input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: HP-UX 10.x - rs.F3000 Unauthorized Access
|
This exploit targets hp-ux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hp-ux platform
|
What is this exploit about: Command School Student Management System - '/sw/admin_relations.php?id' SQL Injection
|
This is a webapps exploit for php platform. Description: Command School Student Management System - '/sw/admin_relations.php?id' SQL Injection. Author: AtT4CKxT3rR0r1ST
|
Analyze the security implications of: Command School Student Management System - '/sw/admin_relations.php?id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: inoERP 0.6.1 - Cross-Site Scripting / Cross-Site Request Forgery / SQL Injection / Session Fixation
|
This is a webapps exploit for php platform. Description: inoERP 0.6.1 - Cross-Site Scripting / Cross-Site Request Forgery / SQL Injection / Session Fixation. Author: Tim Herres
|
Analyze the security implications of: inoERP 0.6.1 - Cross-Site Scripting / Cross-Site Request Forgery / SQL Injection / Session Fixation
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CWB PRO 1.5 - 'INCLUDE_PATH' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: CWB PRO 1.5 - 'INCLUDE_PATH' Remote File Inclusion. Author: GoLd_M
|
Analyze the security implications of: CWB PRO 1.5 - 'INCLUDE_PATH' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bookwyrm v0.4.3 - Authentication Bypass
|
This is a webapps exploit for multiple platform. Description: Bookwyrm v0.4.3 - Authentication Bypass. Author: Akshay Ravi
|
Analyze the security implications of: Bookwyrm v0.4.3 - Authentication Bypass
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Microsoft Internet Explorer 5.0.1 / Opera 7.51 - URI Obfuscation
|
This is a remote exploit for multiple platform. Description: Microsoft Internet Explorer 5.0.1 / Opera 7.51 - URI Obfuscation. Author: http-equiv
|
Analyze the security implications of: Microsoft Internet Explorer 5.0.1 / Opera 7.51 - URI Obfuscation
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Bits Video Script 2.04/2.05 - '/register.php' Arbitrary File Upload / Arbitrary PHP Code Execution
|
This is a webapps exploit for php platform. Description: Bits Video Script 2.04/2.05 - '/register.php' Arbitrary File Upload / Arbitrary PHP Code Execution. Author: indoushka
|
Analyze the security implications of: Bits Video Script 2.04/2.05 - '/register.php' Arbitrary File Upload / Arbitrary PHP Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Media Mall Factory 1.0.4 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Media Mall Factory 1.0.4 - Blind SQL Injection. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component Media Mall Factory 1.0.4 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ktools Photostore 4.7.5 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Ktools Photostore 4.7.5 - Multiple Vulnerabilities. Author: Yakir Wizman
|
Analyze the security implications of: Ktools Photostore 4.7.5 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ApPHP MicroCMS 3.9.5 - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: ApPHP MicroCMS 3.9.5 - Persistent Cross-Site Scripting. Author: Besim
|
Analyze the security implications of: ApPHP MicroCMS 3.9.5 - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Netgear DGN2200 - 'dnslookup.cgi' Command Injection (Metasploit)
|
This is a remote exploit for cgi platform. Description: Netgear DGN2200 - 'dnslookup.cgi' Command Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: Netgear DGN2200 - 'dnslookup.cgi' Command Injection (Metasploit)
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Sagem F@st 3304-V2 - Telnet Crash (PoC)
|
This is a dos exploit for hardware platform. Description: Sagem F@st 3304-V2 - Telnet Crash (PoC). Author: Loudiyi Mohamed
|
Analyze the security implications of: Sagem F@st 3304-V2 - Telnet Crash (PoC)
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Be BeOS 4.0/4.5/5.0 - IP Packet Length Field
|
This is a local exploit for beos platform. Description: Be BeOS 4.0/4.5/5.0 - IP Packet Length Field. Author: Tim Newsham
|
Analyze the security implications of: Be BeOS 4.0/4.5/5.0 - IP Packet Length Field
|
This exploit targets beos systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets beos platform
|
What is this exploit about: RealTime RWR-3G-100 Router - Cross-Site Request Forgery (Change Admin Password)
|
This is a webapps exploit for hardware platform. Description: RealTime RWR-3G-100 Router - Cross-Site Request Forgery (Change Admin Password). Author: Touhid M.Shaikh
|
Analyze the security implications of: RealTime RWR-3G-100 Router - Cross-Site Request Forgery (Change Admin Password)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Sitecom Home Storage Center - Directory Traversal
|
This is a webapps exploit for hardware platform. Description: Sitecom Home Storage Center - Directory Traversal. Author: Mattijs van Ommeren
|
Analyze the security implications of: Sitecom Home Storage Center - Directory Traversal
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Shopizer 2.16.0 - 'Multiple' Cross-Site Scripting (XSS)
|
This is a webapps exploit for java platform. Description: Shopizer 2.16.0 - 'Multiple' Cross-Site Scripting (XSS). Author: Marek Toth
|
Analyze the security implications of: Shopizer 2.16.0 - 'Multiple' Cross-Site Scripting (XSS)
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Interview Management System 1.0 - Stored XSS in Add New Question
|
This is a webapps exploit for php platform. Description: Interview Management System 1.0 - Stored XSS in Add New Question. Author: Saeed Bala Ahmed
|
Analyze the security implications of: Interview Management System 1.0 - Stored XSS in Add New Question
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: jaxultrabb 2.0 - Local File Inclusion / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: jaxultrabb 2.0 - Local File Inclusion / Cross-Site Scripting. Author: CWH Underground
|
Analyze the security implications of: jaxultrabb 2.0 - Local File Inclusion / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Aastra IP Phone 9480i - Web Interface Data Disclosure
|
This is a webapps exploit for hardware platform. Description: Aastra IP Phone 9480i - Web Interface Data Disclosure. Author: Yakir Wizman
|
Analyze the security implications of: Aastra IP Phone 9480i - Web Interface Data Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Diesel Joke Site - 'Category.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Diesel Joke Site - 'Category.php' SQL Injection. Author: black-code
|
Analyze the security implications of: Diesel Joke Site - 'Category.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco Linksys WAG54GS - Cross-Site Request Forgery (Change Admin Password)
|
This is a webapps exploit for hardware platform. Description: Cisco Linksys WAG54GS - Cross-Site Request Forgery (Change Admin Password). Author: Ivano Binetti
|
Analyze the security implications of: Cisco Linksys WAG54GS - Cross-Site Request Forgery (Change Admin Password)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Samsung SyncThruWeb 2.01.00.26 - SMB Hash Disclosure
|
This is a webapps exploit for hardware platform. Description: Samsung SyncThruWeb 2.01.00.26 - SMB Hash Disclosure. Author: Shad Malloy
|
Analyze the security implications of: Samsung SyncThruWeb 2.01.00.26 - SMB Hash Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Eggdrop/Windrop 1.6.19 - ctcpbuf Remote Crash
|
This is a dos exploit for multiple platform. Description: Eggdrop/Windrop 1.6.19 - ctcpbuf Remote Crash. Author: Thomas Sader
|
Analyze the security implications of: Eggdrop/Windrop 1.6.19 - ctcpbuf Remote Crash
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: piSignage 2.6.4 - Directory Traversal
|
This is a webapps exploit for hardware platform. Description: piSignage 2.6.4 - Directory Traversal. Author: JunYeong Ko
|
Analyze the security implications of: piSignage 2.6.4 - Directory Traversal
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: McAfee LinuxShield 1.5.1 - Local/Remote File Inclusion / Remote Code Execution
|
This is a webapps exploit for linux platform. Description: McAfee LinuxShield 1.5.1 - Local/Remote File Inclusion / Remote Code Execution. Author: Nikolas Sotiriu
|
Analyze the security implications of: McAfee LinuxShield 1.5.1 - Local/Remote File Inclusion / Remote Code Execution
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: LayerBB 1.1.4 - 'search_query' SQL Injection
|
This is a webapps exploit for php platform. Description: LayerBB 1.1.4 - 'search_query' SQL Injection. Author: Görkem Haşin
|
Analyze the security implications of: LayerBB 1.1.4 - 'search_query' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HiveMail 1.2.2/1.3 - 'folders.update.php?folderid' Arbitrary PHP Command Execution
|
This is a webapps exploit for php platform. Description: HiveMail 1.2.2/1.3 - 'folders.update.php?folderid' Arbitrary PHP Command Execution. Author: GulfTech Security
|
Analyze the security implications of: HiveMail 1.2.2/1.3 - 'folders.update.php?folderid' Arbitrary PHP Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Redlab CMS - Multiple SQL Injections
|
This is a webapps exploit for asp platform. Description: Redlab CMS - Multiple SQL Injections. Author: tempe_mendoan
|
Analyze the security implications of: Redlab CMS - Multiple SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component JP Jobs 1.2.0 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JP Jobs 1.2.0 - 'id' SQL Injection. Author: v3n0m
|
Analyze the security implications of: Joomla! Component JP Jobs 1.2.0 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Wireless Tools 26 (IWConfig) - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: Wireless Tools 26 (IWConfig) - Local Privilege Escalation. Author: Qnix
|
Analyze the security implications of: Wireless Tools 26 (IWConfig) - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: CONTROLzx Hms 3.3.4 - 'dedicated_order.php?dedicatedPlanID' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: CONTROLzx Hms 3.3.4 - 'dedicated_order.php?dedicatedPlanID' Cross-Site Scripting. Author: r0t
|
Analyze the security implications of: CONTROLzx Hms 3.3.4 - 'dedicated_order.php?dedicatedPlanID' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jupiter CMS 1.1.5 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Jupiter CMS 1.1.5 - Multiple Cross-Site Scripting Vulnerabilities. Author: Nomenumbra
|
Analyze the security implications of: Jupiter CMS 1.1.5 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Wifi Photo Transfer 2.1/1.1 PRO - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Wifi Photo Transfer 2.1/1.1 PRO - Multiple Vulnerabilities. Author: Vulnerability-Lab
|
Analyze the security implications of: Wifi Photo Transfer 2.1/1.1 PRO - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Exponent CMS 2.0 Beta 1.1 - Cross-Site Request Forgery (Add Administrator Account)
|
This is a webapps exploit for php platform. Description: Exponent CMS 2.0 Beta 1.1 - Cross-Site Request Forgery (Add Administrator Account). Author: outlaw.dll
|
Analyze the security implications of: Exponent CMS 2.0 Beta 1.1 - Cross-Site Request Forgery (Add Administrator Account)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.