input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: RedHat 4.x/5.x/6.x / RedHat man 1.5 / Turbolinux man 1.5 / Turbolinux 3.5/4.x - 'man' Buffer Overrun (1) | This is a local exploit for linux platform. Description: RedHat 4.x/5.x/6.x / RedHat man 1.5 / Turbolinux man 1.5 / Turbolinux 3.5/4.x - 'man' Buffer Overrun (1). Author: Babcia Padlina |
Analyze the security implications of: RedHat 4.x/5.x/6.x / RedHat man 1.5 / Turbolinux man 1.5 / Turbolinux 3.5/4.x - 'man' Buffer Overrun (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: OpenNMS 1.5.x - 'Username' Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: OpenNMS 1.5.x - 'Username' Cross-Site Scripting. Author: d2d |
Analyze the security implications of: OpenNMS 1.5.x - 'Username' Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: F5 BIG-IP - Authentication Bypass | This is a remote exploit for hardware platform. Description: F5 BIG-IP - Authentication Bypass. Author: David Kennedy (ReL1K) |
Analyze the security implications of: F5 BIG-IP - Authentication Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ETL Delegate 5.9.x/6.0.x - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: ETL Delegate 5.9.x/6.0.x - Remote Buffer Overflow. Author: scut |
Analyze the security implications of: ETL Delegate 5.9.x/6.0.x - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: WordPress Plugin Colorbox Lightbox v1.1.1 - Persistent Cross-Site Scripting (Authenticated) | This is a webapps exploit for multiple platform. Description: WordPress Plugin Colorbox Lightbox v1.1.1 - Persistent Cross-Site Scripting (Authenticated). Author: n1x_ |
Analyze the security implications of: WordPress Plugin Colorbox Lightbox v1.1.1 - Persistent Cross-Site Scripting (Authenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apple Mac OSX xnu 1228.3.13 - 'macfsstat' Local Kernel Memory Leak/Denial of Service | This is a dos exploit for osx platform. Description: Apple Mac OSX xnu 1228.3.13 - 'macfsstat' Local Kernel Memory Leak/Denial of Service. Author: mu-b |
Analyze the security implications of: Apple Mac OSX xnu 1228.3.13 - 'macfsstat' Local Kernel Memory Leak/Denial of Service | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Vino VNC Server 3.7.3 - Persistent Denial of Service | This is a dos exploit for linux platform. Description: Vino VNC Server 3.7.3 - Persistent Denial of Service. Author: Trustwave's SpiderLabs |
Analyze the security implications of: Vino VNC Server 3.7.3 - Persistent Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Oracle OpenSSO 8.0 - Multiple Cross-Site Scripting POST Injection Vulnerabilities | This is a webapps exploit for multiple platform. Description: Oracle OpenSSO 8.0 - Multiple Cross-Site Scripting POST Injection Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: Oracle OpenSSO 8.0 - Multiple Cross-Site Scripting POST Injection Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Blog Pixel Motion 2.1.1 - PHP Code Execution / Create Admin | This is a webapps exploit for php platform. Description: Blog Pixel Motion 2.1.1 - PHP Code Execution / Create Admin. Author: DarkFig |
Analyze the security implications of: Blog Pixel Motion 2.1.1 - PHP Code Execution / Create Admin | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Article Directory - 'login.php' SQL Injection | This is a webapps exploit for php platform. Description: Article Directory - 'login.php' SQL Injection. Author: R3d D3v!L |
Analyze the security implications of: Article Directory - 'login.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 3Com Wireless 8760 Dual-Radio 11a/b/g PoE - Multiple Vulnerabilities | This is a remote exploit for hardware platform. Description: 3Com Wireless 8760 Dual-Radio 11a/b/g PoE - Multiple Vulnerabilities. Author: Adrian Pastor |
Analyze the security implications of: 3Com Wireless 8760 Dual-Radio 11a/b/g PoE - Multiple Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apple Mac OSX - 'gst_configure' Kernel Buffer Overflow | This is a dos exploit for osx platform. Description: Apple Mac OSX - 'gst_configure' Kernel Buffer Overflow. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX - 'gst_configure' Kernel Buffer Overflow | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Advanced Poll 2.0 - 'mysql_host' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Advanced Poll 2.0 - 'mysql_host' Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: Advanced Poll 2.0 - 'mysql_host' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Novell ZENworks Configuration Management 11.3.1 - Remote Code Execution | This is a webapps exploit for jsp platform. Description: Novell ZENworks Configuration Management 11.3.1 - Remote Code Execution. Author: Pedro Ribeiro |
Analyze the security implications of: Novell ZENworks Configuration Management 11.3.1 - Remote Code Execution | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: LibreOffice < 6.0.7 / 6.1.3 - Macro Code Execution (Metasploit) | This is a local exploit for multiple platform. Description: LibreOffice < 6.0.7 / 6.1.3 - Macro Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: LibreOffice < 6.0.7 / 6.1.3 - Macro Code Execution (Metasploit) | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: obotix IP Camera M1 1.9.4 .7/M10 2.0.5.2 - help Script Cross-Site Scripting | This is a remote exploit for hardware platform. Description: obotix IP Camera M1 1.9.4 .7/M10 2.0.5.2 - help Script Cross-Site Scripting. Author: Jaime Blasco |
Analyze the security implications of: obotix IP Camera M1 1.9.4 .7/M10 2.0.5.2 - help Script Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Boonex Dolphin 7.4.2 - 'width' Stored XSS | This is a webapps exploit for php platform. Description: Boonex Dolphin 7.4.2 - 'width' Stored XSS. Author: Piyush Patil |
Analyze the security implications of: Boonex Dolphin 7.4.2 - 'width' Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Turbo Seek - Null Byte Error Discloses Files | This is a webapps exploit for cgi platform. Description: Turbo Seek - Null Byte Error Discloses Files. Author: durito |
Analyze the security implications of: Turbo Seek - Null Byte Error Discloses Files | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: EMC NetWorker 7.6 sp3 - Denial of Service | This is a dos exploit for multiple platform. Description: EMC NetWorker 7.6 sp3 - Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: EMC NetWorker 7.6 sp3 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Zabbix Agent < 1.6.7 - Remote Bypass | This is a webapps exploit for multiple platform. Description: Zabbix Agent < 1.6.7 - Remote Bypass. Author: Nicob |
Analyze the security implications of: Zabbix Agent < 1.6.7 - Remote Bypass | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ADM 3.1.2RHG1 - Remote Code Execution | This is a webapps exploit for hardware platform. Description: ADM 3.1.2RHG1 - Remote Code Execution. Author: Matthew Fulton |
Analyze the security implications of: ADM 3.1.2RHG1 - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DigiRez 3.4 - 'book_id' SQL Injection | This is a webapps exploit for asp platform. Description: DigiRez 3.4 - 'book_id' SQL Injection. Author: ajann |
Analyze the security implications of: DigiRez 3.4 - 'book_id' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component MailTo - 'article' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component MailTo - 'article' SQL Injection. Author: H!tm@N |
Analyze the security implications of: Joomla! Component MailTo - 'article' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX 10.x - SecurityServer Daemon Local Denial of Service | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.x - SecurityServer Daemon Local Denial of Service. Author: Matt Burnett |
Analyze the security implications of: Apple Mac OSX 10.x - SecurityServer Daemon Local Denial of Service | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Campsite 2.6.1 - 'issue.php?g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'issue.php?g_documentRoot' Remote File Inclusion. Author: anonymous |
Analyze the security implications of: Campsite 2.6.1 - 'issue.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NetAccess IP3 - (Authenticated) Ping Option Command Injection | This is a local exploit for hardware platform. Description: NetAccess IP3 - (Authenticated) Ping Option Command Injection. Author: r00t |
Analyze the security implications of: NetAccess IP3 - (Authenticated) Ping Option Command Injection | This exploit targets hardware systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: WEBgais 1.0 - websendmail Remote Command Execution | This is a remote exploit for cgi platform. Description: WEBgais 1.0 - websendmail Remote Command Execution. Author: Razvan Dragomirescu |
Analyze the security implications of: WEBgais 1.0 - websendmail Remote Command Execution | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: xtell 2.6.1 - User Status Remote Information Disclosure | This is a remote exploit for linux platform. Description: xtell 2.6.1 - User Status Remote Information Disclosure. Author: spybreak |
Analyze the security implications of: xtell 2.6.1 - User Status Remote Information Disclosure | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SGI IRIX 6.4 - 'xfsdump' Local Privilege Escalation | This is a local exploit for irix platform. Description: SGI IRIX 6.4 - 'xfsdump' Local Privilege Escalation. Author: Yuri Volobuev |
Analyze the security implications of: SGI IRIX 6.4 - 'xfsdump' Local Privilege Escalation | This exploit targets irix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: Netgear JNR1010 ADSL Router - (Authenticated) Remote File Disclosure | This is a remote exploit for hardware platform. Description: Netgear JNR1010 ADSL Router - (Authenticated) Remote File Disclosure. Author: Todor Donev |
Analyze the security implications of: Netgear JNR1010 ADSL Router - (Authenticated) Remote File Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Thomson Wireless VoIP Cable Modem TWG850-4B ST9C.05.08 - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Thomson Wireless VoIP Cable Modem TWG850-4B ST9C.05.08 - Authentication Bypass. Author: Orwelllabs |
Analyze the security implications of: Thomson Wireless VoIP Cable Modem TWG850-4B ST9C.05.08 - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Reptile Web Server Reptile Web Server 20020105 - Denial of Service | This is a dos exploit for multiple platform. Description: Reptile Web Server Reptile Web Server 20020105 - Denial of Service. Author: Donato Ferrante |
Analyze the security implications of: Reptile Web Server Reptile Web Server 20020105 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: HP Compaq Insight Management Agent 5.0 - Format String | This is a dos exploit for hardware platform. Description: HP Compaq Insight Management Agent 5.0 - Format String. Author: mcw@wcd.se |
Analyze the security implications of: HP Compaq Insight Management Agent 5.0 - Format String | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: JDownloader Webinterface - Source Code Disclosure | This is a webapps exploit for multiple platform. Description: JDownloader Webinterface - Source Code Disclosure. Author: Sil3nt_Dre4m |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.