input
stringlengths
39
228
output
stringlengths
32
324
What is this exploit about: Exim 3.x - Format String
This is a local exploit for linux platform. Description: Exim 3.x - Format String. Author: Megyer Laszlo
Analyze the security implications of: Exim 3.x - Format String
This exploit targets linux systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: APHP ImgList 1.2.2 - Cross-Site Scripting
This is a webapps exploit for php platform. Description: APHP ImgList 1.2.2 - Cross-Site Scripting. Author: indoushka
Analyze the security implications of: APHP ImgList 1.2.2 - Cross-Site Scripting
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: glFTPd (Slackware 9.0/9.1/10.0) - Local Stack Overflow
This is a local exploit for linux platform. Description: glFTPd (Slackware 9.0/9.1/10.0) - Local Stack Overflow. Author: CoKi
Analyze the security implications of: glFTPd (Slackware 9.0/9.1/10.0) - Local Stack Overflow
This exploit targets linux systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Adtran Personal Phone Manager 10.8.1 - 'emailAddress' Stored Cross-Site Scripting (XSS)
This is a webapps exploit for hardware platform. Description: Adtran Personal Phone Manager 10.8.1 - 'emailAddress' Stored Cross-Site Scripting (XSS). Author: 3ndG4me
Analyze the security implications of: Adtran Personal Phone Manager 10.8.1 - 'emailAddress' Stored Cross-Site Scripting (XSS)
This exploit targets hardware systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: WhatsApp 2.17.52 - Memory Corruption
This is a dos exploit for ios platform. Description: WhatsApp 2.17.52 - Memory Corruption. Author: Juan Sacco
Analyze the security implications of: WhatsApp 2.17.52 - Memory Corruption
This exploit targets ios systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets ios platform
What is this exploit about: JiRos Link Manager 1.0 - 'openlink.asp?LinkID' SQL Injection
This is a webapps exploit for asp platform. Description: JiRos Link Manager 1.0 - 'openlink.asp?LinkID' SQL Injection. Author: laurent gaffie
Analyze the security implications of: JiRos Link Manager 1.0 - 'openlink.asp?LinkID' SQL Injection
This exploit targets asp systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets asp platform
What is this exploit about: ContaoCMS (aka TYPOlight) 2.11 - Cross-Site Request Forgery (Delete Admin / Delete Article)
This is a webapps exploit for php platform. Description: ContaoCMS (aka TYPOlight) 2.11 - Cross-Site Request Forgery (Delete Admin / Delete Article). Author: Ivano Binetti
Analyze the security implications of: ContaoCMS (aka TYPOlight) 2.11 - Cross-Site Request Forgery (Delete Admin / Delete Article)
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Netgear ReadyNAS Surveillance 1.4.3-16 - Remote Command Execution
This is a webapps exploit for hardware platform. Description: Netgear ReadyNAS Surveillance 1.4.3-16 - Remote Command Execution. Author: Kacper Szurek
Analyze the security implications of: Netgear ReadyNAS Surveillance 1.4.3-16 - Remote Command Execution
This exploit targets hardware systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Schmid Watson Management Console - Directory Traversal
This is a remote exploit for linux platform. Description: Schmid Watson Management Console - Directory Traversal. Author: Dhruv Shah
Analyze the security implications of: Schmid Watson Management Console - Directory Traversal
This exploit targets linux systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Xine-Lib 1.1.12 - NSF demuxer Stack Overflow (PoC)
This is a dos exploit for linux platform. Description: Xine-Lib 1.1.12 - NSF demuxer Stack Overflow (PoC). Author: Guido Landi
Analyze the security implications of: Xine-Lib 1.1.12 - NSF demuxer Stack Overflow (PoC)
This exploit targets linux systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: BBS E-Market - 'postscript.php?p_mode' Remote File Inclusion
This is a webapps exploit for php platform. Description: BBS E-Market - 'postscript.php?p_mode' Remote File Inclusion. Author: mozi
Analyze the security implications of: BBS E-Market - 'postscript.php?p_mode' Remote File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Joomla! Component EkRishta 2.10 - 'username' SQL Injection
This is a webapps exploit for php platform. Description: Joomla! Component EkRishta 2.10 - 'username' SQL Injection. Author: L0RD
Analyze the security implications of: Joomla! Component EkRishta 2.10 - 'username' SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Affiliate Me Version 5.0.1 - SQL Injection
This is a webapps exploit for php platform. Description: Affiliate Me Version 5.0.1 - SQL Injection. Author: h4ck3r
Analyze the security implications of: Affiliate Me Version 5.0.1 - SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: HP-UX 11.0 - net.init RC Script
This is a local exploit for hp-ux platform. Description: HP-UX 11.0 - net.init RC Script. Author: Kyong-won Cho
Analyze the security implications of: HP-UX 11.0 - net.init RC Script
This exploit targets hp-ux systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets hp-ux platform
What is this exploit about: Daily Expense Manager 1.0 - Cross-Site Request Forgery (Delete Income)
This is a webapps exploit for php platform. Description: Daily Expense Manager 1.0 - Cross-Site Request Forgery (Delete Income). Author: Mr Winst0n
Analyze the security implications of: Daily Expense Manager 1.0 - Cross-Site Request Forgery (Delete Income)
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: UFO: Alien Invasion 2.2.1 (OSX) - Remote Code Execution
This is a remote exploit for osx platform. Description: UFO: Alien Invasion 2.2.1 (OSX) - Remote Code Execution. Author: dookie
Analyze the security implications of: UFO: Alien Invasion 2.2.1 (OSX) - Remote Code Execution
This exploit targets osx systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets osx platform
What is this exploit about: Flippa Website Script - SQL Injection
This is a webapps exploit for php platform. Description: Flippa Website Script - SQL Injection. Author: Ihsan Sencan
Analyze the security implications of: Flippa Website Script - SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: OpenEMR 5.0.1.3 - (Authenticated) Arbitrary File Actions
This is a webapps exploit for linux platform. Description: OpenEMR 5.0.1.3 - (Authenticated) Arbitrary File Actions. Author: Joshua Fam
Analyze the security implications of: OpenEMR 5.0.1.3 - (Authenticated) Arbitrary File Actions
This exploit targets linux systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: 2DayBiz Business Community Script - Multiple Vulnerabilities
This is a webapps exploit for php platform. Description: 2DayBiz Business Community Script - Multiple Vulnerabilities. Author: TiGeR-Dz
Analyze the security implications of: 2DayBiz Business Community Script - Multiple Vulnerabilities
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: DotNetNuke 4.9.3 - 'ErrorPage.aspx' Cross-Site Scripting
This is a webapps exploit for asp platform. Description: DotNetNuke 4.9.3 - 'ErrorPage.aspx' Cross-Site Scripting. Author: ben hawkes
Analyze the security implications of: DotNetNuke 4.9.3 - 'ErrorPage.aspx' Cross-Site Scripting
This exploit targets asp systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets asp platform
What is this exploit about: PaperCut NG/MG 22.0.4 - Authentication Bypass
This is a webapps exploit for multiple platform. Description: PaperCut NG/MG 22.0.4 - Authentication Bypass. Author: MaanVader
Analyze the security implications of: PaperCut NG/MG 22.0.4 - Authentication Bypass
This exploit targets multiple systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Joomla! Component module autostand 1.0 - Remote File Inclusion
This is a webapps exploit for php platform. Description: Joomla! Component module autostand 1.0 - Remote File Inclusion. Author: Cold Zero
Analyze the security implications of: Joomla! Component module autostand 1.0 - Remote File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Joomla! Component com_xvs - 'Controller' Local File Inclusion
This is a webapps exploit for php platform. Description: Joomla! Component com_xvs - 'Controller' Local File Inclusion. Author: KedAns-Dz
Analyze the security implications of: Joomla! Component com_xvs - 'Controller' Local File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Bloq 0.5.4 - 'rdf.php?page[path]' Remote File Inclusion
This is a webapps exploit for php platform. Description: Bloq 0.5.4 - 'rdf.php?page[path]' Remote File Inclusion. Author: KorsaN
Analyze the security implications of: Bloq 0.5.4 - 'rdf.php?page[path]' Remote File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: PHP 5.2.5 - Multiple GetText functions Denial of Service Vulnerabilities
This is a dos exploit for php platform. Description: PHP 5.2.5 - Multiple GetText functions Denial of Service Vulnerabilities. Author: laurent gaffie
Analyze the security implications of: PHP 5.2.5 - Multiple GetText functions Denial of Service Vulnerabilities
This exploit targets php systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Zoho ManageEngine ServiceDesk Plus (SDP) < 10.0 build 10012 - Arbitrary File Upload
This is a webapps exploit for jsp platform. Description: Zoho ManageEngine ServiceDesk Plus (SDP) < 10.0 build 10012 - Arbitrary File Upload. Author: Dao Duy Hung
Analyze the security implications of: Zoho ManageEngine ServiceDesk Plus (SDP) < 10.0 build 10012 - Arbitrary File Upload
This exploit targets jsp systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets jsp platform
What is this exploit about: Perl Data::FormValidator 4.66 Module - 'results()' Security Bypass
This is a remote exploit for linux platform. Description: Perl Data::FormValidator 4.66 Module - 'results()' Security Bypass. Author: dst
Analyze the security implications of: Perl Data::FormValidator 4.66 Module - 'results()' Security Bypass
This exploit targets linux systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: SmarterTools SmarterStats 5.3.3819 - 'frmHelp.aspx' Cross-Site Scripting
This is a webapps exploit for asp platform. Description: SmarterTools SmarterStats 5.3.3819 - 'frmHelp.aspx' Cross-Site Scripting. Author: David Hoyt
Analyze the security implications of: SmarterTools SmarterStats 5.3.3819 - 'frmHelp.aspx' Cross-Site Scripting
This exploit targets asp systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets asp platform
What is this exploit about: APSIS Pound 1.5 - Remote Format String
This is a remote exploit for linux platform. Description: APSIS Pound 1.5 - Remote Format String. Author: Nilanjan De
Analyze the security implications of: APSIS Pound 1.5 - Remote Format String
This exploit targets linux systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Linux Kernel - 'The Huge Dirty Cow' Overwriting The Huge Zero Page (1)
This is a dos exploit for linux platform. Description: Linux Kernel - 'The Huge Dirty Cow' Overwriting The Huge Zero Page (1). Author: Bindecy
Analyze the security implications of: Linux Kernel - 'The Huge Dirty Cow' Overwriting The Huge Zero Page (1)
This exploit targets linux systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Dixell XWEB 500 - Arbitrary File Write
This is a remote exploit for hardware platform. Description: Dixell XWEB 500 - Arbitrary File Write. Author: Roberto Palamaro
Analyze the security implications of: Dixell XWEB 500 - Arbitrary File Write
This exploit targets hardware systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Cacti v1.2.8 - Unauthenticated Remote Code Execution (Metasploit)
This is a webapps exploit for php platform. Description: Cacti v1.2.8 - Unauthenticated Remote Code Execution (Metasploit). Author: Lucas Amorim
Analyze the security implications of: Cacti v1.2.8 - Unauthenticated Remote Code Execution (Metasploit)
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Hyperic HQ Enterprise 4.5.1 - Cross-Site Scripting / Multiple Security Vulnerabilities
This is a webapps exploit for jsp platform. Description: Hyperic HQ Enterprise 4.5.1 - Cross-Site Scripting / Multiple Security Vulnerabilities. Author: Benjamin Kunz Mejri
Analyze the security implications of: Hyperic HQ Enterprise 4.5.1 - Cross-Site Scripting / Multiple Security Vulnerabilities
This exploit targets jsp systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets jsp platform
What is this exploit about: Clickcess ChitChat.NET - topic title Cross-Site Scripting
This is a webapps exploit for asp platform. Description: Clickcess ChitChat.NET - topic title Cross-Site Scripting. Author: G00db0y