input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Linux Kernel < 2.6.34 (Ubuntu 10.10 x86) - 'CAP_SYS_ADMIN' Local Privilege Escalation (1) | This is a local exploit for linux_x86 platform. Description: Linux Kernel < 2.6.34 (Ubuntu 10.10 x86) - 'CAP_SYS_ADMIN' Local Privilege Escalation (1). Author: Dan Rosenberg |
Analyze the security implications of: Linux Kernel < 2.6.34 (Ubuntu 10.10 x86) - 'CAP_SYS_ADMIN' Local Privilege Escalation (1) | This exploit targets linux_x86 systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux_x86 platform |
What is this exploit about: Joomla! Component Catalogue - SQL Injection / Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Catalogue - SQL Injection / Local File Inclusion. Author: XroGuE |
Analyze the security implications of: Joomla! Component Catalogue - SQL Injection / Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.4/5.5/5.6 - SplDoublyLinkedList 'Unserialize()' Use-After-Free | This is a dos exploit for php platform. Description: PHP 5.4/5.5/5.6 - SplDoublyLinkedList 'Unserialize()' Use-After-Free. Author: Taoguang Chen |
Analyze the security implications of: PHP 5.4/5.5/5.6 - SplDoublyLinkedList 'Unserialize()' Use-After-Free | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EXAMPLO - SQL Injection | This is a webapps exploit for php platform. Description: EXAMPLO - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: EXAMPLO - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Magic Photo Storage Website - '/user/register.php?_config[site_path]' Remote File Inclusion | This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/user/register.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina |
Analyze the security implications of: Magic Photo Storage Website - '/user/register.php?_config[site_path]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Okul Web Otomasyon Sistemi 4.0.1 - SQL Injection | This is a webapps exploit for asp platform. Description: Okul Web Otomasyon Sistemi 4.0.1 - SQL Injection. Author: ilker Kandemir |
Analyze the security implications of: Okul Web Otomasyon Sistemi 4.0.1 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Tendenci 12.3.1 - CSV/ Formula Injection | This is a webapps exploit for multiple platform. Description: Tendenci 12.3.1 - CSV/ Formula Injection. Author: Mufaddal Masalawala |
Analyze the security implications of: Tendenci 12.3.1 - CSV/ Formula Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_caproductprices - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_caproductprices - 'id' SQL Injection. Author: CoBRa_21 |
Analyze the security implications of: Joomla! Component com_caproductprices - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Websense Triton - Multiple Vulnerabilities | This is a webapps exploit for cgi platform. Description: Websense Triton - Multiple Vulnerabilities. Author: Ben Williams |
Analyze the security implications of: Websense Triton - Multiple Vulnerabilities | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: ThingsBoard 3.3.1 'name' - Stored Cross-Site Scripting (XSS) | This is a webapps exploit for multiple platform. Description: ThingsBoard 3.3.1 'name' - Stored Cross-Site Scripting (XSS). Author: Steffen Langenfeld |
Analyze the security implications of: ThingsBoard 3.3.1 'name' - Stored Cross-Site Scripting (XSS) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Brickcom IP Camera - Credentials Disclosure | This is a webapps exploit for hardware platform. Description: Brickcom IP Camera - Credentials Disclosure. Author: Emiliano Ipar |
Analyze the security implications of: Brickcom IP Camera - Credentials Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: TP-Link TL-SC3171 IP Cameras - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: TP-Link TL-SC3171 IP Cameras - Multiple Vulnerabilities. Author: Core Security |
Analyze the security implications of: TP-Link TL-SC3171 IP Cameras - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: DigiOz Guestbook 1.7.2 - 'search.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DigiOz Guestbook 1.7.2 - 'search.php' Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: DigiOz Guestbook 1.7.2 - 'search.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Netgear WNDAP350 Wireless Access Point - Multiple Information Disclosure Vulnerabilities | This is a remote exploit for hardware platform. Description: Netgear WNDAP350 Wireless Access Point - Multiple Information Disclosure Vulnerabilities. Author: Juerd Waalboer |
Analyze the security implications of: Netgear WNDAP350 Wireless Access Point - Multiple Information Disclosure Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ImageAlbum 2.0.0b2 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: ImageAlbum 2.0.0b2 - 'id' SQL Injection. Author: Raw Security |
Analyze the security implications of: ImageAlbum 2.0.0b2 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Craft CMS SEOmatic plugin 3.1.4 - Server-Side Template Injection | This is a webapps exploit for linux platform. Description: Craft CMS SEOmatic plugin 3.1.4 - Server-Side Template Injection. Author: 0xB455 |
Analyze the security implications of: Craft CMS SEOmatic plugin 3.1.4 - Server-Side Template Injection | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GV PostScript Viewer - Remote Buffer Overflow (1) | This is a remote exploit for linux platform. Description: GV PostScript Viewer - Remote Buffer Overflow (1). Author: infamous41md |
Analyze the security implications of: GV PostScript Viewer - Remote Buffer Overflow (1) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component Rapid-Recipe - HTML Injection | This is a webapps exploit for php platform. Description: Joomla! Component Rapid-Recipe - HTML Injection. Author: Sid3^effects |
Analyze the security implications of: Joomla! Component Rapid-Recipe - HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ID Team ID Board 1.1.3 - 'SQL.CLS.php' SQL Injection | This is a webapps exploit for php platform. Description: ID Team ID Board 1.1.3 - 'SQL.CLS.php' SQL Injection. Author: Defa |
Analyze the security implications of: ID Team ID Board 1.1.3 - 'SQL.CLS.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Advanced Poll 2.0 - Remote Information Disclosure | This is a webapps exploit for php platform. Description: Advanced Poll 2.0 - Remote Information Disclosure. Author: subj |
Analyze the security implications of: Advanced Poll 2.0 - Remote Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NTPD - MON_GETLIST Query Amplification Denial of Service | This is a dos exploit for multiple platform. Description: NTPD - MON_GETLIST Query Amplification Denial of Service. Author: Todor Donev |
Analyze the security implications of: NTPD - MON_GETLIST Query Amplification Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cyrus IMAPD 2.3.2 - 'pop3d' Remote Buffer Overflow (1) | This is a remote exploit for linux platform. Description: Cyrus IMAPD 2.3.2 - 'pop3d' Remote Buffer Overflow (1). Author: kingcope |
Analyze the security implications of: Cyrus IMAPD 2.3.2 - 'pop3d' Remote Buffer Overflow (1) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FMyLife Clone Script (Pro Edition) 1.1 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: FMyLife Clone Script (Pro Edition) 1.1 - Cross-Site Request Forgery (Add Admin). Author: Ihsan Sencan |
Analyze the security implications of: FMyLife Clone Script (Pro Edition) 1.1 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco IOS 12 - UDP Denial of Service | This is a dos exploit for hardware platform. Description: Cisco IOS 12 - UDP Denial of Service. Author: blackangels |
Analyze the security implications of: Cisco IOS 12 - UDP Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AJ Classifieds - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: AJ Classifieds - 'index.php' SQL Injection. Author: t0pP8uZz |
Analyze the security implications of: AJ Classifieds - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! / Mambo Component Filebase - 'filecatid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component Filebase - 'filecatid' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! / Mambo Component Filebase - 'filecatid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Centreon 19.10.5 - Remote Command Execution | This is a webapps exploit for php platform. Description: Centreon 19.10.5 - Remote Command Execution. Author: Fabien AUNAY |
Analyze the security implications of: Centreon 19.10.5 - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Motorola SBG6580 Cable Modem & Wireless Router - Reboot (Denial of Service) | This is a dos exploit for hardware platform. Description: Motorola SBG6580 Cable Modem & Wireless Router - Reboot (Denial of Service). Author: nicx0 |
Analyze the security implications of: Motorola SBG6580 Cable Modem & Wireless Router - Reboot (Denial of Service) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AutoIndex PHP Script - 'index.php' Directory Traversal | This is a webapps exploit for php platform. Description: AutoIndex PHP Script - 'index.php' Directory Traversal. Author: Red-D3v1L |
Analyze the security implications of: AutoIndex PHP Script - 'index.php' Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LBT-T300-mini1 - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: LBT-T300-mini1 - Remote Buffer Overflow. Author: Amirhossein Bahramizadeh |
Analyze the security implications of: LBT-T300-mini1 - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Netgear WNR1000v4 - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Netgear WNR1000v4 - Authentication Bypass. Author: Daniel Haake |
Analyze the security implications of: Netgear WNR1000v4 - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: PDFlib 7.0.2 - Multiple Remote Buffer Overflow Vulnerabilities | This is a remote exploit for php platform. Description: PDFlib 7.0.2 - Multiple Remote Buffer Overflow Vulnerabilities. Author: poplix |
Analyze the security implications of: PDFlib 7.0.2 - Multiple Remote Buffer Overflow Vulnerabilities | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ziggurat Farsi CMS - SQL Injection | This is a webapps exploit for asp platform. Description: Ziggurat Farsi CMS - SQL Injection. Author: Arash Saadatfar |
Analyze the security implications of: Ziggurat Farsi CMS - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ImpressCMS 1.3.11 - 'bid' SQL Injection | This is a webapps exploit for php platform. Description: ImpressCMS 1.3.11 - 'bid' SQL Injection. Author: Mehmet Onder |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.