input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: MailEnable 6.02 - 'ForgottonPassword.aspx' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: 1st Class Mail Server 4.0 1 - list.tagz Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: 1st Class Mail Server 4.0 1 - list.tagz Cross-Site Scripting. Author: dr_insane
|
Analyze the security implications of: 1st Class Mail Server 4.0 1 - list.tagz Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: LAquis SCADA 4.1.0.2385 - Directory Traversal (Metasploit)
|
This is a remote exploit for multiple platform. Description: LAquis SCADA 4.1.0.2385 - Directory Traversal (Metasploit). Author: James Fitts
|
Analyze the security implications of: LAquis SCADA 4.1.0.2385 - Directory Traversal (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Adult Portal escort listing - 'user_id' SQL Injection
|
This is a webapps exploit for php platform. Description: Adult Portal escort listing - 'user_id' SQL Injection. Author: Mr.SQL
|
Analyze the security implications of: Adult Portal escort listing - 'user_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Freeciv Server 2.0.0beta8 - Denial of Service
|
This is a dos exploit for multiple platform. Description: Freeciv Server 2.0.0beta8 - Denial of Service. Author: Nico Spicher
|
Analyze the security implications of: Freeciv Server 2.0.0beta8 - Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Adobe Flash - MP4 AMF Parsing Overflow
|
This is a dos exploit for multiple platform. Description: Adobe Flash - MP4 AMF Parsing Overflow. Author: Google Security Research
|
Analyze the security implications of: Adobe Flash - MP4 AMF Parsing Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component Social Factory 3.8.3 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Social Factory 3.8.3 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Social Factory 3.8.3 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eMerge50P 5000P 4.6.07 - Remote Code Execution
|
This is a webapps exploit for hardware platform. Description: eMerge50P 5000P 4.6.07 - Remote Code Execution. Author: LiquidWorm
|
Analyze the security implications of: eMerge50P 5000P 4.6.07 - Remote Code Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: e107 website system 0.6 - 'email article to a friend' Feature Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: e107 website system 0.6 - 'email article to a friend' Feature Cross-Site Scripting. Author: Janek Vind
|
Analyze the security implications of: e107 website system 0.6 - 'email article to a friend' Feature Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FlexCMS 3.2.1 - Multiple Cross-Site Request Forgery Vulnerabilities
|
This is a webapps exploit for php platform. Description: FlexCMS 3.2.1 - Multiple Cross-Site Request Forgery Vulnerabilities. Author: Ivano Binetti
|
Analyze the security implications of: FlexCMS 3.2.1 - Multiple Cross-Site Request Forgery Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IRIX 6.5.x - Performance Co-Pilot Remote Denial of Service
|
This is a dos exploit for irix platform. Description: IRIX 6.5.x - Performance Co-Pilot Remote Denial of Service. Author: Marcelo Magnasco
|
Analyze the security implications of: IRIX 6.5.x - Performance Co-Pilot Remote Denial of Service
|
This exploit targets irix systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets irix platform
|
What is this exploit about: Webmin 1.920 - Unauthenticated Remote Code Execution (Metasploit)
|
This is a remote exploit for linux platform. Description: Webmin 1.920 - Unauthenticated Remote Code Execution (Metasploit). Author: AkkuS
|
Analyze the security implications of: Webmin 1.920 - Unauthenticated Remote Code Execution (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: BIG-IP 15.0.0 < 15.1.0.3 / 14.1.0 < 14.1.2.5 / 13.1.0 < 13.1.3.3 / 12.1.0 < 12.1.5.1 / 11.6.1 < 11.6.5.1 - Traffic Management User Interface 'TMUI' Remote Code Execution
|
This is a webapps exploit for linux platform. Description: BIG-IP 15.0.0 < 15.1.0.3 / 14.1.0 < 14.1.2.5 / 13.1.0 < 13.1.3.3 / 12.1.0 < 12.1.5.1 / 11.6.1 < 11.6.5.1 - Traffic Management User Interface 'TMUI' Remote Code Execution. Author: Critical Start
|
Analyze the security implications of: BIG-IP 15.0.0 < 15.1.0.3 / 14.1.0 < 14.1.2.5 / 13.1.0 < 13.1.3.3 / 12.1.0 < 12.1.5.1 / 11.6.1 < 11.6.5.1 - Traffic Management User Interface 'TMUI' R
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: LG G4 - lghashstorageserver Directory Traversal
|
This is a dos exploit for android platform. Description: LG G4 - lghashstorageserver Directory Traversal. Author: Google Security Research
|
Analyze the security implications of: LG G4 - lghashstorageserver Directory Traversal
|
This exploit targets android systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: CJ Ultra Plus 1.0.4 - Cookie SQL Injection
|
This is a webapps exploit for php platform. Description: CJ Ultra Plus 1.0.4 - Cookie SQL Injection. Author: -SmoG-
|
Analyze the security implications of: CJ Ultra Plus 1.0.4 - Cookie SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ProFTPd 1.x - 'mod_tls' Remote Buffer Overflow
|
This is a remote exploit for linux platform. Description: ProFTPd 1.x - 'mod_tls' Remote Buffer Overflow. Author: netris
|
Analyze the security implications of: ProFTPd 1.x - 'mod_tls' Remote Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: 4x CMS r26 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: 4x CMS r26 - Authentication Bypass. Author: cr4wl3r
|
Analyze the security implications of: 4x CMS r26 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Company's Recruitment Management System 1.0 - 'description' Stored Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Company's Recruitment Management System 1.0 - 'description' Stored Cross-Site Scripting (XSS). Author: Aniket Deshmane
|
Analyze the security implications of: Company's Recruitment Management System 1.0 - 'description' Stored Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: stftp 1.10 - PWD Response Remote Stack Overflow (PoC)
|
This is a dos exploit for linux platform. Description: stftp 1.10 - PWD Response Remote Stack Overflow (PoC). Author: sqlevil
|
Analyze the security implications of: stftp 1.10 - PWD Response Remote Stack Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Alstrasoft Web Host Directory 1.2 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Alstrasoft Web Host Directory 1.2 - Multiple Vulnerabilities. Author: G4N0K
|
Analyze the security implications of: Alstrasoft Web Host Directory 1.2 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JetBrains TeamCity 2018.2.4 - Remote Code Execution
|
This is a remote exploit for java platform. Description: JetBrains TeamCity 2018.2.4 - Remote Code Execution. Author: hantwister
|
Analyze the security implications of: JetBrains TeamCity 2018.2.4 - Remote Code Execution
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Adem 0.5.1 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Adem 0.5.1 - Local File Inclusion. Author: JIKO
|
Analyze the security implications of: Adem 0.5.1 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CubeCart 5.2.8 - Session Fixation
|
This is a webapps exploit for php platform. Description: CubeCart 5.2.8 - Session Fixation. Author: absane
|
Analyze the security implications of: CubeCart 5.2.8 - Session Fixation
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Invoice System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Invoice System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS). Author: Subhadip Nag
|
Analyze the security implications of: Invoice System 1.0 - 'Multiple' Stored Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: cPanel 10 - Select.HTML Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: cPanel 10 - Select.HTML Cross-Site Scripting. Author: preth00nker
|
Analyze the security implications of: cPanel 10 - Select.HTML Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: TW-WebServer 1.0 - Denial of Service (2)
|
This is a dos exploit for multiple platform. Description: TW-WebServer 1.0 - Denial of Service (2). Author: Shashank pandey
|
Analyze the security implications of: TW-WebServer 1.0 - Denial of Service (2)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: TCPDump 4.5.1 - Crash (PoC)
|
This is a dos exploit for linux platform. Description: TCPDump 4.5.1 - Crash (PoC). Author: David Silveiro
|
Analyze the security implications of: TCPDump 4.5.1 - Crash (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Ghostscript - '.PostScript' File Stack Overflow
|
This is a local exploit for bsd platform. Description: Ghostscript - '.PostScript' File Stack Overflow. Author: Rodrigo Rubira Branco
|
Analyze the security implications of: Ghostscript - '.PostScript' File Stack Overflow
|
This exploit targets bsd systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets bsd platform
|
What is this exploit about: CubeCart 3.0.x - 'view_order.php?order_id' SQL Injection
|
This is a webapps exploit for php platform. Description: CubeCart 3.0.x - 'view_order.php?order_id' SQL Injection. Author: HACKERS PAL
|
Analyze the security implications of: CubeCart 3.0.x - 'view_order.php?order_id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dell SonicWALL Scrutinizer 9.0.1 - 'statusFilter.php?q' SQL Injection
|
This is a webapps exploit for php platform. Description: Dell SonicWALL Scrutinizer 9.0.1 - 'statusFilter.php?q' SQL Injection. Author: muts
|
Analyze the security implications of: Dell SonicWALL Scrutinizer 9.0.1 - 'statusFilter.php?q' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco Aironet AP1x00 - GET Denial of Service
|
This is a dos exploit for hardware platform. Description: Cisco Aironet AP1x00 - GET Denial of Service. Author: blackangels
|
Analyze the security implications of: Cisco Aironet AP1x00 - GET Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ARD-9808 DVR Card Security Camera - GET Remote Denial of Service
|
This is a dos exploit for hardware platform. Description: ARD-9808 DVR Card Security Camera - GET Remote Denial of Service. Author: Stack
|
Analyze the security implications of: ARD-9808 DVR Card Security Camera - GET Remote Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Enhanced Multimedia Router 3.0.4.27 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for asp platform. Description: Enhanced Multimedia Router 3.0.4.27 - Cross-Site Request Forgery (Add Admin). Author: Miguel Mendez Z
|
Analyze the security implications of: Enhanced Multimedia Router 3.0.4.27 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: AROUNDMe 0.5.2 - 'templatePath' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: AROUNDMe 0.5.2 - 'templatePath' Remote File Inclusion. Author: Kw3[R]Ln
|
Analyze the security implications of: AROUNDMe 0.5.2 - 'templatePath' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.