input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: CHETCPASSWD 1.12 - Shadow File Disclosure | This is a webapps exploit for cgi platform. Description: CHETCPASSWD 1.12 - Shadow File Disclosure. Author: Victor Pereira |
Analyze the security implications of: CHETCPASSWD 1.12 - Shadow File Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: timelive time and expense tracking 4.1.1 - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: timelive time and expense tracking 4.1.1 - Multiple Vulnerabilities. Author: Nathaniel Carew |
Analyze the security implications of: timelive time and expense tracking 4.1.1 - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: SolarView Compact 6.00 - 'time_begin' Cross-Site Scripting (XSS) | This is a webapps exploit for hardware platform. Description: SolarView Compact 6.00 - 'time_begin' Cross-Site Scripting (XSS). Author: Ahmed Alroky |
Analyze the security implications of: SolarView Compact 6.00 - 'time_begin' Cross-Site Scripting (XSS) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Allomani Mobile 2.5 - Blind SQL Injection | This is a webapps exploit for php platform. Description: Allomani Mobile 2.5 - Blind SQL Injection. Author: Qabandi |
Analyze the security implications of: Allomani Mobile 2.5 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: E-theni - Remote File Inclusion Command Execution | This is a webapps exploit for php platform. Description: E-theni - Remote File Inclusion Command Execution. Author: frog |
Analyze the security implications of: E-theni - Remote File Inclusion Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Opera Web browser 7.54 java implementation - Multiple Vulnerabilities (1) | This is a dos exploit for linux platform. Description: Opera Web browser 7.54 java implementation - Multiple Vulnerabilities (1). Author: Marc Schoenefeld |
Analyze the security implications of: Opera Web browser 7.54 java implementation - Multiple Vulnerabilities (1) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Invision Power Board (IP.Board) 2.0.4 - Print Action 't' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) 2.0.4 - Print Action 't' Cross-Site Scripting. Author: Mr.SNAKE |
Analyze the security implications of: Invision Power Board (IP.Board) 2.0.4 - Print Action 't' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Interactivefx.ie CMS - SQL Injection | This is a webapps exploit for php platform. Description: Interactivefx.ie CMS - SQL Injection. Author: Inj3ct0r |
Analyze the security implications of: Interactivefx.ie CMS - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: H0tturk Panel - 'gizli.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: H0tturk Panel - 'gizli.php' Remote File Inclusion. Author: U238 |
Analyze the security implications of: H0tturk Panel - 'gizli.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Deluxe Blog Factory 1.1.2 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Deluxe Blog Factory 1.1.2 - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component Deluxe Blog Factory 1.1.2 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Enalean Tuleap 7.2 - XML External Entity File Disclosure | This is a webapps exploit for php platform. Description: Enalean Tuleap 7.2 - XML External Entity File Disclosure. Author: Portcullis |
Analyze the security implications of: Enalean Tuleap 7.2 - XML External Entity File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mulesoft ESB Runtime 3.5.1 - Privilege Escalation | This is a webapps exploit for jsp platform. Description: Mulesoft ESB Runtime 3.5.1 - Privilege Escalation. Author: Brandon Perry |
Analyze the security implications of: Mulesoft ESB Runtime 3.5.1 - Privilege Escalation | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: GeoClassifieds Enterprise 2.0.5.x - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: GeoClassifieds Enterprise 2.0.5.x - 'index.php' Multiple Cross-Site Scripting Vulnerabilities. Author: EllipSiS Security |
Analyze the security implications of: GeoClassifieds Enterprise 2.0.5.x - 'index.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: E-Xoopport Samsara 3.1 (Sections Module) - Blind SQL Injection | This is a webapps exploit for php platform. Description: E-Xoopport Samsara 3.1 (Sections Module) - Blind SQL Injection. Author: _mRkZ_ |
Analyze the security implications of: E-Xoopport Samsara 3.1 (Sections Module) - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SDL_image 1.2.6 - Invalid '.GIF' File LWZ Minimum Code Size Remote Buffer Overflow | This is a dos exploit for linux platform. Description: SDL_image 1.2.6 - Invalid '.GIF' File LWZ Minimum Code Size Remote Buffer Overflow. Author: Gynvael Coldwind |
Analyze the security implications of: SDL_image 1.2.6 - Invalid '.GIF' File LWZ Minimum Code Size Remote Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: hosting controller 6.1 hot fix 3.3 - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: hosting controller 6.1 hot fix 3.3 - Multiple Vulnerabilities. Author: BugReport.IR |
Analyze the security implications of: hosting controller 6.1 hot fix 3.3 - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Uptime Agent 5.0.1 - Stack Overflow | This is a dos exploit for linux platform. Description: Uptime Agent 5.0.1 - Stack Overflow. Author: Denis Andzakovic |
Analyze the security implications of: Uptime Agent 5.0.1 - Stack Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Library CMS 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Library CMS 1.0 - SQL Injection. Author: AkkuS |
Analyze the security implications of: Library CMS 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Elektronischer Leitz-Ordner 10 - SQL Injection | This is a webapps exploit for linux platform. Description: Elektronischer Leitz-Ordner 10 - SQL Injection. Author: Jens Regel |
Analyze the security implications of: Elektronischer Leitz-Ordner 10 - SQL Injection | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Indexu 5.0/5.3 - 'upgrade.php?gateway' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Indexu 5.0/5.3 - 'upgrade.php?gateway' Cross-Site Scripting. Author: SwEET-DeViL |
Analyze the security implications of: Indexu 5.0/5.3 - 'upgrade.php?gateway' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CubeCart 3.0.x - '/admin/print_order.php?order_id' SQL Injection | This is a webapps exploit for php platform. Description: CubeCart 3.0.x - '/admin/print_order.php?order_id' SQL Injection. Author: HACKERS PAL |
Analyze the security implications of: CubeCart 3.0.x - '/admin/print_order.php?order_id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: APC Network Management Card - Cross-Site Request Forgery / Cross-Site Scripting | This is a remote exploit for multiple platform. Description: APC Network Management Card - Cross-Site Request Forgery / Cross-Site Scripting. Author: Jamal Pecou |
Analyze the security implications of: APC Network Management Card - Cross-Site Request Forgery / Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Kusaba 1.0.4 - Remote Code Execution (2) | This is a webapps exploit for php platform. Description: Kusaba 1.0.4 - Remote Code Execution (2). Author: Sausage |
Analyze the security implications of: Kusaba 1.0.4 - Remote Code Execution (2) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Beehive Forum 101 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Beehive Forum 101 - Multiple Cross-Site Scripting Vulnerabilities. Author: Stefan Schurtz |
Analyze the security implications of: Beehive Forum 101 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Snort 2.4.2 - Back Orifice Pre-Preprocessor Remote (4) | This is a remote exploit for linux platform. Description: Snort 2.4.2 - Back Orifice Pre-Preprocessor Remote (4). Author: xwings |
Analyze the security implications of: Snort 2.4.2 - Back Orifice Pre-Preprocessor Remote (4) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Check Point Software Firewall-1 3.0/1 4.0 / Cisco PIX Firewall 4.x/5.x - 'ALG' Client | This is a remote exploit for multiple platform. Description: Check Point Software Firewall-1 3.0/1 4.0 / Cisco PIX Firewall 4.x/5.x - 'ALG' Client. Author: Dug Song |
Analyze the security implications of: Check Point Software Firewall-1 3.0/1 4.0 / Cisco PIX Firewall 4.x/5.x - 'ALG' Client | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: TCP SYN - 'bang.c' Denial of Service | This is a dos exploit for bsd platform. Description: TCP SYN - 'bang.c' Denial of Service. Author: Nebunu |
Analyze the security implications of: TCP SYN - 'bang.c' Denial of Service | This exploit targets bsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Dagger CMS 2008 - 'dir_inc' Remote File Inclusion | This is a webapps exploit for php platform. Description: Dagger CMS 2008 - 'dir_inc' Remote File Inclusion. Author: CraCkEr |
Analyze the security implications of: Dagger CMS 2008 - 'dir_inc' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Auto Dealer - SQL Injection | This is a webapps exploit for php platform. Description: Auto Dealer - SQL Injection. Author: Easy Laster |
Analyze the security implications of: Auto Dealer - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BloofoxCMS 0.3 - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: BloofoxCMS 0.3 - Multiple Input Validation Vulnerabilities. Author: AmnPardaz |
Analyze the security implications of: BloofoxCMS 0.3 - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FaScript FaMp3 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: FaScript FaMp3 1.0 - SQL Injection. Author: Khashayar Fereidani |
Analyze the security implications of: FaScript FaMp3 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ProFTPd 1.3.5 - File Copy | This is a remote exploit for linux platform. Description: ProFTPd 1.3.5 - File Copy. Author: anonymous |
Analyze the security implications of: ProFTPd 1.3.5 - File Copy | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 - Authentication Bypass. Author: LiquidWorm |
Analyze the security implications of: Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: APC ActionApps CMS 2.8.1 - Remote File Inclusion | This is a webapps exploit for php platform. Description: APC ActionApps CMS 2.8.1 - Remote File Inclusion. Author: Kacper |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.