input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: GlassFish Enterprise Server 2.1 - Admin Console /resourceNode/resources.jsf URI Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: GlassFish Enterprise Server 2.1 - Admin Console /resourceNode/resources.jsf URI Cross-Site Scripting. Author: DSecRG
|
Analyze the security implications of: GlassFish Enterprise Server 2.1 - Admin Console /resourceNode/resources.jsf URI Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Supervisor 3.0a1 < 3.3.2 - XML-RPC (Authenticated) Remote Code Execution (Metasploit)
|
This is a remote exploit for linux platform. Description: Supervisor 3.0a1 < 3.3.2 - XML-RPC (Authenticated) Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Supervisor 3.0a1 < 3.3.2 - XML-RPC (Authenticated) Remote Code Execution (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Fibaro Home Center 2 - Remote Command Execution / Privilege Escalation
|
This is a webapps exploit for multiple platform. Description: Fibaro Home Center 2 - Remote Command Execution / Privilege Escalation. Author: forsec
|
Analyze the security implications of: Fibaro Home Center 2 - Remote Command Execution / Privilege Escalation
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Odoo 12.0 - Local File Inclusion
|
This is a webapps exploit for multiple platform. Description: Odoo 12.0 - Local File Inclusion. Author: Emre ÖVÜNÇ
|
Analyze the security implications of: Odoo 12.0 - Local File Inclusion
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: EzBan 5.3 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: EzBan 5.3 - 'id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: EzBan 5.3 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: cf shopkart 5.2.2 - SQL Injection / File Disclosure
|
This is a webapps exploit for asp platform. Description: cf shopkart 5.2.2 - SQL Injection / File Disclosure. Author: AlpHaNiX
|
Analyze the security implications of: cf shopkart 5.2.2 - SQL Injection / File Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Click&Email - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Click&Email - Authentication Bypass. Author: SuB-ZeRo
|
Analyze the security implications of: Click&Email - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: dotProject 2.0 - '/modules/tasks/gantt.php?baseDir' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: dotProject 2.0 - '/modules/tasks/gantt.php?baseDir' Remote File Inclusion. Author: r.verton
|
Analyze the security implications of: dotProject 2.0 - '/modules/tasks/gantt.php?baseDir' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ActiveKB NX 2.6 - 'index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: ActiveKB NX 2.6 - 'index.php' Cross-Site Scripting. Author: durito
|
Analyze the security implications of: ActiveKB NX 2.6 - 'index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mike Bobbitt Album.PL 0.61 - Remote Command Execution
|
This is a webapps exploit for cgi platform. Description: Mike Bobbitt Album.PL 0.61 - Remote Command Execution. Author: aresu@bosen.net
|
Analyze the security implications of: Mike Bobbitt Album.PL 0.61 - Remote Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Kayako SupportSuite 3.0.32 - 'PHP_SELF Trigger_Error' Function Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Kayako SupportSuite 3.0.32 - 'PHP_SELF Trigger_Error' Function Cross-Site Scripting. Author: imei
|
Analyze the security implications of: Kayako SupportSuite 3.0.32 - 'PHP_SELF Trigger_Error' Function Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM OpenAdmin Tool - SOAP welcomeServer PHP Code Execution (Metasploit)
|
This is a remote exploit for php platform. Description: IBM OpenAdmin Tool - SOAP welcomeServer PHP Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: IBM OpenAdmin Tool - SOAP welcomeServer PHP Code Execution (Metasploit)
|
This exploit targets php systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linea21 1.2.1 - 'search' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Linea21 1.2.1 - 'search' Cross-Site Scripting. Author: 599eme Man
|
Analyze the security implications of: Linea21 1.2.1 - 'search' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Boss Mini 1.4.0 - local file inclusion
|
This is a webapps exploit for php platform. Description: Boss Mini 1.4.0 - local file inclusion. Author: nltt0
|
Analyze the security implications of: Boss Mini 1.4.0 - local file inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 2.6.x - Cryptoloop Information Disclosure
|
This is a local exploit for linux platform. Description: Linux Kernel 2.6.x - Cryptoloop Information Disclosure. Author: Markku-Juhani O. Saarinen
|
Analyze the security implications of: Linux Kernel 2.6.x - Cryptoloop Information Disclosure
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: jQuery 1.2 - Cross-Site Scripting (XSS)
|
This is a webapps exploit for multiple platform. Description: jQuery 1.2 - Cross-Site Scripting (XSS). Author: Central InfoSec
|
Analyze the security implications of: jQuery 1.2 - Cross-Site Scripting (XSS)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: USB Sharp 1.3.4 iPad iPhone - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: USB Sharp 1.3.4 iPad iPhone - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: USB Sharp 1.3.4 iPad iPhone - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Genexis Platinum-4410 P4410-V2-1.28 - Broken Access Control and CSRF
|
This is a webapps exploit for hardware platform. Description: Genexis Platinum-4410 P4410-V2-1.28 - Broken Access Control and CSRF. Author: Jinson Varghese Behanan
|
Analyze the security implications of: Genexis Platinum-4410 P4410-V2-1.28 - Broken Access Control and CSRF
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component ACYMAILING 3.9.0 - Unauthenticated Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Joomla! Component ACYMAILING 3.9.0 - Unauthenticated Arbitrary File Upload. Author: qw3rTyTy
|
Analyze the security implications of: Joomla! Component ACYMAILING 3.9.0 - Unauthenticated Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component JA Comment - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component JA Comment - Local File Inclusion. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component JA Comment - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BT Voyager 2091 (Wireless ADSL) - Multiple Vulnerabilities
|
This is a remote exploit for hardware platform. Description: BT Voyager 2091 (Wireless ADSL) - Multiple Vulnerabilities. Author: Adrian _pagvac_ Pastor
|
Analyze the security implications of: BT Voyager 2091 (Wireless ADSL) - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Sguil/PADS - Remote Server Crash
|
This is a dos exploit for multiple platform. Description: Sguil/PADS - Remote Server Crash. Author: Ataraxia
|
Analyze the security implications of: Sguil/PADS - Remote Server Crash
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Lodging Reservation Management System 1.0 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Lodging Reservation Management System 1.0 - Authentication Bypass. Author: Nitin Sharma
|
Analyze the security implications of: Lodging Reservation Management System 1.0 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Campsite 2.6.1 - 'Subscription.php?g_documentRoot' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'Subscription.php?g_documentRoot' Remote File Inclusion. Author: anonymous
|
Analyze the security implications of: Campsite 2.6.1 - 'Subscription.php?g_documentRoot' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Half-Life StatsMe 2.6.x Plugin - CMD_ARGV Buffer Overflow
|
This is a remote exploit for multiple platform. Description: Half-Life StatsMe 2.6.x Plugin - CMD_ARGV Buffer Overflow. Author: greuff@void.at
|
Analyze the security implications of: Half-Life StatsMe 2.6.x Plugin - CMD_ARGV Buffer Overflow
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: LayerBB 1.1.1 - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: LayerBB 1.1.1 - Persistent Cross-Site Scripting. Author: 0xB9
|
Analyze the security implications of: LayerBB 1.1.1 - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ZKSoftware Biometric Attendence Managnmnet Hardware[MIPS] 2 - Improper Authentication
|
This is a remote exploit for hardware platform. Description: ZKSoftware Biometric Attendence Managnmnet Hardware[MIPS] 2 - Improper Authentication. Author: fb1h2s
|
Analyze the security implications of: ZKSoftware Biometric Attendence Managnmnet Hardware[MIPS] 2 - Improper Authentication
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: AN Guestbook 0.4 - 'send_email.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: AN Guestbook 0.4 - 'send_email.php' Cross-Site Scripting. Author: ZoRLu
|
Analyze the security implications of: AN Guestbook 0.4 - 'send_email.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Battleaxe Software BttlxeForum 2.0 - 'Failure.asp' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Battleaxe Software BttlxeForum 2.0 - 'Failure.asp' Cross-Site Scripting. Author: rUnViRuS
|
Analyze the security implications of: Battleaxe Software BttlxeForum 2.0 - 'Failure.asp' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Magic News Plus 1.0.3 - Admin Pass Change
|
This is a webapps exploit for php platform. Description: Magic News Plus 1.0.3 - Admin Pass Change. Author: cijfer
|
Analyze the security implications of: Magic News Plus 1.0.3 - Admin Pass Change
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component allvideos - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component allvideos - Blind SQL Injection. Author: bumble_be
|
Analyze the security implications of: Joomla! Component allvideos - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Invision Power Board (IP.Board) 1.x/2.0.3 - SML Code Script Injection
|
This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) 1.x/2.0.3 - SML Code Script Injection. Author: Daniel A.
|
Analyze the security implications of: Invision Power Board (IP.Board) 1.x/2.0.3 - SML Code Script Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IRCnet IRCD 2.10 - Local Buffer Overflow
|
This is a dos exploit for linux platform. Description: IRCnet IRCD 2.10 - Local Buffer Overflow. Author: millhouse
|
Analyze the security implications of: IRCnet IRCD 2.10 - Local Buffer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.