input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Corel Linux OS 1.0 - 'setxconf' Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Corel Linux OS 1.0 - 'setxconf' Local Privilege Escalation. Author: suid
|
Analyze the security implications of: Corel Linux OS 1.0 - 'setxconf' Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: ManageEngine OpManager / Social IT Plus / IT360 - Multiple Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: ManageEngine OpManager / Social IT Plus / IT360 - Multiple Vulnerabilities. Author: Pedro Ribeiro
|
Analyze the security implications of: ManageEngine OpManager / Social IT Plus / IT360 - Multiple Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Dahua Generation 2/3 - Backdoor Access
|
This is a remote exploit for multiple platform. Description: Dahua Generation 2/3 - Backdoor Access. Author: bashis
|
Analyze the security implications of: Dahua Generation 2/3 - Backdoor Access
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation
|
This is a local exploit for linux platform. Description: Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation. Author: Andrey Konovalov
|
Analyze the security implications of: Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Novell Netware Enterprise Web Server 5.1/6.0 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a remote exploit for netware platform. Description: Novell Netware Enterprise Web Server 5.1/6.0 - Multiple Cross-Site Scripting Vulnerabilities. Author: Rafel Ivgi The-Insider
|
Analyze the security implications of: Novell Netware Enterprise Web Server 5.1/6.0 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets netware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets netware platform
|
What is this exploit about: Facile Forms 1.x - 'catid' SQL Injection
|
This is a webapps exploit for php platform. Description: Facile Forms 1.x - 'catid' SQL Injection. Author: S@BUN
|
Analyze the security implications of: Facile Forms 1.x - 'catid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Vik Rent Car 1.11 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Vik Rent Car 1.11 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Vik Rent Car 1.11 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple macOS 10.12 - Double vm_deallocate in Userspace MIG Code Use-After-Free
|
This is a dos exploit for macos platform. Description: Apple macOS 10.12 - Double vm_deallocate in Userspace MIG Code Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: Apple macOS 10.12 - Double vm_deallocate in Userspace MIG Code Use-After-Free
|
This exploit targets macos systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: Dasan Networks GPON ONT WiFi Router H64X Series - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Dasan Networks GPON ONT WiFi Router H64X Series - Authentication Bypass. Author: LiquidWorm
|
Analyze the security implications of: Dasan Networks GPON ONT WiFi Router H64X Series - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CMS WebManager-Pro - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: CMS WebManager-Pro - Multiple SQL Injections. Author: dun
|
Analyze the security implications of: CMS WebManager-Pro - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cacti 1.2.8 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: Cacti 1.2.8 - Remote Code Execution. Author: Askar
|
Analyze the security implications of: Cacti 1.2.8 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Knowledgeroot (fckeditor) - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Knowledgeroot (fckeditor) - Arbitrary File Upload. Author: eidelweiss
|
Analyze the security implications of: Knowledgeroot (fckeditor) - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: QiHang Media Web Digital Signage 3.0.9 - Unauthenticated Arbitrary File Disclosure
|
This is a webapps exploit for hardware platform. Description: QiHang Media Web Digital Signage 3.0.9 - Unauthenticated Arbitrary File Disclosure. Author: LiquidWorm
|
Analyze the security implications of: QiHang Media Web Digital Signage 3.0.9 - Unauthenticated Arbitrary File Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component Percha Multicategory Article 0.6 - 'Controller' Arbitrary File Access
|
This is a webapps exploit for php platform. Description: Joomla! Component Percha Multicategory Article 0.6 - 'Controller' Arbitrary File Access. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component Percha Multicategory Article 0.6 - 'Controller' Arbitrary File Access
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Uniview NVR301-04S2-P4 - Reflected Cross-Site Scripting (XSS)
|
This is a webapps exploit for hardware platform. Description: Uniview NVR301-04S2-P4 - Reflected Cross-Site Scripting (XSS). Author: Bleron Rrustemi
|
Analyze the security implications of: Uniview NVR301-04S2-P4 - Reflected Cross-Site Scripting (XSS)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Apache Tomcat 6.0.18 - Form Authentication Existing/Non-Existing 'Username' Enumeration
|
This is a remote exploit for multiple platform. Description: Apache Tomcat 6.0.18 - Form Authentication Existing/Non-Existing 'Username' Enumeration. Author: D. Matscheko
|
Analyze the security implications of: Apache Tomcat 6.0.18 - Form Authentication Existing/Non-Existing 'Username' Enumeration
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CRESUS - 'recette_detail.php' SQL Injection
|
This is a webapps exploit for php platform. Description: CRESUS - 'recette_detail.php' SQL Injection. Author: GrayHatz Security Group
|
Analyze the security implications of: CRESUS - 'recette_detail.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Glub Tech Secure FTP 2.5.15 - 'LIST' Directory Traversal
|
This is a remote exploit for multiple platform. Description: Glub Tech Secure FTP 2.5.15 - 'LIST' Directory Traversal. Author: Tan Chew Keong
|
Analyze the security implications of: Glub Tech Secure FTP 2.5.15 - 'LIST' Directory Traversal
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Compro Technology IP Camera - 'Multiple' Credential Disclosure
|
This is a webapps exploit for hardware platform. Description: Compro Technology IP Camera - 'Multiple' Credential Disclosure. Author: icekam
|
Analyze the security implications of: Compro Technology IP Camera - 'Multiple' Credential Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Sitecore 8.x - Deserialization Remote Code Execution
|
This is a webapps exploit for aspx platform. Description: Sitecore 8.x - Deserialization Remote Code Execution. Author: Jarad Kopf
|
Analyze the security implications of: Sitecore 8.x - Deserialization Remote Code Execution
|
This exploit targets aspx systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aspx platform
|
What is this exploit about: IBM Websphere Portal 6.0.1.5 Build wp6015 - Portlet Palette Search HTML Injection
|
This is a remote exploit for multiple platform. Description: IBM Websphere Portal 6.0.1.5 Build wp6015 - Portlet Palette Search HTML Injection. Author: Sjoerd Resink
|
Analyze the security implications of: IBM Websphere Portal 6.0.1.5 Build wp6015 - Portlet Palette Search HTML Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Linux Kernel 2.2.x 2.4.0-test1 (SGI ProPack 1.2/1.3) - Sendmail Capabilities Privilege Escalation(1)
|
This is a local exploit for linux platform. Description: Linux Kernel 2.2.x 2.4.0-test1 (SGI ProPack 1.2/1.3) - Sendmail Capabilities Privilege Escalation(1). Author: Florian Heinz
|
Analyze the security implications of: Linux Kernel 2.2.x 2.4.0-test1 (SGI ProPack 1.2/1.3) - Sendmail Capabilities Privilege Escalation(1)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Kimai 2 - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Kimai 2 - Persistent Cross-Site Scripting. Author: osamaalaa
|
Analyze the security implications of: Kimai 2 - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Kwok Information Server - Multiple SQL Injections
|
This is a webapps exploit for cgi platform. Description: Kwok Information Server - Multiple SQL Injections. Author: Yogesh Phadtare
|
Analyze the security implications of: Kwok Information Server - Multiple SQL Injections
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Cerberus Helpdesk 3.2.1 - 'Rpc.php' Unauthorized Access
|
This is a webapps exploit for php platform. Description: Cerberus Helpdesk 3.2.1 - 'Rpc.php' Unauthorized Access. Author: jonepet
|
Analyze the security implications of: Cerberus Helpdesk 3.2.1 - 'Rpc.php' Unauthorized Access
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Google Chrome - Integer Overflow when Processing WebAssembly Locals
|
This is a dos exploit for multiple platform. Description: Google Chrome - Integer Overflow when Processing WebAssembly Locals. Author: Google Security Research
|
Analyze the security implications of: Google Chrome - Integer Overflow when Processing WebAssembly Locals
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CMS Lite 1.3.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: CMS Lite 1.3.1 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: CMS Lite 1.3.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Virtual Programming VP-ASP 5.00 - 'shopexd.asp' SQL Injection (2)
|
This is a webapps exploit for asp platform. Description: Virtual Programming VP-ASP 5.00 - 'shopexd.asp' SQL Injection (2). Author: Bosen & TioEuy
|
Analyze the security implications of: Virtual Programming VP-ASP 5.00 - 'shopexd.asp' SQL Injection (2)
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: JASmine 0.0.2 - 'index.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: JASmine 0.0.2 - 'index.php' Remote File Inclusion. Author: DarkFig
|
Analyze the security implications of: JASmine 0.0.2 - 'index.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: exponentcms 2.0.5 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: exponentcms 2.0.5 - Multiple Vulnerabilities. Author: Onur Yılmaz
|
Analyze the security implications of: exponentcms 2.0.5 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linksys WRT110 - Remote Command Execution (Metasploit)
|
This is a remote exploit for hardware platform. Description: Linksys WRT110 - Remote Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Linksys WRT110 - Remote Command Execution (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Microsoft FrontPage - Server Extensions Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: Microsoft FrontPage - Server Extensions Cross-Site Scripting. Author: Esteban Martinez Fayo
|
Analyze the security implications of: Microsoft FrontPage - Server Extensions Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: OpenSMTPD - OOB Read Local Privilege Escalation (Metasploit)
|
This is a local exploit for linux platform. Description: OpenSMTPD - OOB Read Local Privilege Escalation (Metasploit). Author: Metasploit
|
Analyze the security implications of: OpenSMTPD - OOB Read Local Privilege Escalation (Metasploit)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Pingtel Xpressa 1.2.x/2.0/2.1 - Handset Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Pingtel Xpressa 1.2.x/2.0/2.1 - Handset Remote Denial of Service. Author: @stake
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.