input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Sambar Server 5.1 - Script Source Disclosure | This is a remote exploit for cgi platform. Description: Sambar Server 5.1 - Script Source Disclosure. Author: pgrundl |
Analyze the security implications of: Sambar Server 5.1 - Script Source Disclosure | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Cerbere Proxy Server 1.2 - Long Host Header Field Remote Denial of Service | This is a dos exploit for multiple platform. Description: Cerbere Proxy Server 1.2 - Long Host Header Field Remote Denial of Service. Author: GSS IT |
Analyze the security implications of: Cerbere Proxy Server 1.2 - Long Host Header Field Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Appointment 1.1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Appointment 1.1 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Appointment 1.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dispair 0.1/0.2 - Remote Command Execution | This is a webapps exploit for cgi platform. Description: Dispair 0.1/0.2 - Remote Command Execution. Author: anonymous |
Analyze the security implications of: Dispair 0.1/0.2 - Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: FreeBSD 8.0 / OpenBSD 4.x - 'ftpd' Null Pointer Dereference Denial of Service | This is a dos exploit for bsd platform. Description: FreeBSD 8.0 / OpenBSD 4.x - 'ftpd' Null Pointer Dereference Denial of Service. Author: kingcope |
Analyze the security implications of: FreeBSD 8.0 / OpenBSD 4.x - 'ftpd' Null Pointer Dereference Denial of Service | This exploit targets bsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: 6ALBlog - 'newsid' SQL Injection | This is a webapps exploit for php platform. Description: 6ALBlog - 'newsid' SQL Injection. Author: Crackers_Child |
Analyze the security implications of: 6ALBlog - 'newsid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iShopCart - 'vGetPost()' Remote Buffer Overflow (CGI) | This is a remote exploit for cgi platform. Description: iShopCart - 'vGetPost()' Remote Buffer Overflow (CGI). Author: K-sPecial |
Analyze the security implications of: iShopCart - 'vGetPost()' Remote Buffer Overflow (CGI) | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: HP-UX 9.x/10.x/11.x - cu Buffer Overflow | This is a dos exploit for hp-ux platform. Description: HP-UX 9.x/10.x/11.x - cu Buffer Overflow. Author: zorgon |
Analyze the security implications of: HP-UX 9.x/10.x/11.x - cu Buffer Overflow | This exploit targets hp-ux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: Linux Kernel 2.2.x/2.3/2.4.x - 'd_path()' Path Truncation | This is a local exploit for linux platform. Description: Linux Kernel 2.2.x/2.3/2.4.x - 'd_path()' Path Truncation. Author: cliph |
Analyze the security implications of: Linux Kernel 2.2.x/2.3/2.4.x - 'd_path()' Path Truncation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Limbo CMS 1.0.4.2 - 'itemID' Remote Code Execution | This is a webapps exploit for php platform. Description: Limbo CMS 1.0.4.2 - 'itemID' Remote Code Execution. Author: str0ke |
Analyze the security implications of: Limbo CMS 1.0.4.2 - 'itemID' Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ghostscript 8.0.1/8.15 - 'zseticcspace()' Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Ghostscript 8.0.1/8.15 - 'zseticcspace()' Remote Buffer Overflow. Author: Will Drewry |
Analyze the security implications of: Ghostscript 8.0.1/8.15 - 'zseticcspace()' Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Ubuntu 15.04 (Development) - 'Upstart' Logrotation Privilege Escalation | This is a local exploit for linux platform. Description: Ubuntu 15.04 (Development) - 'Upstart' Logrotation Privilege Escalation. Author: halfdog |
Analyze the security implications of: Ubuntu 15.04 (Development) - 'Upstart' Logrotation Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Barracuda SSL VPN - 'fileSystem.do' Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for hardware platform. Description: Barracuda SSL VPN - 'fileSystem.do' Multiple Cross-Site Scripting Vulnerabilities. Author: Benjamin Kunz Mejri |
Analyze the security implications of: Barracuda SSL VPN - 'fileSystem.do' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Apple macOS/iOS Kernel 10.12.3 (16D32) - Bad Locking in necp_open Use-After-Free | This is a dos exploit for multiple platform. Description: Apple macOS/iOS Kernel 10.12.3 (16D32) - Bad Locking in necp_open Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Apple macOS/iOS Kernel 10.12.3 (16D32) - Bad Locking in necp_open Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Benjamin Lefevre Dobermann Forum 0.x - 'entete.php?subpath' Remote File Inclusion | This is a webapps exploit for php platform. Description: Benjamin Lefevre Dobermann Forum 0.x - 'entete.php?subpath' Remote File Inclusion. Author: frog |
Analyze the security implications of: Benjamin Lefevre Dobermann Forum 0.x - 'entete.php?subpath' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JGS-Gallery 4.0 - 'jgs_galerie_slideshow.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: JGS-Gallery 4.0 - 'jgs_galerie_slideshow.php' Multiple Cross-Site Scripting Vulnerabilities. Author: nuker |
Analyze the security implications of: JGS-Gallery 4.0 - 'jgs_galerie_slideshow.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_weblinks - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_weblinks - 'id' SQL Injection. Author: Pouya Daneshmand |
Analyze the security implications of: Joomla! Component com_weblinks - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EQdkp 1.3.0 - 'dbal.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: EQdkp 1.3.0 - 'dbal.php' Remote File Inclusion. Author: OLiBekaS |
Analyze the security implications of: EQdkp 1.3.0 - 'dbal.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DreamPoll 3.1 - SQL Injection | This is a webapps exploit for php platform. Description: DreamPoll 3.1 - SQL Injection. Author: Mark from infosecstuff |
Analyze the security implications of: DreamPoll 3.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ArtiPHP 5.5.0 Neo - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: ArtiPHP 5.5.0 Neo - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Gjoko Krstic |
Analyze the security implications of: ArtiPHP 5.5.0 Neo - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AShop Deluxe 4.5 - 'search.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: AShop Deluxe 4.5 - 'search.php' Cross-Site Scripting. Author: Hackers Center Security |
Analyze the security implications of: AShop Deluxe 4.5 - 'search.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fa-Ads - Authentication Bypass | This is a webapps exploit for php platform. Description: Fa-Ads - Authentication Bypass. Author: indoushka |
Analyze the security implications of: Fa-Ads - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AspTR EXtended - Cross-Site Request Forgery | This is a webapps exploit for asp platform. Description: AspTR EXtended - Cross-Site Request Forgery. Author: FreWaL |
Analyze the security implications of: AspTR EXtended - Cross-Site Request Forgery | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Ifenslave 0.0.7 - Argument Local Buffer Overflow (3) | This is a local exploit for linux platform. Description: Ifenslave 0.0.7 - Argument Local Buffer Overflow (3). Author: Julien L |
Analyze the security implications of: Ifenslave 0.0.7 - Argument Local Buffer Overflow (3) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: A-PDF All to MP3 Converter 2.0.0 - DEP Bypass via HeapCreate + HeapAlloc | This is a local exploit for multiple platform. Description: A-PDF All to MP3 Converter 2.0.0 - DEP Bypass via HeapCreate + HeapAlloc. Author: George Washington |
Analyze the security implications of: A-PDF All to MP3 Converter 2.0.0 - DEP Bypass via HeapCreate + HeapAlloc | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache cocoon 2.14/2.2 - Directory Traversal | This is a remote exploit for multiple platform. Description: Apache cocoon 2.14/2.2 - Directory Traversal. Author: Thierry De Leeuw |
Analyze the security implications of: Apache cocoon 2.14/2.2 - Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation (Access /etc/shadow) | This is a local exploit for linux platform. Description: Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation (Access /etc/shadow). Author: rebel |
Analyze the security implications of: Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Privilege Escalation (Access /etc/shadow) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Sendmail 8.9.x/8.10.x/8.11.x/8.12.x - File Locking Denial of Service (1) | This is a dos exploit for linux platform. Description: Sendmail 8.9.x/8.10.x/8.11.x/8.12.x - File Locking Denial of Service (1). Author: zillion |
Analyze the security implications of: Sendmail 8.9.x/8.10.x/8.11.x/8.12.x - File Locking Denial of Service (1) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Dansie Shopping Cart 3.0.4 - Multiple Vulnerabilities | This is a remote exploit for cgi platform. Description: Dansie Shopping Cart 3.0.4 - Multiple Vulnerabilities. Author: tombow & Randy Janinda |
Analyze the security implications of: Dansie Shopping Cart 3.0.4 - Multiple Vulnerabilities | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Zenoss 3.2.1 - (Authenticated) Remote Command Execution | This is a webapps exploit for multiple platform. Description: Zenoss 3.2.1 - (Authenticated) Remote Command Execution. Author: Brendan Coles |
Analyze the security implications of: Zenoss 3.2.1 - (Authenticated) Remote Command Execution | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Flash Operator Panel 2.31.03 - Command Execution | This is a webapps exploit for php platform. Description: Flash Operator Panel 2.31.03 - Command Execution. Author: Vulnerability-Lab |
Analyze the security implications of: Flash Operator Panel 2.31.03 - Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASP-DEV Internal E-Mail System - Authentication Bypass | This is a webapps exploit for asp platform. Description: ASP-DEV Internal E-Mail System - Authentication Bypass. Author: Pouya_Server |
Analyze the security implications of: ASP-DEV Internal E-Mail System - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Gravity Board X 2.0 Beta - SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Gravity Board X 2.0 Beta - SQL Injection / Cross-Site Scripting. Author: CWH Underground |
Analyze the security implications of: Gravity Board X 2.0 Beta - SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Huawei HG255 - Directory Traversal (Metasploit) | This is a webapps exploit for hardware platform. Description: Huawei HG255 - Directory Traversal (Metasploit). Author: Ismail Tasdelen |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.