input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: LibTIFF - 'LZWDecodeCompat()' Remote Buffer Underflow | This is a dos exploit for multiple platform. Description: LibTIFF - 'LZWDecodeCompat()' Remote Buffer Underflow. Author: wololo |
Analyze the security implications of: LibTIFF - 'LZWDecodeCompat()' Remote Buffer Underflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Clipbucket 2.6 Revision 738 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Clipbucket 2.6 Revision 738 - Multiple SQL Injections. Author: High-Tech Bridge SA |
Analyze the security implications of: Clipbucket 2.6 Revision 738 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Snom IP Phone - Privilege Escalation | This is a webapps exploit for hardware platform. Description: Snom IP Phone - Privilege Escalation. Author: Sense of Security |
Analyze the security implications of: Snom IP Phone - Privilege Escalation | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Microsoft IIS 4.0 - Remote Buffer Overflow (3) | This is a remote exploit for linux platform. Description: Microsoft IIS 4.0 - Remote Buffer Overflow (3). Author: eeye security |
Analyze the security implications of: Microsoft IIS 4.0 - Remote Buffer Overflow (3) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mailman 2.1.x - Multiple Input Validation Vulnerabilities | This is a webapps exploit for cgi platform. Description: Mailman 2.1.x - Multiple Input Validation Vulnerabilities. Author: Moritz Naumann |
Analyze the security implications of: Mailman 2.1.x - Multiple Input Validation Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: AzDGVote - Remote File Inclusion | This is a webapps exploit for php platform. Description: AzDGVote - Remote File Inclusion. Author: SnIpEr_SA |
Analyze the security implications of: AzDGVote - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cwmCounter 5.1.1 - 'statistic.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: cwmCounter 5.1.1 - 'statistic.php' Remote File Inclusion. Author: bd0rk |
Analyze the security implications of: cwmCounter 5.1.1 - 'statistic.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_communitypolls 1.5.2 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_communitypolls 1.5.2 - Local File Inclusion. Author: kaMtiEz |
Analyze the security implications of: Joomla! Component com_communitypolls 1.5.2 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Belchior Foundry vCard Pro 3.1 - 'Addrbook.php' SQL Injection | This is a webapps exploit for php platform. Description: Belchior Foundry vCard Pro 3.1 - 'Addrbook.php' SQL Injection. Author: almaster |
Analyze the security implications of: Belchior Foundry vCard Pro 3.1 - 'Addrbook.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Made Simple < 2.2.10 - SQL Injection | This is a webapps exploit for php platform. Description: CMS Made Simple < 2.2.10 - SQL Injection. Author: Daniele Scanu |
Analyze the security implications of: CMS Made Simple < 2.2.10 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: KwsPHP 1.3.456 Module Galerie - 'id_gal' SQL Injection | This is a webapps exploit for php platform. Description: KwsPHP 1.3.456 Module Galerie - 'id_gal' SQL Injection. Author: S@BUN |
Analyze the security implications of: KwsPHP 1.3.456 Module Galerie - 'id_gal' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Multiple Hunt CCTV - Information Disclosure | This is a remote exploit for multiple platform. Description: Multiple Hunt CCTV - Information Disclosure. Author: Alejandro Ramos |
Analyze the security implications of: Multiple Hunt CCTV - Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Sophos XG115w Firewall 17.0.10 MR-10 - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Sophos XG115w Firewall 17.0.10 MR-10 - Authentication Bypass. Author: Aryan Chehreghani |
Analyze the security implications of: Sophos XG115w Firewall 17.0.10 MR-10 - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ASPNuke 0.80 - 'profile.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: ASPNuke 0.80 - 'profile.asp' Cross-Site Scripting. Author: Dcrab |
Analyze the security implications of: ASPNuke 0.80 - 'profile.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: LoveCMS 1.6.2 - Cross-Site Request Forgery / Code Injection | This is a webapps exploit for php platform. Description: LoveCMS 1.6.2 - Cross-Site Request Forgery / Code Injection. Author: hiphop |
Analyze the security implications of: LoveCMS 1.6.2 - Cross-Site Request Forgery / Code Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Crafty Syntax Live Help 2.14.6 - 'department' SQL Injection | This is a webapps exploit for php platform. Description: Crafty Syntax Live Help 2.14.6 - 'department' SQL Injection. Author: GulfTech Security |
Analyze the security implications of: Crafty Syntax Live Help 2.14.6 - 'department' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_book - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_book - SQL Injection. Author: Evil-Cod3r |
Analyze the security implications of: Joomla! Component com_book - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bookmark4U 2.0 - '/inc/function.php?env[include_prefix]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Bookmark4U 2.0 - '/inc/function.php?env[include_prefix]' Remote File Inclusion. Author: SnIpEr_SA |
Analyze the security implications of: Bookmark4U 2.0 - '/inc/function.php?env[include_prefix]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EggBlog 2.0 - 'message' Cross-Site Scripting | This is a webapps exploit for php platform. Description: EggBlog 2.0 - 'message' Cross-Site Scripting. Author: alex@evuln.com |
Analyze the security implications of: EggBlog 2.0 - 'message' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Telesquare SKT LTE Router SDT-CS3B1 - Information Disclosure | This is a webapps exploit for hardware platform. Description: Telesquare SKT LTE Router SDT-CS3B1 - Information Disclosure. Author: LiquidWorm |
Analyze the security implications of: Telesquare SKT LTE Router SDT-CS3B1 - Information Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apple At Ease 5.0 - Information Disclosure | This is a local exploit for osx platform. Description: Apple At Ease 5.0 - Information Disclosure. Author: Tim Conrad |
Analyze the security implications of: Apple At Ease 5.0 - Information Disclosure | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: DoubleSpeak 0.1 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: DoubleSpeak 0.1 - Multiple Remote File Inclusions. Author: R@1D3N |
Analyze the security implications of: DoubleSpeak 0.1 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.x - Btrfs Cloned File Security Bypass | This is a local exploit for linux platform. Description: Linux Kernel 2.6.x - Btrfs Cloned File Security Bypass. Author: Dan Rosenberg |
Analyze the security implications of: Linux Kernel 2.6.x - Btrfs Cloned File Security Bypass | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ClanSphere 2011.3 - 'cs_lang' Cookie Local File Inclusion | This is a webapps exploit for php platform. Description: ClanSphere 2011.3 - 'cs_lang' Cookie Local File Inclusion. Author: blkhtc0rp |
Analyze the security implications of: ClanSphere 2011.3 - 'cs_lang' Cookie Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fortify Software Security Center (SSC) 17.x/18.1 - XML External Entity Injection | This is a webapps exploit for java platform. Description: Fortify Software Security Center (SSC) 17.x/18.1 - XML External Entity Injection. Author: alt3kx |
Analyze the security implications of: Fortify Software Security Center (SSC) 17.x/18.1 - XML External Entity Injection | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: DELTAScripts PHP Links - Multiple SQL Injections | This is a webapps exploit for php platform. Description: DELTAScripts PHP Links - Multiple SQL Injections. Author: L0n3ly-H34rT |
Analyze the security implications of: DELTAScripts PHP Links - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FreeBSD 3.5.1/4.2 - Ports Package 'xklock' Local Privilege Escalation | This is a local exploit for bsd platform. Description: FreeBSD 3.5.1/4.2 - Ports Package 'xklock' Local Privilege Escalation. Author: dethy |
Analyze the security implications of: FreeBSD 3.5.1/4.2 - Ports Package 'xklock' Local Privilege Escalation | This exploit targets bsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Linux Kernel 2.4.28/2.6.9 - 'scm_send Local' Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 2.4.28/2.6.9 - 'scm_send Local' Denial of Service. Author: Paul Starzetz |
Analyze the security implications of: Linux Kernel 2.4.28/2.6.9 - 'scm_send Local' Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CommuniGate Pro 5.2.14 - Web Mail URI Parsing HTML Injection | This is a webapps exploit for php platform. Description: CommuniGate Pro 5.2.14 - Web Mail URI Parsing HTML Injection. Author: Andrea Purificato |
Analyze the security implications of: CommuniGate Pro 5.2.14 - Web Mail URI Parsing HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: TP-Link TL-WR340G / TL-WR340GD - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: TP-Link TL-WR340G / TL-WR340GD - Multiple Vulnerabilities. Author: smash |
Analyze the security implications of: TP-Link TL-WR340G / TL-WR340GD - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Geeklog 2 - 'BaseView.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Geeklog 2 - 'BaseView.php' Remote File Inclusion. Author: GoLd_M |
Analyze the security implications of: Geeklog 2 - 'BaseView.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Job2C - 'conf.inc' Configuration File Disclosure | This is a webapps exploit for php platform. Description: Job2C - 'conf.inc' Configuration File Disclosure. Author: InjEctOr5 |
Analyze the security implications of: Job2C - 'conf.inc' Configuration File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Emacs 2.1 - Local Variable Arbitrary Command Execution | This is a local exploit for linux platform. Description: Emacs 2.1 - Local Variable Arbitrary Command Execution. Author: Georgi Guninski |
Analyze the security implications of: Emacs 2.1 - Local Variable Arbitrary Command Execution | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component JS Jobs 1.2.0 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component JS Jobs 1.2.0 - Cross-Site Scripting. Author: Sureshbabu Narvaneni |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.