input
stringlengths
39
228
output
stringlengths
32
324
What is this exploit about: Facil-CMS 0.1RC2 - Local/Remote File Inclusion
This is a webapps exploit for php platform. Description: Facil-CMS 0.1RC2 - Local/Remote File Inclusion. Author: eidelweiss
Analyze the security implications of: Facil-CMS 0.1RC2 - Local/Remote File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Oracle Business Process Management 10.3.2 - Cross-Site Scripting
This is a remote exploit for multiple platform. Description: Oracle Business Process Management 10.3.2 - Cross-Site Scripting. Author: Markot
Analyze the security implications of: Oracle Business Process Management 10.3.2 - Cross-Site Scripting
This exploit targets multiple systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: JamMail 1.8 - Jammail.pl Arbitrary Command Execution
This is a webapps exploit for cgi platform. Description: JamMail 1.8 - Jammail.pl Arbitrary Command Execution. Author: blahplok
Analyze the security implications of: JamMail 1.8 - Jammail.pl Arbitrary Command Execution
This exploit targets cgi systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets cgi platform
What is this exploit about: Techno Dreams Articles & Papers 2.0 - SQL Injection
This is a webapps exploit for asp platform. Description: Techno Dreams Articles & Papers 2.0 - SQL Injection. Author: ajann
Analyze the security implications of: Techno Dreams Articles & Papers 2.0 - SQL Injection
This exploit targets asp systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets asp platform
What is this exploit about: TalentSoft Web+ Application Server (Linux) 4.6 - Example Script File Disclosure
This is a remote exploit for linux platform. Description: TalentSoft Web+ Application Server (Linux) 4.6 - Example Script File Disclosure. Author: DCIST
Analyze the security implications of: TalentSoft Web+ Application Server (Linux) 4.6 - Example Script File Disclosure
This exploit targets linux systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Joomla! Component com_lowcosthotels - Blind SQL Injection
This is a webapps exploit for php platform. Description: Joomla! Component com_lowcosthotels - Blind SQL Injection. Author: Hussin X
Analyze the security implications of: Joomla! Component com_lowcosthotels - Blind SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: REDDOXX Appliance Build 2032 / 2.0.625 - Arbitrary File Disclosure
This is a webapps exploit for json platform. Description: REDDOXX Appliance Build 2032 / 2.0.625 - Arbitrary File Disclosure. Author: RedTeam Pentesting
Analyze the security implications of: REDDOXX Appliance Build 2032 / 2.0.625 - Arbitrary File Disclosure
This exploit targets json systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets json platform
What is this exploit about: almond Classifieds ads - Blind SQL Injection / Cross-Site Scripting
This is a webapps exploit for php platform. Description: almond Classifieds ads - Blind SQL Injection / Cross-Site Scripting. Author: Moudi
Analyze the security implications of: almond Classifieds ads - Blind SQL Injection / Cross-Site Scripting
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Bitweaver 2.8.1 - Multiple Cross-Site Scripting Vulnerabilities
This is a webapps exploit for php platform. Description: Bitweaver 2.8.1 - Multiple Cross-Site Scripting Vulnerabilities. Author: Stefan Schurtz
Analyze the security implications of: Bitweaver 2.8.1 - Multiple Cross-Site Scripting Vulnerabilities
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Apache HTTP Server 2.4.50 - Path Traversal & Remote Code Execution (RCE)
This is a webapps exploit for multiple platform. Description: Apache HTTP Server 2.4.50 - Path Traversal & Remote Code Execution (RCE). Author: Lucas Souza
Analyze the security implications of: Apache HTTP Server 2.4.50 - Path Traversal & Remote Code Execution (RCE)
This exploit targets multiple systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Polar Helpdesk 3.0 - Cookie Based Authentication Bypass
This is a webapps exploit for asp platform. Description: Polar Helpdesk 3.0 - Cookie Based Authentication Bypass. Author: Noam Rathaus
Analyze the security implications of: Polar Helpdesk 3.0 - Cookie Based Authentication Bypass
This exploit targets asp systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets asp platform
What is this exploit about: Apple WebKit 10.0.2 - Cross-Origin or Sandboxed IFRAME Pop-up Blocker Bypass
This is a webapps exploit for multiple platform. Description: Apple WebKit 10.0.2 - Cross-Origin or Sandboxed IFRAME Pop-up Blocker Bypass. Author: Google Security Research
Analyze the security implications of: Apple WebKit 10.0.2 - Cross-Origin or Sandboxed IFRAME Pop-up Blocker Bypass
This exploit targets multiple systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Joomla! Component com_bearleague - SQL Injection
This is a webapps exploit for php platform. Description: Joomla! Component com_bearleague - SQL Injection. Author: xDarkSton3x
Analyze the security implications of: Joomla! Component com_bearleague - SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Accellion FTA - getStatus verify_oauth_token Command Execution (Metasploit)
This is a remote exploit for hardware platform. Description: Accellion FTA - getStatus verify_oauth_token Command Execution (Metasploit). Author: Metasploit
Analyze the security implications of: Accellion FTA - getStatus verify_oauth_token Command Execution (Metasploit)
This exploit targets hardware systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Kerio Control 8.3.1 - Blind SQL Injection
This is a webapps exploit for php platform. Description: Kerio Control 8.3.1 - Blind SQL Injection. Author: Khashayar Fereidani
Analyze the security implications of: Kerio Control 8.3.1 - Blind SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Telerik UI for ASP.NET AJAX 2012.3.1308 < 2017.1.118 - Arbitrary File Upload
This is a webapps exploit for aspx platform. Description: Telerik UI for ASP.NET AJAX 2012.3.1308 < 2017.1.118 - Arbitrary File Upload. Author: Paul Taylor
Analyze the security implications of: Telerik UI for ASP.NET AJAX 2012.3.1308 < 2017.1.118 - Arbitrary File Upload
This exploit targets aspx systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets aspx platform
What is this exploit about: Technote 2000/2001 - 'Filename' Command Execution / File Disclosure
This is a remote exploit for cgi platform. Description: Technote 2000/2001 - 'Filename' Command Execution / File Disclosure. Author: Ksecurity
Analyze the security implications of: Technote 2000/2001 - 'Filename' Command Execution / File Disclosure
This exploit targets cgi systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets cgi platform
What is this exploit about: WebKit JSC - 'JSArray::shiftCountWithArrayStorage' Out-of-Bounds Read/Write
This is a dos exploit for multiple platform. Description: WebKit JSC - 'JSArray::shiftCountWithArrayStorage' Out-of-Bounds Read/Write. Author: Google Security Research
Analyze the security implications of: WebKit JSC - 'JSArray::shiftCountWithArrayStorage' Out-of-Bounds Read/Write
This exploit targets multiple systems. Type: dos. Risk level: Medium
What platform does this exploit target?
This exploit targets multiple platform
What is this exploit about: Audio File Library 0.2.6 - libaudiofile 'msadpcm.c .WAV' File Processing Buffer Overflow
This is a remote exploit for linux platform. Description: Audio File Library 0.2.6 - libaudiofile 'msadpcm.c .WAV' File Processing Buffer Overflow. Author: Anton Khirnov
Analyze the security implications of: Audio File Library 0.2.6 - libaudiofile 'msadpcm.c .WAV' File Processing Buffer Overflow
This exploit targets linux systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: Mambo Component SimpleBoard 1.0.1 - Arbitrary File Upload
This is a webapps exploit for php platform. Description: Mambo Component SimpleBoard 1.0.1 - Arbitrary File Upload. Author: t0pP8uZz
Analyze the security implications of: Mambo Component SimpleBoard 1.0.1 - Arbitrary File Upload
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: D-Link DSL-2740R - Remote DNS Change
This is a remote exploit for hardware platform. Description: D-Link DSL-2740R - Remote DNS Change. Author: Todor Donev
Analyze the security implications of: D-Link DSL-2740R - Remote DNS Change
This exploit targets hardware systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Joomla! Component Recly!Competitions 1.0.0 - Multiple Remote File Inclusions
This is a webapps exploit for php platform. Description: Joomla! Component Recly!Competitions 1.0.0 - Multiple Remote File Inclusions. Author: NoGe
Analyze the security implications of: Joomla! Component Recly!Competitions 1.0.0 - Multiple Remote File Inclusions
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Xmame 0.102 - '-pb/-lang/-rec' Local Buffer Overflow
This is a local exploit for linux platform. Description: Xmame 0.102 - '-pb/-lang/-rec' Local Buffer Overflow. Author: sj
Analyze the security implications of: Xmame 0.102 - '-pb/-lang/-rec' Local Buffer Overflow
This exploit targets linux systems. Type: local. Risk level: Medium
What platform does this exploit target?
This exploit targets linux platform
What is this exploit about: ManageEngine Firewall Analyzer 7.2 - 'fw/mindex.do?url' Cross-Site Scripting
This is a webapps exploit for java platform. Description: ManageEngine Firewall Analyzer 7.2 - 'fw/mindex.do?url' Cross-Site Scripting. Author: Vulnerability Research Laboratory
Analyze the security implications of: ManageEngine Firewall Analyzer 7.2 - 'fw/mindex.do?url' Cross-Site Scripting
This exploit targets java systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets java platform
What is this exploit about: Joomla! Component iNetLanka Multiple root 1.0 - Local File Inclusion
This is a webapps exploit for php platform. Description: Joomla! Component iNetLanka Multiple root 1.0 - Local File Inclusion. Author: AntiSecurity
Analyze the security implications of: Joomla! Component iNetLanka Multiple root 1.0 - Local File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Apple Mail.App 10.5.0 (OSX) - Image Attachment Command Execution (Metasploit)
This is a remote exploit for osx platform. Description: Apple Mail.App 10.5.0 (OSX) - Image Attachment Command Execution (Metasploit). Author: H D Moore
Analyze the security implications of: Apple Mail.App 10.5.0 (OSX) - Image Attachment Command Execution (Metasploit)
This exploit targets osx systems. Type: remote. Risk level: High
What platform does this exploit target?
This exploit targets osx platform
What is this exploit about: EZBoard 7.3 - Font Tag HTML Injection
This is a webapps exploit for php platform. Description: EZBoard 7.3 - Font Tag HTML Injection. Author: Cheng Peng Su
Analyze the security implications of: EZBoard 7.3 - Font Tag HTML Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Campsite 2.6.1 - 'LoginAttempts.php?g_documentRoot' Remote File Inclusion
This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'LoginAttempts.php?g_documentRoot' Remote File Inclusion. Author: anonymous
Analyze the security implications of: Campsite 2.6.1 - 'LoginAttempts.php?g_documentRoot' Remote File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: 6KBBS 8.0 build 20101201 - Cross-Site Scripting / Information Disclosure
This is a webapps exploit for php platform. Description: 6KBBS 8.0 build 20101201 - Cross-Site Scripting / Information Disclosure. Author: labs insight
Analyze the security implications of: 6KBBS 8.0 build 20101201 - Cross-Site Scripting / Information Disclosure
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: D-Link IP Cameras - Multiple Vulnerabilities
This is a webapps exploit for hardware platform. Description: D-Link IP Cameras - Multiple Vulnerabilities. Author: Core Security
Analyze the security implications of: D-Link IP Cameras - Multiple Vulnerabilities
This exploit targets hardware systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets hardware platform
What is this exploit about: Electricks eCommerce 1.0 - Cross-Site Request Forgery (Change Admin Password)
This is a webapps exploit for php platform. Description: Electricks eCommerce 1.0 - Cross-Site Request Forgery (Change Admin Password). Author: Nawaf Alkeraithe
Analyze the security implications of: Electricks eCommerce 1.0 - Cross-Site Request Forgery (Change Admin Password)
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Joomla! Component com_cartweberp - Local File Inclusion
This is a webapps exploit for php platform. Description: Joomla! Component com_cartweberp - Local File Inclusion. Author: FL0RiX
Analyze the security implications of: Joomla! Component com_cartweberp - Local File Inclusion
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Itech Multi Vendor Script 6.49 - 'pl' SQL Injection
This is a webapps exploit for php platform. Description: Itech Multi Vendor Script 6.49 - 'pl' SQL Injection. Author: Kaan KAMIS
Analyze the security implications of: Itech Multi Vendor Script 6.49 - 'pl' SQL Injection
This exploit targets php systems. Type: webapps. Risk level: Medium
What platform does this exploit target?
This exploit targets php platform
What is this exploit about: Iatek PortalApp 3.3/4.0 - 'login.asp' Multiple Cross-Site Scripting Vulnerabilities
This is a webapps exploit for asp platform. Description: Iatek PortalApp 3.3/4.0 - 'login.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: High-Tech Bridge SA