input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Active Auction House - 'sendpassword.asp' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for asp platform. Description: Active Auction House - 'sendpassword.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: Dcrab
|
Analyze the security implications of: Active Auction House - 'sendpassword.asp' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Babe Logger 2.0 - 'comments.php?id' SQL Injection
|
This is a webapps exploit for php platform. Description: Babe Logger 2.0 - 'comments.php?id' SQL Injection. Author: r0t
|
Analyze the security implications of: Babe Logger 2.0 - 'comments.php?id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mozilla Firefox 1.5 (OSX) - 'location.QueryInterface()' Code Execution (Metasploit)
|
This is a remote exploit for osx platform. Description: Mozilla Firefox 1.5 (OSX) - 'location.QueryInterface()' Code Execution (Metasploit). Author: H D Moore
|
Analyze the security implications of: Mozilla Firefox 1.5 (OSX) - 'location.QueryInterface()' Code Execution (Metasploit)
|
This exploit targets osx systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Fastgraf's whois.cgi - Remote Command Execution
|
This is a webapps exploit for cgi platform. Description: Fastgraf's whois.cgi - Remote Command Execution. Author: Marco van Berkum
|
Analyze the security implications of: Fastgraf's whois.cgi - Remote Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: ClanSuite 2.9 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: ClanSuite 2.9 - Arbitrary File Upload. Author: Adrien Thierry
|
Analyze the security implications of: ClanSuite 2.9 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component JS Autoz 1.0.9 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JS Autoz 1.0.9 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component JS Autoz 1.0.9 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! J2 JOBS 1.3.0 - 'sortby' Authenticated SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! J2 JOBS 1.3.0 - 'sortby' Authenticated SQL Injection. Author: Mehmet Kelepçe
|
Analyze the security implications of: Joomla! J2 JOBS 1.3.0 - 'sortby' Authenticated SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Advanced Webhost Billing System (AWBS) 2.7.1 - 'news.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Advanced Webhost Billing System (AWBS) 2.7.1 - 'news.php' SQL Injection. Author: Mr.SQL
|
Analyze the security implications of: Advanced Webhost Billing System (AWBS) 2.7.1 - 'news.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LocazoList Classifieds 1.0 - 'SearchDB.asp' Input Validation
|
This is a webapps exploit for asp platform. Description: LocazoList Classifieds 1.0 - 'SearchDB.asp' Input Validation. Author: r0t3d3Vil
|
Analyze the security implications of: LocazoList Classifieds 1.0 - 'SearchDB.asp' Input Validation
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Batflat CMS 1.3.6 - 'multiple' Stored XSS
|
This is a webapps exploit for php platform. Description: Batflat CMS 1.3.6 - 'multiple' Stored XSS. Author: Tadjmen
|
Analyze the security implications of: Batflat CMS 1.3.6 - 'multiple' Stored XSS
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Wireshark - getRate Stack Out-of-Bounds Read
|
This is a dos exploit for multiple platform. Description: Wireshark - getRate Stack Out-of-Bounds Read. Author: Google Security Research
|
Analyze the security implications of: Wireshark - getRate Stack Out-of-Bounds Read
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Railo 4.2.1 - Remote File Inclusion (Metasploit)
|
This is a remote exploit for multiple platform. Description: Railo 4.2.1 - Remote File Inclusion (Metasploit). Author: Metasploit
|
Analyze the security implications of: Railo 4.2.1 - Remote File Inclusion (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: SAP NetWeaver Web Dynpro 6.4 < 7.5 - Information Disclosure
|
This is a webapps exploit for linux platform. Description: SAP NetWeaver Web Dynpro 6.4 < 7.5 - Information Disclosure. Author: Richard Alviarez
|
Analyze the security implications of: SAP NetWeaver Web Dynpro 6.4 < 7.5 - Information Disclosure
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! 1.5.0 Beta - 'pcltar.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! 1.5.0 Beta - 'pcltar.php' Remote File Inclusion. Author: Omid
|
Analyze the security implications of: Joomla! 1.5.0 Beta - 'pcltar.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Enalean Tuleap 7.4.99.5 - Remote Command Execution
|
This is a webapps exploit for php platform. Description: Enalean Tuleap 7.4.99.5 - Remote Command Execution. Author: Portcullis
|
Analyze the security implications of: Enalean Tuleap 7.4.99.5 - Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Geeklog 1.3.5 - Calendar Event Form Script Injection
|
This is a webapps exploit for php platform. Description: Geeklog 1.3.5 - Calendar Event Form Script Injection. Author: Ahmet Sabri ALPER
|
Analyze the security implications of: Geeklog 1.3.5 - Calendar Event Form Script Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ClamAV / UnRAR - .RAR Handling Remote Null Pointer Dereference
|
This is a remote exploit for linux platform. Description: ClamAV / UnRAR - .RAR Handling Remote Null Pointer Dereference. Author: Metaeye Security Group
|
Analyze the security implications of: ClamAV / UnRAR - .RAR Handling Remote Null Pointer Dereference
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: TIPS MailPost 5.1.1 - Remote File Enumeration
|
This is a webapps exploit for cgi platform. Description: TIPS MailPost 5.1.1 - Remote File Enumeration. Author: Gemma Hughes
|
Analyze the security implications of: TIPS MailPost 5.1.1 - Remote File Enumeration
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Joomla! Component NoticeBoard 1.3 - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component NoticeBoard 1.3 - Local File Inclusion. Author: AntiSecurity
|
Analyze the security implications of: Joomla! Component NoticeBoard 1.3 - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ManageEngine Support Center Plus 7916 - Directory Traversal
|
This is a webapps exploit for php platform. Description: ManageEngine Support Center Plus 7916 - Directory Traversal. Author: xistence
|
Analyze the security implications of: ManageEngine Support Center Plus 7916 - Directory Traversal
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SAP Business Objects Crystal Reports 7-10 - 'viewreport.asp' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: SAP Business Objects Crystal Reports 7-10 - 'viewreport.asp' Cross-Site Scripting. Author: Bugs NotHugs
|
Analyze the security implications of: SAP Business Objects Crystal Reports 7-10 - 'viewreport.asp' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Axis M10 Series Network Cameras - Cross-Site Scripting
|
This is a remote exploit for hardware platform. Description: Axis M10 Series Network Cameras - Cross-Site Scripting. Author: Matt Metzger
|
Analyze the security implications of: Axis M10 Series Network Cameras - Cross-Site Scripting
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: iPhone4 FTP Server 1.0 - Empty CWD-RETR Remote Crash
|
This is a dos exploit for hardware platform. Description: iPhone4 FTP Server 1.0 - Empty CWD-RETR Remote Crash. Author: offsetIntruder
|
Analyze the security implications of: iPhone4 FTP Server 1.0 - Empty CWD-RETR Remote Crash
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: GPS Tracking System 2.12 - 'username' SQL Injection
|
This is a webapps exploit for php platform. Description: GPS Tracking System 2.12 - 'username' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: GPS Tracking System 2.12 - 'username' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Kshop 2.22 - 'kshop_search.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Kshop 2.22 - 'kshop_search.php' Cross-Site Scripting. Author: Lostmon
|
Analyze the security implications of: Kshop 2.22 - 'kshop_search.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IceBB 1.0-rc5 - Remote Create Admin
|
This is a webapps exploit for php platform. Description: IceBB 1.0-rc5 - Remote Create Admin. Author: Hessam-x
|
Analyze the security implications of: IceBB 1.0-rc5 - Remote Create Admin
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ACGV News 0.9.1 - 'glossaire.php?id' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: ACGV News 0.9.1 - 'glossaire.php?id' Cross-Site Scripting. Author: ZoRLu
|
Analyze the security implications of: ACGV News 0.9.1 - 'glossaire.php?id' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Innovate Portal 2.0 - 'cat' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Innovate Portal 2.0 - 'cat' Cross-Site Scripting. Author: Eyup CELIK
|
Analyze the security implications of: Innovate Portal 2.0 - 'cat' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Fluig 1.7.0 - Path Traversal
|
This is a webapps exploit for multiple platform. Description: Fluig 1.7.0 - Path Traversal. Author: Lucas Souza
|
Analyze the security implications of: Fluig 1.7.0 - Path Traversal
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: eBrigade ERP 4.5 - SQL Injection
|
This is a webapps exploit for php platform. Description: eBrigade ERP 4.5 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: eBrigade ERP 4.5 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PHP 'Exif' Extension - 'exif_read_data()' Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: PHP 'Exif' Extension - 'exif_read_data()' Remote Denial of Service. Author: _ikki & paradoxengine
|
Analyze the security implications of: PHP 'Exif' Extension - 'exif_read_data()' Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: PolicyKit-1 0.105-31 - Privilege Escalation
|
This is a local exploit for linux platform. Description: PolicyKit-1 0.105-31 - Privilege Escalation. Author: Lance Biggerstaff
|
Analyze the security implications of: PolicyKit-1 0.105-31 - Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Mambo 4.5.2 - Globals Overwrite / Remote Command Execution
|
This is a webapps exploit for php platform. Description: Mambo 4.5.2 - Globals Overwrite / Remote Command Execution. Author: rgod
|
Analyze the security implications of: Mambo 4.5.2 - Globals Overwrite / Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CFAGCMS 1 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: CFAGCMS 1 - Remote File Inclusion. Author: BeyazKurt
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.