input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Cisco Adaptive Security Appliance 8.x - Web VPN FTP or CIFS Authentication Form Phishing
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: JQuery-Real-Person plugin - Bypass Captcha
|
This is a webapps exploit for php platform. Description: JQuery-Real-Person plugin - Bypass Captcha. Author: Alberto_García_Illera
|
Analyze the security implications of: JQuery-Real-Person plugin - Bypass Captcha
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 68KB 1.0.0rc4 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: 68KB 1.0.0rc4 - Remote File Inclusion. Author: eidelweiss
|
Analyze the security implications of: 68KB 1.0.0rc4 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ZCMS 1.1 - Multiple Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: ZCMS 1.1 - Multiple Vulnerabilities. Author: hyp3rlinx
|
Analyze the security implications of: ZCMS 1.1 - Multiple Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: LoveCMS 1.6.2 Final (Simple Forum 3.1d) - Change Admin Password
|
This is a webapps exploit for php platform. Description: LoveCMS 1.6.2 Final (Simple Forum 3.1d) - Change Admin Password. Author: cOndemned
|
Analyze the security implications of: LoveCMS 1.6.2 Final (Simple Forum 3.1d) - Change Admin Password
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Comparison Engine Power 1.0 - 'product.comparision.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Comparison Engine Power 1.0 - 'product.comparision.php' SQL Injection. Author: SirGod
|
Analyze the security implications of: Comparison Engine Power 1.0 - 'product.comparision.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: jevoncms - Local/Remote File Inclusion
|
This is a webapps exploit for php platform. Description: jevoncms - Local/Remote File Inclusion. Author: eidelweiss
|
Analyze the security implications of: jevoncms - Local/Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle JD Edwards EnterpriseOne 8.9x Tools Web Runtime SEC - '/jde/E1Menu.maf?jdeowpBackButtonProtect' Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: Oracle JD Edwards EnterpriseOne 8.9x Tools Web Runtime SEC - '/jde/E1Menu.maf?jdeowpBackButtonProtect' Cross-Site Scripting. Author: Juan Manuel Garcia
|
Analyze the security implications of: Oracle JD Edwards EnterpriseOne 8.9x Tools Web Runtime SEC - '/jde/E1Menu.maf?jdeowpBackButtonProtect' Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_beeheard - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_beeheard - Blind SQL Injection. Author: FL0RiX
|
Analyze the security implications of: Joomla! Component com_beeheard - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DoceboLms 2.0.5 - 'help.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: DoceboLms 2.0.5 - 'help.php' Remote File Inclusion. Author: beford
|
Analyze the security implications of: DoceboLms 2.0.5 - 'help.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: RiSearch 0.99 /RiSearch Pro 3.2.6 - show.pl Arbitrary File Access
|
This is a remote exploit for cgi platform. Description: RiSearch 0.99 /RiSearch Pro 3.2.6 - show.pl Arbitrary File Access. Author: Phil Robinson
|
Analyze the security implications of: RiSearch 0.99 /RiSearch Pro 3.2.6 - show.pl Arbitrary File Access
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: ProFTPD 1.3.7a - Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: ProFTPD 1.3.7a - Remote Denial of Service. Author: xynmaps
|
Analyze the security implications of: ProFTPD 1.3.7a - Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla Solidres 2.13.3 - Reflected XSS
|
This is a webapps exploit for php platform. Description: Joomla Solidres 2.13.3 - Reflected XSS. Author: CraCkEr
|
Analyze the security implications of: Joomla Solidres 2.13.3 - Reflected XSS
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP 'phar' Extension 1.1.1 - Heap Overflow
|
This is a dos exploit for multiple platform. Description: PHP 'phar' Extension 1.1.1 - Heap Overflow. Author: Alexander Gavrun
|
Analyze the security implications of: PHP 'phar' Extension 1.1.1 - Heap Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Jbook - SQL Injection
|
This is a webapps exploit for asp platform. Description: Jbook - SQL Injection. Author: Pouya_Server
|
Analyze the security implications of: Jbook - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Cosmicperl Directory Pro 2.0 - Arbitrary File Disclosure
|
This is a remote exploit for cgi platform. Description: Cosmicperl Directory Pro 2.0 - Arbitrary File Disclosure. Author: Marshal
|
Analyze the security implications of: Cosmicperl Directory Pro 2.0 - Arbitrary File Disclosure
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Help Center Live 2.1.2 - 'module.php' Directory Traversal
|
This is a webapps exploit for php platform. Description: Help Center Live 2.1.2 - 'module.php' Directory Traversal. Author: Dr.GooGle
|
Analyze the security implications of: Help Center Live 2.1.2 - 'module.php' Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Fiyo CMS 2.0.6.1 - Privilege Escalation
|
This is a webapps exploit for php platform. Description: Fiyo CMS 2.0.6.1 - Privilege Escalation. Author: rungga_reksya
|
Analyze the security implications of: Fiyo CMS 2.0.6.1 - Privilege Escalation
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DMXReady Photo Gallery Manager 1.1 - Contents Change
|
This is a webapps exploit for asp platform. Description: DMXReady Photo Gallery Manager 1.1 - Contents Change. Author: ajann
|
Analyze the security implications of: DMXReady Photo Gallery Manager 1.1 - Contents Change
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: QuickEStore 6.1 - Backup Dump
|
This is a webapps exploit for multiple platform. Description: QuickEStore 6.1 - Backup Dump. Author: indoushka
|
Analyze the security implications of: QuickEStore 6.1 - Backup Dump
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: E-Detective Lawful Interception System - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: E-Detective Lawful Interception System - Multiple Vulnerabilities. Author: Mustafa Al-Bassam
|
Analyze the security implications of: E-Detective Lawful Interception System - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LDU 8.x - 'polls.php' SQL Injection
|
This is a webapps exploit for php platform. Description: LDU 8.x - 'polls.php' SQL Injection. Author: ajann
|
Analyze the security implications of: LDU 8.x - 'polls.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! 1.5 < 3.4.6 - Object Injection 'x-forwarded-for' Header Remote Code Execution
|
This is a webapps exploit for php platform. Description: Joomla! 1.5 < 3.4.6 - Object Injection 'x-forwarded-for' Header Remote Code Execution. Author: Andrew McNicol
|
Analyze the security implications of: Joomla! 1.5 < 3.4.6 - Object Injection 'x-forwarded-for' Header Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: cPanel 10 - DNSlook.HTML Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: cPanel 10 - DNSlook.HTML Cross-Site Scripting. Author: Aria-Security Team
|
Analyze the security implications of: cPanel 10 - DNSlook.HTML Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adobe Flash - Overflow when Playing Sound
|
This is a dos exploit for multiple platform. Description: Adobe Flash - Overflow when Playing Sound. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - Overflow when Playing Sound
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Visual Tools DVR VX16 4.2.28.0 - OS Command Injection (Unauthenticated)
|
This is a webapps exploit for multiple platform. Description: Visual Tools DVR VX16 4.2.28.0 - OS Command Injection (Unauthenticated). Author: Andrea D\'Ubaldo
|
Analyze the security implications of: Visual Tools DVR VX16 4.2.28.0 - OS Command Injection (Unauthenticated)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Bitweaver 1.x - '/fisheye/index.php?sort_mode' SQL Injection
|
This is a webapps exploit for php platform. Description: Bitweaver 1.x - '/fisheye/index.php?sort_mode' SQL Injection. Author: laurent gaffie
|
Analyze the security implications of: Bitweaver 1.x - '/fisheye/index.php?sort_mode' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ourspace 2.0.9 - 'uploadmedia.cgi' Arbitrary File Upload
|
This is a webapps exploit for cgi platform. Description: Ourspace 2.0.9 - 'uploadmedia.cgi' Arbitrary File Upload. Author: Don
|
Analyze the security implications of: Ourspace 2.0.9 - 'uploadmedia.cgi' Arbitrary File Upload
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: LibreNMS - Collectd Command Injection (Metasploit)
|
This is a remote exploit for linux platform. Description: LibreNMS - Collectd Command Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: LibreNMS - Collectd Command Injection (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Linux Kernel < 4.5.1 - Off-By-One (PoC)
|
This is a dos exploit for linux platform. Description: Linux Kernel < 4.5.1 - Off-By-One (PoC). Author: Vitaly Nikolenko
|
Analyze the security implications of: Linux Kernel < 4.5.1 - Off-By-One (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: KeystoneJS < 4.0.0-beta.7 - Cross-Site Request Forgery
|
This is a webapps exploit for nodejs platform. Description: KeystoneJS < 4.0.0-beta.7 - Cross-Site Request Forgery. Author: Saurabh Banawar
|
Analyze the security implications of: KeystoneJS < 4.0.0-beta.7 - Cross-Site Request Forgery
|
This exploit targets nodejs systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets nodejs platform
|
What is this exploit about: FlexCMS 2.5 - 'catId' SQL Injection
|
This is a webapps exploit for php platform. Description: FlexCMS 2.5 - 'catId' SQL Injection. Author: MisterRichard
|
Analyze the security implications of: FlexCMS 2.5 - 'catId' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link DIR-100 - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: D-Link DIR-100 - Multiple Vulnerabilities. Author: Felix Richter
|
Analyze the security implications of: D-Link DIR-100 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Seowon Intech WiMAX SWC-9100 Router - '/cgi-bin/reboot.cgi' Remote Reboot (Denial of Service)
|
This is a dos exploit for cgi platform. Description: Seowon Intech WiMAX SWC-9100 Router - '/cgi-bin/reboot.cgi' Remote Reboot (Denial of Service). Author: Josue Rojas
|
Analyze the security implications of: Seowon Intech WiMAX SWC-9100 Router - '/cgi-bin/reboot.cgi' Remote Reboot (Denial of Service)
|
This exploit targets cgi systems. Type: dos. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.