input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Openfire 4.6.0 - 'users' Stored XSS | This is a webapps exploit for jsp platform. Description: Openfire 4.6.0 - 'users' Stored XSS. Author: j5s |
Analyze the security implications of: Openfire 4.6.0 - 'users' Stored XSS | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: jQuery Uploadify 2.1.0 - Arbitrary File Upload | This is a webapps exploit for multiple platform. Description: jQuery Uploadify 2.1.0 - Arbitrary File Upload. Author: k4cp3r/Ablus |
Analyze the security implications of: jQuery Uploadify 2.1.0 - Arbitrary File Upload | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DVGuestbook 1.0/1.2.2 - 'index.php?page' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DVGuestbook 1.0/1.2.2 - 'index.php?page' Cross-Site Scripting. Author: Liz0ziM |
Analyze the security implications of: DVGuestbook 1.0/1.2.2 - 'index.php?page' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IF-CMS 2.07 - Local File Inclusion (Metasploit) (2) | This is a webapps exploit for php platform. Description: IF-CMS 2.07 - Local File Inclusion (Metasploit) (2). Author: TecR0c |
Analyze the security implications of: IF-CMS 2.07 - Local File Inclusion (Metasploit) (2) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Wolters Kluwer TeamMate 3.1 - Cross-Site Request Forgery | This is a webapps exploit for multiple platform. Description: Wolters Kluwer TeamMate 3.1 - Cross-Site Request Forgery. Author: Bhadresh Patel |
Analyze the security implications of: Wolters Kluwer TeamMate 3.1 - Cross-Site Request Forgery | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache Subversion 1.6.x - 'mod_dav_svn/lock.c' Remote Denial of Service | This is a dos exploit for linux platform. Description: Apache Subversion 1.6.x - 'mod_dav_svn/lock.c' Remote Denial of Service. Author: anonymous |
Analyze the security implications of: Apache Subversion 1.6.x - 'mod_dav_svn/lock.c' Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: SmartAgent 3.1.0 - Privilege Escalation | This is a webapps exploit for multiple platform. Description: SmartAgent 3.1.0 - Privilege Escalation. Author: Orion Hridoy |
Analyze the security implications of: SmartAgent 3.1.0 - Privilege Escalation | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Control Web Panel 7 (CWP7) v0.9.8.1147 - Remote Code Execution (RCE) | This is a webapps exploit for php platform. Description: Control Web Panel 7 (CWP7) v0.9.8.1147 - Remote Code Execution (RCE). Author: Mayank Deshmukh |
Analyze the security implications of: Control Web Panel 7 (CWP7) v0.9.8.1147 - Remote Code Execution (RCE) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BSW Gallery - 'uploadpic.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: BSW Gallery - 'uploadpic.php' Arbitrary File Upload. Author: cr4wl3r |
Analyze the security implications of: BSW Gallery - 'uploadpic.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 4x CMS - 'login.php' Multiple SQL Injections | This is a webapps exploit for php platform. Description: 4x CMS - 'login.php' Multiple SQL Injections. Author: cr4wl3r |
Analyze the security implications of: 4x CMS - 'login.php' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SearchBlox - Multiple Information Disclosure Vulnerabilities | This is a webapps exploit for java platform. Description: SearchBlox - Multiple Information Disclosure Vulnerabilities. Author: Ricky Roane Jr |
Analyze the security implications of: SearchBlox - Multiple Information Disclosure Vulnerabilities | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: BoastMachine - 'blog' SQL Injection | This is a webapps exploit for php platform. Description: BoastMachine - 'blog' SQL Injection. Author: Omar Kurt |
Analyze the security implications of: BoastMachine - 'blog' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dir2web - '/system/src/dispatcher.php?oid' SQL Injection | This is a webapps exploit for php platform. Description: Dir2web - '/system/src/dispatcher.php?oid' SQL Injection. Author: Daniel Correa |
Analyze the security implications of: Dir2web - '/system/src/dispatcher.php?oid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMSsite 1.0 - Multiple Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: CMSsite 1.0 - Multiple Cross-Site Request Forgery. Author: Mr Winst0n |
Analyze the security implications of: CMSsite 1.0 - Multiple Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASP Indir Iltaweb Alisveris Sistemi - 'xurunler.asp' SQL Injection | This is a webapps exploit for asp platform. Description: ASP Indir Iltaweb Alisveris Sistemi - 'xurunler.asp' SQL Injection. Author: tRoot |
Analyze the security implications of: ASP Indir Iltaweb Alisveris Sistemi - 'xurunler.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apple Mac OSX 10.4.8 - DMG UFS FFS_MountFS Integer Overflow | This is a dos exploit for osx platform. Description: Apple Mac OSX 10.4.8 - DMG UFS FFS_MountFS Integer Overflow. Author: LMH |
Analyze the security implications of: Apple Mac OSX 10.4.8 - DMG UFS FFS_MountFS Integer Overflow | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Command School Student Management System - '/sw/Admin_change_Password.php' Cross-Site Request Forgery (Admin Password Manipulation) | This is a webapps exploit for php platform. Description: Command School Student Management System - '/sw/Admin_change_Password.php' Cross-Site Request Forgery (Admin Password Manipulation). Author: AtT4CKxT3rR0r1ST |
Analyze the security implications of: Command School Student Management System - '/sw/Admin_change_Password.php' Cross-Site Request Forgery (Admin Password Manipulation) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HolaCMS 1.2.x/1.4.x Voting Module - Directory Traversal Remote File Corruption | This is a webapps exploit for php platform. Description: HolaCMS 1.2.x/1.4.x Voting Module - Directory Traversal Remote File Corruption. Author: Virginity Security |
Analyze the security implications of: HolaCMS 1.2.x/1.4.x Voting Module - Directory Traversal Remote File Corruption | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Nessus 8.2.1 - Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Nessus 8.2.1 - Cross-Site Scripting. Author: Ozer Goker |
Analyze the security implications of: Nessus 8.2.1 - Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: AlkalinePHP 0.77.35 - 'adduser.php' Arbitrary Add Admin | This is a webapps exploit for php platform. Description: AlkalinePHP 0.77.35 - 'adduser.php' Arbitrary Add Admin. Author: t0pP8uZz |
Analyze the security implications of: AlkalinePHP 0.77.35 - 'adduser.php' Arbitrary Add Admin | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Squid Proxy 2.5/2.6 - FTP URI Remote Denial of Service | This is a dos exploit for linux platform. Description: Squid Proxy 2.5/2.6 - FTP URI Remote Denial of Service. Author: David Duncan Ross Palmer |
Analyze the security implications of: Squid Proxy 2.5/2.6 - FTP URI Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple macOS 10.12 - Double vm_deallocate in Userspace MIG Code Use-After-Free | This is a dos exploit for macos platform. Description: Apple macOS 10.12 - Double vm_deallocate in Userspace MIG Code Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Apple macOS 10.12 - Double vm_deallocate in Userspace MIG Code Use-After-Free | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: dagger Web engine 23jan2007 - Remote File Inclusion | This is a webapps exploit for php platform. Description: dagger Web engine 23jan2007 - Remote File Inclusion. Author: Katatafish |
Analyze the security implications of: dagger Web engine 23jan2007 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LibTiff 3.7.1 - BitsPerSample Tag Local Buffer Overflow | This is a local exploit for multiple platform. Description: LibTiff 3.7.1 - BitsPerSample Tag Local Buffer Overflow. Author: Agustin Gianni |
Analyze the security implications of: LibTiff 3.7.1 - BitsPerSample Tag Local Buffer Overflow | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: D-Link DCS Series Cameras - Insecure Crossdomain | This is a webapps exploit for hardware platform. Description: D-Link DCS Series Cameras - Insecure Crossdomain. Author: SlidingWindow |
Analyze the security implications of: D-Link DCS Series Cameras - Insecure Crossdomain | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: e107 Hupsi_fancybox Plugin - 'Uploadify.php' Arbitrary File Upload | This is a webapps exploit for php platform. Description: e107 Hupsi_fancybox Plugin - 'Uploadify.php' Arbitrary File Upload. Author: Sammy FORGIT |
Analyze the security implications of: e107 Hupsi_fancybox Plugin - 'Uploadify.php' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component is 1.0.1 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Joomla! Component is 1.0.1 - Multiple SQL Injections. Author: Houssamix |
Analyze the security implications of: Joomla! Component is 1.0.1 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BareNuked CMS 1.1.0 - Arbitrary Add Admin | This is a webapps exploit for php platform. Description: BareNuked CMS 1.1.0 - Arbitrary Add Admin. Author: CWH Underground |
Analyze the security implications of: BareNuked CMS 1.1.0 - Arbitrary Add Admin | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: VMware Remote Console e.x.p build-158248 - Format String | This is a dos exploit for multiple platform. Description: VMware Remote Console e.x.p build-158248 - Format String. Author: Alexey Sintsov |
Analyze the security implications of: VMware Remote Console e.x.p build-158248 - Format String | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: TerminatorX 3.8 - Multiple Command-Line and Environment Buffer Overrun Vulnerabilities (1) | This is a local exploit for linux platform. Description: TerminatorX 3.8 - Multiple Command-Line and Environment Buffer Overrun Vulnerabilities (1). Author: c0wboy |
Analyze the security implications of: TerminatorX 3.8 - Multiple Command-Line and Environment Buffer Overrun Vulnerabilities (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: HumHub 1.3.12 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: HumHub 1.3.12 - Cross-Site Scripting. Author: Kağan EĞLENCE |
Analyze the security implications of: HumHub 1.3.12 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Acymailing Starter 5.9.5 - CSV Macro Injection | This is a webapps exploit for php platform. Description: Joomla! Component Acymailing Starter 5.9.5 - CSV Macro Injection. Author: Sureshbabu Narvaneni |
Analyze the security implications of: Joomla! Component Acymailing Starter 5.9.5 - CSV Macro Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Front Accounting 2.3.4 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: Front Accounting 2.3.4 - Cross-Site Request Forgery. Author: AutoSec Tools |
Analyze the security implications of: Front Accounting 2.3.4 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DeluxeBB 1.0 - 'topic.php' SQL Injection | This is a webapps exploit for php platform. Description: DeluxeBB 1.0 - 'topic.php' SQL Injection. Author: abducter |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.