input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: OpenText Documentum Content Server - Privilege Escalation
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: DBHcms 1.1.4 - 'dbhcms_core_dir' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: DBHcms 1.1.4 - 'dbhcms_core_dir' Remote File Inclusion. Author: Gamoscu
|
Analyze the security implications of: DBHcms 1.1.4 - 'dbhcms_core_dir' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Blogator-script 0.95 - 'id_art' SQL Injection
|
This is a webapps exploit for php platform. Description: Blogator-script 0.95 - 'id_art' SQL Injection. Author: Virangar Security
|
Analyze the security implications of: Blogator-script 0.95 - 'id_art' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Employee Task Management System v1.0 - SQL Injection on edit-task.php
|
This is a webapps exploit for php platform. Description: Employee Task Management System v1.0 - SQL Injection on edit-task.php. Author: Muhammad Navaid Zafar Ansari
|
Analyze the security implications of: Employee Task Management System v1.0 - SQL Injection on edit-task.php
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Keynect eCommerce - SQL Injection
|
This is a webapps exploit for php platform. Description: Keynect eCommerce - SQL Injection. Author: Arturo Zamora
|
Analyze the security implications of: Keynect eCommerce - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Home File Share Server 0.7.2 32 - Directory Traversal
|
This is a remote exploit for multiple platform. Description: Home File Share Server 0.7.2 32 - Directory Traversal. Author: John Leitch
|
Analyze the security implications of: Home File Share Server 0.7.2 32 - Directory Traversal
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: S.u.S.E Linux 4.x/5.x/6.x/7.0 / Slackware 3.x/4.0 / Turbolinux 6 / OpenLinux 7.0 - 'fdmount' Local Buffer Overflow (2)
|
This is a local exploit for linux platform. Description: S.u.S.E Linux 4.x/5.x/6.x/7.0 / Slackware 3.x/4.0 / Turbolinux 6 / OpenLinux 7.0 - 'fdmount' Local Buffer Overflow (2). Author: Scrippie
|
Analyze the security implications of: S.u.S.E Linux 4.x/5.x/6.x/7.0 / Slackware 3.x/4.0 / Turbolinux 6 / OpenLinux 7.0 - 'fdmount' Local Buffer Overflow (2)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: BugFree 2.1.3 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: BugFree 2.1.3 - Multiple Cross-Site Scripting Vulnerabilities. Author: High-Tech Bridge SA
|
Analyze the security implications of: BugFree 2.1.3 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Riorey RIOS 4.7.0 - Hard-Coded Password
|
This is a remote exploit for hardware platform. Description: Riorey RIOS 4.7.0 - Hard-Coded Password. Author: Marek Kroemeke
|
Analyze the security implications of: Riorey RIOS 4.7.0 - Hard-Coded Password
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: GoAutoDial CE 2.0 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: GoAutoDial CE 2.0 - Arbitrary File Upload. Author: R-73eN
|
Analyze the security implications of: GoAutoDial CE 2.0 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Fortigate Firewall 2.x - selector Admin Interface Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: Fortigate Firewall 2.x - selector Admin Interface Cross-Site Scripting. Author: Maarten Hartsuijker
|
Analyze the security implications of: Fortigate Firewall 2.x - selector Admin Interface Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CyberBuild - 'browse0.htm?ProductIndex' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: CyberBuild - 'browse0.htm?ProductIndex' Cross-Site Scripting. Author: r0t
|
Analyze the security implications of: CyberBuild - 'browse0.htm?ProductIndex' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component DM Orders - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component DM Orders - 'id' SQL Injection. Author: NoGe
|
Analyze the security implications of: Joomla! Component DM Orders - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle 10g Database - 'SUBSCRIPTION_NAME' SQL Injection (2)
|
This is a remote exploit for multiple platform. Description: Oracle 10g Database - 'SUBSCRIPTION_NAME' SQL Injection (2). Author: bunker
|
Analyze the security implications of: Oracle 10g Database - 'SUBSCRIPTION_NAME' SQL Injection (2)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CF_Calendar - 'calendarevent.cfm' SQL Injection
|
This is a webapps exploit for asp platform. Description: CF_Calendar - 'calendarevent.cfm' SQL Injection. Author: AlpHaNiX
|
Analyze the security implications of: CF_Calendar - 'calendarevent.cfm' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: dotWidget for articles 2.0 - '/admin/editconfig.php' Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: dotWidget for articles 2.0 - '/admin/editconfig.php' Multiple Remote File Inclusions. Author: SwEET-DeViL
|
Analyze the security implications of: dotWidget for articles 2.0 - '/admin/editconfig.php' Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Auto Database System 1.0 Infusion Addon - SQL Injection
|
This is a webapps exploit for php platform. Description: Auto Database System 1.0 Infusion Addon - SQL Injection. Author: Saif
|
Analyze the security implications of: Auto Database System 1.0 Infusion Addon - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WordPress Plugin WP Symposium 14.11 - Arbitrary File Upload (Metasploit)
|
This is a remote exploit for php platform. Description: WordPress Plugin WP Symposium 14.11 - Arbitrary File Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: WordPress Plugin WP Symposium 14.11 - Arbitrary File Upload (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_xcloner-backupandrestore - Remote Command Execution
|
This is a webapps exploit for php platform. Description: Joomla! Component com_xcloner-backupandrestore - Remote Command Execution. Author: mr_me
|
Analyze the security implications of: Joomla! Component com_xcloner-backupandrestore - Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apache 2.4.7 mod_status - Scoreboard Handling Race Condition
|
This is a dos exploit for linux platform. Description: Apache 2.4.7 mod_status - Scoreboard Handling Race Condition. Author: Marek Kroemeke
|
Analyze the security implications of: Apache 2.4.7 mod_status - Scoreboard Handling Race Condition
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Advanced Webhost Billing System (AWBS) 2.9.2 - 'oid' SQL Injection
|
This is a webapps exploit for php platform. Description: Advanced Webhost Billing System (AWBS) 2.9.2 - 'oid' SQL Injection. Author: ShivX
|
Analyze the security implications of: Advanced Webhost Billing System (AWBS) 2.9.2 - 'oid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component JE Quiz 2.3 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JE Quiz 2.3 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component JE Quiz 2.3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Real Networks Real Server 7.0/7.0.1/8.0 Beta - view-source Denial of Service
|
This is a dos exploit for multiple platform. Description: Real Networks Real Server 7.0/7.0.1/8.0 Beta - view-source Denial of Service. Author: Ussr Labs
|
Analyze the security implications of: Real Networks Real Server 7.0/7.0.1/8.0 Beta - view-source Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Mozilla Firefox 9.0.1 / Thunderbird 3.1.20 - Information Disclosure
|
This is a remote exploit for multiple platform. Description: Mozilla Firefox 9.0.1 / Thunderbird 3.1.20 - Information Disclosure. Author: Michal Zalewski
|
Analyze the security implications of: Mozilla Firefox 9.0.1 / Thunderbird 3.1.20 - Information Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: KeyBase Botnet 1.5 - SQL Injection
|
This is a webapps exploit for php platform. Description: KeyBase Botnet 1.5 - SQL Injection. Author: n4pst3r
|
Analyze the security implications of: KeyBase Botnet 1.5 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Trend Micro IWSS 3.1 - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Trend Micro IWSS 3.1 - Local Privilege Escalation. Author: Buguroo Offensive Security
|
Analyze the security implications of: Trend Micro IWSS 3.1 - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AWStats 5.7 < 6.2 - Multiple Remote
|
This is a webapps exploit for cgi platform. Description: AWStats 5.7 < 6.2 - Multiple Remote. Author: Silentium
|
Analyze the security implications of: AWStats 5.7 < 6.2 - Multiple Remote
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: CMSimple 5.15 - Remote Code Execution (RCE) (Authenticated)
|
This is a webapps exploit for php platform. Description: CMSimple 5.15 - Remote Code Execution (RCE) (Authenticated). Author: Ahmet Ümit BAYRAM
|
Analyze the security implications of: CMSimple 5.15 - Remote Code Execution (RCE) (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Enigma NMS 65.0.0 - OS Command Injection
|
This is a webapps exploit for multiple platform. Description: Enigma NMS 65.0.0 - OS Command Injection. Author: xerubus
|
Analyze the security implications of: Enigma NMS 65.0.0 - OS Command Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Ananda Real Estate 3.4 - 'list.asp' Multiple SQL Injections
|
This is a webapps exploit for asp platform. Description: Ananda Real Estate 3.4 - 'list.asp' Multiple SQL Injections. Author: underground-stockholm.com
|
Analyze the security implications of: Ananda Real Estate 3.4 - 'list.asp' Multiple SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: glFusion 1.1.2 - 'COM_applyFilter()/cookies' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: glFusion 1.1.2 - 'COM_applyFilter()/cookies' Blind SQL Injection. Author: Nine:Situations:Group
|
Analyze the security implications of: glFusion 1.1.2 - 'COM_applyFilter()/cookies' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apache Struts 2.3 < 2.3.34 / 2.5 < 2.5.16 - Remote Code Execution (2)
|
This is a remote exploit for multiple platform. Description: Apache Struts 2.3 < 2.3.34 / 2.5 < 2.5.16 - Remote Code Execution (2). Author: hook-s3c
|
Analyze the security implications of: Apache Struts 2.3 < 2.3.34 / 2.5 < 2.5.16 - Remote Code Execution (2)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Snort 2.x - PrintTcpOptions Remote Denial of Service
|
This is a dos exploit for linux platform. Description: Snort 2.x - PrintTcpOptions Remote Denial of Service. Author: VulnFact Security Labs
|
Analyze the security implications of: Snort 2.x - PrintTcpOptions Remote Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: iVote - 'details.php' SQL Injection
|
This is a webapps exploit for php platform. Description: iVote - 'details.php' SQL Injection. Author: Ashiyane Digital Security Team
|
Analyze the security implications of: iVote - 'details.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.