input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Linux 4.4.0 < 4.4.0-53 - 'AF_PACKET chocobo_root' Local Privilege Escalation (Metasploit)
|
This is a local exploit for linux platform. Description: Linux 4.4.0 < 4.4.0-53 - 'AF_PACKET chocobo_root' Local Privilege Escalation (Metasploit). Author: Metasploit
|
Analyze the security implications of: Linux 4.4.0 < 4.4.0-53 - 'AF_PACKET chocobo_root' Local Privilege Escalation (Metasploit)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: DoceboLms 2.0.x/3.0.x / DoceboKms 3.0.3 / Docebo CMS 3.0.x - Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: DoceboLms 2.0.x/3.0.x / DoceboKms 3.0.3 / Docebo CMS 3.0.x - Multiple Remote File Inclusions. Author: Kacper
|
Analyze the security implications of: DoceboLms 2.0.x/3.0.x / DoceboKms 3.0.3 / Docebo CMS 3.0.x - Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Nginx 1.1.17 - URI Processing SecURIty Bypass
|
This is a remote exploit for multiple platform. Description: Nginx 1.1.17 - URI Processing SecURIty Bypass. Author: Ivan Fratric
|
Analyze the security implications of: Nginx 1.1.17 - URI Processing SecURIty Bypass
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Web Wiz NewsPad 1.02 - 'sub' Directory Traversal
|
This is a webapps exploit for asp platform. Description: Web Wiz NewsPad 1.02 - 'sub' Directory Traversal. Author: BugReport.IR
|
Analyze the security implications of: Web Wiz NewsPad 1.02 - 'sub' Directory Traversal
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ManageEngine Desktop Central - 'FileStorage getChartImage' Deserialization / Unauthenticated Remote Code Execution
|
This is a webapps exploit for multiple platform. Description: ManageEngine Desktop Central - 'FileStorage getChartImage' Deserialization / Unauthenticated Remote Code Execution. Author: mr_me
|
Analyze the security implications of: ManageEngine Desktop Central - 'FileStorage getChartImage' Deserialization / Unauthenticated Remote Code Execution
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Concrete5 CMS 5.7.3.1 - 'Application::dispatch' Method Local File Inclusion
|
This is a webapps exploit for php platform. Description: Concrete5 CMS 5.7.3.1 - 'Application::dispatch' Method Local File Inclusion. Author: Egidio Romano
|
Analyze the security implications of: Concrete5 CMS 5.7.3.1 - 'Application::dispatch' Method Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FlexWATCH Network Camera - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: FlexWATCH Network Camera - Cross-Site Scripting. Author: Jaime Blasco
|
Analyze the security implications of: FlexWATCH Network Camera - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: TotalECommerce 1.0 - 'index.asp?id' SQL Injection
|
This is a webapps exploit for asp platform. Description: TotalECommerce 1.0 - 'index.asp?id' SQL Injection. Author: nukedx
|
Analyze the security implications of: TotalECommerce 1.0 - 'index.asp?id' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: BigACE 2.7.5 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: BigACE 2.7.5 - Arbitrary File Upload. Author: Net.Edit0r
|
Analyze the security implications of: BigACE 2.7.5 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! 3.7 - SQL Injection
|
This is a remote exploit for php platform. Description: Joomla! 3.7 - SQL Injection. Author: Manish Tanwar
|
Analyze the security implications of: Joomla! 3.7 - SQL Injection
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Perl Web Server 0.x - Directory Traversal
|
This is a remote exploit for multiple platform. Description: Perl Web Server 0.x - Directory Traversal. Author: neme-dhc
|
Analyze the security implications of: Perl Web Server 0.x - Directory Traversal
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: HotScripts Clone Script - SQL Injection
|
This is a webapps exploit for php platform. Description: HotScripts Clone Script - SQL Injection. Author: t0pP8uZz
|
Analyze the security implications of: HotScripts Clone Script - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Instant Photo Gallery 1.0 - 'portfolio.php?cat_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Instant Photo Gallery 1.0 - 'portfolio.php?cat_id' SQL Injection. Author: r0t
|
Analyze the security implications of: Instant Photo Gallery 1.0 - 'portfolio.php?cat_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: E-Cart 1.1 - 'index.cgi' Remote Command Execution
|
This is a webapps exploit for cgi platform. Description: E-Cart 1.1 - 'index.cgi' Remote Command Execution. Author: z
|
Analyze the security implications of: E-Cart 1.1 - 'index.cgi' Remote Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: iOS Kernel - AppleOscarCompass Use-After-Free
|
This is a dos exploit for ios platform. Description: iOS Kernel - AppleOscarCompass Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: iOS Kernel - AppleOscarCompass Use-After-Free
|
This exploit targets ios systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: logahead UNU edition 1.0 - Arbitrary File Upload / Code Execution
|
This is a webapps exploit for php platform. Description: logahead UNU edition 1.0 - Arbitrary File Upload / Code Execution. Author: CorryL
|
Analyze the security implications of: logahead UNU edition 1.0 - Arbitrary File Upload / Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Komento - 'cid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Komento - 'cid' SQL Injection. Author: Crim3R
|
Analyze the security implications of: Joomla! Component Komento - 'cid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! / Mambo Component Showroom Joomlearn LMS - 'cat' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! / Mambo Component Showroom Joomlearn LMS - 'cat' SQL Injection. Author: The-0utl4w
|
Analyze the security implications of: Joomla! / Mambo Component Showroom Joomlearn LMS - 'cat' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cambio 0.5a - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: Cambio 0.5a - Cross-Site Request Forgery. Author: High-Tech Bridge SA
|
Analyze the security implications of: Cambio 0.5a - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CA Release Automation NiMi 6.5 - Remote Command Execution
|
This is a remote exploit for java platform. Description: CA Release Automation NiMi 6.5 - Remote Command Execution. Author: Jakub Palaczynski
|
Analyze the security implications of: CA Release Automation NiMi 6.5 - Remote Command Execution
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: HD-Network Real-time Monitoring System 2.0 - Local File Inclusion (LFI)
|
This is a remote exploit for linux platform. Description: HD-Network Real-time Monitoring System 2.0 - Local File Inclusion (LFI). Author: Momen Eldawakhly
|
Analyze the security implications of: HD-Network Real-time Monitoring System 2.0 - Local File Inclusion (LFI)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apache Roller 5.0.3 - XML External Entity Injection (File Disclosure)
|
This is a webapps exploit for linux platform. Description: Apache Roller 5.0.3 - XML External Entity Injection (File Disclosure). Author: Marko Jokic
|
Analyze the security implications of: Apache Roller 5.0.3 - XML External Entity Injection (File Disclosure)
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: 3Com OfficeConnect Routers - Remote Denial of Service
|
This is a dos exploit for hardware platform. Description: 3Com OfficeConnect Routers - Remote Denial of Service. Author: Alberto Ortega Llamas
|
Analyze the security implications of: 3Com OfficeConnect Routers - Remote Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Art Gallery Management System Project v1.0 - SQL Injection (cid) Unauthenticated
|
This is a webapps exploit for php platform. Description: Art Gallery Management System Project v1.0 - SQL Injection (cid) Unauthenticated. Author: Rahul Patwari
|
Analyze the security implications of: Art Gallery Management System Project v1.0 - SQL Injection (cid) Unauthenticated
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Exceed 5.0/6.0/6.1/7.1/8.0 - Font Name Handler Buffer Overflow
|
This is a remote exploit for linux platform. Description: Exceed 5.0/6.0/6.1/7.1/8.0 - Font Name Handler Buffer Overflow. Author: c0ntex
|
Analyze the security implications of: Exceed 5.0/6.0/6.1/7.1/8.0 - Font Name Handler Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Adobe Flash - AVC Processing Out-of-Bounds Read
|
This is a dos exploit for linux platform. Description: Adobe Flash - AVC Processing Out-of-Bounds Read. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - AVC Processing Out-of-Bounds Read
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: PDF Album 1.7 iOS - Local File Inclusion
|
This is a webapps exploit for ios platform. Description: PDF Album 1.7 iOS - Local File Inclusion. Author: Vulnerability-Lab
|
Analyze the security implications of: PDF Album 1.7 iOS - Local File Inclusion
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: Gallery 2.0.3 - 'stepOrder[]' Remote Command Execution
|
This is a webapps exploit for php platform. Description: Gallery 2.0.3 - 'stepOrder[]' Remote Command Execution. Author: rgod
|
Analyze the security implications of: Gallery 2.0.3 - 'stepOrder[]' Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Kryn.cms 0.9 - '_kurl' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Kryn.cms 0.9 - '_kurl' Cross-Site Scripting. Author: AutoSec Tools
|
Analyze the security implications of: Kryn.cms 0.9 - '_kurl' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PIKATEL 96338WS_ 96338L-2M-8M - DNS Change
|
This is a webapps exploit for cgi platform. Description: PIKATEL 96338WS_ 96338L-2M-8M - DNS Change. Author: Todor Donev
|
Analyze the security implications of: PIKATEL 96338WS_ 96338L-2M-8M - DNS Change
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Infoblox 6.8.2.11 - OS Command Injection
|
This is a webapps exploit for linux_x86 platform. Description: Infoblox 6.8.2.11 - OS Command Injection. Author: Nate Kettlewell
|
Analyze the security implications of: Infoblox 6.8.2.11 - OS Command Injection
|
This exploit targets linux_x86 systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux_x86 platform
|
What is this exploit about: Juju-run Agent - Privilege Escalation (Metasploit)
|
This is a local exploit for linux platform. Description: Juju-run Agent - Privilege Escalation (Metasploit). Author: Metasploit
|
Analyze the security implications of: Juju-run Agent - Privilege Escalation (Metasploit)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: FBZX 2.10 - Local Stack Buffer Overflow
|
This is a dos exploit for linux platform. Description: FBZX 2.10 - Local Stack Buffer Overflow. Author: Juan Sacco
|
Analyze the security implications of: FBZX 2.10 - Local Stack Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Applied Watch Command Center 1.0 - Authentication Bypass (2)
|
This is a remote exploit for multiple platform. Description: Applied Watch Command Center 1.0 - Authentication Bypass (2). Author: Bugtraq Security
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.