input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: dotProject 2.0 - '/modules/admin/vw_usr_roles.php?baseDir' Remote File Inclusion | This is a webapps exploit for php platform. Description: dotProject 2.0 - '/modules/admin/vw_usr_roles.php?baseDir' Remote File Inclusion. Author: r.verton |
Analyze the security implications of: dotProject 2.0 - '/modules/admin/vw_usr_roles.php?baseDir' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dolibarr 11.0.3 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Dolibarr 11.0.3 - Persistent Cross-Site Scripting. Author: Mehmet Kelepçe |
Analyze the security implications of: Dolibarr 11.0.3 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Symantec Messaging Gateway 9.5/9.5.1 - SSH Default Password Security Bypass (Metasploit) | This is a remote exploit for linux platform. Description: Symantec Messaging Gateway 9.5/9.5.1 - SSH Default Password Security Bypass (Metasploit). Author: Metasploit |
Analyze the security implications of: Symantec Messaging Gateway 9.5/9.5.1 - SSH Default Password Security Bypass (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GuppY 4.6.3 - 'index.php?selskin' Remote File Inclusion | This is a webapps exploit for php platform. Description: GuppY 4.6.3 - 'index.php?selskin' Remote File Inclusion. Author: irk4z |
Analyze the security implications of: GuppY 4.6.3 - 'index.php?selskin' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Motorola Surfboard Cable Modem - Directory Traversal | This is a remote exploit for hardware platform. Description: Motorola Surfboard Cable Modem - Directory Traversal. Author: S2 Crew |
Analyze the security implications of: Motorola Surfboard Cable Modem - Directory Traversal | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ZTE ZXDSL-931VII - Configuration Dump | This is a webapps exploit for hardware platform. Description: ZTE ZXDSL-931VII - Configuration Dump. Author: L0ukanik0-s S0kniaku0l |
Analyze the security implications of: ZTE ZXDSL-931VII - Configuration Dump | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Jobberbase 2.0 - 'subscribe' SQL Injection | This is a webapps exploit for php platform. Description: Jobberbase 2.0 - 'subscribe' SQL Injection. Author: Damian Ebelties |
Analyze the security implications of: Jobberbase 2.0 - 'subscribe' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ECOA Building Automation System - Configuration Download Information Disclosure | This is a webapps exploit for hardware platform. Description: ECOA Building Automation System - Configuration Download Information Disclosure. Author: Neurogenesia |
Analyze the security implications of: ECOA Building Automation System - Configuration Download Information Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Opera Web Browser 7.53 - Location Replace URI Obfuscation | This is a remote exploit for multiple platform. Description: Opera Web Browser 7.53 - Location Replace URI Obfuscation. Author: bitlance winter |
Analyze the security implications of: Opera Web Browser 7.53 - Location Replace URI Obfuscation | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: F5 BIG-IQ 4.1.0.2013.0 - Privilege Escalation (Metasploit) | This is a remote exploit for hardware platform. Description: F5 BIG-IQ 4.1.0.2013.0 - Privilege Escalation (Metasploit). Author: Brandon Perry |
Analyze the security implications of: F5 BIG-IQ 4.1.0.2013.0 - Privilege Escalation (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Sun JDK/SDK 1.3/1.4 / IBM JDK 1.3.1 / BEA Systems WebLogic 5/6/7 - java.util.zip Null Value Denial of Service (1) | This is a dos exploit for multiple platform. Description: Sun JDK/SDK 1.3/1.4 / IBM JDK 1.3.1 / BEA Systems WebLogic 5/6/7 - java.util.zip Null Value Denial of Service (1). Author: Marc Schoenefeld |
Analyze the security implications of: Sun JDK/SDK 1.3/1.4 / IBM JDK 1.3.1 / BEA Systems WebLogic 5/6/7 - java.util.zip Null Value Denial of Service (1) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: KDE libkhtml 3.5 < 4.2.0 - Unhandled HTML Parse Exception | This is a dos exploit for linux platform. Description: KDE libkhtml 3.5 < 4.2.0 - Unhandled HTML Parse Exception. Author: Federico L. Bossi Bonin |
Analyze the security implications of: KDE libkhtml 3.5 < 4.2.0 - Unhandled HTML Parse Exception | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Linux Kernel 2.0/2.1 - Send a SIGIO Signal To Any Process | This is a dos exploit for linux platform. Description: Linux Kernel 2.0/2.1 - Send a SIGIO Signal To Any Process. Author: David Luyer |
Analyze the security implications of: Linux Kernel 2.0/2.1 - Send a SIGIO Signal To Any Process | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Geeklog 1.6.0sr2 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Geeklog 1.6.0sr2 - Arbitrary File Upload. Author: JaL0h |
Analyze the security implications of: Geeklog 1.6.0sr2 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash - ATF Processing Overflow | This is a dos exploit for multiple platform. Description: Adobe Flash - ATF Processing Overflow. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - ATF Processing Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Wowza Streaming Engine 4.5.0 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for multiple platform. Description: Wowza Streaming Engine 4.5.0 - Multiple Cross-Site Scripting Vulnerabilities. Author: LiquidWorm |
Analyze the security implications of: Wowza Streaming Engine 4.5.0 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component mv_restaurantmenumanager - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component mv_restaurantmenumanager - SQL Injection. Author: Sudden_death |
Analyze the security implications of: Joomla! Component mv_restaurantmenumanager - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FLIR Thermal Camera F/FC/PT/D - Information Disclosure | This is a webapps exploit for hardware platform. Description: FLIR Thermal Camera F/FC/PT/D - Information Disclosure. Author: LiquidWorm |
Analyze the security implications of: FLIR Thermal Camera F/FC/PT/D - Information Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Card Payment 1.0 - Cross-Site Request Forgery (Update Admin) | This is a webapps exploit for php platform. Description: Card Payment 1.0 - Cross-Site Request Forgery (Update Admin). Author: Ihsan Sencan |
Analyze the security implications of: Card Payment 1.0 - Cross-Site Request Forgery (Update Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HIOX Browser Statistics 2.0 - Arbitrary Add Admin | This is a webapps exploit for php platform. Description: HIOX Browser Statistics 2.0 - Arbitrary Add Admin. Author: Stack |
Analyze the security implications of: HIOX Browser Statistics 2.0 - Arbitrary Add Admin | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EZ-Ticket 0.0.1 - 'common.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: EZ-Ticket 0.0.1 - 'common.php' Remote File Inclusion. Author: the master |
Analyze the security implications of: EZ-Ticket 0.0.1 - 'common.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_manager 1.5.3 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_manager 1.5.3 - 'id' SQL Injection. Author: Islam DefenDers Mr.HaMaDa |
Analyze the security implications of: Joomla! Component com_manager 1.5.3 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HotScripts Type PHP Clone Script - 'feedback.php?msg' Cross-Site Scripting | This is a webapps exploit for php platform. Description: HotScripts Type PHP Clone Script - 'feedback.php?msg' Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: HotScripts Type PHP Clone Script - 'feedback.php?msg' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Beheer Systeem - 'pbs.cgi' Remote Command Execution | This is a webapps exploit for cgi platform. Description: Beheer Systeem - 'pbs.cgi' Remote Command Execution. Author: Felipe Andrian Peixoto |
Analyze the security implications of: Beheer Systeem - 'pbs.cgi' Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Joomla! 3.4.6 - Remote Code Execution | This is a webapps exploit for php platform. Description: Joomla! 3.4.6 - Remote Code Execution. Author: Alessandro Groppo |
Analyze the security implications of: Joomla! 3.4.6 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google Chrome - Swiftshader Texture Allocation Integer Overflow | This is a dos exploit for multiple platform. Description: Google Chrome - Swiftshader Texture Allocation Integer Overflow. Author: Google Security Research |
Analyze the security implications of: Google Chrome - Swiftshader Texture Allocation Integer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Enterprise Heart Enterprise Connector 1.0.2 - 'send.php?messageid' SQL Injection | This is a webapps exploit for php platform. Description: Enterprise Heart Enterprise Connector 1.0.2 - 'send.php?messageid' SQL Injection. Author: r0t |
Analyze the security implications of: Enterprise Heart Enterprise Connector 1.0.2 - 'send.php?messageid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lawrence Osiris DB_eSession 1.0.2 - Class SQL Injection | This is a webapps exploit for php platform. Description: Lawrence Osiris DB_eSession 1.0.2 - Class SQL Injection. Author: GulfTech Security |
Analyze the security implications of: Lawrence Osiris DB_eSession 1.0.2 - Class SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.2.5 - Multiple functions 'safe_mode_exec_dir' / 'open_basedir' Restriction Bypass Vulnerabilities | This is a local exploit for php platform. Description: PHP 5.2.5 - Multiple functions 'safe_mode_exec_dir' / 'open_basedir' Restriction Bypass Vulnerabilities. Author: Ciph3r |
Analyze the security implications of: PHP 5.2.5 - Multiple functions 'safe_mode_exec_dir' / 'open_basedir' Restriction Bypass Vulnerabilities | This exploit targets php systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Infinity 2.x - 'options[style_dir]' Local File Disclosure | This is a webapps exploit for php platform. Description: Infinity 2.x - 'options[style_dir]' Local File Disclosure. Author: SwEET-DeViL |
Analyze the security implications of: Infinity 2.x - 'options[style_dir]' Local File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cover Vision - SQL Injection | This is a webapps exploit for php platform. Description: Cover Vision - SQL Injection. Author: Egyptian.H4x0rz |
Analyze the security implications of: Cover Vision - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JoomCRM 1.1.1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JoomCRM 1.1.1 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JoomCRM 1.1.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Double Choco Latte 0.9.3/0.9.4 - 'main.php' Arbitrary PHP Code Execution | This is a webapps exploit for php platform. Description: Double Choco Latte 0.9.3/0.9.4 - 'main.php' Arbitrary PHP Code Execution. Author: GulfTech Security |
Analyze the security implications of: Double Choco Latte 0.9.3/0.9.4 - 'main.php' Arbitrary PHP Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Atmail WebMail - 'searchResultsTab5?filter' Reflected Cross-Site Scripting | This is a webapps exploit for php platform. Description: Atmail WebMail - 'searchResultsTab5?filter' Reflected Cross-Site Scripting. Author: Vicente Aguilera Diaz |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.