 - 'Shellshock' Remote Command Injection
This exploit targets linux systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: ICSiteBuilder 1.1 - SQL Injection
This is a webapps exploit for php platform. Description: ICSiteBuilder 1.1 - SQL Injection. Author: Ihsan Sencan
Analyze the security implications of: ICSiteBuilder 1.1 - SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Unreal Tournament 2004 - 'Secure' Remote Overflow (Metasploit)
This is a remote exploit for linux platform. Description: Unreal Tournament 2004 - 'Secure' Remote Overflow (Metasploit). Author: onetwo
Analyze the security implications of: Unreal Tournament 2004 - 'Secure' Remote Overflow (Metasploit)
This exploit targets linux systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: xweb 1.0 - Directory Traversal
This is a remote exploit for linux platform. Description: xweb 1.0 - Directory Traversal. Author: Donato Ferrante
Analyze the security implications of: xweb 1.0 - Directory Traversal
This exploit targets linux systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: In-link 2.3.4/5.1.3 RC1 - 'cat' SQL Injection
This is a webapps exploit for php platform. Description: In-link 2.3.4/5.1.3 RC1 - 'cat' SQL Injection. Author: SubhashDasyam
Analyze the security implications of: In-link 2.3.4/5.1.3 RC1 - 'cat' SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: actSite 1.56 - 'news.php' Local File Inclusion
This is a webapps exploit for php platform. Description: actSite 1.56 - 'news.php' Local File Inclusion. Author: DNX
Analyze the security implications of: actSite 1.56 - 'news.php' Local File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: D-Link DSL-526B ADSL2+ AU_2.01 - Remote DNS Change
This is a webapps exploit for hardware platform. Description: D-Link DSL-526B ADSL2+ AU_2.01 - Remote DNS Change. Author: Todor Donev
Analyze the security implications of: D-Link DSL-526B ADSL2+ AU_2.01 - Remote DNS Change
This exploit targets hardware systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: SeaMonkey 1.1.8 - Remote Array Overrun
This is a dos exploit for bsd platform. Description: SeaMonkey 1.1.8 - Remote Array Overrun. Author: Maksymilian Arciemowicz & sp3x
Analyze the security implications of: SeaMonkey 1.1.8 - Remote Array Overrun
This exploit targets bsd systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets bsd platform
What is this exploit about: Jenkins Software RakNet 3.72 - Remote Integer Underflow
This is a remote exploit for multiple platform. Description: Jenkins Software RakNet 3.72 - Remote Integer Underflow. Author: Luigi Auriemma
Analyze the security implications of: Jenkins Software RakNet 3.72 - Remote Integer Underflow
This exploit targets multiple systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Mambo Component zOOm Media Gallery 2.5 Beta 2 - Remote File Inclusion
This is a webapps exploit for php platform. Description: Mambo Component zOOm Media Gallery 2.5 Beta 2 - Remote File Inclusion. Author: iskorpitx
Analyze the security implications of: Mambo Component zOOm Media Gallery 2.5 Beta 2 - Remote File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Joomla! 3.4.6 - 'configuration.php' Remote Code Execution
This is a webapps exploit for php platform. Description: Joomla! 3.4.6 - 'configuration.php' Remote Code Execution. Author: Alessandro Groppo
Analyze the security implications of: Joomla! 3.4.6 - 'configuration.php' Remote Code Execution
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Dorsa CMS - 'Default_.aspx' Cross-Site Scripting
This is a webapps exploit for asp platform. Description: Dorsa CMS - 'Default_.aspx' Cross-Site Scripting. Author: Pouya_Server
Analyze the security implications of: Dorsa CMS - 'Default_.aspx' Cross-Site Scripting
This exploit targets asp systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets asp platform
What is this exploit about: Joomla! Component Huge-IT Portfolio Gallery Plugin 1.0.6 - SQL Injection
This is a webapps exploit for php platform. Description: Joomla! Component Huge-IT Portfolio Gallery Plugin 1.0.6 - SQL Injection. Author: Larry W. Cashdollar
Analyze the security implications of: Joomla! Component Huge-IT Portfolio Gallery Plugin 1.0.6 - SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Apache Rave 0.11 < 0.20 - User Information Disclosure
This is a webapps exploit for multiple platform. Description: Apache Rave 0.11 < 0.20 - User Information Disclosure. Author: Andreas Guth
Analyze the security implications of: Apache Rave 0.11 < 0.20 - User Information Disclosure
This exploit targets multiple systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Emby MediaServer 3.2.5 - Directory Traversal
This is a webapps exploit for multiple platform. Description: Emby MediaServer 3.2.5 - Directory Traversal. Author: LiquidWorm
Analyze the security implications of: Emby MediaServer 3.2.5 - Directory Traversal
This exploit targets multiple systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Pars Design CMS - Arbitrary File Upload
This is a webapps exploit for asp platform. Description: Pars Design CMS - Arbitrary File Upload. Author: Securitylab.ir
Analyze the security implications of: Pars Design CMS - Arbitrary File Upload
This exploit targets asp systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets asp platform
What is this exploit about: Joomla! 3.4.4 < 3.6.4 - Account Creation / Privilege Escalation
This is a webapps exploit for php platform. Description: Joomla! 3.4.4 < 3.6.4 - Account Creation / Privilege Escalation. Author: Xiphos Research Ltd
Analyze the security implications of: Joomla! 3.4.4 < 3.6.4 - Account Creation / Privilege Escalation
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: events Calendar 1.1 - Remote File Inclusion
This is a webapps exploit for php platform. Description: events Calendar 1.1 - Remote File Inclusion. Author: k3vin mitnick
Analyze the security implications of: events Calendar 1.1 - Remote File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Tower Toppler 0.96 - 'HOME Environment' Local Buffer Overflow
This is a local exploit for linux platform. Description: Tower Toppler 0.96 - 'HOME Environment' Local Buffer Overflow. Author: FBHowns
Analyze the security implications of: Tower Toppler 0.96 - 'HOME Environment' Local Buffer Overflow
This exploit targets linux systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Bash 5.0 Patch 11 - SUID Priv Drop Exploit
This is a local exploit for linux platform. Description: Bash 5.0 Patch 11 - SUID Priv Drop Exploit. Author: Mohin Paramasivam
Analyze the security implications of: Bash 5.0 Patch 11 - SUID Priv Drop Exploit
This exploit targets linux systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: OpenBSD - 'ibcs2_exec' Kernel Code Execution
This is a local exploit for bsd platform. Description: OpenBSD - 'ibcs2_exec' Kernel Code Execution. Author: Scott Bartram
Analyze the security implications of: OpenBSD - 'ibcs2_exec' Kernel Code Execution
This exploit targets bsd systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets bsd platform
What is this exploit about: Mozilla Spidermonkey - IonMonkey 'Array.prototype.pop' Type Confusion
This is a dos exploit for multiple platform. Description: Mozilla Spidermonkey - IonMonkey 'Array.prototype.pop' Type Confusion. Author: Google Security Research
Analyze the security implications of: Mozilla Spidermonkey - IonMonkey 'Array.prototype.pop' Type Confusion
This exploit targets multiple systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Samba 2.0.x - Insecure TMP File Symbolic Link
This is a local exploit for linux platform. Description: Samba 2.0.x - Insecure TMP File Symbolic Link. Author: Gabriel Maggiotti
Analyze the security implications of: Samba 2.0.x - Insecure TMP File Symbolic Link
This exploit targets linux systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: FileThingie 2.5.7 - Arbitrary File Upload
This is a webapps exploit for php platform. Description: FileThingie 2.5.7 - Arbitrary File Upload. Author: cakes
Analyze the security implications of: FileThingie 2.5.7 - Arbitrary File Upload
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Pre Hotels&Resorts Management System - Authentication Bypass
This is a webapps exploit for asp platform. Description: Pre Hotels&Resorts Management System - Authentication Bypass. Author: R3d-D3V!L
Analyze the security implications of: Pre Hotels&Resorts Management System - Authentication Bypass
This exploit targets asp systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets asp platform
What is this exploit about: GNU C Library 2.x (libc6) - Dynamic Linker LD_AUDIT Arbitrary DSO Load Privilege Escalation
This is a local exploit for linux platform. Description: GNU C Library 2.x (libc6) - Dynamic Linker LD_AUDIT Arbitrary DSO Load Privilege Escalation. Author: Tavis Ormandy
Analyze the security implications of: GNU C Library 2.x (libc6) - Dynamic Linker LD_AUDIT Arbitrary DSO Load Privilege Escalation
This exploit targets linux systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Limbo CMS 1.0.4.2 - Cross-Site Request Forgery / Privilege Escalation
This is a webapps exploit for php platform. Description: Limbo CMS 1.0.4.2 - Cross-Site Request Forgery / Privilege Escalation. Author: Alfons Luja
Analyze the security implications of: Limbo CMS 1.0.4.2 - Cross-Site Request Forgery / Privilege Escalation
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: KDE Konqueror 3.0.3 - Malformed HTML Page Denial of Service
This is a dos exploit for linux platform. Description: KDE Konqueror 3.0.3 - Malformed HTML Page Denial of Service. Author: Joachim_Strombergson
Analyze the security implications of: KDE Konqueror 3.0.3 - Malformed HTML Page Denial of Service
This exploit targets linux systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Apple macOS 10.12 16A323 XNU Kernel / iOS 10.1.1 - 'set_dp_control_port' Lack of Locking Use-After-Free
This is a local exploit for multiple platform. Description: Apple macOS 10.12 16A323 XNU Kernel / iOS 10.1.1 - 'set_dp_control_port' Lack of Locking Use-After-Free. Author: Google Security Research
Analyze the security implications of: Apple macOS 10.12 16A323 XNU Kernel / iOS 10.1.1 - 'set_dp_control_port' Lack of Locking Use-After-Free
This exploit targets multiple systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: BatmanPorTaL - 'profil.asp?id' SQL Injection
This is a webapps exploit for php platform. Description: BatmanPorTaL - 'profil.asp?id' SQL Injection. Author: U238
Analyze the security implications of: BatmanPorTaL - 'profil.asp?id' SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Sagemcom F@ST 3890 (50_10_19-T1) Cable Modem - 'Cable Haunt' Remote Code Execution
This is a remote exploit for hardware platform. Description: Sagemcom F@ST 3890 (50_10_19-T1) Cable Modem - 'Cable Haunt' Remote Code Execution. Author: Lyrebirds