input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: systemd - 'chown_one()' Dereference Symlinks | This is a local exploit for linux platform. Description: systemd - 'chown_one()' Dereference Symlinks. Author: Google Security Research |
Analyze the security implications of: systemd - 'chown_one()' Dereference Symlinks | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux Kernel 4.4.0-21 (Ubuntu 16.04 x64) - Netfilter 'target_offset' Out-of-Bounds Privilege Escalation | This is a local exploit for linux_x86-64 platform. Description: Linux Kernel 4.4.0-21 (Ubuntu 16.04 x64) - Netfilter 'target_offset' Out-of-Bounds Privilege Escalation. Author: vnik |
Analyze the security implications of: Linux Kernel 4.4.0-21 (Ubuntu 16.04 x64) - Netfilter 'target_offset' Out-of-Bounds Privilege Escalation | This exploit targets linux_x86-64 systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux_x86-64 platform |
What is this exploit about: Tenda W309R Router 5.07.46 - Configuration Disclosure | This is a webapps exploit for hardware platform. Description: Tenda W309R Router 5.07.46 - Configuration Disclosure. Author: SANTHO |
Analyze the security implications of: Tenda W309R Router 5.07.46 - Configuration Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Discuz! 5.0.0 GBK - SQL Injection / Admin Credentials Disclosure | This is a webapps exploit for php platform. Description: Discuz! 5.0.0 GBK - SQL Injection / Admin Credentials Disclosure. Author: rgod |
Analyze the security implications of: Discuz! 5.0.0 GBK - SQL Injection / Admin Credentials Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: gallery_show.asp - GID Blind SQL Injection | This is a webapps exploit for asp platform. Description: gallery_show.asp - GID Blind SQL Injection. Author: R3d-D3V!L |
Analyze the security implications of: gallery_show.asp - GID Blind SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apache Axis2 1.x - '/axis2/axis2-admin' Session Fixation | This is a remote exploit for multiple platform. Description: Apache Axis2 1.x - '/axis2/axis2-admin' Session Fixation. Author: Tiago Ferreira Barbosa |
Analyze the security implications of: Apache Axis2 1.x - '/axis2/axis2-admin' Session Fixation | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Rockwell Automation Allen-Bradley PowerMonitor 1000 - Incorrect Access Control Authentication Bypass | This is a webapps exploit for hardware platform. Description: Rockwell Automation Allen-Bradley PowerMonitor 1000 - Incorrect Access Control Authentication Bypass. Author: Luca.Chiou |
Analyze the security implications of: Rockwell Automation Allen-Bradley PowerMonitor 1000 - Incorrect Access Control Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Aruba Instant (IAP) - Remote Code Execution | This is a remote exploit for cgi platform. Description: Aruba Instant (IAP) - Remote Code Execution. Author: Aleph Security |
Analyze the security implications of: Aruba Instant (IAP) - Remote Code Execution | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Sercomm TCP/32674 - Backdoor Reactivation | This is a remote exploit for hardware platform. Description: Sercomm TCP/32674 - Backdoor Reactivation. Author: Synacktiv |
Analyze the security implications of: Sercomm TCP/32674 - Backdoor Reactivation | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CubeCart 3.0.x - '/admin/forgot_pass.php?user_name' SQL Injection | This is a webapps exploit for php platform. Description: CubeCart 3.0.x - '/admin/forgot_pass.php?user_name' SQL Injection. Author: HACKERS PAL |
Analyze the security implications of: CubeCart 3.0.x - '/admin/forgot_pass.php?user_name' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: dotProject 2.1.6 - Remote File Inclusion | This is a webapps exploit for php platform. Description: dotProject 2.1.6 - Remote File Inclusion. Author: dun |
Analyze the security implications of: dotProject 2.1.6 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linksys Web Camera Software 2.10 - 'Next_file' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Linksys Web Camera Software 2.10 - 'Next_file' Cross-Site Scripting. Author: scriptX |
Analyze the security implications of: Linksys Web Camera Software 2.10 - 'Next_file' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: ActiveNews Manager - 'page' SQL Injection | This is a webapps exploit for asp platform. Description: ActiveNews Manager - 'page' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: ActiveNews Manager - 'page' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: DRDoS - Distributed Reflection Denial of Service | This is a dos exploit for multiple platform. Description: DRDoS - Distributed Reflection Denial of Service. Author: whoppix |
Analyze the security implications of: DRDoS - Distributed Reflection Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Basic-CMS - Remote Database Disclosure | This is a webapps exploit for php platform. Description: Basic-CMS - Remote Database Disclosure. Author: Stack |
Analyze the security implications of: Basic-CMS - Remote Database Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MySQL MaxDB 7.5 - WAHTTP Server Remote Denial of Service | This is a dos exploit for multiple platform. Description: MySQL MaxDB 7.5 - WAHTTP Server Remote Denial of Service. Author: Evgeny Demidov |
Analyze the security implications of: MySQL MaxDB 7.5 - WAHTTP Server Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Motorola SB5101 Hax0rware Rajko HTTPd - Remote Denial of Service (PoC) | This is a dos exploit for hardware platform. Description: Motorola SB5101 Hax0rware Rajko HTTPd - Remote Denial of Service (PoC). Author: Dillon Beresford |
Analyze the security implications of: Motorola SB5101 Hax0rware Rajko HTTPd - Remote Denial of Service (PoC) | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: cPanel 10.x - 'showfile.html?File' Cross-Site Scripting | This is a webapps exploit for php platform. Description: cPanel 10.x - 'showfile.html?File' Cross-Site Scripting. Author: preth00nker |
Analyze the security implications of: cPanel 10.x - 'showfile.html?File' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_as - 'catid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_as - 'catid' SQL Injection. Author: N2n-Hacker |
Analyze the security implications of: Joomla! Component com_as - 'catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Android Web Browser - '.BMP' File Integer Overflow | This is a dos exploit for android platform. Description: Google Android Web Browser - '.BMP' File Integer Overflow. Author: Alfredo Ortega |
Analyze the security implications of: Google Android Web Browser - '.BMP' File Integer Overflow | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Mambo 4.6.4 - Cache Lite Output Remote File Inclusion (Metasploit) | This is a webapps exploit for php platform. Description: Mambo 4.6.4 - Cache Lite Output Remote File Inclusion (Metasploit). Author: MC |
Analyze the security implications of: Mambo 4.6.4 - Cache Lite Output Remote File Inclusion (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DIR-615 Wireless Router - Persistent Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: D-Link DIR-615 Wireless Router - Persistent Cross-Site Scripting. Author: Sanyam Chawla |
Analyze the security implications of: D-Link DIR-615 Wireless Router - Persistent Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: QNX RTOS 4.25 - dumper Arbitrary File Modification | This is a local exploit for linux platform. Description: QNX RTOS 4.25 - dumper Arbitrary File Modification. Author: Simon Ouellette |
Analyze the security implications of: QNX RTOS 4.25 - dumper Arbitrary File Modification | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Coastercms 5.8.18 - Stored XSS | This is a webapps exploit for php platform. Description: Coastercms 5.8.18 - Stored XSS. Author: Hardik Solanki |
Analyze the security implications of: Coastercms 5.8.18 - Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FS Gigs Script 1.0 - 'cat' / 'sc' SQL Injection | This is a webapps exploit for php platform. Description: FS Gigs Script 1.0 - 'cat' / 'sc' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: FS Gigs Script 1.0 - 'cat' / 'sc' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ISC BIND 9 - Remote Dynamic Update Message Denial of Service (PoC) | This is a dos exploit for multiple platform. Description: ISC BIND 9 - Remote Dynamic Update Message Denial of Service (PoC). Author: kingcope |
Analyze the security implications of: ISC BIND 9 - Remote Dynamic Update Message Denial of Service (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: InverseFlow 2.4 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: InverseFlow 2.4 - Multiple Cross-Site Scripting Vulnerabilities. Author: Amir Expl0its |
Analyze the security implications of: InverseFlow 2.4 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache Tomcat 6.0.10 - Documentation Sample Application Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for multiple platform. Description: Apache Tomcat 6.0.10 - Documentation Sample Application Multiple Cross-Site Scripting Vulnerabilities. Author: Ferruh Mavituna |
Analyze the security implications of: Apache Tomcat 6.0.10 - Documentation Sample Application Multiple Cross-Site Scripting Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: WebKit JSC - 'ObjectPatternNode::appendEntry' Stack Use-After-Free | This is a dos exploit for multiple platform. Description: WebKit JSC - 'ObjectPatternNode::appendEntry' Stack Use-After-Free. Author: Google Security Research |
Analyze the security implications of: WebKit JSC - 'ObjectPatternNode::appendEntry' Stack Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AContent 1.3 - Local File Inclusion | This is a webapps exploit for php platform. Description: AContent 1.3 - Local File Inclusion. Author: DaOne |
Analyze the security implications of: AContent 1.3 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MikroTik RouterOS 6.45.6 - DNS Cache Poisoning | This is a remote exploit for hardware platform. Description: MikroTik RouterOS 6.45.6 - DNS Cache Poisoning. Author: Jacob Baines |
Analyze the security implications of: MikroTik RouterOS 6.45.6 - DNS Cache Poisoning | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Oracle 10g - SYS.LT.REMOVEWORKSPACE SQL Injection | This is a local exploit for multiple platform. Description: Oracle 10g - SYS.LT.REMOVEWORKSPACE SQL Injection. Author: sh2kerr |
Analyze the security implications of: Oracle 10g - SYS.LT.REMOVEWORKSPACE SQL Injection | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: cattaDoc 2.21 - 'download2.php?fn1' Remote File Disclosure | This is a webapps exploit for php platform. Description: cattaDoc 2.21 - 'download2.php?fn1' Remote File Disclosure. Author: GoLd_M |
Analyze the security implications of: cattaDoc 2.21 - 'download2.php?fn1' Remote File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JomSocial 1.6.288 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component JomSocial 1.6.288 - Multiple Cross-Site Scripting Vulnerabilities. Author: jdc |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.