input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Maian Support Helpdesk 4.3 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for php platform. Description: Maian Support Helpdesk 4.3 - Cross-Site Request Forgery (Add Admin). Author: Besim
|
Analyze the security implications of: Maian Support Helpdesk 4.3 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_djcatalog - SQL Injection / Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_djcatalog - SQL Injection / Blind SQL Injection. Author: Chip d3 bi0s
|
Analyze the security implications of: Joomla! Component com_djcatalog - SQL Injection / Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dragon Business Directory 3.01.12 - 'ID' SQL Injection
|
This is a webapps exploit for asp platform. Description: Dragon Business Directory 3.01.12 - 'ID' SQL Injection. Author: ajann
|
Analyze the security implications of: Dragon Business Directory 3.01.12 - 'ID' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Horde IMP 2.2.x - Session Hijacking
|
This is a remote exploit for linux platform. Description: Horde IMP 2.2.x - Session Hijacking. Author: Joao Pedro Goncalves
|
Analyze the security implications of: Horde IMP 2.2.x - Session Hijacking
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Oracle Application Server 9i - Webcache Cache_dump_file Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: Oracle Application Server 9i - Webcache Cache_dump_file Cross-Site Scripting. Author: Alexander Kornbrust
|
Analyze the security implications of: Oracle Application Server 9i - Webcache Cache_dump_file Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_aprice - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_aprice - Blind SQL Injection. Author: FL0RiX
|
Analyze the security implications of: Joomla! Component com_aprice - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Feng Office 1.7.4 - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Feng Office 1.7.4 - Cross-Site Scripting. Author: AutoSec Tools
|
Analyze the security implications of: Feng Office 1.7.4 - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Kasseler CMS - File Disclosure / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Kasseler CMS - File Disclosure / Cross-Site Scripting. Author: S(r1pt
|
Analyze the security implications of: Kasseler CMS - File Disclosure / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apache CouchDB - Arbitrary Command Execution (Metasploit)
|
This is a remote exploit for linux platform. Description: Apache CouchDB - Arbitrary Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Apache CouchDB - Arbitrary Command Execution (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: JReport - 'dealSchedules.jsp' Cross-Site Request Forgery
|
This is a webapps exploit for jsp platform. Description: JReport - 'dealSchedules.jsp' Cross-Site Request Forgery. Author: Poonam Singh
|
Analyze the security implications of: JReport - 'dealSchedules.jsp' Cross-Site Request Forgery
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Camtasia Studio 4.0.2 - 'csPreloader' Remote Code Execution
|
This is a remote exploit for multiple platform. Description: Camtasia Studio 4.0.2 - 'csPreloader' Remote Code Execution. Author: Rich Cannings
|
Analyze the security implications of: Camtasia Studio 4.0.2 - 'csPreloader' Remote Code Execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Google AD Sync Tool - Exposure of Sensitive Information
|
This is a local exploit for multiple platform. Description: Google AD Sync Tool - Exposure of Sensitive Information. Author: Sense of Security
|
Analyze the security implications of: Google AD Sync Tool - Exposure of Sensitive Information
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: SAP Internet Transaction Server 6.10/6.20 - Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: SAP Internet Transaction Server 6.10/6.20 - Cross-Site Scripting. Author: ILION Research
|
Analyze the security implications of: SAP Internet Transaction Server 6.10/6.20 - Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Icinga Web 2.10 - Authenticated Remote Code Execution
|
This is a webapps exploit for php platform. Description: Icinga Web 2.10 - Authenticated Remote Code Execution. Author: Dante Corona
|
Analyze the security implications of: Icinga Web 2.10 - Authenticated Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Grokability Snipe-IT 8.0.4 - Insecure Direct Object Reference (IDOR)
|
This is a webapps exploit for php platform. Description: Grokability Snipe-IT 8.0.4 - Insecure Direct Object Reference (IDOR). Author: Sn1p3r-H4ck3r
|
Analyze the security implications of: Grokability Snipe-IT 8.0.4 - Insecure Direct Object Reference (IDOR)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WebKit JavaScriptCore - Out-Of-Bounds Access in FTL JIT due to LICM Moving Array Access Before the Bounds Check
|
This is a dos exploit for multiple platform. Description: WebKit JavaScriptCore - Out-Of-Bounds Access in FTL JIT due to LICM Moving Array Access Before the Bounds Check. Author: Google Security Research
|
Analyze the security implications of: WebKit JavaScriptCore - Out-Of-Bounds Access in FTL JIT due to LICM Moving Array Access Before the Bounds Check
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Confixx Pro 3.3.1 - 'saveserver.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Confixx Pro 3.3.1 - 'saveserver.php' Remote File Inclusion. Author: H4 / XPK
|
Analyze the security implications of: Confixx Pro 3.3.1 - 'saveserver.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ContentKeeper Web Appliance < 125.10 - Command Execution (Metasploit)
|
This is a webapps exploit for multiple platform. Description: ContentKeeper Web Appliance < 125.10 - Command Execution (Metasploit). Author: patrick
|
Analyze the security implications of: ContentKeeper Web Appliance < 125.10 - Command Execution (Metasploit)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: python-wrapper - Untrusted Search Path/Code Execution
|
This is a local exploit for linux platform. Description: python-wrapper - Untrusted Search Path/Code Execution. Author: ShadowHatesYou
|
Analyze the security implications of: python-wrapper - Untrusted Search Path/Code Execution
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Eyeland Studio Inc. - 'game.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Eyeland Studio Inc. - 'game.php' SQL Injection. Author: CoBRa_21
|
Analyze the security implications of: Eyeland Studio Inc. - 'game.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Engeman 6.x - SQL Injection
|
This is a webapps exploit for multiple platform. Description: Engeman 6.x - SQL Injection. Author: crashbrz
|
Analyze the security implications of: Engeman 6.x - SQL Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: GNUBoard 4.31.04 (09.01.30) - Multiple Local/Remote Vulnerabilities
|
This is a webapps exploit for php platform. Description: GNUBoard 4.31.04 (09.01.30) - Multiple Local/Remote Vulnerabilities. Author: make0day
|
Analyze the security implications of: GNUBoard 4.31.04 (09.01.30) - Multiple Local/Remote Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link DIR-8xx Routers - Leak Credentials
|
This is a webapps exploit for hardware platform. Description: D-Link DIR-8xx Routers - Leak Credentials. Author: embedi
|
Analyze the security implications of: D-Link DIR-8xx Routers - Leak Credentials
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: BeOS 5.0 - TCP Fragmentation Remote Denial of Service
|
This is a dos exploit for beos platform. Description: BeOS 5.0 - TCP Fragmentation Remote Denial of Service. Author: visi0n
|
Analyze the security implications of: BeOS 5.0 - TCP Fragmentation Remote Denial of Service
|
This exploit targets beos systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets beos platform
|
What is this exploit about: Advantech Webaccess HMI/SCADA Software - Persistence Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Advantech Webaccess HMI/SCADA Software - Persistence Cross-Site Scripting. Author: SecPod Research
|
Analyze the security implications of: Advantech Webaccess HMI/SCADA Software - Persistence Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: FreeHostShop Website Generator 3.3 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: FreeHostShop Website Generator 3.3 - Arbitrary File Upload. Author: NSA Group
|
Analyze the security implications of: FreeHostShop Website Generator 3.3 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Daily Expenses Management System 1.0 - 'item' SQL Injection
|
This is a webapps exploit for php platform. Description: Daily Expenses Management System 1.0 - 'item' SQL Injection. Author: screetsec
|
Analyze the security implications of: Daily Expenses Management System 1.0 - 'item' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ABC estore 3.0 - 'cat_id' Blind SQL Injection
|
This is a webapps exploit for php platform. Description: ABC estore 3.0 - 'cat_id' Blind SQL Injection. Author: k1tk4t
|
Analyze the security implications of: ABC estore 3.0 - 'cat_id' Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! / Mambo Component com_scheduling - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_scheduling - 'id' SQL Injection. Author: S@BUN
|
Analyze the security implications of: Joomla! / Mambo Component com_scheduling - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ClipBucket - 'beats_uploader' Arbitrary File Upload (Metasploit)
|
This is a webapps exploit for php platform. Description: ClipBucket - 'beats_uploader' Arbitrary File Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: ClipBucket - 'beats_uploader' Arbitrary File Upload (Metasploit)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Hot Project 7.0 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Hot Project 7.0 - Authentication Bypass. Author: HCOCA_MAN
|
Analyze the security implications of: Hot Project 7.0 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 2.4.x/2.6.x - BlueTooth Signed Buffer Index (PoC)
|
This is a dos exploit for linux platform. Description: Linux Kernel 2.4.x/2.6.x - BlueTooth Signed Buffer Index (PoC). Author: ilja van sprundel
|
Analyze the security implications of: Linux Kernel 2.4.x/2.6.x - BlueTooth Signed Buffer Index (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: HP JetDirect rev. G.08.x/rev. H.08.x/x.08.x/J3111A - LCD Display Modification
|
This is a remote exploit for hardware platform. Description: HP JetDirect rev. G.08.x/rev. H.08.x/x.08.x/J3111A - LCD Display Modification. Author: sili
|
Analyze the security implications of: HP JetDirect rev. G.08.x/rev. H.08.x/x.08.x/J3111A - LCD Display Modification
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: KCFinder 2.51 - Local File Disclosure
|
This is a webapps exploit for php platform. Description: KCFinder 2.51 - Local File Disclosure. Author: DaOne
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.