input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Les Visiteurs 2.0 - Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ActiveWeb Professional 3.0 - Arbitrary File Upload
|
This is a webapps exploit for cfm platform. Description: ActiveWeb Professional 3.0 - Arbitrary File Upload. Author: StenoPlasma
|
Analyze the security implications of: ActiveWeb Professional 3.0 - Arbitrary File Upload
|
This exploit targets cfm systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cfm platform
|
What is this exploit about: Mambo 4.6rc1 - Weblinks Blind SQL Injection (2)
|
This is a webapps exploit for php platform. Description: Mambo 4.6rc1 - Weblinks Blind SQL Injection (2). Author: rgod
|
Analyze the security implications of: Mambo 4.6rc1 - Weblinks Blind SQL Injection (2)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! 1.5.12 - read/exec Remote files
|
This is a webapps exploit for php platform. Description: Joomla! 1.5.12 - read/exec Remote files. Author: Nikoal Petrov
|
Analyze the security implications of: Joomla! 1.5.12 - read/exec Remote files
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MagicScripts E-Store Kit-2 PayPal Edition - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: MagicScripts E-Store Kit-2 PayPal Edition - Remote File Inclusion. Author: Dcrab
|
Analyze the security implications of: MagicScripts E-Store Kit-2 PayPal Edition - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JavaScript Core - Arbitrary Code Execution
|
This is a local exploit for multiple platform. Description: JavaScript Core - Arbitrary Code Execution. Author: ret2
|
Analyze the security implications of: JavaScript Core - Arbitrary Code Execution
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Angry IP Scanner for Linux 3.5.3 - Denial of Service (PoC)
|
This is a dos exploit for linux platform. Description: Angry IP Scanner for Linux 3.5.3 - Denial of Service (PoC). Author: Sam
|
Analyze the security implications of: Angry IP Scanner for Linux 3.5.3 - Denial of Service (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Acidcat CMS 3.3 - 'FCKeditor' Arbitrary File Upload
|
This is a webapps exploit for asp platform. Description: Acidcat CMS 3.3 - 'FCKeditor' Arbitrary File Upload. Author: Net.Edit0r
|
Analyze the security implications of: Acidcat CMS 3.3 - 'FCKeditor' Arbitrary File Upload
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ABB Cylon Aspect 3.08.01 - Remote Code Execution (RCE)
|
This is a webapps exploit for multiple platform. Description: ABB Cylon Aspect 3.08.01 - Remote Code Execution (RCE). Author: LiquidWorm
|
Analyze the security implications of: ABB Cylon Aspect 3.08.01 - Remote Code Execution (RCE)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: DesktopOnNet 3 Beta - Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: DesktopOnNet 3 Beta - Multiple Remote File Inclusions. Author: MK
|
Analyze the security implications of: DesktopOnNet 3 Beta - Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco IOS 11.x/12.x - HTTP Configuration Arbitrary Administrative Access (1)
|
This is a remote exploit for hardware platform. Description: Cisco IOS 11.x/12.x - HTTP Configuration Arbitrary Administrative Access (1). Author: cronos
|
Analyze the security implications of: Cisco IOS 11.x/12.x - HTTP Configuration Arbitrary Administrative Access (1)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: DataLife Engine - 'preview.php' PHP Code Injection (Metasploit)
|
This is a remote exploit for php platform. Description: DataLife Engine - 'preview.php' PHP Code Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: DataLife Engine - 'preview.php' PHP Code Injection (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GNUJSP 1.0 - File Disclosure
|
This is a remote exploit for multiple platform. Description: GNUJSP 1.0 - File Disclosure. Author: Thomas Springer
|
Analyze the security implications of: GNUJSP 1.0 - File Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ASPSiteWare Home Builder 1.0/2.0 - SQL Injection
|
This is a webapps exploit for asp platform. Description: ASPSiteWare Home Builder 1.0/2.0 - SQL Injection. Author: AlpHaNiX
|
Analyze the security implications of: ASPSiteWare Home Builder 1.0/2.0 - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Dokeos 1.x - '/forum/viewthread.php?forum' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Dokeos 1.x - '/forum/viewthread.php?forum' Cross-Site Scripting. Author: Doz
|
Analyze the security implications of: Dokeos 1.x - '/forum/viewthread.php?forum' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CarLine Forum Russian Board 4.2 - 'new.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: CarLine Forum Russian Board 4.2 - 'new.php' Multiple Cross-Site Scripting Vulnerabilities. Author: 1dt.w0lf
|
Analyze the security implications of: CarLine Forum Russian Board 4.2 - 'new.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ACal 2.2.6 - 'view' Local File Inclusion
|
This is a webapps exploit for php platform. Description: ACal 2.2.6 - 'view' Local File Inclusion. Author: ICheer_No0M
|
Analyze the security implications of: ACal 2.2.6 - 'view' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM Net.Commerce 3.1/3.2 Websphere - Weak Password
|
This is a remote exploit for multiple platform. Description: IBM Net.Commerce 3.1/3.2 Websphere - Weak Password. Author: Rudi Carell
|
Analyze the security implications of: IBM Net.Commerce 3.1/3.2 Websphere - Weak Password
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: T-Dreams Job Career Package 3.0 - Insecure Cookie Handling
|
This is a webapps exploit for asp platform. Description: T-Dreams Job Career Package 3.0 - Insecure Cookie Handling. Author: TiGeR-Dz
|
Analyze the security implications of: T-Dreams Job Career Package 3.0 - Insecure Cookie Handling
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component com_fireboard - 'Itemid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_fireboard - 'Itemid' SQL Injection. Author: ViRuS Qalaa
|
Analyze the security implications of: Joomla! Component com_fireboard - 'Itemid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Conectiva 4.x/5.x / Debian 2.x / RedHat 6.x / S.u.S.E 6.x/7.0 / Trustix 1.x - rpc.statd Remote Format String (2)
|
This is a remote exploit for linux platform. Description: Conectiva 4.x/5.x / Debian 2.x / RedHat 6.x / S.u.S.E 6.x/7.0 / Trustix 1.x - rpc.statd Remote Format String (2). Author: Doing
|
Analyze the security implications of: Conectiva 4.x/5.x / Debian 2.x / RedHat 6.x / S.u.S.E 6.x/7.0 / Trustix 1.x - rpc.statd Remote Format String (2)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Oracle WebLogic Server 10.3.3 - Encoded URL
|
This is a remote exploit for multiple platform. Description: Oracle WebLogic Server 10.3.3 - Encoded URL. Author: Timothy D. Morgan
|
Analyze the security implications of: Oracle WebLogic Server 10.3.3 - Encoded URL
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: bttlxe Forum 2.0 - Multiple SQL Injections / Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for asp platform. Description: bttlxe Forum 2.0 - Multiple SQL Injections / Cross-Site Scripting Vulnerabilities. Author: Mormoroth
|
Analyze the security implications of: bttlxe Forum 2.0 - Multiple SQL Injections / Cross-Site Scripting Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Benjamin Lefevre Dobermann Forum 0.x - 'enteteacceuil.php?subpath' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Benjamin Lefevre Dobermann Forum 0.x - 'enteteacceuil.php?subpath' Remote File Inclusion. Author: frog
|
Analyze the security implications of: Benjamin Lefevre Dobermann Forum 0.x - 'enteteacceuil.php?subpath' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IDevSpot iSupport 1.8 - 'index.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: IDevSpot iSupport 1.8 - 'index.php' Remote File Inclusion. Author: s3rv3r_hack3r
|
Analyze the security implications of: IDevSpot iSupport 1.8 - 'index.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Avaya Cajun P130/P133/P330/P333 Network Switch - Connection Stalling Denial of Service
|
This is a dos exploit for hardware platform. Description: Avaya Cajun P130/P133/P330/P333 Network Switch - Connection Stalling Denial of Service. Author: Jacek Lipkowski
|
Analyze the security implications of: Avaya Cajun P130/P133/P330/P333 Network Switch - Connection Stalling Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Monkey HTTP Daemon Mandril Security Plugin - Security Bypass
|
This is a remote exploit for multiple platform. Description: Monkey HTTP Daemon Mandril Security Plugin - Security Bypass. Author: felipensp
|
Analyze the security implications of: Monkey HTTP Daemon Mandril Security Plugin - Security Bypass
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: backupDB() 1.2.7a - 'onlyDB' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: backupDB() 1.2.7a - 'onlyDB' Cross-Site Scripting. Author: LiquidWorm
|
Analyze the security implications of: backupDB() 1.2.7a - 'onlyDB' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Advanced Guestbook - 'addentry.php' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Advanced Guestbook - 'addentry.php' Arbitrary File Upload. Author: Ashiyane Digital Security Team
|
Analyze the security implications of: Advanced Guestbook - 'addentry.php' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Great Circle Associates Majordomo 1.94.4 - Local resend
|
This is a local exploit for linux platform. Description: Great Circle Associates Majordomo 1.94.4 - Local resend. Author: Brock Tellier
|
Analyze the security implications of: Great Circle Associates Majordomo 1.94.4 - Local resend
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: lionmax software www file share pro 2.4x - Multiple Vulnerabilities (2)
|
This is a remote exploit for multiple platform. Description: lionmax software www file share pro 2.4x - Multiple Vulnerabilities (2). Author: Luigi Auriemma
|
Analyze the security implications of: lionmax software www file share pro 2.4x - Multiple Vulnerabilities (2)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Kodak InSite 5.5.2 - '/Troubleshooting/DiagnosticReport.asp?HeaderWarning' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Kodak InSite 5.5.2 - '/Troubleshooting/DiagnosticReport.asp?HeaderWarning' Cross-Site Scripting. Author: Dionach
|
Analyze the security implications of: Kodak InSite 5.5.2 - '/Troubleshooting/DiagnosticReport.asp?HeaderWarning' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Adobe Flash - SimpleButton Creation Type Confusion
|
This is a dos exploit for multiple platform. Description: Adobe Flash - SimpleButton Creation Type Confusion. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - SimpleButton Creation Type Confusion
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: clientResponse Client Management 4.1 - Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: clientResponse Client Management 4.1 - Cross-Site Scripting. Author: Halil Dalabasmaz
|
Analyze the security implications of: clientResponse Client Management 4.1 - Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.