input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Dog Pedigree Online Database 1.0.1b - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Dog Pedigree Online Database 1.0.1b - Insecure Cookie Handling. Author: YEnH4ckEr |
Analyze the security implications of: Dog Pedigree Online Database 1.0.1b - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM Tivoli Storage Manager (TSM) - Local Privilege Escalation | This is a local exploit for linux platform. Description: IBM Tivoli Storage Manager (TSM) - Local Privilege Escalation. Author: Kryptos Logic |
Analyze the security implications of: IBM Tivoli Storage Manager (TSM) - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple Mac OSX EvoCam Web Server (Snow Leopard) - ROP Remote Overflow | This is a remote exploit for osx platform. Description: Apple Mac OSX EvoCam Web Server (Snow Leopard) - ROP Remote Overflow. Author: d1dn0t |
Analyze the security implications of: Apple Mac OSX EvoCam Web Server (Snow Leopard) - ROP Remote Overflow | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Gazelle CMS 1.0 - Multiple Vulnerabilities / Remote Code Execution | This is a webapps exploit for php platform. Description: Gazelle CMS 1.0 - Multiple Vulnerabilities / Remote Code Execution. Author: IHTeam |
Analyze the security implications of: Gazelle CMS 1.0 - Multiple Vulnerabilities / Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dacio's Image Gallery 1.6 - Multiple Remote Vulnerabilities | This is a webapps exploit for php platform. Description: Dacio's Image Gallery 1.6 - Multiple Remote Vulnerabilities. Author: ahmadbady |
Analyze the security implications of: Dacio's Image Gallery 1.6 - Multiple Remote Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DMXReady BillboardManager 1.1 - Contents Change | This is a webapps exploit for asp platform. Description: DMXReady BillboardManager 1.1 - Contents Change. Author: x0r |
Analyze the security implications of: DMXReady BillboardManager 1.1 - Contents Change | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component JInventory 1.23.02 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component JInventory 1.23.02 - Local File Inclusion. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component JInventory 1.23.02 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AutoDealer 2.0 - 'detail.asp?iPro' SQL Injection | This is a webapps exploit for asp platform. Description: AutoDealer 2.0 - 'detail.asp?iPro' SQL Injection. Author: ajann |
Analyze the security implications of: AutoDealer 2.0 - 'detail.asp?iPro' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: OpenBSD 3.3 - 'Semget()' Integer Overflow (1) | This is a local exploit for openbsd platform. Description: OpenBSD 3.3 - 'Semget()' Integer Overflow (1). Author: blexim |
Analyze the security implications of: OpenBSD 3.3 - 'Semget()' Integer Overflow (1) | This exploit targets openbsd systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets openbsd platform |
What is this exploit about: MTS MBlaze Ultra Wi-Fi / ZTE AC3633 - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: MTS MBlaze Ultra Wi-Fi / ZTE AC3633 - Multiple Vulnerabilities. Author: Ajin Abraham |
Analyze the security implications of: MTS MBlaze Ultra Wi-Fi / ZTE AC3633 - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Caldera kdenetwork 1.1.1-1 / Caldera OpenLinux 1.3/2.2 / KDE KDE 1.1/1.1. / RedHat Linux 6.0 - K-Mail File Creation | This is a local exploit for linux platform. Description: Caldera kdenetwork 1.1.1-1 / Caldera OpenLinux 1.3/2.2 / KDE KDE 1.1/1.1. / RedHat Linux 6.0 - K-Mail File Creation. Author: Brian Mitchell |
Analyze the security implications of: Caldera kdenetwork 1.1.1-1 / Caldera OpenLinux 1.3/2.2 / KDE KDE 1.1/1.1. / RedHat Linux 6.0 - K-Mail File Creation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component beamospetition - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component beamospetition - SQL Injection. Author: His0k4 |
Analyze the security implications of: Joomla! Component beamospetition - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - 'CONFIG_X86_X32' Arbitrary Write (2) | This is a local exploit for linux platform. Description: Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - 'CONFIG_X86_X32' Arbitrary Write (2). Author: saelo |
Analyze the security implications of: Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - 'CONFIG_X86_X32' Arbitrary Write (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AJ HYIP PRIME - 'welcome.php?id' Blind SQL Injection | This is a webapps exploit for php platform. Description: AJ HYIP PRIME - 'welcome.php?id' Blind SQL Injection. Author: JosS |
Analyze the security implications of: AJ HYIP PRIME - 'welcome.php?id' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNU Screen 4.5.0 - Local Privilege Escalation | This is a local exploit for linux platform. Description: GNU Screen 4.5.0 - Local Privilege Escalation. Author: Xiphos Research Ltd |
Analyze the security implications of: GNU Screen 4.5.0 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: M-TECH P-Synch 6.2.5 - 'nph-psf.exe?css' Remote File Inclusion | This is a webapps exploit for cgi platform. Description: M-TECH P-Synch 6.2.5 - 'nph-psf.exe?css' Remote File Inclusion. Author: JeiAr |
Analyze the security implications of: M-TECH P-Synch 6.2.5 - 'nph-psf.exe?css' Remote File Inclusion | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Call of Duty Server 4.1.x - Callvote Map Command Remote Buffer Overflow | This is a dos exploit for multiple platform. Description: Call of Duty Server 4.1.x - Callvote Map Command Remote Buffer Overflow. Author: Luigi Auriemma |
Analyze the security implications of: Call of Duty Server 4.1.x - Callvote Map Command Remote Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Koha 3.20.1 - Directory Traversal | This is a webapps exploit for php platform. Description: Koha 3.20.1 - Directory Traversal. Author: Raschin Tavakoli_ Bernhard Garn_ Peter Aufner & Dimitris Simos |
Analyze the security implications of: Koha 3.20.1 - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CPaint 1.3 - xmlhttp Request Input Validation | This is a webapps exploit for asp platform. Description: CPaint 1.3 - xmlhttp Request Input Validation. Author: Thor Larholm |
Analyze the security implications of: CPaint 1.3 - xmlhttp Request Input Validation | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: CLONEBID B2B Marketplace - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: CLONEBID B2B Marketplace - Multiple Vulnerabilities. Author: Hamza 'MizoZ' N. |
Analyze the security implications of: CLONEBID B2B Marketplace - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Postfix 1.1.x - Denial of Service (1) | This is a dos exploit for linux platform. Description: Postfix 1.1.x - Denial of Service (1). Author: r3b00t |
Analyze the security implications of: Postfix 1.1.x - Denial of Service (1) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Sawmill 6.2.x - Admin Password Insecure Default Permissions | This is a local exploit for multiple platform. Description: Sawmill 6.2.x - Admin Password Insecure Default Permissions. Author: darky0da |
Analyze the security implications of: Sawmill 6.2.x - Admin Password Insecure Default Permissions | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FlatNuke 2.5.7 - 'index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: FlatNuke 2.5.7 - 'index.php' Remote File Inclusion. Author: rgod |
Analyze the security implications of: FlatNuke 2.5.7 - 'index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux - Missing Locking Between ELF coredump code and userfaultfd VMA Modification | This is a dos exploit for linux platform. Description: Linux - Missing Locking Between ELF coredump code and userfaultfd VMA Modification. Author: Google Security Research |
Analyze the security implications of: Linux - Missing Locking Between ELF coredump code and userfaultfd VMA Modification | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: OpenSSL 0.9.8k/1.0.0-beta2 - DTLS Remote Memory Exhaustion Denial of Service | This is a dos exploit for multiple platform. Description: OpenSSL 0.9.8k/1.0.0-beta2 - DTLS Remote Memory Exhaustion Denial of Service. Author: Jon Oberheide |
Analyze the security implications of: OpenSSL 0.9.8k/1.0.0-beta2 - DTLS Remote Memory Exhaustion Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Buffalo TeraStation Network Attached Storage (NAS) 1.66 - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Buffalo TeraStation Network Attached Storage (NAS) 1.66 - Authentication Bypass. Author: Jordan Glover |
Analyze the security implications of: Buffalo TeraStation Network Attached Storage (NAS) 1.66 - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Zen Cart < 1.3.8a - SQL Injection | This is a webapps exploit for linux platform. Description: Zen Cart < 1.3.8a - SQL Injection. Author: GulfTech Security |
Analyze the security implications of: Zen Cart < 1.3.8a - SQL Injection | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: TaxiMonger for Android - 'name' HTML Injection | This is a remote exploit for android platform. Description: TaxiMonger for Android - 'name' HTML Injection. Author: Ismail Kaleem |
Analyze the security implications of: TaxiMonger for Android - 'name' HTML Injection | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: OpenSMTPD 6.6.3 - Arbitrary File Read | This is a remote exploit for linux platform. Description: OpenSMTPD 6.6.3 - Arbitrary File Read. Author: Qualys Corporation |
Analyze the security implications of: OpenSMTPD 6.6.3 - Arbitrary File Read | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: alitalk 1.9.1.1 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: alitalk 1.9.1.1 - Multiple Vulnerabilities. Author: tomplixsee |
Analyze the security implications of: alitalk 1.9.1.1 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco EPC 3925 - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: Cisco EPC 3925 - Multiple Vulnerabilities. Author: Patryk Bogdan |
Analyze the security implications of: Cisco EPC 3925 - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: NewMark CMS 2.1 - 'sec_id' SQL Injection | This is a webapps exploit for linux platform. Description: NewMark CMS 2.1 - 'sec_id' SQL Injection. Author: Berk Dusunur |
Analyze the security implications of: NewMark CMS 2.1 - 'sec_id' SQL Injection | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Fire Soft Board RC 3 - 'racine' Remote File Inclusion | This is a webapps exploit for php platform. Description: Fire Soft Board RC 3 - 'racine' Remote File Inclusion. Author: ddoshomo |
Analyze the security implications of: Fire Soft Board RC 3 - 'racine' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DIR-615 Rev D3 / DIR-300 Rev A - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: D-Link DIR-615 Rev D3 / DIR-300 Rev A - Multiple Vulnerabilities. Author: m-1-k-3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.