input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_output_query.inc.php?base_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_output_query.inc.php?base_path' Remote File Inclusion. Author: indoushka
|
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_output_query.inc.php?base_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Horde Multiple Product - 'workweek.php?Timestamp' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Horde Multiple Product - 'workweek.php?Timestamp' Cross-Site Scripting. Author: Ivan Sanchez
|
Analyze the security implications of: Horde Multiple Product - 'workweek.php?Timestamp' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Entrepreneur Dating Script 2.0.1 - 'marital' / 'gender' / 'country' / 'profileid' SQL Injection
|
This is a webapps exploit for php platform. Description: Entrepreneur Dating Script 2.0.1 - 'marital' / 'gender' / 'country' / 'profileid' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Entrepreneur Dating Script 2.0.1 - 'marital' / 'gender' / 'country' / 'profileid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: m0n0wall 1.33 - Multiple Cross-Site Request Forgery Vulnerabilities
|
This is a webapps exploit for freebsd platform. Description: m0n0wall 1.33 - Multiple Cross-Site Request Forgery Vulnerabilities. Author: Yann CAM
|
Analyze the security implications of: m0n0wall 1.33 - Multiple Cross-Site Request Forgery Vulnerabilities
|
This exploit targets freebsd systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: Linux - Use-After-Free via race Between modify_ldt() and #BR Exception
|
This is a dos exploit for linux platform. Description: Linux - Use-After-Free via race Between modify_ldt() and #BR Exception. Author: Google Security Research
|
Analyze the security implications of: Linux - Use-After-Free via race Between modify_ldt() and #BR Exception
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Audins Audiens 3.3 - 'setup.php?PATH_INFO' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Audins Audiens 3.3 - 'setup.php?PATH_INFO' Cross-Site Scripting. Author: r00t
|
Analyze the security implications of: Audins Audiens 3.3 - 'setup.php?PATH_INFO' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OpenX - Backdoor PHP Code Execution (Metasploit)
|
This is a remote exploit for php platform. Description: OpenX - Backdoor PHP Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: OpenX - Backdoor PHP Code Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Personify360 7.5.2/7.6.1 - Improper Database Schema Access Restrictions
|
This is a webapps exploit for aspx platform. Description: Personify360 7.5.2/7.6.1 - Improper Database Schema Access Restrictions. Author: Pesach Zirkind
|
Analyze the security implications of: Personify360 7.5.2/7.6.1 - Improper Database Schema Access Restrictions
|
This exploit targets aspx systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aspx platform
|
What is this exploit about: Jeebles Technology Jeebles Directory 2.9.60 - 'download.php' Local File Inclusion
|
This is a webapps exploit for php platform. Description: Jeebles Technology Jeebles Directory 2.9.60 - 'download.php' Local File Inclusion. Author: hack2prison
|
Analyze the security implications of: Jeebles Technology Jeebles Directory 2.9.60 - 'download.php' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Kubernetes - (Unauthenticated) Arbitrary Requests
|
This is a remote exploit for multiple platform. Description: Kubernetes - (Unauthenticated) Arbitrary Requests. Author: evict
|
Analyze the security implications of: Kubernetes - (Unauthenticated) Arbitrary Requests
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component JE QuoteForm - 'Itemid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JE QuoteForm - 'Itemid' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component JE QuoteForm - 'Itemid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adobe Flash - Color.setTransform Use-After-Free
|
This is a dos exploit for multiple platform. Description: Adobe Flash - Color.setTransform Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - Color.setTransform Use-After-Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Nokia N95-8 browser - 'setAttributeNode' Method Crash
|
This is a dos exploit for hardware platform. Description: Nokia N95-8 browser - 'setAttributeNode' Method Crash. Author: Juan Yacubian
|
Analyze the security implications of: Nokia N95-8 browser - 'setAttributeNode' Method Crash
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Sony Playstation 4 (PS4) 4.05 - 'Jailbreak' WebKit / 'NamedObj ' Kernel Loader
|
This is a local exploit for hardware platform. Description: Sony Playstation 4 (PS4) 4.05 - 'Jailbreak' WebKit / 'NamedObj ' Kernel Loader. Author: Specter
|
Analyze the security implications of: Sony Playstation 4 (PS4) 4.05 - 'Jailbreak' WebKit / 'NamedObj ' Kernel Loader
|
This exploit targets hardware systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: C2C Forward Auction Creator - '/auction/casp/Admin.asp' SQL Injection (Admin Authentication Bypass)
|
This is a webapps exploit for php platform. Description: C2C Forward Auction Creator - '/auction/casp/Admin.asp' SQL Injection (Admin Authentication Bypass). Author: R3d-D3V!L
|
Analyze the security implications of: C2C Forward Auction Creator - '/auction/casp/Admin.asp' SQL Injection (Admin Authentication Bypass)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Links Management Application 1.0 - 'lcnt' SQL Injection
|
This is a webapps exploit for php platform. Description: Links Management Application 1.0 - 'lcnt' SQL Injection. Author: ajann
|
Analyze the security implications of: Links Management Application 1.0 - 'lcnt' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_gameserver 1.0 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_gameserver 1.0 - 'id' SQL Injection. Author: v3n0m
|
Analyze the security implications of: Joomla! Component com_gameserver 1.0 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component JS Jobs 1.0.5.8 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JS Jobs 1.0.5.8 - SQL Injection. Author: d0lc3
|
Analyze the security implications of: Joomla! Component JS Jobs 1.0.5.8 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple iOS Mobile Mail - LibTIFF Buffer Overflow (Metasploit)
|
This is a remote exploit for ios platform. Description: Apple iOS Mobile Mail - LibTIFF Buffer Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: Apple iOS Mobile Mail - LibTIFF Buffer Overflow (Metasploit)
|
This exploit targets ios systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: DSocks 1.3 - 'Name' Buffer Overflow (PoC)
|
This is a dos exploit for multiple platform. Description: DSocks 1.3 - 'Name' Buffer Overflow (PoC). Author: Michael Adams
|
Analyze the security implications of: DSocks 1.3 - 'Name' Buffer Overflow (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Java Mini Web Server 1.0 - Directory Traversal / Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: Java Mini Web Server 1.0 - Directory Traversal / Cross-Site Scripting. Author: cp77fk4r
|
Analyze the security implications of: Java Mini Web Server 1.0 - Directory Traversal / Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Groomify v1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Groomify v1.0 - SQL Injection. Author: Ahmet Ümit BAYRAM
|
Analyze the security implications of: Groomify v1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Konqueror 3.5.9 - 'color'/'bgcolor' Multiple Remote Crash Vulnerabilities
|
This is a dos exploit for linux platform. Description: Konqueror 3.5.9 - 'color'/'bgcolor' Multiple Remote Crash Vulnerabilities. Author: Jeremy Brown
|
Analyze the security implications of: Konqueror 3.5.9 - 'color'/'bgcolor' Multiple Remote Crash Vulnerabilities
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Budget and Expense Tracker System 1.0 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Budget and Expense Tracker System 1.0 - Arbitrary File Upload. Author: ()t/\\/\\1
|
Analyze the security implications of: Budget and Expense Tracker System 1.0 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MySQL (Linux) - Stack Buffer Overrun (PoC)
|
This is a dos exploit for linux platform. Description: MySQL (Linux) - Stack Buffer Overrun (PoC). Author: kingcope
|
Analyze the security implications of: MySQL (Linux) - Stack Buffer Overrun (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AWS Xms 2.5 - 'importer.php?what' Directory Traversal
|
This is a webapps exploit for php platform. Description: AWS Xms 2.5 - 'importer.php?what' Directory Traversal. Author: High-Tech Bridge SA
|
Analyze the security implications of: AWS Xms 2.5 - 'importer.php?what' Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ImpressCMS v1.4.4 - Unrestricted File Upload
|
This is a webapps exploit for php platform. Description: ImpressCMS v1.4.4 - Unrestricted File Upload. Author: Ünsal Furkan Harani
|
Analyze the security implications of: ImpressCMS v1.4.4 - Unrestricted File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dell SonicWALL Scrutinizer - Multiple HTML Injection Vulnerabilities
|
This is a remote exploit for multiple platform. Description: Dell SonicWALL Scrutinizer - Multiple HTML Injection Vulnerabilities. Author: Benjamin Kunz Mejri
|
Analyze the security implications of: Dell SonicWALL Scrutinizer - Multiple HTML Injection Vulnerabilities
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Oracle 10g Release 2 - 'DBMS_EXPORT_EXTENSION' SQL
|
This is a local exploit for multiple platform. Description: Oracle 10g Release 2 - 'DBMS_EXPORT_EXTENSION' SQL. Author: N1V1Hd
|
Analyze the security implications of: Oracle 10g Release 2 - 'DBMS_EXPORT_EXTENSION' SQL
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: LiteRadius 3.2 - Multiple Blind SQL Injections
|
This is a webapps exploit for php platform. Description: LiteRadius 3.2 - Multiple Blind SQL Injections. Author: Robert Cooper
|
Analyze the security implications of: LiteRadius 3.2 - Multiple Blind SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eGroupWare 1.8.001.20110421 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: eGroupWare 1.8.001.20110421 - Multiple Vulnerabilities. Author: AutoSec Tools
|
Analyze the security implications of: eGroupWare 1.8.001.20110421 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alstrasoft Affiliate Network Pro 8.0 - 'temp.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Alstrasoft Affiliate Network Pro 8.0 - 'temp.php' Cross-Site Scripting. Author: Lostmon
|
Analyze the security implications of: Alstrasoft Affiliate Network Pro 8.0 - 'temp.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HP-UX LPD 10.20/11.00/11.11 - Command Execution (Metasploit)
|
This is a remote exploit for hp-ux platform. Description: HP-UX LPD 10.20/11.00/11.11 - Command Execution (Metasploit). Author: H D Moore
|
Analyze the security implications of: HP-UX LPD 10.20/11.00/11.11 - Command Execution (Metasploit)
|
This exploit targets hp-ux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hp-ux platform
|
What is this exploit about: Netscape Navigator 7.1 - Embedded Image URI Obfuscation
|
This is a remote exploit for multiple platform. Description: Netscape Navigator 7.1 - Embedded Image URI Obfuscation. Author: Lyndon Durham
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.