input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Linux Kernel < 2.6.34 (Ubuntu 10.10 x86) - 'CAP_SYS_ADMIN' Local Privilege Escalation (1)
|
This is a local exploit for linux_x86 platform. Description: Linux Kernel < 2.6.34 (Ubuntu 10.10 x86) - 'CAP_SYS_ADMIN' Local Privilege Escalation (1). Author: Dan Rosenberg
|
Analyze the security implications of: Linux Kernel < 2.6.34 (Ubuntu 10.10 x86) - 'CAP_SYS_ADMIN' Local Privilege Escalation (1)
|
This exploit targets linux_x86 systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux_x86 platform
|
What is this exploit about: Joomla! Component Catalogue - SQL Injection / Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Catalogue - SQL Injection / Local File Inclusion. Author: XroGuE
|
Analyze the security implications of: Joomla! Component Catalogue - SQL Injection / Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP 5.4/5.5/5.6 - SplDoublyLinkedList 'Unserialize()' Use-After-Free
|
This is a dos exploit for php platform. Description: PHP 5.4/5.5/5.6 - SplDoublyLinkedList 'Unserialize()' Use-After-Free. Author: Taoguang Chen
|
Analyze the security implications of: PHP 5.4/5.5/5.6 - SplDoublyLinkedList 'Unserialize()' Use-After-Free
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EXAMPLO - SQL Injection
|
This is a webapps exploit for php platform. Description: EXAMPLO - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: EXAMPLO - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Magic Photo Storage Website - '/user/register.php?_config[site_path]' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Magic Photo Storage Website - '/user/register.php?_config[site_path]' Remote File Inclusion. Author: IbnuSina
|
Analyze the security implications of: Magic Photo Storage Website - '/user/register.php?_config[site_path]' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Okul Web Otomasyon Sistemi 4.0.1 - SQL Injection
|
This is a webapps exploit for asp platform. Description: Okul Web Otomasyon Sistemi 4.0.1 - SQL Injection. Author: ilker Kandemir
|
Analyze the security implications of: Okul Web Otomasyon Sistemi 4.0.1 - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Tendenci 12.3.1 - CSV/ Formula Injection
|
This is a webapps exploit for multiple platform. Description: Tendenci 12.3.1 - CSV/ Formula Injection. Author: Mufaddal Masalawala
|
Analyze the security implications of: Tendenci 12.3.1 - CSV/ Formula Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_caproductprices - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_caproductprices - 'id' SQL Injection. Author: CoBRa_21
|
Analyze the security implications of: Joomla! Component com_caproductprices - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Websense Triton - Multiple Vulnerabilities
|
This is a webapps exploit for cgi platform. Description: Websense Triton - Multiple Vulnerabilities. Author: Ben Williams
|
Analyze the security implications of: Websense Triton - Multiple Vulnerabilities
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: ThingsBoard 3.3.1 'name' - Stored Cross-Site Scripting (XSS)
|
This is a webapps exploit for multiple platform. Description: ThingsBoard 3.3.1 'name' - Stored Cross-Site Scripting (XSS). Author: Steffen Langenfeld
|
Analyze the security implications of: ThingsBoard 3.3.1 'name' - Stored Cross-Site Scripting (XSS)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Brickcom IP Camera - Credentials Disclosure
|
This is a webapps exploit for hardware platform. Description: Brickcom IP Camera - Credentials Disclosure. Author: Emiliano Ipar
|
Analyze the security implications of: Brickcom IP Camera - Credentials Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: TP-Link TL-SC3171 IP Cameras - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: TP-Link TL-SC3171 IP Cameras - Multiple Vulnerabilities. Author: Core Security
|
Analyze the security implications of: TP-Link TL-SC3171 IP Cameras - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: DigiOz Guestbook 1.7.2 - 'search.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DigiOz Guestbook 1.7.2 - 'search.php' Cross-Site Scripting. Author: Moudi
|
Analyze the security implications of: DigiOz Guestbook 1.7.2 - 'search.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Netgear WNDAP350 Wireless Access Point - Multiple Information Disclosure Vulnerabilities
|
This is a remote exploit for hardware platform. Description: Netgear WNDAP350 Wireless Access Point - Multiple Information Disclosure Vulnerabilities. Author: Juerd Waalboer
|
Analyze the security implications of: Netgear WNDAP350 Wireless Access Point - Multiple Information Disclosure Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ImageAlbum 2.0.0b2 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: ImageAlbum 2.0.0b2 - 'id' SQL Injection. Author: Raw Security
|
Analyze the security implications of: ImageAlbum 2.0.0b2 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Craft CMS SEOmatic plugin 3.1.4 - Server-Side Template Injection
|
This is a webapps exploit for linux platform. Description: Craft CMS SEOmatic plugin 3.1.4 - Server-Side Template Injection. Author: 0xB455
|
Analyze the security implications of: Craft CMS SEOmatic plugin 3.1.4 - Server-Side Template Injection
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: GV PostScript Viewer - Remote Buffer Overflow (1)
|
This is a remote exploit for linux platform. Description: GV PostScript Viewer - Remote Buffer Overflow (1). Author: infamous41md
|
Analyze the security implications of: GV PostScript Viewer - Remote Buffer Overflow (1)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component Rapid-Recipe - HTML Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Rapid-Recipe - HTML Injection. Author: Sid3^effects
|
Analyze the security implications of: Joomla! Component Rapid-Recipe - HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ID Team ID Board 1.1.3 - 'SQL.CLS.php' SQL Injection
|
This is a webapps exploit for php platform. Description: ID Team ID Board 1.1.3 - 'SQL.CLS.php' SQL Injection. Author: Defa
|
Analyze the security implications of: ID Team ID Board 1.1.3 - 'SQL.CLS.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Advanced Poll 2.0 - Remote Information Disclosure
|
This is a webapps exploit for php platform. Description: Advanced Poll 2.0 - Remote Information Disclosure. Author: subj
|
Analyze the security implications of: Advanced Poll 2.0 - Remote Information Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: NTPD - MON_GETLIST Query Amplification Denial of Service
|
This is a dos exploit for multiple platform. Description: NTPD - MON_GETLIST Query Amplification Denial of Service. Author: Todor Donev
|
Analyze the security implications of: NTPD - MON_GETLIST Query Amplification Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Cyrus IMAPD 2.3.2 - 'pop3d' Remote Buffer Overflow (1)
|
This is a remote exploit for linux platform. Description: Cyrus IMAPD 2.3.2 - 'pop3d' Remote Buffer Overflow (1). Author: kingcope
|
Analyze the security implications of: Cyrus IMAPD 2.3.2 - 'pop3d' Remote Buffer Overflow (1)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: FMyLife Clone Script (Pro Edition) 1.1 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for php platform. Description: FMyLife Clone Script (Pro Edition) 1.1 - Cross-Site Request Forgery (Add Admin). Author: Ihsan Sencan
|
Analyze the security implications of: FMyLife Clone Script (Pro Edition) 1.1 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco IOS 12 - UDP Denial of Service
|
This is a dos exploit for hardware platform. Description: Cisco IOS 12 - UDP Denial of Service. Author: blackangels
|
Analyze the security implications of: Cisco IOS 12 - UDP Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: AJ Classifieds - 'index.php' SQL Injection
|
This is a webapps exploit for php platform. Description: AJ Classifieds - 'index.php' SQL Injection. Author: t0pP8uZz
|
Analyze the security implications of: AJ Classifieds - 'index.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! / Mambo Component Filebase - 'filecatid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! / Mambo Component Filebase - 'filecatid' SQL Injection. Author: S@BUN
|
Analyze the security implications of: Joomla! / Mambo Component Filebase - 'filecatid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Centreon 19.10.5 - Remote Command Execution
|
This is a webapps exploit for php platform. Description: Centreon 19.10.5 - Remote Command Execution. Author: Fabien AUNAY
|
Analyze the security implications of: Centreon 19.10.5 - Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Motorola SBG6580 Cable Modem & Wireless Router - Reboot (Denial of Service)
|
This is a dos exploit for hardware platform. Description: Motorola SBG6580 Cable Modem & Wireless Router - Reboot (Denial of Service). Author: nicx0
|
Analyze the security implications of: Motorola SBG6580 Cable Modem & Wireless Router - Reboot (Denial of Service)
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: AutoIndex PHP Script - 'index.php' Directory Traversal
|
This is a webapps exploit for php platform. Description: AutoIndex PHP Script - 'index.php' Directory Traversal. Author: Red-D3v1L
|
Analyze the security implications of: AutoIndex PHP Script - 'index.php' Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LBT-T300-mini1 - Remote Buffer Overflow
|
This is a remote exploit for linux platform. Description: LBT-T300-mini1 - Remote Buffer Overflow. Author: Amirhossein Bahramizadeh
|
Analyze the security implications of: LBT-T300-mini1 - Remote Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Netgear WNR1000v4 - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Netgear WNR1000v4 - Authentication Bypass. Author: Daniel Haake
|
Analyze the security implications of: Netgear WNR1000v4 - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: PDFlib 7.0.2 - Multiple Remote Buffer Overflow Vulnerabilities
|
This is a remote exploit for php platform. Description: PDFlib 7.0.2 - Multiple Remote Buffer Overflow Vulnerabilities. Author: poplix
|
Analyze the security implications of: PDFlib 7.0.2 - Multiple Remote Buffer Overflow Vulnerabilities
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ziggurat Farsi CMS - SQL Injection
|
This is a webapps exploit for asp platform. Description: Ziggurat Farsi CMS - SQL Injection. Author: Arash Saadatfar
|
Analyze the security implications of: Ziggurat Farsi CMS - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ImpressCMS 1.3.11 - 'bid' SQL Injection
|
This is a webapps exploit for php platform. Description: ImpressCMS 1.3.11 - 'bid' SQL Injection. Author: Mehmet Onder
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.