input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Mambo Component bigAPE-Backup 1.1 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ALiCE-CMS 0.1 - 'CONFIG[local_root]' Remote File Inclusion | This is a webapps exploit for php platform. Description: ALiCE-CMS 0.1 - 'CONFIG[local_root]' Remote File Inclusion. Author: nuffsaid |
Analyze the security implications of: ALiCE-CMS 0.1 - 'CONFIG[local_root]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Limelight Software - 'article.php' SQL Injection | This is a webapps exploit for php platform. Description: Limelight Software - 'article.php' SQL Injection. Author: eXeSoul |
Analyze the security implications of: Limelight Software - 'article.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CGI-World Poll It 2.0 - Internal Variable Override | This is a remote exploit for cgi platform. Description: CGI-World Poll It 2.0 - Internal Variable Override. Author: Adrian Daminato |
Analyze the security implications of: CGI-World Poll It 2.0 - Internal Variable Override | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: MariaDB 10.2 - 'wsrep_provider' OS Command Execution | This is a local exploit for linux platform. Description: MariaDB 10.2 - 'wsrep_provider' OS Command Execution. Author: Central InfoSec |
Analyze the security implications of: MariaDB 10.2 - 'wsrep_provider' OS Command Execution | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Global Centre Aplomb Poll 1.1 - 'index.php?Madoa' Remote File Inclusion | This is a webapps exploit for php platform. Description: Global Centre Aplomb Poll 1.1 - 'index.php?Madoa' Remote File Inclusion. Author: ilker Kandemir |
Analyze the security implications of: Global Centre Aplomb Poll 1.1 - 'index.php?Madoa' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mozilla Firefox 3.6 - Denial of Service (2) | This is a dos exploit for multiple platform. Description: Mozilla Firefox 3.6 - Denial of Service (2). Author: Ale46 |
Analyze the security implications of: Mozilla Firefox 3.6 - Denial of Service (2) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Limbo CMS 1.0.4.2 - 'Cuid' cookie Blind SQL Injection | This is a webapps exploit for php platform. Description: Limbo CMS 1.0.4.2 - 'Cuid' cookie Blind SQL Injection. Author: The:Paradox |
Analyze the security implications of: Limbo CMS 1.0.4.2 - 'Cuid' cookie Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP < 5.3.12 / < 5.4.2 - CGI Argument Injection | This is a remote exploit for php platform. Description: PHP < 5.3.12 / < 5.4.2 - CGI Argument Injection. Author: rayh4c |
Analyze the security implications of: PHP < 5.3.12 / < 5.4.2 - CGI Argument Injection | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: W3-mSQL - Error Page Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: W3-mSQL - Error Page Cross-Site Scripting. Author: vivek_infosec |
Analyze the security implications of: W3-mSQL - Error Page Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: BigACE 2.5 - SQL Injection | This is a webapps exploit for php platform. Description: BigACE 2.5 - SQL Injection. Author: YEnH4ckEr |
Analyze the security implications of: BigACE 2.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DynPG 4.2.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: DynPG 4.2.0 - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: DynPG 4.2.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Aardvark Topsites PHP 4.2.2 - 'path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Aardvark Topsites PHP 4.2.2 - 'path' Remote File Inclusion. Author: [Oo] |
Analyze the security implications of: Aardvark Topsites PHP 4.2.2 - 'path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HIOX Browser Statistics 2.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: HIOX Browser Statistics 2.0 - Remote File Inclusion. Author: Ghost Hacker |
Analyze the security implications of: HIOX Browser Statistics 2.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: I-RATER Basic - Arbitrary File Upload | This is a webapps exploit for php platform. Description: I-RATER Basic - Arbitrary File Upload. Author: indoushka |
Analyze the security implications of: I-RATER Basic - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CS-Cart 1.3.3 - authenticated RCE | This is a webapps exploit for php platform. Description: CS-Cart 1.3.3 - authenticated RCE. Author: 0xmmnbassel |
Analyze the security implications of: CS-Cart 1.3.3 - authenticated RCE | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_common.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_common.php?base_path' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_common.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NIBE heat pump - Local File Inclusion | This is a webapps exploit for cgi platform. Description: NIBE heat pump - Local File Inclusion. Author: Jelmer de Hen |
Analyze the security implications of: NIBE heat pump - Local File Inclusion | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: CF_Nuke 4.6 - 'index.cfm' Cross-Site Scripting | This is a webapps exploit for cfm platform. Description: CF_Nuke 4.6 - 'index.cfm' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: CF_Nuke 4.6 - 'index.cfm' Cross-Site Scripting | This exploit targets cfm systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cfm platform |
What is this exploit about: ClickContact - 'default.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: ClickContact - 'default.asp' Multiple SQL Injections. Author: Aria-Security Team |
Analyze the security implications of: ClickContact - 'default.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ElasticSearch 7.13.3 - Memory disclosure | This is a webapps exploit for multiple platform. Description: ElasticSearch 7.13.3 - Memory disclosure. Author: r0ny |
Analyze the security implications of: ElasticSearch 7.13.3 - Memory disclosure | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component ChronoForms - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component ChronoForms - Blind SQL Injection. Author: _mlk_ |
Analyze the security implications of: Joomla! Component ChronoForms - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_worldrates - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_worldrates - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component com_worldrates - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CKEditor - 'posteddata.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CKEditor - 'posteddata.php' Cross-Site Scripting. Author: AkaStep |
Analyze the security implications of: CKEditor - 'posteddata.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Downline Goldmine Builder - SQL Injection | This is a webapps exploit for php platform. Description: Downline Goldmine Builder - SQL Injection. Author: Hussin X |
Analyze the security implications of: Downline Goldmine Builder - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Comrie Software Pay Roll Time Sheet & Punch Card - Authentication Bypass | This is a webapps exploit for asp platform. Description: Comrie Software Pay Roll Time Sheet & Punch Card - Authentication Bypass. Author: L0rd CrusAd3r |
Analyze the security implications of: Comrie Software Pay Roll Time Sheet & Punch Card - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Websockify (C Implementation) 0.8.0 - Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: Websockify (C Implementation) 0.8.0 - Buffer Overflow (PoC). Author: RedTeam Pentesting GmbH |
Analyze the security implications of: Websockify (C Implementation) 0.8.0 - Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Intel Modular Server System 10.18 - Cross-Site Request Forgery (Change Admin Password) | This is a webapps exploit for php platform. Description: Intel Modular Server System 10.18 - Cross-Site Request Forgery (Change Admin Password). Author: LiquidWorm |
Analyze the security implications of: Intel Modular Server System 10.18 - Cross-Site Request Forgery (Change Admin Password) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Limny 2.1 - 'q' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Limny 2.1 - 'q' Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: Limny 2.1 - 'q' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DenyHosts - 'regex.py' Remote Denial of Service | This is a dos exploit for linux platform. Description: DenyHosts - 'regex.py' Remote Denial of Service. Author: Helmut Grohne |
Analyze the security implications of: DenyHosts - 'regex.py' Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Adobe Flash Player 22.0.0.192 - TAG Memory Corruption | This is a dos exploit for multiple platform. Description: Adobe Flash Player 22.0.0.192 - TAG Memory Corruption. Author: COSIG |
Analyze the security implications of: Adobe Flash Player 22.0.0.192 - TAG Memory Corruption | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cisco Email Security Appliance (IronPort) C160 - 'Host' Header Injection | This is a remote exploit for hardware platform. Description: Cisco Email Security Appliance (IronPort) C160 - 'Host' Header Injection. Author: Todor Donev |
Analyze the security implications of: Cisco Email Security Appliance (IronPort) C160 - 'Host' Header Injection | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Google Chrome < M73 - MidiManagerWin Use-After-Free | This is a dos exploit for multiple platform. Description: Google Chrome < M73 - MidiManagerWin Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Google Chrome < M73 - MidiManagerWin Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: OpenVMPSd 1.3 - Remote Format String | This is a remote exploit for linux platform. Description: OpenVMPSd 1.3 - Remote Format String. Author: Gotfault Security |
Analyze the security implications of: OpenVMPSd 1.3 - Remote Format String | This exploit targets linux systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.