input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Bus Pass Management System 1.0 - Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Meinberg LANTIME Web Configuration Utility 6.16.008 - Arbitrary File Read
|
This is a webapps exploit for cgi platform. Description: Meinberg LANTIME Web Configuration Utility 6.16.008 - Arbitrary File Read. Author: Jakub Palaczynski
|
Analyze the security implications of: Meinberg LANTIME Web Configuration Utility 6.16.008 - Arbitrary File Read
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: IntranetApp 3.3 - 'login.asp?ret_page' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: IntranetApp 3.3 - 'login.asp?ret_page' Cross-Site Scripting. Author: r0t
|
Analyze the security implications of: IntranetApp 3.3 - 'login.asp?ret_page' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Faq-O-Matic 2.6/2.7 - Cross-Site Scripting
|
This is a remote exploit for cgi platform. Description: Faq-O-Matic 2.6/2.7 - Cross-Site Scripting. Author: superpetz
|
Analyze the security implications of: Faq-O-Matic 2.6/2.7 - Cross-Site Scripting
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Easysitenetwork Jokes Complete Website 2.1.3 - 'jokeid' SQL Injection
|
This is a webapps exploit for php platform. Description: Easysitenetwork Jokes Complete Website 2.1.3 - 'jokeid' SQL Injection. Author: InjEctOr5
|
Analyze the security implications of: Easysitenetwork Jokes Complete Website 2.1.3 - 'jokeid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DRZES Hms 3.2 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: DRZES Hms 3.2 - Multiple SQL Injections. Author: r0t
|
Analyze the security implications of: DRZES Hms 3.2 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Coppermine Photo Gallery 1.4.21 - 'css' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Coppermine Photo Gallery 1.4.21 - 'css' Cross-Site Scripting. Author: Gerendi Sandor Attila
|
Analyze the security implications of: Coppermine Photo Gallery 1.4.21 - 'css' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: jPlayer - 'Jplayer.swf' Script Cross-Site Scripting
|
This is a webapps exploit for jsp platform. Description: jPlayer - 'Jplayer.swf' Script Cross-Site Scripting. Author: Malte Batram
|
Analyze the security implications of: jPlayer - 'Jplayer.swf' Script Cross-Site Scripting
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Dojo Toolkit 1.4.1 - '/dijit/tests/_testCommon.js?theme' Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: Dojo Toolkit 1.4.1 - '/dijit/tests/_testCommon.js?theme' Cross-Site Scripting. Author: Adam Bixby
|
Analyze the security implications of: Dojo Toolkit 1.4.1 - '/dijit/tests/_testCommon.js?theme' Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CoolPHP - 'index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: CoolPHP - 'index.php' Cross-Site Scripting. Author: black-code
|
Analyze the security implications of: CoolPHP - 'index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Brickcom Multiple IP Cameras - Cross-Site Request Forgery
|
This is a remote exploit for hardware platform. Description: Brickcom Multiple IP Cameras - Cross-Site Request Forgery. Author: Castillo
|
Analyze the security implications of: Brickcom Multiple IP Cameras - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Incredible PBX 2.0.6.5.0 - Remote Command Execution
|
This is a webapps exploit for php platform. Description: Incredible PBX 2.0.6.5.0 - Remote Command Execution. Author: Simo Ben Youssef
|
Analyze the security implications of: Incredible PBX 2.0.6.5.0 - Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ocean12 Technologies Calendar Manager Pro 1.0 1 - '/admin/main.asp?date' SQL Injection
|
This is a webapps exploit for asp platform. Description: Ocean12 Technologies Calendar Manager Pro 1.0 1 - '/admin/main.asp?date' SQL Injection. Author: dj_eyes2005
|
Analyze the security implications of: Ocean12 Technologies Calendar Manager Pro 1.0 1 - '/admin/main.asp?date' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Andy Mack 35mm Slide Gallery 6.0 - 'index.php?imgdir' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Andy Mack 35mm Slide Gallery 6.0 - 'index.php?imgdir' Cross-Site Scripting. Author: black-cod3
|
Analyze the security implications of: Andy Mack 35mm Slide Gallery 6.0 - 'index.php?imgdir' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Clever Copy 3.0 - 'Connect.INC' Information Disclosure
|
This is a webapps exploit for php platform. Description: Clever Copy 3.0 - 'Connect.INC' Information Disclosure. Author: M.Hasran Addahroni
|
Analyze the security implications of: Clever Copy 3.0 - 'Connect.INC' Information Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Archery Scores 1.0.6 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Archery Scores 1.0.6 - Local File Inclusion. Author: wishnusakti + inc0mp13te
|
Analyze the security implications of: Joomla! Component Archery Scores 1.0.6 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ruckus Wireless Zoneflex 2942 Wireless Access Point - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: Ruckus Wireless Zoneflex 2942 Wireless Access Point - Authentication Bypass. Author: myexploit
|
Analyze the security implications of: Ruckus Wireless Zoneflex 2942 Wireless Access Point - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: EasyImageCatalogue 1.31 - 'thumber.php?dir' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: EasyImageCatalogue 1.31 - 'thumber.php?dir' Cross-Site Scripting. Author: ZoRLu
|
Analyze the security implications of: EasyImageCatalogue 1.31 - 'thumber.php?dir' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cybertek CMS - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Cybertek CMS - Local File Inclusion. Author: XroGuE
|
Analyze the security implications of: Cybertek CMS - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ArticleSetup 1.00 - Cross-Site Request Forgery (Change Admin Password)
|
This is a webapps exploit for php platform. Description: ArticleSetup 1.00 - Cross-Site Request Forgery (Change Admin Password). Author: Ali Ghanbari
|
Analyze the security implications of: ArticleSetup 1.00 - Cross-Site Request Forgery (Change Admin Password)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DreamPics Builder - 'page' SQL Injection
|
This is a webapps exploit for php platform. Description: DreamPics Builder - 'page' SQL Injection. Author: Hussin X
|
Analyze the security implications of: DreamPics Builder - 'page' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MLdonkey 2.5-4 - Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: MLdonkey 2.5-4 - Cross-Site Scripting. Author: Chris Sharp
|
Analyze the security implications of: MLdonkey 2.5-4 - Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: IBM AIX 4.2.1 / Sun Solaris 7.0 - LC_MESSAGES libc Buffer Overflow (3)
|
This is a local exploit for aix platform. Description: IBM AIX 4.2.1 / Sun Solaris 7.0 - LC_MESSAGES libc Buffer Overflow (3). Author: UNYUN
|
Analyze the security implications of: IBM AIX 4.2.1 / Sun Solaris 7.0 - LC_MESSAGES libc Buffer Overflow (3)
|
This exploit targets aix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: Joomla! Component com_intuit - Apache Directory listing Download
|
This is a webapps exploit for php platform. Description: Joomla! Component com_intuit - Apache Directory listing Download. Author: indoushka
|
Analyze the security implications of: Joomla! Component com_intuit - Apache Directory listing Download
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Horizon QCMS 4.0 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Horizon QCMS 4.0 - Multiple Vulnerabilities. Author: High-Tech Bridge SA
|
Analyze the security implications of: Horizon QCMS 4.0 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Snitz Forums 2000 3.4.03 - 'search.asp' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Snitz Forums 2000 3.4.03 - 'search.asp' Cross-Site Scripting. Author: JeiAr
|
Analyze the security implications of: Snitz Forums 2000 3.4.03 - 'search.asp' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: PSWD.JS - Insecure Password Hash
|
This is a webapps exploit for multiple platform. Description: PSWD.JS - Insecure Password Hash. Author: Gianstefano Monni
|
Analyze the security implications of: PSWD.JS - Insecure Password Hash
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Magic Home Pro 1.5.1 - Authentication Bypass
|
This is a webapps exploit for android platform. Description: Magic Home Pro 1.5.1 - Authentication Bypass. Author: Victor Hanna
|
Analyze the security implications of: Magic Home Pro 1.5.1 - Authentication Bypass
|
This exploit targets android systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Mambo Component pc_cookbook 0.3 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Mambo Component pc_cookbook 0.3 - Remote File Inclusion. Author: Matdhule
|
Analyze the security implications of: Mambo Component pc_cookbook 0.3 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Google SLO-Generator 2.0.0 - Code Execution
|
This is a local exploit for linux platform. Description: Google SLO-Generator 2.0.0 - Code Execution. Author: Kiran Ghimire
|
Analyze the security implications of: Google SLO-Generator 2.0.0 - Code Execution
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: NethServer 7.3.1611 - Cross-Site Request Forgery (Create User / Enable SSH Access)
|
This is a webapps exploit for json platform. Description: NethServer 7.3.1611 - Cross-Site Request Forgery (Create User / Enable SSH Access). Author: LiquidWorm
|
Analyze the security implications of: NethServer 7.3.1611 - Cross-Site Request Forgery (Create User / Enable SSH Access)
|
This exploit targets json systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets json platform
|
What is this exploit about: Cobalt RaQ 2.0/3.0 / qpopper 2.52/2.53 - 'EUIDL' Format String Input
|
This is a local exploit for linux platform. Description: Cobalt RaQ 2.0/3.0 / qpopper 2.52/2.53 - 'EUIDL' Format String Input. Author: Prizm
|
Analyze the security implications of: Cobalt RaQ 2.0/3.0 / qpopper 2.52/2.53 - 'EUIDL' Format String Input
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Barracuda Networks Message Archiver 650 - Persistent Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: Barracuda Networks Message Archiver 650 - Persistent Cross-Site Scripting. Author: Vulnerability-Lab
|
Analyze the security implications of: Barracuda Networks Message Archiver 650 - Persistent Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Real Server 7/8/9 (Windows / Linux) - Remote Code Execution
|
This is a remote exploit for multiple platform. Description: Real Server 7/8/9 (Windows / Linux) - Remote Code Execution. Author: Johnny Cyberpunk
|
Analyze the security implications of: Real Server 7/8/9 (Windows / Linux) - Remote Code Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.