input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: dotProject 2.0 - '/modules/projects/vw_files.php?dPconfig[root_dir]' Remote File Inclusion | This is a webapps exploit for php platform. Description: dotProject 2.0 - '/modules/projects/vw_files.php?dPconfig[root_dir]' Remote File Inclusion. Author: r.verton |
Analyze the security implications of: dotProject 2.0 - '/modules/projects/vw_files.php?dPconfig[root_dir]' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mambo Module Flatmenu 1.07 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Module Flatmenu 1.07 - Remote File Inclusion. Author: Cold Zero |
Analyze the security implications of: Mambo Module Flatmenu 1.07 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flip 2.01 final - 'previewtheme.php?inc_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Flip 2.01 final - 'previewtheme.php?inc_path' Remote File Inclusion. Author: GoLd_M |
Analyze the security implications of: Flip 2.01 final - 'previewtheme.php?inc_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ImpressPages CMS 1.0x - 'admin.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: ImpressPages CMS 1.0x - 'admin.php' Multiple SQL Injections. Author: High-Tech Bridge SA |
Analyze the security implications of: ImpressPages CMS 1.0x - 'admin.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Barbo91 - 'upload.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Barbo91 - 'upload.php' Cross-Site Scripting. Author: indoushka |
Analyze the security implications of: Barbo91 - 'upload.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CASAP Automated Enrollment System 1.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: CASAP Automated Enrollment System 1.0 - Authentication Bypass. Author: Himanshu Shukla |
Analyze the security implications of: CASAP Automated Enrollment System 1.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Gramophone - 'rs' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Gramophone - 'rs' Cross-Site Scripting. Author: G13 |
Analyze the security implications of: Gramophone - 'rs' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AneCMS 1.x - '/modules/blog/index.php' HTML Injection | This is a webapps exploit for php platform. Description: AneCMS 1.x - '/modules/blog/index.php' HTML Injection. Author: High-Tech Bridge SA |
Analyze the security implications of: AneCMS 1.x - '/modules/blog/index.php' HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNU Make For IBM AIX 4.3.3 - CC Path Local Buffer Overflow | This is a local exploit for aix platform. Description: GNU Make For IBM AIX 4.3.3 - CC Path Local Buffer Overflow. Author: watercloud |
Analyze the security implications of: GNU Make For IBM AIX 4.3.3 - CC Path Local Buffer Overflow | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Adult Script 1.6.5 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Adult Script 1.6.5 - Multiple SQL Injections. Author: MhZ91 |
Analyze the security implications of: Adult Script 1.6.5 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BRS Webweaver 1.06 - HTTPd 'User-Agent' Remote Denial of Service | This is a dos exploit for multiple platform. Description: BRS Webweaver 1.06 - HTTPd 'User-Agent' Remote Denial of Service. Author: D4rkGr3y |
Analyze the security implications of: BRS Webweaver 1.06 - HTTPd 'User-Agent' Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Google Chrome 60.0.3080.5 V8 JavaScript Engine - Out-of-Bounds Write | This is a remote exploit for linux platform. Description: Google Chrome 60.0.3080.5 V8 JavaScript Engine - Out-of-Bounds Write. Author: halbecaf |
Analyze the security implications of: Google Chrome 60.0.3080.5 V8 JavaScript Engine - Out-of-Bounds Write | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: BIND 9.4.1 < 9.4.2 - Remote DNS Cache Poisoning (Metasploit) | This is a remote exploit for multiple platform. Description: BIND 9.4.1 < 9.4.2 - Remote DNS Cache Poisoning (Metasploit). Author: I)ruid |
Analyze the security implications of: BIND 9.4.1 < 9.4.2 - Remote DNS Cache Poisoning (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: LocazoList Classifieds 1.0 - 'Viewmsg.asp' SQL Injection | This is a webapps exploit for asp platform. Description: LocazoList Classifieds 1.0 - 'Viewmsg.asp' SQL Injection. Author: ajann |
Analyze the security implications of: LocazoList Classifieds 1.0 - 'Viewmsg.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ASP Photo Gallery 1.0 - Multiple SQL Injections | This is a webapps exploit for asp platform. Description: ASP Photo Gallery 1.0 - Multiple SQL Injections. Author: trew |
Analyze the security implications of: ASP Photo Gallery 1.0 - Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Jedox 2020.2.5 - Remote Code Execution via Configurable Storage Path | This is a webapps exploit for php platform. Description: Jedox 2020.2.5 - Remote Code Execution via Configurable Storage Path. Author: Team Syslifters |
Analyze the security implications of: Jedox 2020.2.5 - Remote Code Execution via Configurable Storage Path | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component AutarTimonial 1.0.8 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component AutarTimonial 1.0.8 - SQL Injection. Author: Sid3^effects |
Analyze the security implications of: Joomla! Component AutarTimonial 1.0.8 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GetSimpleCMS 3.3.16 - Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: GetSimpleCMS 3.3.16 - Remote Code Execution (RCE). Author: CodeSecLab |
Analyze the security implications of: GetSimpleCMS 3.3.16 - Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AllMyVisitors 0.4.0 - 'index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: AllMyVisitors 0.4.0 - 'index.php' Remote File Inclusion. Author: bd0rk |
Analyze the security implications of: AllMyVisitors 0.4.0 - 'index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IMWheel 1.0 - Predictable Temporary File Creation | This is a local exploit for linux platform. Description: IMWheel 1.0 - Predictable Temporary File Creation. Author: I)ruid |
Analyze the security implications of: IMWheel 1.0 - Predictable Temporary File Creation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Wowza Streaming Engine 4.5.0 - Remote Privilege Escalation | This is a webapps exploit for multiple platform. Description: Wowza Streaming Engine 4.5.0 - Remote Privilege Escalation. Author: LiquidWorm |
Analyze the security implications of: Wowza Streaming Engine 4.5.0 - Remote Privilege Escalation | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Debian 2.2 /usr/bin/pileup - Local Privilege Escalation | This is a local exploit for linux platform. Description: Debian 2.2 /usr/bin/pileup - Local Privilege Escalation. Author: Charles Stevenson |
Analyze the security implications of: Debian 2.2 /usr/bin/pileup - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_mediqna 1.1 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component com_mediqna 1.1 - Local File Inclusion. Author: kaMtiEz |
Analyze the security implications of: Joomla! Component com_mediqna 1.1 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Demarc PureSecure 1.0.5 - Authentication Check SQL Injection | This is a remote exploit for multiple platform. Description: Demarc PureSecure 1.0.5 - Authentication Check SQL Injection. Author: pokleyzz sakamaniaka |
Analyze the security implications of: Demarc PureSecure 1.0.5 - Authentication Check SQL Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Helpdesk Pro < 1.4.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Joomla! Component Helpdesk Pro < 1.4.0 - Multiple Vulnerabilities. Author: Simon Rawet |
Analyze the security implications of: Joomla! Component Helpdesk Pro < 1.4.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SAP cFolders - Cross-Site Scripting / HTML Injection | This is a remote exploit for multiple platform. Description: SAP cFolders - Cross-Site Scripting / HTML Injection. Author: Digital Security Research Group |
Analyze the security implications of: SAP cFolders - Cross-Site Scripting / HTML Injection | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Hosting Controller 6.1 - 'resellerresources.asp?jresourceid' SQL Injection | This is a webapps exploit for asp platform. Description: Hosting Controller 6.1 - 'resellerresources.asp?jresourceid' SQL Injection. Author: GrayHatz Security Group |
Analyze the security implications of: Hosting Controller 6.1 - 'resellerresources.asp?jresourceid' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: BSDI 4.0 tcpmux / inetd - Crash | This is a dos exploit for aix platform. Description: BSDI 4.0 tcpmux / inetd - Crash. Author: Mark Schaefer |
Analyze the security implications of: BSDI 4.0 tcpmux / inetd - Crash | This exploit targets aix systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Maian Weblog 2.0 - 'mail.php' SQL Injection | This is a webapps exploit for php platform. Description: Maian Weblog 2.0 - 'mail.php' SQL Injection. Author: Aliaksandr Hartsuyeu |
Analyze the security implications of: Maian Weblog 2.0 - 'mail.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: XenForo 2 - CSS Loader Denial of Service | This is a dos exploit for php platform. Description: XenForo 2 - CSS Loader Denial of Service. Author: LockedByte |
Analyze the security implications of: XenForo 2 - CSS Loader Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Addonics NAS Adapter - 'bts.cgi' (Authenticated) Remote Denial of Service | This is a dos exploit for hardware platform. Description: Addonics NAS Adapter - 'bts.cgi' (Authenticated) Remote Denial of Service. Author: h00die |
Analyze the security implications of: Addonics NAS Adapter - 'bts.cgi' (Authenticated) Remote Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: kora - Reinstall Admin Information | This is a webapps exploit for php platform. Description: kora - Reinstall Admin Information. Author: indoushka |
Analyze the security implications of: kora - Reinstall Admin Information | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_dms 2.5.1 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_dms 2.5.1 - SQL Injection. Author: kaMtiEz |
Analyze the security implications of: Joomla! Component com_dms 2.5.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Salim Gasmi GLD (Greylisting Daemon) - Postfix Buffer Overflow (Metasploit) | This is a remote exploit for linux platform. Description: Salim Gasmi GLD (Greylisting Daemon) - Postfix Buffer Overflow (Metasploit). Author: Metasploit |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.