input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_output_query.inc.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_output_query.inc.php?base_path' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_output_query.inc.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Horde Multiple Product - 'workweek.php?Timestamp' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Horde Multiple Product - 'workweek.php?Timestamp' Cross-Site Scripting. Author: Ivan Sanchez |
Analyze the security implications of: Horde Multiple Product - 'workweek.php?Timestamp' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Entrepreneur Dating Script 2.0.1 - 'marital' / 'gender' / 'country' / 'profileid' SQL Injection | This is a webapps exploit for php platform. Description: Entrepreneur Dating Script 2.0.1 - 'marital' / 'gender' / 'country' / 'profileid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Entrepreneur Dating Script 2.0.1 - 'marital' / 'gender' / 'country' / 'profileid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: m0n0wall 1.33 - Multiple Cross-Site Request Forgery Vulnerabilities | This is a webapps exploit for freebsd platform. Description: m0n0wall 1.33 - Multiple Cross-Site Request Forgery Vulnerabilities. Author: Yann CAM |
Analyze the security implications of: m0n0wall 1.33 - Multiple Cross-Site Request Forgery Vulnerabilities | This exploit targets freebsd systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Linux - Use-After-Free via race Between modify_ldt() and #BR Exception | This is a dos exploit for linux platform. Description: Linux - Use-After-Free via race Between modify_ldt() and #BR Exception. Author: Google Security Research |
Analyze the security implications of: Linux - Use-After-Free via race Between modify_ldt() and #BR Exception | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Audins Audiens 3.3 - 'setup.php?PATH_INFO' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Audins Audiens 3.3 - 'setup.php?PATH_INFO' Cross-Site Scripting. Author: r00t |
Analyze the security implications of: Audins Audiens 3.3 - 'setup.php?PATH_INFO' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenX - Backdoor PHP Code Execution (Metasploit) | This is a remote exploit for php platform. Description: OpenX - Backdoor PHP Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: OpenX - Backdoor PHP Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Personify360 7.5.2/7.6.1 - Improper Database Schema Access Restrictions | This is a webapps exploit for aspx platform. Description: Personify360 7.5.2/7.6.1 - Improper Database Schema Access Restrictions. Author: Pesach Zirkind |
Analyze the security implications of: Personify360 7.5.2/7.6.1 - Improper Database Schema Access Restrictions | This exploit targets aspx systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets aspx platform |
What is this exploit about: Jeebles Technology Jeebles Directory 2.9.60 - 'download.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Jeebles Technology Jeebles Directory 2.9.60 - 'download.php' Local File Inclusion. Author: hack2prison |
Analyze the security implications of: Jeebles Technology Jeebles Directory 2.9.60 - 'download.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kubernetes - (Unauthenticated) Arbitrary Requests | This is a remote exploit for multiple platform. Description: Kubernetes - (Unauthenticated) Arbitrary Requests. Author: evict |
Analyze the security implications of: Kubernetes - (Unauthenticated) Arbitrary Requests | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component JE QuoteForm - 'Itemid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JE QuoteForm - 'Itemid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JE QuoteForm - 'Itemid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash - Color.setTransform Use-After-Free | This is a dos exploit for multiple platform. Description: Adobe Flash - Color.setTransform Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Color.setTransform Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Nokia N95-8 browser - 'setAttributeNode' Method Crash | This is a dos exploit for hardware platform. Description: Nokia N95-8 browser - 'setAttributeNode' Method Crash. Author: Juan Yacubian |
Analyze the security implications of: Nokia N95-8 browser - 'setAttributeNode' Method Crash | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Sony Playstation 4 (PS4) 4.05 - 'Jailbreak' WebKit / 'NamedObj ' Kernel Loader | This is a local exploit for hardware platform. Description: Sony Playstation 4 (PS4) 4.05 - 'Jailbreak' WebKit / 'NamedObj ' Kernel Loader. Author: Specter |
Analyze the security implications of: Sony Playstation 4 (PS4) 4.05 - 'Jailbreak' WebKit / 'NamedObj ' Kernel Loader | This exploit targets hardware systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: C2C Forward Auction Creator - '/auction/casp/Admin.asp' SQL Injection (Admin Authentication Bypass) | This is a webapps exploit for php platform. Description: C2C Forward Auction Creator - '/auction/casp/Admin.asp' SQL Injection (Admin Authentication Bypass). Author: R3d-D3V!L |
Analyze the security implications of: C2C Forward Auction Creator - '/auction/casp/Admin.asp' SQL Injection (Admin Authentication Bypass) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Links Management Application 1.0 - 'lcnt' SQL Injection | This is a webapps exploit for php platform. Description: Links Management Application 1.0 - 'lcnt' SQL Injection. Author: ajann |
Analyze the security implications of: Links Management Application 1.0 - 'lcnt' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_gameserver 1.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_gameserver 1.0 - 'id' SQL Injection. Author: v3n0m |
Analyze the security implications of: Joomla! Component com_gameserver 1.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JS Jobs 1.0.5.8 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JS Jobs 1.0.5.8 - SQL Injection. Author: d0lc3 |
Analyze the security implications of: Joomla! Component JS Jobs 1.0.5.8 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple iOS Mobile Mail - LibTIFF Buffer Overflow (Metasploit) | This is a remote exploit for ios platform. Description: Apple iOS Mobile Mail - LibTIFF Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Apple iOS Mobile Mail - LibTIFF Buffer Overflow (Metasploit) | This exploit targets ios systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: DSocks 1.3 - 'Name' Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: DSocks 1.3 - 'Name' Buffer Overflow (PoC). Author: Michael Adams |
Analyze the security implications of: DSocks 1.3 - 'Name' Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Java Mini Web Server 1.0 - Directory Traversal / Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Java Mini Web Server 1.0 - Directory Traversal / Cross-Site Scripting. Author: cp77fk4r |
Analyze the security implications of: Java Mini Web Server 1.0 - Directory Traversal / Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Groomify v1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Groomify v1.0 - SQL Injection. Author: Ahmet Ümit BAYRAM |
Analyze the security implications of: Groomify v1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Konqueror 3.5.9 - 'color'/'bgcolor' Multiple Remote Crash Vulnerabilities | This is a dos exploit for linux platform. Description: Konqueror 3.5.9 - 'color'/'bgcolor' Multiple Remote Crash Vulnerabilities. Author: Jeremy Brown |
Analyze the security implications of: Konqueror 3.5.9 - 'color'/'bgcolor' Multiple Remote Crash Vulnerabilities | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Budget and Expense Tracker System 1.0 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Budget and Expense Tracker System 1.0 - Arbitrary File Upload. Author: ()t/\\/\\1 |
Analyze the security implications of: Budget and Expense Tracker System 1.0 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MySQL (Linux) - Stack Buffer Overrun (PoC) | This is a dos exploit for linux platform. Description: MySQL (Linux) - Stack Buffer Overrun (PoC). Author: kingcope |
Analyze the security implications of: MySQL (Linux) - Stack Buffer Overrun (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AWS Xms 2.5 - 'importer.php?what' Directory Traversal | This is a webapps exploit for php platform. Description: AWS Xms 2.5 - 'importer.php?what' Directory Traversal. Author: High-Tech Bridge SA |
Analyze the security implications of: AWS Xms 2.5 - 'importer.php?what' Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ImpressCMS v1.4.4 - Unrestricted File Upload | This is a webapps exploit for php platform. Description: ImpressCMS v1.4.4 - Unrestricted File Upload. Author: Ünsal Furkan Harani |
Analyze the security implications of: ImpressCMS v1.4.4 - Unrestricted File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dell SonicWALL Scrutinizer - Multiple HTML Injection Vulnerabilities | This is a remote exploit for multiple platform. Description: Dell SonicWALL Scrutinizer - Multiple HTML Injection Vulnerabilities. Author: Benjamin Kunz Mejri |
Analyze the security implications of: Dell SonicWALL Scrutinizer - Multiple HTML Injection Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Oracle 10g Release 2 - 'DBMS_EXPORT_EXTENSION' SQL | This is a local exploit for multiple platform. Description: Oracle 10g Release 2 - 'DBMS_EXPORT_EXTENSION' SQL. Author: N1V1Hd |
Analyze the security implications of: Oracle 10g Release 2 - 'DBMS_EXPORT_EXTENSION' SQL | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: LiteRadius 3.2 - Multiple Blind SQL Injections | This is a webapps exploit for php platform. Description: LiteRadius 3.2 - Multiple Blind SQL Injections. Author: Robert Cooper |
Analyze the security implications of: LiteRadius 3.2 - Multiple Blind SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eGroupWare 1.8.001.20110421 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: eGroupWare 1.8.001.20110421 - Multiple Vulnerabilities. Author: AutoSec Tools |
Analyze the security implications of: eGroupWare 1.8.001.20110421 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alstrasoft Affiliate Network Pro 8.0 - 'temp.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Alstrasoft Affiliate Network Pro 8.0 - 'temp.php' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: Alstrasoft Affiliate Network Pro 8.0 - 'temp.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP-UX LPD 10.20/11.00/11.11 - Command Execution (Metasploit) | This is a remote exploit for hp-ux platform. Description: HP-UX LPD 10.20/11.00/11.11 - Command Execution (Metasploit). Author: H D Moore |
Analyze the security implications of: HP-UX LPD 10.20/11.00/11.11 - Command Execution (Metasploit) | This exploit targets hp-ux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hp-ux platform |
What is this exploit about: Netscape Navigator 7.1 - Embedded Image URI Obfuscation | This is a remote exploit for multiple platform. Description: Netscape Navigator 7.1 - Embedded Image URI Obfuscation. Author: Lyndon Durham |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.