input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Kerberos 4 4.0/5 5.0 - KDC Spoofing | This is a remote exploit for multiple platform. Description: Kerberos 4 4.0/5 5.0 - KDC Spoofing. Author: Dug Song |
Analyze the security implications of: Kerberos 4 4.0/5 5.0 - KDC Spoofing | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (4) | This is a dos exploit for multiple platform. Description: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (4). Author: COSIG |
Analyze the security implications of: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (4) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux Kernel 2.6 (Debian 4.0 / Ubuntu / Gentoo) UDEV < 1.4.1 - Local Privilege Escalation (1) | This is a local exploit for linux platform. Description: Linux Kernel 2.6 (Debian 4.0 / Ubuntu / Gentoo) UDEV < 1.4.1 - Local Privilege Escalation (1). Author: kingcope |
Analyze the security implications of: Linux Kernel 2.6 (Debian 4.0 / Ubuntu / Gentoo) UDEV < 1.4.1 - Local Privilege Escalation (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AJ Auction 6.2.1 - 'classifide_ad.php' SQL Injection | This is a webapps exploit for php platform. Description: AJ Auction 6.2.1 - 'classifide_ad.php' SQL Injection. Author: t0pP8uZz |
Analyze the security implications of: AJ Auction 6.2.1 - 'classifide_ad.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MCL-Net 4.3.5.8788 - Information Disclosure | This is a webapps exploit for hardware platform. Description: MCL-Net 4.3.5.8788 - Information Disclosure. Author: Victor A. Morales |
Analyze the security implications of: MCL-Net 4.3.5.8788 - Information Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Virtual Programming VP-ASP 5.00 - 'shopexd.asp' SQL Injection (1) | This is a webapps exploit for asp platform. Description: Virtual Programming VP-ASP 5.00 - 'shopexd.asp' SQL Injection (1). Author: TioEuy & AresU |
Analyze the security implications of: Virtual Programming VP-ASP 5.00 - 'shopexd.asp' SQL Injection (1) | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: HBGK DVR 3.0.0 build20161206 - Authentication Bypass | This is a webapps exploit for hardware platform. Description: HBGK DVR 3.0.0 build20161206 - Authentication Bypass. Author: RAT - ThiefKing |
Analyze the security implications of: HBGK DVR 3.0.0 build20161206 - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FoT Video scripti 1.1b - 'oyun' SQL Injection | This is a webapps exploit for asp platform. Description: FoT Video scripti 1.1b - 'oyun' SQL Injection. Author: Crackers_Child |
Analyze the security implications of: FoT Video scripti 1.1b - 'oyun' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apple Mac OSX / iOS Kernel - iokit Registry Iterator Manipulation Double-Free | This is a dos exploit for multiple platform. Description: Apple Mac OSX / iOS Kernel - iokit Registry Iterator Manipulation Double-Free. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX / iOS Kernel - iokit Registry Iterator Manipulation Double-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Telestream Flip4Mac - 'WMV' File Remote Memory Corruption | This is a dos exploit for osx platform. Description: Telestream Flip4Mac - 'WMV' File Remote Memory Corruption. Author: kf |
Analyze the security implications of: Telestream Flip4Mac - 'WMV' File Remote Memory Corruption | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Apple WebKit - 'table' Use-After-Free | This is a dos exploit for multiple platform. Description: Apple WebKit - 'table' Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Apple WebKit - 'table' Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Google Chrome 72.0.3626.121 / 74.0.3725.0 - 'NewFixedDoubleArray' Integer Overflow | This is a remote exploit for multiple platform. Description: Google Chrome 72.0.3626.121 / 74.0.3725.0 - 'NewFixedDoubleArray' Integer Overflow. Author: Google Security Research |
Analyze the security implications of: Google Chrome 72.0.3626.121 / 74.0.3725.0 - 'NewFixedDoubleArray' Integer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: D-Link DSL-500B Gen 2 - URL Filter Configuration Panel Persistent Cross-Site Scripting | This is a webapps exploit for hardware platform. Description: D-Link DSL-500B Gen 2 - URL Filter Configuration Panel Persistent Cross-Site Scripting. Author: XLabs Security |
Analyze the security implications of: D-Link DSL-500B Gen 2 - URL Filter Configuration Panel Persistent Cross-Site Scripting | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FreeBSD 3.x/4.x - 'ipfw' Filtering Evasion | This is a remote exploit for freebsd platform. Description: FreeBSD 3.x/4.x - 'ipfw' Filtering Evasion. Author: Aragon Gouveia |
Analyze the security implications of: FreeBSD 3.x/4.x - 'ipfw' Filtering Evasion | This exploit targets freebsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: cPanel 5-9 - Passwd SQL Injection | This is a webapps exploit for php platform. Description: cPanel 5-9 - Passwd SQL Injection. Author: verb0s@virtualnova.net |
Analyze the security implications of: cPanel 5-9 - Passwd SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Samsung fimg2d - FIMG2D_BITBLT_BLIT ioctl Concurrency Flaw | This is a dos exploit for android platform. Description: Samsung fimg2d - FIMG2D_BITBLT_BLIT ioctl Concurrency Flaw. Author: Google Security Research |
Analyze the security implications of: Samsung fimg2d - FIMG2D_BITBLT_BLIT ioctl Concurrency Flaw | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Meinberg NTP Time Server ELX800/GPS M4x V5.30p - Remote Command Execution / Escalate Privileges | This is a remote exploit for hardware platform. Description: Meinberg NTP Time Server ELX800/GPS M4x V5.30p - Remote Command Execution / Escalate Privileges. Author: b0yd |
Analyze the security implications of: Meinberg NTP Time Server ELX800/GPS M4x V5.30p - Remote Command Execution / Escalate Privileges | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Oracle VM VirtualBox < 5.0.32 / < 5.1.14 - Local Privilege Escalation | This is a local exploit for linux platform. Description: Oracle VM VirtualBox < 5.0.32 / < 5.1.14 - Local Privilege Escalation. Author: Wolfgang Hotwagner |
Analyze the security implications of: Oracle VM VirtualBox < 5.0.32 / < 5.1.14 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: EasyRealtorPRO 2008 - 'site_search.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: EasyRealtorPRO 2008 - 'site_search.php' Multiple SQL Injections. Author: David Sopas |
Analyze the security implications of: EasyRealtorPRO 2008 - 'site_search.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Salim Gasmi GLD (Greylisting Daemon) 1.0 < 1.4 - Postfix Greylisting Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: Salim Gasmi GLD (Greylisting Daemon) 1.0 < 1.4 - Postfix Greylisting Buffer Overflow (Metasploit). Author: patrick |
Analyze the security implications of: Salim Gasmi GLD (Greylisting Daemon) 1.0 < 1.4 - Postfix Greylisting Buffer Overflow (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! 3.0.2 - 'highlight.php' PHP Object Injection | This is a webapps exploit for php platform. Description: Joomla! 3.0.2 - 'highlight.php' PHP Object Injection. Author: EgiX |
Analyze the security implications of: Joomla! 3.0.2 - 'highlight.php' PHP Object Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Digital Diary 1.5.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Digital Diary 1.5.0 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Digital Diary 1.5.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ubuntu < 15.10 - PT Chown Arbitrary PTs Access Via User Namespace Privilege Escalation | This is a local exploit for linux platform. Description: Ubuntu < 15.10 - PT Chown Arbitrary PTs Access Via User Namespace Privilege Escalation. Author: halfdog |
Analyze the security implications of: Ubuntu < 15.10 - PT Chown Arbitrary PTs Access Via User Namespace Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: E-Sic Software livre CMS - Cross Site Scripting | This is a webapps exploit for php platform. Description: E-Sic Software livre CMS - Cross Site Scripting. Author: Elber Tavares |
Analyze the security implications of: E-Sic Software livre CMS - Cross Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: InfraPower PPS-02-S Q213V1 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: InfraPower PPS-02-S Q213V1 - Cross-Site Request Forgery. Author: LiquidWorm |
Analyze the security implications of: InfraPower PPS-02-S Q213V1 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Tomcat 3.0/3.1 Snoop Servlet - Information Disclosure | This is a remote exploit for multiple platform. Description: Tomcat 3.0/3.1 Snoop Servlet - Information Disclosure. Author: ET LoWNOISE |
Analyze the security implications of: Tomcat 3.0/3.1 Snoop Servlet - Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component JE FAQ Pro 1.5.0 - Multiple Blind SQL Injections | This is a webapps exploit for php platform. Description: Joomla! Component JE FAQ Pro 1.5.0 - Multiple Blind SQL Injections. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component JE FAQ Pro 1.5.0 - Multiple Blind SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Complaint Management System 4.0 - 'cid' SQL injection | This is a webapps exploit for php platform. Description: Complaint Management System 4.0 - 'cid' SQL injection. Author: FULLSHADE |
Analyze the security implications of: Complaint Management System 4.0 - 'cid' SQL injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EasyImageCatalogue 1.31 - 'describe.php?d' Cross-Site Scripting | This is a webapps exploit for php platform. Description: EasyImageCatalogue 1.31 - 'describe.php?d' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: EasyImageCatalogue 1.31 - 'describe.php?d' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: I-Net MLM Script Engine - SQL Injection | This is a webapps exploit for php platform. Description: I-Net MLM Script Engine - SQL Injection. Author: Sid3^effects |
Analyze the security implications of: I-Net MLM Script Engine - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Light Weight Calendar 1.x - 'date' Remote Code Execution | This is a webapps exploit for php platform. Description: Light Weight Calendar 1.x - 'date' Remote Code Execution. Author: Hessam-x |
Analyze the security implications of: Light Weight Calendar 1.x - 'date' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dnsmasq < 2.78 - Stack Overflow | This is a dos exploit for multiple platform. Description: Dnsmasq < 2.78 - Stack Overflow. Author: Google Security Research |
Analyze the security implications of: Dnsmasq < 2.78 - Stack Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_libros - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_libros - SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_libros - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BigTree CMS 4.2.23 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: BigTree CMS 4.2.23 - Cross-Site Scripting. Author: Ismail Tasdelen |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.