input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Facil-CMS 0.1RC2 - Local/Remote File Inclusion | This is a webapps exploit for php platform. Description: Facil-CMS 0.1RC2 - Local/Remote File Inclusion. Author: eidelweiss |
Analyze the security implications of: Facil-CMS 0.1RC2 - Local/Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle Business Process Management 10.3.2 - Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Oracle Business Process Management 10.3.2 - Cross-Site Scripting. Author: Markot |
Analyze the security implications of: Oracle Business Process Management 10.3.2 - Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: JamMail 1.8 - Jammail.pl Arbitrary Command Execution | This is a webapps exploit for cgi platform. Description: JamMail 1.8 - Jammail.pl Arbitrary Command Execution. Author: blahplok |
Analyze the security implications of: JamMail 1.8 - Jammail.pl Arbitrary Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Techno Dreams Articles & Papers 2.0 - SQL Injection | This is a webapps exploit for asp platform. Description: Techno Dreams Articles & Papers 2.0 - SQL Injection. Author: ajann |
Analyze the security implications of: Techno Dreams Articles & Papers 2.0 - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: TalentSoft Web+ Application Server (Linux) 4.6 - Example Script File Disclosure | This is a remote exploit for linux platform. Description: TalentSoft Web+ Application Server (Linux) 4.6 - Example Script File Disclosure. Author: DCIST |
Analyze the security implications of: TalentSoft Web+ Application Server (Linux) 4.6 - Example Script File Disclosure | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_lowcosthotels - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_lowcosthotels - Blind SQL Injection. Author: Hussin X |
Analyze the security implications of: Joomla! Component com_lowcosthotels - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: REDDOXX Appliance Build 2032 / 2.0.625 - Arbitrary File Disclosure | This is a webapps exploit for json platform. Description: REDDOXX Appliance Build 2032 / 2.0.625 - Arbitrary File Disclosure. Author: RedTeam Pentesting |
Analyze the security implications of: REDDOXX Appliance Build 2032 / 2.0.625 - Arbitrary File Disclosure | This exploit targets json systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets json platform |
What is this exploit about: almond Classifieds ads - Blind SQL Injection / Cross-Site Scripting | This is a webapps exploit for php platform. Description: almond Classifieds ads - Blind SQL Injection / Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: almond Classifieds ads - Blind SQL Injection / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bitweaver 2.8.1 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Bitweaver 2.8.1 - Multiple Cross-Site Scripting Vulnerabilities. Author: Stefan Schurtz |
Analyze the security implications of: Bitweaver 2.8.1 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache HTTP Server 2.4.50 - Path Traversal & Remote Code Execution (RCE) | This is a webapps exploit for multiple platform. Description: Apache HTTP Server 2.4.50 - Path Traversal & Remote Code Execution (RCE). Author: Lucas Souza |
Analyze the security implications of: Apache HTTP Server 2.4.50 - Path Traversal & Remote Code Execution (RCE) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Polar Helpdesk 3.0 - Cookie Based Authentication Bypass | This is a webapps exploit for asp platform. Description: Polar Helpdesk 3.0 - Cookie Based Authentication Bypass. Author: Noam Rathaus |
Analyze the security implications of: Polar Helpdesk 3.0 - Cookie Based Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apple WebKit 10.0.2 - Cross-Origin or Sandboxed IFRAME Pop-up Blocker Bypass | This is a webapps exploit for multiple platform. Description: Apple WebKit 10.0.2 - Cross-Origin or Sandboxed IFRAME Pop-up Blocker Bypass. Author: Google Security Research |
Analyze the security implications of: Apple WebKit 10.0.2 - Cross-Origin or Sandboxed IFRAME Pop-up Blocker Bypass | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_bearleague - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_bearleague - SQL Injection. Author: xDarkSton3x |
Analyze the security implications of: Joomla! Component com_bearleague - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Accellion FTA - getStatus verify_oauth_token Command Execution (Metasploit) | This is a remote exploit for hardware platform. Description: Accellion FTA - getStatus verify_oauth_token Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Accellion FTA - getStatus verify_oauth_token Command Execution (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Kerio Control 8.3.1 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Kerio Control 8.3.1 - Blind SQL Injection. Author: Khashayar Fereidani |
Analyze the security implications of: Kerio Control 8.3.1 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Telerik UI for ASP.NET AJAX 2012.3.1308 < 2017.1.118 - Arbitrary File Upload | This is a webapps exploit for aspx platform. Description: Telerik UI for ASP.NET AJAX 2012.3.1308 < 2017.1.118 - Arbitrary File Upload. Author: Paul Taylor |
Analyze the security implications of: Telerik UI for ASP.NET AJAX 2012.3.1308 < 2017.1.118 - Arbitrary File Upload | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Technote 2000/2001 - 'Filename' Command Execution / File Disclosure | This is a remote exploit for cgi platform. Description: Technote 2000/2001 - 'Filename' Command Execution / File Disclosure. Author: Ksecurity |
Analyze the security implications of: Technote 2000/2001 - 'Filename' Command Execution / File Disclosure | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: WebKit JSC - 'JSArray::shiftCountWithArrayStorage' Out-of-Bounds Read/Write | This is a dos exploit for multiple platform. Description: WebKit JSC - 'JSArray::shiftCountWithArrayStorage' Out-of-Bounds Read/Write. Author: Google Security Research |
Analyze the security implications of: WebKit JSC - 'JSArray::shiftCountWithArrayStorage' Out-of-Bounds Read/Write | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Audio File Library 0.2.6 - libaudiofile 'msadpcm.c .WAV' File Processing Buffer Overflow | This is a remote exploit for linux platform. Description: Audio File Library 0.2.6 - libaudiofile 'msadpcm.c .WAV' File Processing Buffer Overflow. Author: Anton Khirnov |
Analyze the security implications of: Audio File Library 0.2.6 - libaudiofile 'msadpcm.c .WAV' File Processing Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mambo Component SimpleBoard 1.0.1 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Mambo Component SimpleBoard 1.0.1 - Arbitrary File Upload. Author: t0pP8uZz |
Analyze the security implications of: Mambo Component SimpleBoard 1.0.1 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DSL-2740R - Remote DNS Change | This is a remote exploit for hardware platform. Description: D-Link DSL-2740R - Remote DNS Change. Author: Todor Donev |
Analyze the security implications of: D-Link DSL-2740R - Remote DNS Change | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component Recly!Competitions 1.0.0 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Joomla! Component Recly!Competitions 1.0.0 - Multiple Remote File Inclusions. Author: NoGe |
Analyze the security implications of: Joomla! Component Recly!Competitions 1.0.0 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Xmame 0.102 - '-pb/-lang/-rec' Local Buffer Overflow | This is a local exploit for linux platform. Description: Xmame 0.102 - '-pb/-lang/-rec' Local Buffer Overflow. Author: sj |
Analyze the security implications of: Xmame 0.102 - '-pb/-lang/-rec' Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ManageEngine Firewall Analyzer 7.2 - 'fw/mindex.do?url' Cross-Site Scripting | This is a webapps exploit for java platform. Description: ManageEngine Firewall Analyzer 7.2 - 'fw/mindex.do?url' Cross-Site Scripting. Author: Vulnerability Research Laboratory |
Analyze the security implications of: ManageEngine Firewall Analyzer 7.2 - 'fw/mindex.do?url' Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Joomla! Component iNetLanka Multiple root 1.0 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component iNetLanka Multiple root 1.0 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component iNetLanka Multiple root 1.0 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mail.App 10.5.0 (OSX) - Image Attachment Command Execution (Metasploit) | This is a remote exploit for osx platform. Description: Apple Mail.App 10.5.0 (OSX) - Image Attachment Command Execution (Metasploit). Author: H D Moore |
Analyze the security implications of: Apple Mail.App 10.5.0 (OSX) - Image Attachment Command Execution (Metasploit) | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: EZBoard 7.3 - Font Tag HTML Injection | This is a webapps exploit for php platform. Description: EZBoard 7.3 - Font Tag HTML Injection. Author: Cheng Peng Su |
Analyze the security implications of: EZBoard 7.3 - Font Tag HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Campsite 2.6.1 - 'LoginAttempts.php?g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'LoginAttempts.php?g_documentRoot' Remote File Inclusion. Author: anonymous |
Analyze the security implications of: Campsite 2.6.1 - 'LoginAttempts.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 6KBBS 8.0 build 20101201 - Cross-Site Scripting / Information Disclosure | This is a webapps exploit for php platform. Description: 6KBBS 8.0 build 20101201 - Cross-Site Scripting / Information Disclosure. Author: labs insight |
Analyze the security implications of: 6KBBS 8.0 build 20101201 - Cross-Site Scripting / Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link IP Cameras - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: D-Link IP Cameras - Multiple Vulnerabilities. Author: Core Security |
Analyze the security implications of: D-Link IP Cameras - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Electricks eCommerce 1.0 - Cross-Site Request Forgery (Change Admin Password) | This is a webapps exploit for php platform. Description: Electricks eCommerce 1.0 - Cross-Site Request Forgery (Change Admin Password). Author: Nawaf Alkeraithe |
Analyze the security implications of: Electricks eCommerce 1.0 - Cross-Site Request Forgery (Change Admin Password) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_cartweberp - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_cartweberp - Local File Inclusion. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_cartweberp - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Itech Multi Vendor Script 6.49 - 'pl' SQL Injection | This is a webapps exploit for php platform. Description: Itech Multi Vendor Script 6.49 - 'pl' SQL Injection. Author: Kaan KAMIS |
Analyze the security implications of: Itech Multi Vendor Script 6.49 - 'pl' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Iatek PortalApp 3.3/4.0 - 'login.asp' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: Iatek PortalApp 3.3/4.0 - 'login.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: High-Tech Bridge SA |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.