input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: RedHat 4.x/5.x/6.x / RedHat man 1.5 / Turbolinux man 1.5 / Turbolinux 3.5/4.x - 'man' Buffer Overrun (1)
|
This is a local exploit for linux platform. Description: RedHat 4.x/5.x/6.x / RedHat man 1.5 / Turbolinux man 1.5 / Turbolinux 3.5/4.x - 'man' Buffer Overrun (1). Author: Babcia Padlina
|
Analyze the security implications of: RedHat 4.x/5.x/6.x / RedHat man 1.5 / Turbolinux man 1.5 / Turbolinux 3.5/4.x - 'man' Buffer Overrun (1)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: OpenNMS 1.5.x - 'Username' Cross-Site Scripting
|
This is a webapps exploit for jsp platform. Description: OpenNMS 1.5.x - 'Username' Cross-Site Scripting. Author: d2d
|
Analyze the security implications of: OpenNMS 1.5.x - 'Username' Cross-Site Scripting
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: F5 BIG-IP - Authentication Bypass
|
This is a remote exploit for hardware platform. Description: F5 BIG-IP - Authentication Bypass. Author: David Kennedy (ReL1K)
|
Analyze the security implications of: F5 BIG-IP - Authentication Bypass
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ETL Delegate 5.9.x/6.0.x - Remote Buffer Overflow
|
This is a remote exploit for linux platform. Description: ETL Delegate 5.9.x/6.0.x - Remote Buffer Overflow. Author: scut
|
Analyze the security implications of: ETL Delegate 5.9.x/6.0.x - Remote Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: WordPress Plugin Colorbox Lightbox v1.1.1 - Persistent Cross-Site Scripting (Authenticated)
|
This is a webapps exploit for multiple platform. Description: WordPress Plugin Colorbox Lightbox v1.1.1 - Persistent Cross-Site Scripting (Authenticated). Author: n1x_
|
Analyze the security implications of: WordPress Plugin Colorbox Lightbox v1.1.1 - Persistent Cross-Site Scripting (Authenticated)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apple Mac OSX xnu 1228.3.13 - 'macfsstat' Local Kernel Memory Leak/Denial of Service
|
This is a dos exploit for osx platform. Description: Apple Mac OSX xnu 1228.3.13 - 'macfsstat' Local Kernel Memory Leak/Denial of Service. Author: mu-b
|
Analyze the security implications of: Apple Mac OSX xnu 1228.3.13 - 'macfsstat' Local Kernel Memory Leak/Denial of Service
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Vino VNC Server 3.7.3 - Persistent Denial of Service
|
This is a dos exploit for linux platform. Description: Vino VNC Server 3.7.3 - Persistent Denial of Service. Author: Trustwave's SpiderLabs
|
Analyze the security implications of: Vino VNC Server 3.7.3 - Persistent Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Oracle OpenSSO 8.0 - Multiple Cross-Site Scripting POST Injection Vulnerabilities
|
This is a webapps exploit for multiple platform. Description: Oracle OpenSSO 8.0 - Multiple Cross-Site Scripting POST Injection Vulnerabilities. Author: LiquidWorm
|
Analyze the security implications of: Oracle OpenSSO 8.0 - Multiple Cross-Site Scripting POST Injection Vulnerabilities
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Blog Pixel Motion 2.1.1 - PHP Code Execution / Create Admin
|
This is a webapps exploit for php platform. Description: Blog Pixel Motion 2.1.1 - PHP Code Execution / Create Admin. Author: DarkFig
|
Analyze the security implications of: Blog Pixel Motion 2.1.1 - PHP Code Execution / Create Admin
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Article Directory - 'login.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Article Directory - 'login.php' SQL Injection. Author: R3d D3v!L
|
Analyze the security implications of: Article Directory - 'login.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 3Com Wireless 8760 Dual-Radio 11a/b/g PoE - Multiple Vulnerabilities
|
This is a remote exploit for hardware platform. Description: 3Com Wireless 8760 Dual-Radio 11a/b/g PoE - Multiple Vulnerabilities. Author: Adrian Pastor
|
Analyze the security implications of: 3Com Wireless 8760 Dual-Radio 11a/b/g PoE - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Apple Mac OSX - 'gst_configure' Kernel Buffer Overflow
|
This is a dos exploit for osx platform. Description: Apple Mac OSX - 'gst_configure' Kernel Buffer Overflow. Author: Google Security Research
|
Analyze the security implications of: Apple Mac OSX - 'gst_configure' Kernel Buffer Overflow
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Advanced Poll 2.0 - 'mysql_host' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Advanced Poll 2.0 - 'mysql_host' Cross-Site Scripting. Author: High-Tech Bridge SA
|
Analyze the security implications of: Advanced Poll 2.0 - 'mysql_host' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Novell ZENworks Configuration Management 11.3.1 - Remote Code Execution
|
This is a webapps exploit for jsp platform. Description: Novell ZENworks Configuration Management 11.3.1 - Remote Code Execution. Author: Pedro Ribeiro
|
Analyze the security implications of: Novell ZENworks Configuration Management 11.3.1 - Remote Code Execution
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: LibreOffice < 6.0.7 / 6.1.3 - Macro Code Execution (Metasploit)
|
This is a local exploit for multiple platform. Description: LibreOffice < 6.0.7 / 6.1.3 - Macro Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: LibreOffice < 6.0.7 / 6.1.3 - Macro Code Execution (Metasploit)
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: obotix IP Camera M1 1.9.4 .7/M10 2.0.5.2 - help Script Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: obotix IP Camera M1 1.9.4 .7/M10 2.0.5.2 - help Script Cross-Site Scripting. Author: Jaime Blasco
|
Analyze the security implications of: obotix IP Camera M1 1.9.4 .7/M10 2.0.5.2 - help Script Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Boonex Dolphin 7.4.2 - 'width' Stored XSS
|
This is a webapps exploit for php platform. Description: Boonex Dolphin 7.4.2 - 'width' Stored XSS. Author: Piyush Patil
|
Analyze the security implications of: Boonex Dolphin 7.4.2 - 'width' Stored XSS
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Turbo Seek - Null Byte Error Discloses Files
|
This is a webapps exploit for cgi platform. Description: Turbo Seek - Null Byte Error Discloses Files. Author: durito
|
Analyze the security implications of: Turbo Seek - Null Byte Error Discloses Files
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: EMC NetWorker 7.6 sp3 - Denial of Service
|
This is a dos exploit for multiple platform. Description: EMC NetWorker 7.6 sp3 - Denial of Service. Author: Luigi Auriemma
|
Analyze the security implications of: EMC NetWorker 7.6 sp3 - Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Zabbix Agent < 1.6.7 - Remote Bypass
|
This is a webapps exploit for multiple platform. Description: Zabbix Agent < 1.6.7 - Remote Bypass. Author: Nicob
|
Analyze the security implications of: Zabbix Agent < 1.6.7 - Remote Bypass
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ADM 3.1.2RHG1 - Remote Code Execution
|
This is a webapps exploit for hardware platform. Description: ADM 3.1.2RHG1 - Remote Code Execution. Author: Matthew Fulton
|
Analyze the security implications of: ADM 3.1.2RHG1 - Remote Code Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: DigiRez 3.4 - 'book_id' SQL Injection
|
This is a webapps exploit for asp platform. Description: DigiRez 3.4 - 'book_id' SQL Injection. Author: ajann
|
Analyze the security implications of: DigiRez 3.4 - 'book_id' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component MailTo - 'article' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component MailTo - 'article' SQL Injection. Author: H!tm@N
|
Analyze the security implications of: Joomla! Component MailTo - 'article' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Mac OSX 10.x - SecurityServer Daemon Local Denial of Service
|
This is a dos exploit for osx platform. Description: Apple Mac OSX 10.x - SecurityServer Daemon Local Denial of Service. Author: Matt Burnett
|
Analyze the security implications of: Apple Mac OSX 10.x - SecurityServer Daemon Local Denial of Service
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Campsite 2.6.1 - 'issue.php?g_documentRoot' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'issue.php?g_documentRoot' Remote File Inclusion. Author: anonymous
|
Analyze the security implications of: Campsite 2.6.1 - 'issue.php?g_documentRoot' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: NetAccess IP3 - (Authenticated) Ping Option Command Injection
|
This is a local exploit for hardware platform. Description: NetAccess IP3 - (Authenticated) Ping Option Command Injection. Author: r00t
|
Analyze the security implications of: NetAccess IP3 - (Authenticated) Ping Option Command Injection
|
This exploit targets hardware systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: WEBgais 1.0 - websendmail Remote Command Execution
|
This is a remote exploit for cgi platform. Description: WEBgais 1.0 - websendmail Remote Command Execution. Author: Razvan Dragomirescu
|
Analyze the security implications of: WEBgais 1.0 - websendmail Remote Command Execution
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: xtell 2.6.1 - User Status Remote Information Disclosure
|
This is a remote exploit for linux platform. Description: xtell 2.6.1 - User Status Remote Information Disclosure. Author: spybreak
|
Analyze the security implications of: xtell 2.6.1 - User Status Remote Information Disclosure
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: SGI IRIX 6.4 - 'xfsdump' Local Privilege Escalation
|
This is a local exploit for irix platform. Description: SGI IRIX 6.4 - 'xfsdump' Local Privilege Escalation. Author: Yuri Volobuev
|
Analyze the security implications of: SGI IRIX 6.4 - 'xfsdump' Local Privilege Escalation
|
This exploit targets irix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets irix platform
|
What is this exploit about: Netgear JNR1010 ADSL Router - (Authenticated) Remote File Disclosure
|
This is a remote exploit for hardware platform. Description: Netgear JNR1010 ADSL Router - (Authenticated) Remote File Disclosure. Author: Todor Donev
|
Analyze the security implications of: Netgear JNR1010 ADSL Router - (Authenticated) Remote File Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Thomson Wireless VoIP Cable Modem TWG850-4B ST9C.05.08 - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Thomson Wireless VoIP Cable Modem TWG850-4B ST9C.05.08 - Authentication Bypass. Author: Orwelllabs
|
Analyze the security implications of: Thomson Wireless VoIP Cable Modem TWG850-4B ST9C.05.08 - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Reptile Web Server Reptile Web Server 20020105 - Denial of Service
|
This is a dos exploit for multiple platform. Description: Reptile Web Server Reptile Web Server 20020105 - Denial of Service. Author: Donato Ferrante
|
Analyze the security implications of: Reptile Web Server Reptile Web Server 20020105 - Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: HP Compaq Insight Management Agent 5.0 - Format String
|
This is a dos exploit for hardware platform. Description: HP Compaq Insight Management Agent 5.0 - Format String. Author: mcw@wcd.se
|
Analyze the security implications of: HP Compaq Insight Management Agent 5.0 - Format String
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: JDownloader Webinterface - Source Code Disclosure
|
This is a webapps exploit for multiple platform. Description: JDownloader Webinterface - Source Code Disclosure. Author: Sil3nt_Dre4m
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.