input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Dog Pedigree Online Database 1.0.1b - Insecure Cookie Handling
|
This is a webapps exploit for php platform. Description: Dog Pedigree Online Database 1.0.1b - Insecure Cookie Handling. Author: YEnH4ckEr
|
Analyze the security implications of: Dog Pedigree Online Database 1.0.1b - Insecure Cookie Handling
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM Tivoli Storage Manager (TSM) - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: IBM Tivoli Storage Manager (TSM) - Local Privilege Escalation. Author: Kryptos Logic
|
Analyze the security implications of: IBM Tivoli Storage Manager (TSM) - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apple Mac OSX EvoCam Web Server (Snow Leopard) - ROP Remote Overflow
|
This is a remote exploit for osx platform. Description: Apple Mac OSX EvoCam Web Server (Snow Leopard) - ROP Remote Overflow. Author: d1dn0t
|
Analyze the security implications of: Apple Mac OSX EvoCam Web Server (Snow Leopard) - ROP Remote Overflow
|
This exploit targets osx systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Gazelle CMS 1.0 - Multiple Vulnerabilities / Remote Code Execution
|
This is a webapps exploit for php platform. Description: Gazelle CMS 1.0 - Multiple Vulnerabilities / Remote Code Execution. Author: IHTeam
|
Analyze the security implications of: Gazelle CMS 1.0 - Multiple Vulnerabilities / Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dacio's Image Gallery 1.6 - Multiple Remote Vulnerabilities
|
This is a webapps exploit for php platform. Description: Dacio's Image Gallery 1.6 - Multiple Remote Vulnerabilities. Author: ahmadbady
|
Analyze the security implications of: Dacio's Image Gallery 1.6 - Multiple Remote Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DMXReady BillboardManager 1.1 - Contents Change
|
This is a webapps exploit for asp platform. Description: DMXReady BillboardManager 1.1 - Contents Change. Author: x0r
|
Analyze the security implications of: DMXReady BillboardManager 1.1 - Contents Change
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component JInventory 1.23.02 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component JInventory 1.23.02 - Local File Inclusion. Author: Chip d3 bi0s
|
Analyze the security implications of: Joomla! Component JInventory 1.23.02 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AutoDealer 2.0 - 'detail.asp?iPro' SQL Injection
|
This is a webapps exploit for asp platform. Description: AutoDealer 2.0 - 'detail.asp?iPro' SQL Injection. Author: ajann
|
Analyze the security implications of: AutoDealer 2.0 - 'detail.asp?iPro' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: OpenBSD 3.3 - 'Semget()' Integer Overflow (1)
|
This is a local exploit for openbsd platform. Description: OpenBSD 3.3 - 'Semget()' Integer Overflow (1). Author: blexim
|
Analyze the security implications of: OpenBSD 3.3 - 'Semget()' Integer Overflow (1)
|
This exploit targets openbsd systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets openbsd platform
|
What is this exploit about: MTS MBlaze Ultra Wi-Fi / ZTE AC3633 - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: MTS MBlaze Ultra Wi-Fi / ZTE AC3633 - Multiple Vulnerabilities. Author: Ajin Abraham
|
Analyze the security implications of: MTS MBlaze Ultra Wi-Fi / ZTE AC3633 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Caldera kdenetwork 1.1.1-1 / Caldera OpenLinux 1.3/2.2 / KDE KDE 1.1/1.1. / RedHat Linux 6.0 - K-Mail File Creation
|
This is a local exploit for linux platform. Description: Caldera kdenetwork 1.1.1-1 / Caldera OpenLinux 1.3/2.2 / KDE KDE 1.1/1.1. / RedHat Linux 6.0 - K-Mail File Creation. Author: Brian Mitchell
|
Analyze the security implications of: Caldera kdenetwork 1.1.1-1 / Caldera OpenLinux 1.3/2.2 / KDE KDE 1.1/1.1. / RedHat Linux 6.0 - K-Mail File Creation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component beamospetition - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component beamospetition - SQL Injection. Author: His0k4
|
Analyze the security implications of: Joomla! Component beamospetition - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - 'CONFIG_X86_X32' Arbitrary Write (2)
|
This is a local exploit for linux platform. Description: Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - 'CONFIG_X86_X32' Arbitrary Write (2). Author: saelo
|
Analyze the security implications of: Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - 'CONFIG_X86_X32' Arbitrary Write (2)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AJ HYIP PRIME - 'welcome.php?id' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: AJ HYIP PRIME - 'welcome.php?id' Blind SQL Injection. Author: JosS
|
Analyze the security implications of: AJ HYIP PRIME - 'welcome.php?id' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GNU Screen 4.5.0 - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: GNU Screen 4.5.0 - Local Privilege Escalation. Author: Xiphos Research Ltd
|
Analyze the security implications of: GNU Screen 4.5.0 - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: M-TECH P-Synch 6.2.5 - 'nph-psf.exe?css' Remote File Inclusion
|
This is a webapps exploit for cgi platform. Description: M-TECH P-Synch 6.2.5 - 'nph-psf.exe?css' Remote File Inclusion. Author: JeiAr
|
Analyze the security implications of: M-TECH P-Synch 6.2.5 - 'nph-psf.exe?css' Remote File Inclusion
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Call of Duty Server 4.1.x - Callvote Map Command Remote Buffer Overflow
|
This is a dos exploit for multiple platform. Description: Call of Duty Server 4.1.x - Callvote Map Command Remote Buffer Overflow. Author: Luigi Auriemma
|
Analyze the security implications of: Call of Duty Server 4.1.x - Callvote Map Command Remote Buffer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Koha 3.20.1 - Directory Traversal
|
This is a webapps exploit for php platform. Description: Koha 3.20.1 - Directory Traversal. Author: Raschin Tavakoli_ Bernhard Garn_ Peter Aufner & Dimitris Simos
|
Analyze the security implications of: Koha 3.20.1 - Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CPaint 1.3 - xmlhttp Request Input Validation
|
This is a webapps exploit for asp platform. Description: CPaint 1.3 - xmlhttp Request Input Validation. Author: Thor Larholm
|
Analyze the security implications of: CPaint 1.3 - xmlhttp Request Input Validation
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: CLONEBID B2B Marketplace - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: CLONEBID B2B Marketplace - Multiple Vulnerabilities. Author: Hamza 'MizoZ' N.
|
Analyze the security implications of: CLONEBID B2B Marketplace - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Postfix 1.1.x - Denial of Service (1)
|
This is a dos exploit for linux platform. Description: Postfix 1.1.x - Denial of Service (1). Author: r3b00t
|
Analyze the security implications of: Postfix 1.1.x - Denial of Service (1)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Sawmill 6.2.x - Admin Password Insecure Default Permissions
|
This is a local exploit for multiple platform. Description: Sawmill 6.2.x - Admin Password Insecure Default Permissions. Author: darky0da
|
Analyze the security implications of: Sawmill 6.2.x - Admin Password Insecure Default Permissions
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: FlatNuke 2.5.7 - 'index.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: FlatNuke 2.5.7 - 'index.php' Remote File Inclusion. Author: rgod
|
Analyze the security implications of: FlatNuke 2.5.7 - 'index.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux - Missing Locking Between ELF coredump code and userfaultfd VMA Modification
|
This is a dos exploit for linux platform. Description: Linux - Missing Locking Between ELF coredump code and userfaultfd VMA Modification. Author: Google Security Research
|
Analyze the security implications of: Linux - Missing Locking Between ELF coredump code and userfaultfd VMA Modification
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: OpenSSL 0.9.8k/1.0.0-beta2 - DTLS Remote Memory Exhaustion Denial of Service
|
This is a dos exploit for multiple platform. Description: OpenSSL 0.9.8k/1.0.0-beta2 - DTLS Remote Memory Exhaustion Denial of Service. Author: Jon Oberheide
|
Analyze the security implications of: OpenSSL 0.9.8k/1.0.0-beta2 - DTLS Remote Memory Exhaustion Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Buffalo TeraStation Network Attached Storage (NAS) 1.66 - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Buffalo TeraStation Network Attached Storage (NAS) 1.66 - Authentication Bypass. Author: Jordan Glover
|
Analyze the security implications of: Buffalo TeraStation Network Attached Storage (NAS) 1.66 - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Zen Cart < 1.3.8a - SQL Injection
|
This is a webapps exploit for linux platform. Description: Zen Cart < 1.3.8a - SQL Injection. Author: GulfTech Security
|
Analyze the security implications of: Zen Cart < 1.3.8a - SQL Injection
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: TaxiMonger for Android - 'name' HTML Injection
|
This is a remote exploit for android platform. Description: TaxiMonger for Android - 'name' HTML Injection. Author: Ismail Kaleem
|
Analyze the security implications of: TaxiMonger for Android - 'name' HTML Injection
|
This exploit targets android systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: OpenSMTPD 6.6.3 - Arbitrary File Read
|
This is a remote exploit for linux platform. Description: OpenSMTPD 6.6.3 - Arbitrary File Read. Author: Qualys Corporation
|
Analyze the security implications of: OpenSMTPD 6.6.3 - Arbitrary File Read
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: alitalk 1.9.1.1 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: alitalk 1.9.1.1 - Multiple Vulnerabilities. Author: tomplixsee
|
Analyze the security implications of: alitalk 1.9.1.1 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco EPC 3925 - Multiple Vulnerabilities
|
This is a webapps exploit for asp platform. Description: Cisco EPC 3925 - Multiple Vulnerabilities. Author: Patryk Bogdan
|
Analyze the security implications of: Cisco EPC 3925 - Multiple Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: NewMark CMS 2.1 - 'sec_id' SQL Injection
|
This is a webapps exploit for linux platform. Description: NewMark CMS 2.1 - 'sec_id' SQL Injection. Author: Berk Dusunur
|
Analyze the security implications of: NewMark CMS 2.1 - 'sec_id' SQL Injection
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Fire Soft Board RC 3 - 'racine' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Fire Soft Board RC 3 - 'racine' Remote File Inclusion. Author: ddoshomo
|
Analyze the security implications of: Fire Soft Board RC 3 - 'racine' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link DIR-615 Rev D3 / DIR-300 Rev A - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: D-Link DIR-615 Rev D3 / DIR-300 Rev A - Multiple Vulnerabilities. Author: m-1-k-3
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.