input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: CHETCPASSWD 1.12 - Shadow File Disclosure
|
This is a webapps exploit for cgi platform. Description: CHETCPASSWD 1.12 - Shadow File Disclosure. Author: Victor Pereira
|
Analyze the security implications of: CHETCPASSWD 1.12 - Shadow File Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: timelive time and expense tracking 4.1.1 - Multiple Vulnerabilities
|
This is a webapps exploit for asp platform. Description: timelive time and expense tracking 4.1.1 - Multiple Vulnerabilities. Author: Nathaniel Carew
|
Analyze the security implications of: timelive time and expense tracking 4.1.1 - Multiple Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: SolarView Compact 6.00 - 'time_begin' Cross-Site Scripting (XSS)
|
This is a webapps exploit for hardware platform. Description: SolarView Compact 6.00 - 'time_begin' Cross-Site Scripting (XSS). Author: Ahmed Alroky
|
Analyze the security implications of: SolarView Compact 6.00 - 'time_begin' Cross-Site Scripting (XSS)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Allomani Mobile 2.5 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Allomani Mobile 2.5 - Blind SQL Injection. Author: Qabandi
|
Analyze the security implications of: Allomani Mobile 2.5 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: E-theni - Remote File Inclusion Command Execution
|
This is a webapps exploit for php platform. Description: E-theni - Remote File Inclusion Command Execution. Author: frog
|
Analyze the security implications of: E-theni - Remote File Inclusion Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Opera Web browser 7.54 java implementation - Multiple Vulnerabilities (1)
|
This is a dos exploit for linux platform. Description: Opera Web browser 7.54 java implementation - Multiple Vulnerabilities (1). Author: Marc Schoenefeld
|
Analyze the security implications of: Opera Web browser 7.54 java implementation - Multiple Vulnerabilities (1)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Invision Power Board (IP.Board) 2.0.4 - Print Action 't' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) 2.0.4 - Print Action 't' Cross-Site Scripting. Author: Mr.SNAKE
|
Analyze the security implications of: Invision Power Board (IP.Board) 2.0.4 - Print Action 't' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Interactivefx.ie CMS - SQL Injection
|
This is a webapps exploit for php platform. Description: Interactivefx.ie CMS - SQL Injection. Author: Inj3ct0r
|
Analyze the security implications of: Interactivefx.ie CMS - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: H0tturk Panel - 'gizli.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: H0tturk Panel - 'gizli.php' Remote File Inclusion. Author: U238
|
Analyze the security implications of: H0tturk Panel - 'gizli.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Deluxe Blog Factory 1.1.2 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Deluxe Blog Factory 1.1.2 - Local File Inclusion. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component Deluxe Blog Factory 1.1.2 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Enalean Tuleap 7.2 - XML External Entity File Disclosure
|
This is a webapps exploit for php platform. Description: Enalean Tuleap 7.2 - XML External Entity File Disclosure. Author: Portcullis
|
Analyze the security implications of: Enalean Tuleap 7.2 - XML External Entity File Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mulesoft ESB Runtime 3.5.1 - Privilege Escalation
|
This is a webapps exploit for jsp platform. Description: Mulesoft ESB Runtime 3.5.1 - Privilege Escalation. Author: Brandon Perry
|
Analyze the security implications of: Mulesoft ESB Runtime 3.5.1 - Privilege Escalation
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: GeoClassifieds Enterprise 2.0.5.x - 'index.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: GeoClassifieds Enterprise 2.0.5.x - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: EllipSiS Security
|
Analyze the security implications of: GeoClassifieds Enterprise 2.0.5.x - 'index.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: E-Xoopport Samsara 3.1 (Sections Module) - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: E-Xoopport Samsara 3.1 (Sections Module) - Blind SQL Injection. Author: _mRkZ_
|
Analyze the security implications of: E-Xoopport Samsara 3.1 (Sections Module) - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SDL_image 1.2.6 - Invalid '.GIF' File LWZ Minimum Code Size Remote Buffer Overflow
|
This is a dos exploit for linux platform. Description: SDL_image 1.2.6 - Invalid '.GIF' File LWZ Minimum Code Size Remote Buffer Overflow. Author: Gynvael Coldwind
|
Analyze the security implications of: SDL_image 1.2.6 - Invalid '.GIF' File LWZ Minimum Code Size Remote Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: hosting controller 6.1 hot fix 3.3 - Multiple Vulnerabilities
|
This is a webapps exploit for asp platform. Description: hosting controller 6.1 hot fix 3.3 - Multiple Vulnerabilities. Author: BugReport.IR
|
Analyze the security implications of: hosting controller 6.1 hot fix 3.3 - Multiple Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Uptime Agent 5.0.1 - Stack Overflow
|
This is a dos exploit for linux platform. Description: Uptime Agent 5.0.1 - Stack Overflow. Author: Denis Andzakovic
|
Analyze the security implications of: Uptime Agent 5.0.1 - Stack Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Library CMS 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Library CMS 1.0 - SQL Injection. Author: AkkuS
|
Analyze the security implications of: Library CMS 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Elektronischer Leitz-Ordner 10 - SQL Injection
|
This is a webapps exploit for linux platform. Description: Elektronischer Leitz-Ordner 10 - SQL Injection. Author: Jens Regel
|
Analyze the security implications of: Elektronischer Leitz-Ordner 10 - SQL Injection
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Indexu 5.0/5.3 - 'upgrade.php?gateway' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Indexu 5.0/5.3 - 'upgrade.php?gateway' Cross-Site Scripting. Author: SwEET-DeViL
|
Analyze the security implications of: Indexu 5.0/5.3 - 'upgrade.php?gateway' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CubeCart 3.0.x - '/admin/print_order.php?order_id' SQL Injection
|
This is a webapps exploit for php platform. Description: CubeCart 3.0.x - '/admin/print_order.php?order_id' SQL Injection. Author: HACKERS PAL
|
Analyze the security implications of: CubeCart 3.0.x - '/admin/print_order.php?order_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: APC Network Management Card - Cross-Site Request Forgery / Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: APC Network Management Card - Cross-Site Request Forgery / Cross-Site Scripting. Author: Jamal Pecou
|
Analyze the security implications of: APC Network Management Card - Cross-Site Request Forgery / Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Kusaba 1.0.4 - Remote Code Execution (2)
|
This is a webapps exploit for php platform. Description: Kusaba 1.0.4 - Remote Code Execution (2). Author: Sausage
|
Analyze the security implications of: Kusaba 1.0.4 - Remote Code Execution (2)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Beehive Forum 101 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Beehive Forum 101 - Multiple Cross-Site Scripting Vulnerabilities. Author: Stefan Schurtz
|
Analyze the security implications of: Beehive Forum 101 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Snort 2.4.2 - Back Orifice Pre-Preprocessor Remote (4)
|
This is a remote exploit for linux platform. Description: Snort 2.4.2 - Back Orifice Pre-Preprocessor Remote (4). Author: xwings
|
Analyze the security implications of: Snort 2.4.2 - Back Orifice Pre-Preprocessor Remote (4)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Check Point Software Firewall-1 3.0/1 4.0 / Cisco PIX Firewall 4.x/5.x - 'ALG' Client
|
This is a remote exploit for multiple platform. Description: Check Point Software Firewall-1 3.0/1 4.0 / Cisco PIX Firewall 4.x/5.x - 'ALG' Client. Author: Dug Song
|
Analyze the security implications of: Check Point Software Firewall-1 3.0/1 4.0 / Cisco PIX Firewall 4.x/5.x - 'ALG' Client
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: TCP SYN - 'bang.c' Denial of Service
|
This is a dos exploit for bsd platform. Description: TCP SYN - 'bang.c' Denial of Service. Author: Nebunu
|
Analyze the security implications of: TCP SYN - 'bang.c' Denial of Service
|
This exploit targets bsd systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets bsd platform
|
What is this exploit about: Dagger CMS 2008 - 'dir_inc' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Dagger CMS 2008 - 'dir_inc' Remote File Inclusion. Author: CraCkEr
|
Analyze the security implications of: Dagger CMS 2008 - 'dir_inc' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Auto Dealer - SQL Injection
|
This is a webapps exploit for php platform. Description: Auto Dealer - SQL Injection. Author: Easy Laster
|
Analyze the security implications of: Auto Dealer - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BloofoxCMS 0.3 - Multiple Input Validation Vulnerabilities
|
This is a webapps exploit for php platform. Description: BloofoxCMS 0.3 - Multiple Input Validation Vulnerabilities. Author: AmnPardaz
|
Analyze the security implications of: BloofoxCMS 0.3 - Multiple Input Validation Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FaScript FaMp3 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: FaScript FaMp3 1.0 - SQL Injection. Author: Khashayar Fereidani
|
Analyze the security implications of: FaScript FaMp3 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ProFTPd 1.3.5 - File Copy
|
This is a remote exploit for linux platform. Description: ProFTPd 1.3.5 - File Copy. Author: anonymous
|
Analyze the security implications of: ProFTPd 1.3.5 - File Copy
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 - Authentication Bypass. Author: LiquidWorm
|
Analyze the security implications of: Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: APC ActionApps CMS 2.8.1 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: APC ActionApps CMS 2.8.1 - Remote File Inclusion. Author: Kacper
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.