input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: dotProject 2.0 - '/modules/projects/vw_files.php?dPconfig[root_dir]' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: dotProject 2.0 - '/modules/projects/vw_files.php?dPconfig[root_dir]' Remote File Inclusion. Author: r.verton
|
Analyze the security implications of: dotProject 2.0 - '/modules/projects/vw_files.php?dPconfig[root_dir]' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mambo Module Flatmenu 1.07 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Mambo Module Flatmenu 1.07 - Remote File Inclusion. Author: Cold Zero
|
Analyze the security implications of: Mambo Module Flatmenu 1.07 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Flip 2.01 final - 'previewtheme.php?inc_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Flip 2.01 final - 'previewtheme.php?inc_path' Remote File Inclusion. Author: GoLd_M
|
Analyze the security implications of: Flip 2.01 final - 'previewtheme.php?inc_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ImpressPages CMS 1.0x - 'admin.php' Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: ImpressPages CMS 1.0x - 'admin.php' Multiple SQL Injections. Author: High-Tech Bridge SA
|
Analyze the security implications of: ImpressPages CMS 1.0x - 'admin.php' Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Barbo91 - 'upload.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Barbo91 - 'upload.php' Cross-Site Scripting. Author: indoushka
|
Analyze the security implications of: Barbo91 - 'upload.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CASAP Automated Enrollment System 1.0 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: CASAP Automated Enrollment System 1.0 - Authentication Bypass. Author: Himanshu Shukla
|
Analyze the security implications of: CASAP Automated Enrollment System 1.0 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Gramophone - 'rs' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Gramophone - 'rs' Cross-Site Scripting. Author: G13
|
Analyze the security implications of: Gramophone - 'rs' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AneCMS 1.x - '/modules/blog/index.php' HTML Injection
|
This is a webapps exploit for php platform. Description: AneCMS 1.x - '/modules/blog/index.php' HTML Injection. Author: High-Tech Bridge SA
|
Analyze the security implications of: AneCMS 1.x - '/modules/blog/index.php' HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GNU Make For IBM AIX 4.3.3 - CC Path Local Buffer Overflow
|
This is a local exploit for aix platform. Description: GNU Make For IBM AIX 4.3.3 - CC Path Local Buffer Overflow. Author: watercloud
|
Analyze the security implications of: GNU Make For IBM AIX 4.3.3 - CC Path Local Buffer Overflow
|
This exploit targets aix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: Adult Script 1.6.5 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Adult Script 1.6.5 - Multiple SQL Injections. Author: MhZ91
|
Analyze the security implications of: Adult Script 1.6.5 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BRS Webweaver 1.06 - HTTPd 'User-Agent' Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: BRS Webweaver 1.06 - HTTPd 'User-Agent' Remote Denial of Service. Author: D4rkGr3y
|
Analyze the security implications of: BRS Webweaver 1.06 - HTTPd 'User-Agent' Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Google Chrome 60.0.3080.5 V8 JavaScript Engine - Out-of-Bounds Write
|
This is a remote exploit for linux platform. Description: Google Chrome 60.0.3080.5 V8 JavaScript Engine - Out-of-Bounds Write. Author: halbecaf
|
Analyze the security implications of: Google Chrome 60.0.3080.5 V8 JavaScript Engine - Out-of-Bounds Write
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: BIND 9.4.1 < 9.4.2 - Remote DNS Cache Poisoning (Metasploit)
|
This is a remote exploit for multiple platform. Description: BIND 9.4.1 < 9.4.2 - Remote DNS Cache Poisoning (Metasploit). Author: I)ruid
|
Analyze the security implications of: BIND 9.4.1 < 9.4.2 - Remote DNS Cache Poisoning (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: LocazoList Classifieds 1.0 - 'Viewmsg.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: LocazoList Classifieds 1.0 - 'Viewmsg.asp' SQL Injection. Author: ajann
|
Analyze the security implications of: LocazoList Classifieds 1.0 - 'Viewmsg.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ASP Photo Gallery 1.0 - Multiple SQL Injections
|
This is a webapps exploit for asp platform. Description: ASP Photo Gallery 1.0 - Multiple SQL Injections. Author: trew
|
Analyze the security implications of: ASP Photo Gallery 1.0 - Multiple SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Jedox 2020.2.5 - Remote Code Execution via Configurable Storage Path
|
This is a webapps exploit for php platform. Description: Jedox 2020.2.5 - Remote Code Execution via Configurable Storage Path. Author: Team Syslifters
|
Analyze the security implications of: Jedox 2020.2.5 - Remote Code Execution via Configurable Storage Path
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component AutarTimonial 1.0.8 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component AutarTimonial 1.0.8 - SQL Injection. Author: Sid3^effects
|
Analyze the security implications of: Joomla! Component AutarTimonial 1.0.8 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GetSimpleCMS 3.3.16 - Remote Code Execution (RCE)
|
This is a webapps exploit for php platform. Description: GetSimpleCMS 3.3.16 - Remote Code Execution (RCE). Author: CodeSecLab
|
Analyze the security implications of: GetSimpleCMS 3.3.16 - Remote Code Execution (RCE)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AllMyVisitors 0.4.0 - 'index.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: AllMyVisitors 0.4.0 - 'index.php' Remote File Inclusion. Author: bd0rk
|
Analyze the security implications of: AllMyVisitors 0.4.0 - 'index.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IMWheel 1.0 - Predictable Temporary File Creation
|
This is a local exploit for linux platform. Description: IMWheel 1.0 - Predictable Temporary File Creation. Author: I)ruid
|
Analyze the security implications of: IMWheel 1.0 - Predictable Temporary File Creation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Wowza Streaming Engine 4.5.0 - Remote Privilege Escalation
|
This is a webapps exploit for multiple platform. Description: Wowza Streaming Engine 4.5.0 - Remote Privilege Escalation. Author: LiquidWorm
|
Analyze the security implications of: Wowza Streaming Engine 4.5.0 - Remote Privilege Escalation
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Debian 2.2 /usr/bin/pileup - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Debian 2.2 /usr/bin/pileup - Local Privilege Escalation. Author: Charles Stevenson
|
Analyze the security implications of: Debian 2.2 /usr/bin/pileup - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_mediqna 1.1 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_mediqna 1.1 - Local File Inclusion. Author: kaMtiEz
|
Analyze the security implications of: Joomla! Component com_mediqna 1.1 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Demarc PureSecure 1.0.5 - Authentication Check SQL Injection
|
This is a remote exploit for multiple platform. Description: Demarc PureSecure 1.0.5 - Authentication Check SQL Injection. Author: pokleyzz sakamaniaka
|
Analyze the security implications of: Demarc PureSecure 1.0.5 - Authentication Check SQL Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component Helpdesk Pro < 1.4.0 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Joomla! Component Helpdesk Pro < 1.4.0 - Multiple Vulnerabilities. Author: Simon Rawet
|
Analyze the security implications of: Joomla! Component Helpdesk Pro < 1.4.0 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SAP cFolders - Cross-Site Scripting / HTML Injection
|
This is a remote exploit for multiple platform. Description: SAP cFolders - Cross-Site Scripting / HTML Injection. Author: Digital Security Research Group
|
Analyze the security implications of: SAP cFolders - Cross-Site Scripting / HTML Injection
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Hosting Controller 6.1 - 'resellerresources.asp?jresourceid' SQL Injection
|
This is a webapps exploit for asp platform. Description: Hosting Controller 6.1 - 'resellerresources.asp?jresourceid' SQL Injection. Author: GrayHatz Security Group
|
Analyze the security implications of: Hosting Controller 6.1 - 'resellerresources.asp?jresourceid' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: BSDI 4.0 tcpmux / inetd - Crash
|
This is a dos exploit for aix platform. Description: BSDI 4.0 tcpmux / inetd - Crash. Author: Mark Schaefer
|
Analyze the security implications of: BSDI 4.0 tcpmux / inetd - Crash
|
This exploit targets aix systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: Maian Weblog 2.0 - 'mail.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Maian Weblog 2.0 - 'mail.php' SQL Injection. Author: Aliaksandr Hartsuyeu
|
Analyze the security implications of: Maian Weblog 2.0 - 'mail.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: XenForo 2 - CSS Loader Denial of Service
|
This is a dos exploit for php platform. Description: XenForo 2 - CSS Loader Denial of Service. Author: LockedByte
|
Analyze the security implications of: XenForo 2 - CSS Loader Denial of Service
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Addonics NAS Adapter - 'bts.cgi' (Authenticated) Remote Denial of Service
|
This is a dos exploit for hardware platform. Description: Addonics NAS Adapter - 'bts.cgi' (Authenticated) Remote Denial of Service. Author: h00die
|
Analyze the security implications of: Addonics NAS Adapter - 'bts.cgi' (Authenticated) Remote Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: kora - Reinstall Admin Information
|
This is a webapps exploit for php platform. Description: kora - Reinstall Admin Information. Author: indoushka
|
Analyze the security implications of: kora - Reinstall Admin Information
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_dms 2.5.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_dms 2.5.1 - SQL Injection. Author: kaMtiEz
|
Analyze the security implications of: Joomla! Component com_dms 2.5.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Salim Gasmi GLD (Greylisting Daemon) - Postfix Buffer Overflow (Metasploit)
|
This is a remote exploit for linux platform. Description: Salim Gasmi GLD (Greylisting Daemon) - Postfix Buffer Overflow (Metasploit). Author: Metasploit
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.