input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: systemd - 'chown_one()' Dereference Symlinks
|
This is a local exploit for linux platform. Description: systemd - 'chown_one()' Dereference Symlinks. Author: Google Security Research
|
Analyze the security implications of: systemd - 'chown_one()' Dereference Symlinks
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Linux Kernel 4.4.0-21 (Ubuntu 16.04 x64) - Netfilter 'target_offset' Out-of-Bounds Privilege Escalation
|
This is a local exploit for linux_x86-64 platform. Description: Linux Kernel 4.4.0-21 (Ubuntu 16.04 x64) - Netfilter 'target_offset' Out-of-Bounds Privilege Escalation. Author: vnik
|
Analyze the security implications of: Linux Kernel 4.4.0-21 (Ubuntu 16.04 x64) - Netfilter 'target_offset' Out-of-Bounds Privilege Escalation
|
This exploit targets linux_x86-64 systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux_x86-64 platform
|
What is this exploit about: Tenda W309R Router 5.07.46 - Configuration Disclosure
|
This is a webapps exploit for hardware platform. Description: Tenda W309R Router 5.07.46 - Configuration Disclosure. Author: SANTHO
|
Analyze the security implications of: Tenda W309R Router 5.07.46 - Configuration Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Discuz! 5.0.0 GBK - SQL Injection / Admin Credentials Disclosure
|
This is a webapps exploit for php platform. Description: Discuz! 5.0.0 GBK - SQL Injection / Admin Credentials Disclosure. Author: rgod
|
Analyze the security implications of: Discuz! 5.0.0 GBK - SQL Injection / Admin Credentials Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: gallery_show.asp - GID Blind SQL Injection
|
This is a webapps exploit for asp platform. Description: gallery_show.asp - GID Blind SQL Injection. Author: R3d-D3V!L
|
Analyze the security implications of: gallery_show.asp - GID Blind SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Apache Axis2 1.x - '/axis2/axis2-admin' Session Fixation
|
This is a remote exploit for multiple platform. Description: Apache Axis2 1.x - '/axis2/axis2-admin' Session Fixation. Author: Tiago Ferreira Barbosa
|
Analyze the security implications of: Apache Axis2 1.x - '/axis2/axis2-admin' Session Fixation
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Rockwell Automation Allen-Bradley PowerMonitor 1000 - Incorrect Access Control Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Rockwell Automation Allen-Bradley PowerMonitor 1000 - Incorrect Access Control Authentication Bypass. Author: Luca.Chiou
|
Analyze the security implications of: Rockwell Automation Allen-Bradley PowerMonitor 1000 - Incorrect Access Control Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Aruba Instant (IAP) - Remote Code Execution
|
This is a remote exploit for cgi platform. Description: Aruba Instant (IAP) - Remote Code Execution. Author: Aleph Security
|
Analyze the security implications of: Aruba Instant (IAP) - Remote Code Execution
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Sercomm TCP/32674 - Backdoor Reactivation
|
This is a remote exploit for hardware platform. Description: Sercomm TCP/32674 - Backdoor Reactivation. Author: Synacktiv
|
Analyze the security implications of: Sercomm TCP/32674 - Backdoor Reactivation
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CubeCart 3.0.x - '/admin/forgot_pass.php?user_name' SQL Injection
|
This is a webapps exploit for php platform. Description: CubeCart 3.0.x - '/admin/forgot_pass.php?user_name' SQL Injection. Author: HACKERS PAL
|
Analyze the security implications of: CubeCart 3.0.x - '/admin/forgot_pass.php?user_name' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: dotProject 2.1.6 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: dotProject 2.1.6 - Remote File Inclusion. Author: dun
|
Analyze the security implications of: dotProject 2.1.6 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linksys Web Camera Software 2.10 - 'Next_file' Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: Linksys Web Camera Software 2.10 - 'Next_file' Cross-Site Scripting. Author: scriptX
|
Analyze the security implications of: Linksys Web Camera Software 2.10 - 'Next_file' Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: ActiveNews Manager - 'page' SQL Injection
|
This is a webapps exploit for asp platform. Description: ActiveNews Manager - 'page' SQL Injection. Author: laurent gaffie
|
Analyze the security implications of: ActiveNews Manager - 'page' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: DRDoS - Distributed Reflection Denial of Service
|
This is a dos exploit for multiple platform. Description: DRDoS - Distributed Reflection Denial of Service. Author: whoppix
|
Analyze the security implications of: DRDoS - Distributed Reflection Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Basic-CMS - Remote Database Disclosure
|
This is a webapps exploit for php platform. Description: Basic-CMS - Remote Database Disclosure. Author: Stack
|
Analyze the security implications of: Basic-CMS - Remote Database Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MySQL MaxDB 7.5 - WAHTTP Server Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: MySQL MaxDB 7.5 - WAHTTP Server Remote Denial of Service. Author: Evgeny Demidov
|
Analyze the security implications of: MySQL MaxDB 7.5 - WAHTTP Server Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Motorola SB5101 Hax0rware Rajko HTTPd - Remote Denial of Service (PoC)
|
This is a dos exploit for hardware platform. Description: Motorola SB5101 Hax0rware Rajko HTTPd - Remote Denial of Service (PoC). Author: Dillon Beresford
|
Analyze the security implications of: Motorola SB5101 Hax0rware Rajko HTTPd - Remote Denial of Service (PoC)
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: cPanel 10.x - 'showfile.html?File' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: cPanel 10.x - 'showfile.html?File' Cross-Site Scripting. Author: preth00nker
|
Analyze the security implications of: cPanel 10.x - 'showfile.html?File' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_as - 'catid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_as - 'catid' SQL Injection. Author: N2n-Hacker
|
Analyze the security implications of: Joomla! Component com_as - 'catid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Google Android Web Browser - '.BMP' File Integer Overflow
|
This is a dos exploit for android platform. Description: Google Android Web Browser - '.BMP' File Integer Overflow. Author: Alfredo Ortega
|
Analyze the security implications of: Google Android Web Browser - '.BMP' File Integer Overflow
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Mambo 4.6.4 - Cache Lite Output Remote File Inclusion (Metasploit)
|
This is a webapps exploit for php platform. Description: Mambo 4.6.4 - Cache Lite Output Remote File Inclusion (Metasploit). Author: MC
|
Analyze the security implications of: Mambo 4.6.4 - Cache Lite Output Remote File Inclusion (Metasploit)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link DIR-615 Wireless Router - Persistent Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: D-Link DIR-615 Wireless Router - Persistent Cross-Site Scripting. Author: Sanyam Chawla
|
Analyze the security implications of: D-Link DIR-615 Wireless Router - Persistent Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: QNX RTOS 4.25 - dumper Arbitrary File Modification
|
This is a local exploit for linux platform. Description: QNX RTOS 4.25 - dumper Arbitrary File Modification. Author: Simon Ouellette
|
Analyze the security implications of: QNX RTOS 4.25 - dumper Arbitrary File Modification
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Coastercms 5.8.18 - Stored XSS
|
This is a webapps exploit for php platform. Description: Coastercms 5.8.18 - Stored XSS. Author: Hardik Solanki
|
Analyze the security implications of: Coastercms 5.8.18 - Stored XSS
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FS Gigs Script 1.0 - 'cat' / 'sc' SQL Injection
|
This is a webapps exploit for php platform. Description: FS Gigs Script 1.0 - 'cat' / 'sc' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: FS Gigs Script 1.0 - 'cat' / 'sc' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ISC BIND 9 - Remote Dynamic Update Message Denial of Service (PoC)
|
This is a dos exploit for multiple platform. Description: ISC BIND 9 - Remote Dynamic Update Message Denial of Service (PoC). Author: kingcope
|
Analyze the security implications of: ISC BIND 9 - Remote Dynamic Update Message Denial of Service (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: InverseFlow 2.4 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: InverseFlow 2.4 - Multiple Cross-Site Scripting Vulnerabilities. Author: Amir Expl0its
|
Analyze the security implications of: InverseFlow 2.4 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apache Tomcat 6.0.10 - Documentation Sample Application Multiple Cross-Site Scripting Vulnerabilities
|
This is a remote exploit for multiple platform. Description: Apache Tomcat 6.0.10 - Documentation Sample Application Multiple Cross-Site Scripting Vulnerabilities. Author: Ferruh Mavituna
|
Analyze the security implications of: Apache Tomcat 6.0.10 - Documentation Sample Application Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: WebKit JSC - 'ObjectPatternNode::appendEntry' Stack Use-After-Free
|
This is a dos exploit for multiple platform. Description: WebKit JSC - 'ObjectPatternNode::appendEntry' Stack Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: WebKit JSC - 'ObjectPatternNode::appendEntry' Stack Use-After-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: AContent 1.3 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: AContent 1.3 - Local File Inclusion. Author: DaOne
|
Analyze the security implications of: AContent 1.3 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MikroTik RouterOS 6.45.6 - DNS Cache Poisoning
|
This is a remote exploit for hardware platform. Description: MikroTik RouterOS 6.45.6 - DNS Cache Poisoning. Author: Jacob Baines
|
Analyze the security implications of: MikroTik RouterOS 6.45.6 - DNS Cache Poisoning
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Oracle 10g - SYS.LT.REMOVEWORKSPACE SQL Injection
|
This is a local exploit for multiple platform. Description: Oracle 10g - SYS.LT.REMOVEWORKSPACE SQL Injection. Author: sh2kerr
|
Analyze the security implications of: Oracle 10g - SYS.LT.REMOVEWORKSPACE SQL Injection
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: cattaDoc 2.21 - 'download2.php?fn1' Remote File Disclosure
|
This is a webapps exploit for php platform. Description: cattaDoc 2.21 - 'download2.php?fn1' Remote File Disclosure. Author: GoLd_M
|
Analyze the security implications of: cattaDoc 2.21 - 'download2.php?fn1' Remote File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component JomSocial 1.6.288 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Joomla! Component JomSocial 1.6.288 - Multiple Cross-Site Scripting Vulnerabilities. Author: jdc
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.