input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Kerberos 4 4.0/5 5.0 - KDC Spoofing
|
This is a remote exploit for multiple platform. Description: Kerberos 4 4.0/5 5.0 - KDC Spoofing. Author: Dug Song
|
Analyze the security implications of: Kerberos 4 4.0/5 5.0 - KDC Spoofing
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (4)
|
This is a dos exploit for multiple platform. Description: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (4). Author: COSIG
|
Analyze the security implications of: Adobe Acrobat Reader DC 15.016.20045 - Invalid Font '.ttf' Memory Corruption (4)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Linux Kernel 2.6 (Debian 4.0 / Ubuntu / Gentoo) UDEV < 1.4.1 - Local Privilege Escalation (1)
|
This is a local exploit for linux platform. Description: Linux Kernel 2.6 (Debian 4.0 / Ubuntu / Gentoo) UDEV < 1.4.1 - Local Privilege Escalation (1). Author: kingcope
|
Analyze the security implications of: Linux Kernel 2.6 (Debian 4.0 / Ubuntu / Gentoo) UDEV < 1.4.1 - Local Privilege Escalation (1)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AJ Auction 6.2.1 - 'classifide_ad.php' SQL Injection
|
This is a webapps exploit for php platform. Description: AJ Auction 6.2.1 - 'classifide_ad.php' SQL Injection. Author: t0pP8uZz
|
Analyze the security implications of: AJ Auction 6.2.1 - 'classifide_ad.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MCL-Net 4.3.5.8788 - Information Disclosure
|
This is a webapps exploit for hardware platform. Description: MCL-Net 4.3.5.8788 - Information Disclosure. Author: Victor A. Morales
|
Analyze the security implications of: MCL-Net 4.3.5.8788 - Information Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Virtual Programming VP-ASP 5.00 - 'shopexd.asp' SQL Injection (1)
|
This is a webapps exploit for asp platform. Description: Virtual Programming VP-ASP 5.00 - 'shopexd.asp' SQL Injection (1). Author: TioEuy & AresU
|
Analyze the security implications of: Virtual Programming VP-ASP 5.00 - 'shopexd.asp' SQL Injection (1)
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: HBGK DVR 3.0.0 build20161206 - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: HBGK DVR 3.0.0 build20161206 - Authentication Bypass. Author: RAT - ThiefKing
|
Analyze the security implications of: HBGK DVR 3.0.0 build20161206 - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: FoT Video scripti 1.1b - 'oyun' SQL Injection
|
This is a webapps exploit for asp platform. Description: FoT Video scripti 1.1b - 'oyun' SQL Injection. Author: Crackers_Child
|
Analyze the security implications of: FoT Video scripti 1.1b - 'oyun' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Apple Mac OSX / iOS Kernel - iokit Registry Iterator Manipulation Double-Free
|
This is a dos exploit for multiple platform. Description: Apple Mac OSX / iOS Kernel - iokit Registry Iterator Manipulation Double-Free. Author: Google Security Research
|
Analyze the security implications of: Apple Mac OSX / iOS Kernel - iokit Registry Iterator Manipulation Double-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Telestream Flip4Mac - 'WMV' File Remote Memory Corruption
|
This is a dos exploit for osx platform. Description: Telestream Flip4Mac - 'WMV' File Remote Memory Corruption. Author: kf
|
Analyze the security implications of: Telestream Flip4Mac - 'WMV' File Remote Memory Corruption
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Apple WebKit - 'table' Use-After-Free
|
This is a dos exploit for multiple platform. Description: Apple WebKit - 'table' Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: Apple WebKit - 'table' Use-After-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Google Chrome 72.0.3626.121 / 74.0.3725.0 - 'NewFixedDoubleArray' Integer Overflow
|
This is a remote exploit for multiple platform. Description: Google Chrome 72.0.3626.121 / 74.0.3725.0 - 'NewFixedDoubleArray' Integer Overflow. Author: Google Security Research
|
Analyze the security implications of: Google Chrome 72.0.3626.121 / 74.0.3725.0 - 'NewFixedDoubleArray' Integer Overflow
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: D-Link DSL-500B Gen 2 - URL Filter Configuration Panel Persistent Cross-Site Scripting
|
This is a webapps exploit for hardware platform. Description: D-Link DSL-500B Gen 2 - URL Filter Configuration Panel Persistent Cross-Site Scripting. Author: XLabs Security
|
Analyze the security implications of: D-Link DSL-500B Gen 2 - URL Filter Configuration Panel Persistent Cross-Site Scripting
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: FreeBSD 3.x/4.x - 'ipfw' Filtering Evasion
|
This is a remote exploit for freebsd platform. Description: FreeBSD 3.x/4.x - 'ipfw' Filtering Evasion. Author: Aragon Gouveia
|
Analyze the security implications of: FreeBSD 3.x/4.x - 'ipfw' Filtering Evasion
|
This exploit targets freebsd systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: cPanel 5-9 - Passwd SQL Injection
|
This is a webapps exploit for php platform. Description: cPanel 5-9 - Passwd SQL Injection. Author: verb0s@virtualnova.net
|
Analyze the security implications of: cPanel 5-9 - Passwd SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Samsung fimg2d - FIMG2D_BITBLT_BLIT ioctl Concurrency Flaw
|
This is a dos exploit for android platform. Description: Samsung fimg2d - FIMG2D_BITBLT_BLIT ioctl Concurrency Flaw. Author: Google Security Research
|
Analyze the security implications of: Samsung fimg2d - FIMG2D_BITBLT_BLIT ioctl Concurrency Flaw
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Meinberg NTP Time Server ELX800/GPS M4x V5.30p - Remote Command Execution / Escalate Privileges
|
This is a remote exploit for hardware platform. Description: Meinberg NTP Time Server ELX800/GPS M4x V5.30p - Remote Command Execution / Escalate Privileges. Author: b0yd
|
Analyze the security implications of: Meinberg NTP Time Server ELX800/GPS M4x V5.30p - Remote Command Execution / Escalate Privileges
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Oracle VM VirtualBox < 5.0.32 / < 5.1.14 - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Oracle VM VirtualBox < 5.0.32 / < 5.1.14 - Local Privilege Escalation. Author: Wolfgang Hotwagner
|
Analyze the security implications of: Oracle VM VirtualBox < 5.0.32 / < 5.1.14 - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: EasyRealtorPRO 2008 - 'site_search.php' Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: EasyRealtorPRO 2008 - 'site_search.php' Multiple SQL Injections. Author: David Sopas
|
Analyze the security implications of: EasyRealtorPRO 2008 - 'site_search.php' Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Salim Gasmi GLD (Greylisting Daemon) 1.0 < 1.4 - Postfix Greylisting Buffer Overflow (Metasploit)
|
This is a remote exploit for linux platform. Description: Salim Gasmi GLD (Greylisting Daemon) 1.0 < 1.4 - Postfix Greylisting Buffer Overflow (Metasploit). Author: patrick
|
Analyze the security implications of: Salim Gasmi GLD (Greylisting Daemon) 1.0 < 1.4 - Postfix Greylisting Buffer Overflow (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! 3.0.2 - 'highlight.php' PHP Object Injection
|
This is a webapps exploit for php platform. Description: Joomla! 3.0.2 - 'highlight.php' PHP Object Injection. Author: EgiX
|
Analyze the security implications of: Joomla! 3.0.2 - 'highlight.php' PHP Object Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Digital Diary 1.5.0 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Digital Diary 1.5.0 - Local File Inclusion. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component Digital Diary 1.5.0 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ubuntu < 15.10 - PT Chown Arbitrary PTs Access Via User Namespace Privilege Escalation
|
This is a local exploit for linux platform. Description: Ubuntu < 15.10 - PT Chown Arbitrary PTs Access Via User Namespace Privilege Escalation. Author: halfdog
|
Analyze the security implications of: Ubuntu < 15.10 - PT Chown Arbitrary PTs Access Via User Namespace Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: E-Sic Software livre CMS - Cross Site Scripting
|
This is a webapps exploit for php platform. Description: E-Sic Software livre CMS - Cross Site Scripting. Author: Elber Tavares
|
Analyze the security implications of: E-Sic Software livre CMS - Cross Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: InfraPower PPS-02-S Q213V1 - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: InfraPower PPS-02-S Q213V1 - Cross-Site Request Forgery. Author: LiquidWorm
|
Analyze the security implications of: InfraPower PPS-02-S Q213V1 - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Tomcat 3.0/3.1 Snoop Servlet - Information Disclosure
|
This is a remote exploit for multiple platform. Description: Tomcat 3.0/3.1 Snoop Servlet - Information Disclosure. Author: ET LoWNOISE
|
Analyze the security implications of: Tomcat 3.0/3.1 Snoop Servlet - Information Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component JE FAQ Pro 1.5.0 - Multiple Blind SQL Injections
|
This is a webapps exploit for php platform. Description: Joomla! Component JE FAQ Pro 1.5.0 - Multiple Blind SQL Injections. Author: Chip d3 bi0s
|
Analyze the security implications of: Joomla! Component JE FAQ Pro 1.5.0 - Multiple Blind SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Complaint Management System 4.0 - 'cid' SQL injection
|
This is a webapps exploit for php platform. Description: Complaint Management System 4.0 - 'cid' SQL injection. Author: FULLSHADE
|
Analyze the security implications of: Complaint Management System 4.0 - 'cid' SQL injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EasyImageCatalogue 1.31 - 'describe.php?d' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: EasyImageCatalogue 1.31 - 'describe.php?d' Cross-Site Scripting. Author: ZoRLu
|
Analyze the security implications of: EasyImageCatalogue 1.31 - 'describe.php?d' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: I-Net MLM Script Engine - SQL Injection
|
This is a webapps exploit for php platform. Description: I-Net MLM Script Engine - SQL Injection. Author: Sid3^effects
|
Analyze the security implications of: I-Net MLM Script Engine - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Light Weight Calendar 1.x - 'date' Remote Code Execution
|
This is a webapps exploit for php platform. Description: Light Weight Calendar 1.x - 'date' Remote Code Execution. Author: Hessam-x
|
Analyze the security implications of: Light Weight Calendar 1.x - 'date' Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dnsmasq < 2.78 - Stack Overflow
|
This is a dos exploit for multiple platform. Description: Dnsmasq < 2.78 - Stack Overflow. Author: Google Security Research
|
Analyze the security implications of: Dnsmasq < 2.78 - Stack Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_libros - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_libros - SQL Injection. Author: FL0RiX
|
Analyze the security implications of: Joomla! Component com_libros - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BigTree CMS 4.2.23 - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: BigTree CMS 4.2.23 - Cross-Site Scripting. Author: Ismail Tasdelen
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.