input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: sudo 1.8.27 - Security Bypass
|
This is a local exploit for linux platform. Description: sudo 1.8.27 - Security Bypass. Author: Mohin Paramasivam
|
Analyze the security implications of: sudo 1.8.27 - Security Bypass
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: D-Link DKVM-IP8 - 'auth.asp' Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: D-Link DKVM-IP8 - 'auth.asp' Cross-Site Scripting. Author: POPCORN
|
Analyze the security implications of: D-Link DKVM-IP8 - 'auth.asp' Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: DomainMOD 4.11.01 - 'ssl-provider-name' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DomainMOD 4.11.01 - 'ssl-provider-name' Cross-Site Scripting. Author: Mohammed Abdul Raheem
|
Analyze the security implications of: DomainMOD 4.11.01 - 'ssl-provider-name' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: K9 Kreativity Design - 'pages.php' SQL Injection
|
This is a webapps exploit for php platform. Description: K9 Kreativity Design - 'pages.php' SQL Injection. Author: Newbie_Campuz
|
Analyze the security implications of: K9 Kreativity Design - 'pages.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 2.6 - Console Keymap Local Command Injection
|
This is a local exploit for linux platform. Description: Linux Kernel 2.6 - Console Keymap Local Command Injection. Author: Rudolf Polzer
|
Analyze the security implications of: Linux Kernel 2.6 - Console Keymap Local Command Injection
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Alstrasoft AskMe Pro 2.1 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Alstrasoft AskMe Pro 2.1 - Multiple SQL Injections. Author: t0pP8uZz
|
Analyze the security implications of: Alstrasoft AskMe Pro 2.1 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP - 'openssl_x509_parse()' Memory Corruption
|
This is a dos exploit for php platform. Description: PHP - 'openssl_x509_parse()' Memory Corruption. Author: Stefan Esser
|
Analyze the security implications of: PHP - 'openssl_x509_parse()' Memory Corruption
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Knowledge Base Enterprise Edition 4.62.0 - SQL Injection
|
This is a webapps exploit for asp platform. Description: Knowledge Base Enterprise Edition 4.62.0 - SQL Injection. Author: Vulnerability-Lab
|
Analyze the security implications of: Knowledge Base Enterprise Edition 4.62.0 - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Hastymail2 - 'rs' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Hastymail2 - 'rs' Cross-Site Scripting. Author: HTrovao
|
Analyze the security implications of: Hastymail2 - 'rs' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: e107 0.7.16 - Referer header Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: e107 0.7.16 - Referer header Cross-Site Scripting. Author: MustLive
|
Analyze the security implications of: e107 0.7.16 - Referer header Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sunbelt Kerio Personal Firewall 4.3.426 - CreateRemoteThread Denial of Service
|
This is a dos exploit for hardware platform. Description: Sunbelt Kerio Personal Firewall 4.3.426 - CreateRemoteThread Denial of Service. Author: David Matousek
|
Analyze the security implications of: Sunbelt Kerio Personal Firewall 4.3.426 - CreateRemoteThread Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CS-Guestbook 0.1 - Login Credentials Information Disclosure
|
This is a webapps exploit for php platform. Description: CS-Guestbook 0.1 - Login Credentials Information Disclosure. Author: Cr@zy_King
|
Analyze the security implications of: CS-Guestbook 0.1 - Login Credentials Information Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apache - Arbitrary Long HTTP Headers Denial of Service
|
This is a dos exploit for linux platform. Description: Apache - Arbitrary Long HTTP Headers Denial of Service. Author: anonymous
|
Analyze the security implications of: Apache - Arbitrary Long HTTP Headers Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Acme thttpd HTTP Server - Directory Traversal
|
This is a remote exploit for linux platform. Description: Acme thttpd HTTP Server - Directory Traversal. Author: Metropolis
|
Analyze the security implications of: Acme thttpd HTTP Server - Directory Traversal
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: DT Centrepiece 4.5 - Cross-Site Scripting / Security Bypass
|
This is a webapps exploit for asp platform. Description: DT Centrepiece 4.5 - Cross-Site Scripting / Security Bypass. Author: High-Tech Bridge SA
|
Analyze the security implications of: DT Centrepiece 4.5 - Cross-Site Scripting / Security Bypass
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Katello (RedHat Satellite) - users/update_roles Missing Authorisation (Metasploit)
|
This is a remote exploit for linux platform. Description: Katello (RedHat Satellite) - users/update_roles Missing Authorisation (Metasploit). Author: Metasploit
|
Analyze the security implications of: Katello (RedHat Satellite) - users/update_roles Missing Authorisation (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Libopt.a 3.1x - Error Logging Buffer Overflow (1)
|
This is a dos exploit for linux platform. Description: Libopt.a 3.1x - Error Logging Buffer Overflow (1). Author: kf
|
Analyze the security implications of: Libopt.a 3.1x - Error Logging Buffer Overflow (1)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Icinga Web 2.10 - Arbitrary File Disclosure
|
This is a webapps exploit for php platform. Description: Icinga Web 2.10 - Arbitrary File Disclosure. Author: Jacob Ebben
|
Analyze the security implications of: Icinga Web 2.10 - Arbitrary File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Kayako Live Response 2.0 - 'index.php' Calendar Feature Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Kayako Live Response 2.0 - 'index.php' Calendar Feature Multiple SQL Injections. Author: GulfTech Security
|
Analyze the security implications of: Kayako Live Response 2.0 - 'index.php' Calendar Feature Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Endpoint Protector 4.0.4.0 - Multiple Vulnerabilities
|
This is a webapps exploit for multiple platform. Description: Endpoint Protector 4.0.4.0 - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: Endpoint Protector 4.0.4.0 - Multiple Vulnerabilities
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: DragDropCart - '/includes/ajax/getstate.php?prefix' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DragDropCart - '/includes/ajax/getstate.php?prefix' Cross-Site Scripting. Author: Moudi
|
Analyze the security implications of: DragDropCart - '/includes/ajax/getstate.php?prefix' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Concrete5 CMS 5.5.2.1 - Information Disclosure / SQL Injection / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Concrete5 CMS 5.5.2.1 - Information Disclosure / SQL Injection / Cross-Site Scripting. Author: Jakub Galczyk
|
Analyze the security implications of: Concrete5 CMS 5.5.2.1 - Information Disclosure / SQL Injection / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Justice Guestbook 1.3 - Full Path Disclosure
|
This is a webapps exploit for php platform. Description: Justice Guestbook 1.3 - Full Path Disclosure. Author: euronymous
|
Analyze the security implications of: Justice Guestbook 1.3 - Full Path Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ManageEngin AMP 4.3.0 - File-path-traversal
|
This is a webapps exploit for multiple platform. Description: ManageEngin AMP 4.3.0 - File-path-traversal. Author: nu11secur1ty
|
Analyze the security implications of: ManageEngin AMP 4.3.0 - File-path-traversal
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CMS Balitbang - Multiple HTML Injection / Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: CMS Balitbang - Multiple HTML Injection / Cross-Site Scripting Vulnerabilities. Author: TheCyberNuxbie
|
Analyze the security implications of: CMS Balitbang - Multiple HTML Injection / Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Concrete5 8.5.4 - 'name' Stored XSS
|
This is a webapps exploit for php platform. Description: Concrete5 8.5.4 - 'name' Stored XSS. Author: Quadron Research Lab
|
Analyze the security implications of: Concrete5 8.5.4 - 'name' Stored XSS
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component versioning 1.0.2 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component versioning 1.0.2 - 'id' SQL Injection. Author: DarkMatter Crew
|
Analyze the security implications of: Joomla! Component versioning 1.0.2 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WebIf - 'OutConfig' Local File Inclusion
|
This is a webapps exploit for cgi platform. Description: WebIf - 'OutConfig' Local File Inclusion. Author: maiosyet
|
Analyze the security implications of: WebIf - 'OutConfig' Local File Inclusion
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: GNU CFEngine 2.0.x/2.1 - AuthenticationDialogue Remote Heap Buffer Overrun (1)
|
This is a dos exploit for linux platform. Description: GNU CFEngine 2.0.x/2.1 - AuthenticationDialogue Remote Heap Buffer Overrun (1). Author: Juan Pablo Martinez Kuhn
|
Analyze the security implications of: GNU CFEngine 2.0.x/2.1 - AuthenticationDialogue Remote Heap Buffer Overrun (1)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apple Mac OSX / iOS Kernel - UAF Racing getProperty on IOHDIXController and testNetBootMethod on IOHDIXControllerUserClient
|
This is a dos exploit for multiple platform. Description: Apple Mac OSX / iOS Kernel - UAF Racing getProperty on IOHDIXController and testNetBootMethod on IOHDIXControllerUserClient. Author: Google Security Research
|
Analyze the security implications of: Apple Mac OSX / iOS Kernel - UAF Racing getProperty on IOHDIXController and testNetBootMethod on IOHDIXControllerUserClient
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: TP-Link TL-WR740N - Buffer Overflow 'DOS'
|
This is a webapps exploit for hardware platform. Description: TP-Link TL-WR740N - Buffer Overflow 'DOS'. Author: Anish Feroz
|
Analyze the security implications of: TP-Link TL-WR740N - Buffer Overflow 'DOS'
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: PHP 5.4SVN-2012-02-03 - htmlspecialchars/entities Buffer Overflow
|
This is a dos exploit for php platform. Description: PHP 5.4SVN-2012-02-03 - htmlspecialchars/entities Buffer Overflow. Author: cataphract
|
Analyze the security implications of: PHP 5.4SVN-2012-02-03 - htmlspecialchars/entities Buffer Overflow
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Livefyre LiveComments Plugin - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Livefyre LiveComments Plugin - Persistent Cross-Site Scripting. Author: Brij Kishore Mishra
|
Analyze the security implications of: Livefyre LiveComments Plugin - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bus Pass Management System 1.0 - Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Bus Pass Management System 1.0 - Cross-Site Scripting (XSS). Author: Ali Alipour
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.