input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: OpenText Documentum Content Server - Privilege Escalation | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DBHcms 1.1.4 - 'dbhcms_core_dir' Remote File Inclusion | This is a webapps exploit for php platform. Description: DBHcms 1.1.4 - 'dbhcms_core_dir' Remote File Inclusion. Author: Gamoscu |
Analyze the security implications of: DBHcms 1.1.4 - 'dbhcms_core_dir' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Blogator-script 0.95 - 'id_art' SQL Injection | This is a webapps exploit for php platform. Description: Blogator-script 0.95 - 'id_art' SQL Injection. Author: Virangar Security |
Analyze the security implications of: Blogator-script 0.95 - 'id_art' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Employee Task Management System v1.0 - SQL Injection on edit-task.php | This is a webapps exploit for php platform. Description: Employee Task Management System v1.0 - SQL Injection on edit-task.php. Author: Muhammad Navaid Zafar Ansari |
Analyze the security implications of: Employee Task Management System v1.0 - SQL Injection on edit-task.php | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Keynect eCommerce - SQL Injection | This is a webapps exploit for php platform. Description: Keynect eCommerce - SQL Injection. Author: Arturo Zamora |
Analyze the security implications of: Keynect eCommerce - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Home File Share Server 0.7.2 32 - Directory Traversal | This is a remote exploit for multiple platform. Description: Home File Share Server 0.7.2 32 - Directory Traversal. Author: John Leitch |
Analyze the security implications of: Home File Share Server 0.7.2 32 - Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: S.u.S.E Linux 4.x/5.x/6.x/7.0 / Slackware 3.x/4.0 / Turbolinux 6 / OpenLinux 7.0 - 'fdmount' Local Buffer Overflow (2) | This is a local exploit for linux platform. Description: S.u.S.E Linux 4.x/5.x/6.x/7.0 / Slackware 3.x/4.0 / Turbolinux 6 / OpenLinux 7.0 - 'fdmount' Local Buffer Overflow (2). Author: Scrippie |
Analyze the security implications of: S.u.S.E Linux 4.x/5.x/6.x/7.0 / Slackware 3.x/4.0 / Turbolinux 6 / OpenLinux 7.0 - 'fdmount' Local Buffer Overflow (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BugFree 2.1.3 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: BugFree 2.1.3 - Multiple Cross-Site Scripting Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: BugFree 2.1.3 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Riorey RIOS 4.7.0 - Hard-Coded Password | This is a remote exploit for hardware platform. Description: Riorey RIOS 4.7.0 - Hard-Coded Password. Author: Marek Kroemeke |
Analyze the security implications of: Riorey RIOS 4.7.0 - Hard-Coded Password | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GoAutoDial CE 2.0 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: GoAutoDial CE 2.0 - Arbitrary File Upload. Author: R-73eN |
Analyze the security implications of: GoAutoDial CE 2.0 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Fortigate Firewall 2.x - selector Admin Interface Cross-Site Scripting | This is a remote exploit for hardware platform. Description: Fortigate Firewall 2.x - selector Admin Interface Cross-Site Scripting. Author: Maarten Hartsuijker |
Analyze the security implications of: Fortigate Firewall 2.x - selector Admin Interface Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CyberBuild - 'browse0.htm?ProductIndex' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: CyberBuild - 'browse0.htm?ProductIndex' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: CyberBuild - 'browse0.htm?ProductIndex' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component DM Orders - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component DM Orders - 'id' SQL Injection. Author: NoGe |
Analyze the security implications of: Joomla! Component DM Orders - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle 10g Database - 'SUBSCRIPTION_NAME' SQL Injection (2) | This is a remote exploit for multiple platform. Description: Oracle 10g Database - 'SUBSCRIPTION_NAME' SQL Injection (2). Author: bunker |
Analyze the security implications of: Oracle 10g Database - 'SUBSCRIPTION_NAME' SQL Injection (2) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CF_Calendar - 'calendarevent.cfm' SQL Injection | This is a webapps exploit for asp platform. Description: CF_Calendar - 'calendarevent.cfm' SQL Injection. Author: AlpHaNiX |
Analyze the security implications of: CF_Calendar - 'calendarevent.cfm' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: dotWidget for articles 2.0 - '/admin/editconfig.php' Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: dotWidget for articles 2.0 - '/admin/editconfig.php' Multiple Remote File Inclusions. Author: SwEET-DeViL |
Analyze the security implications of: dotWidget for articles 2.0 - '/admin/editconfig.php' Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Auto Database System 1.0 Infusion Addon - SQL Injection | This is a webapps exploit for php platform. Description: Auto Database System 1.0 Infusion Addon - SQL Injection. Author: Saif |
Analyze the security implications of: Auto Database System 1.0 Infusion Addon - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WordPress Plugin WP Symposium 14.11 - Arbitrary File Upload (Metasploit) | This is a remote exploit for php platform. Description: WordPress Plugin WP Symposium 14.11 - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: WordPress Plugin WP Symposium 14.11 - Arbitrary File Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_xcloner-backupandrestore - Remote Command Execution | This is a webapps exploit for php platform. Description: Joomla! Component com_xcloner-backupandrestore - Remote Command Execution. Author: mr_me |
Analyze the security implications of: Joomla! Component com_xcloner-backupandrestore - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache 2.4.7 mod_status - Scoreboard Handling Race Condition | This is a dos exploit for linux platform. Description: Apache 2.4.7 mod_status - Scoreboard Handling Race Condition. Author: Marek Kroemeke |
Analyze the security implications of: Apache 2.4.7 mod_status - Scoreboard Handling Race Condition | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Advanced Webhost Billing System (AWBS) 2.9.2 - 'oid' SQL Injection | This is a webapps exploit for php platform. Description: Advanced Webhost Billing System (AWBS) 2.9.2 - 'oid' SQL Injection. Author: ShivX |
Analyze the security implications of: Advanced Webhost Billing System (AWBS) 2.9.2 - 'oid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JE Quiz 2.3 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JE Quiz 2.3 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JE Quiz 2.3 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Real Networks Real Server 7.0/7.0.1/8.0 Beta - view-source Denial of Service | This is a dos exploit for multiple platform. Description: Real Networks Real Server 7.0/7.0.1/8.0 Beta - view-source Denial of Service. Author: Ussr Labs |
Analyze the security implications of: Real Networks Real Server 7.0/7.0.1/8.0 Beta - view-source Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mozilla Firefox 9.0.1 / Thunderbird 3.1.20 - Information Disclosure | This is a remote exploit for multiple platform. Description: Mozilla Firefox 9.0.1 / Thunderbird 3.1.20 - Information Disclosure. Author: Michal Zalewski |
Analyze the security implications of: Mozilla Firefox 9.0.1 / Thunderbird 3.1.20 - Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: KeyBase Botnet 1.5 - SQL Injection | This is a webapps exploit for php platform. Description: KeyBase Botnet 1.5 - SQL Injection. Author: n4pst3r |
Analyze the security implications of: KeyBase Botnet 1.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Trend Micro IWSS 3.1 - Local Privilege Escalation | This is a local exploit for linux platform. Description: Trend Micro IWSS 3.1 - Local Privilege Escalation. Author: Buguroo Offensive Security |
Analyze the security implications of: Trend Micro IWSS 3.1 - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AWStats 5.7 < 6.2 - Multiple Remote | This is a webapps exploit for cgi platform. Description: AWStats 5.7 < 6.2 - Multiple Remote. Author: Silentium |
Analyze the security implications of: AWStats 5.7 < 6.2 - Multiple Remote | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: CMSimple 5.15 - Remote Code Execution (RCE) (Authenticated) | This is a webapps exploit for php platform. Description: CMSimple 5.15 - Remote Code Execution (RCE) (Authenticated). Author: Ahmet Ümit BAYRAM |
Analyze the security implications of: CMSimple 5.15 - Remote Code Execution (RCE) (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Enigma NMS 65.0.0 - OS Command Injection | This is a webapps exploit for multiple platform. Description: Enigma NMS 65.0.0 - OS Command Injection. Author: xerubus |
Analyze the security implications of: Enigma NMS 65.0.0 - OS Command Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ananda Real Estate 3.4 - 'list.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Ananda Real Estate 3.4 - 'list.asp' Multiple SQL Injections. Author: underground-stockholm.com |
Analyze the security implications of: Ananda Real Estate 3.4 - 'list.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: glFusion 1.1.2 - 'COM_applyFilter()/cookies' Blind SQL Injection | This is a webapps exploit for php platform. Description: glFusion 1.1.2 - 'COM_applyFilter()/cookies' Blind SQL Injection. Author: Nine:Situations:Group |
Analyze the security implications of: glFusion 1.1.2 - 'COM_applyFilter()/cookies' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache Struts 2.3 < 2.3.34 / 2.5 < 2.5.16 - Remote Code Execution (2) | This is a remote exploit for multiple platform. Description: Apache Struts 2.3 < 2.3.34 / 2.5 < 2.5.16 - Remote Code Execution (2). Author: hook-s3c |
Analyze the security implications of: Apache Struts 2.3 < 2.3.34 / 2.5 < 2.5.16 - Remote Code Execution (2) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Snort 2.x - PrintTcpOptions Remote Denial of Service | This is a dos exploit for linux platform. Description: Snort 2.x - PrintTcpOptions Remote Denial of Service. Author: VulnFact Security Labs |
Analyze the security implications of: Snort 2.x - PrintTcpOptions Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: iVote - 'details.php' SQL Injection | This is a webapps exploit for php platform. Description: iVote - 'details.php' SQL Injection. Author: Ashiyane Digital Security Team |
Analyze the security implications of: iVote - 'details.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.