input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Chicomas 2.0.4 - Database Backup / File Disclosure / Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ATutor - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities
|
This is a webapps exploit for php platform. Description: ATutor - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities. Author: HauntIT
|
Analyze the security implications of: ATutor - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Atlassian Confluence Data Center and Server - Authentication Bypass (Metasploit)
|
This is a webapps exploit for multiple platform. Description: Atlassian Confluence Data Center and Server - Authentication Bypass (Metasploit). Author: Emir Polat
|
Analyze the security implications of: Atlassian Confluence Data Center and Server - Authentication Bypass (Metasploit)
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: HyperVM - File Permissions Credential Disclosure
|
This is a local exploit for multiple platform. Description: HyperVM - File Permissions Credential Disclosure. Author: Xia Shing Zee
|
Analyze the security implications of: HyperVM - File Permissions Credential Disclosure
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ZTE ZXHN H108L - Authentication Bypass (2)
|
This is a webapps exploit for hardware platform. Description: ZTE ZXHN H108L - Authentication Bypass (2). Author: Project Zero Labs
|
Analyze the security implications of: ZTE ZXHN H108L - Authentication Bypass (2)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: InnovaPortal - 'tc/contents/home001.jsp?contentid' Cross-Site Scripting
|
This is a webapps exploit for jsp platform. Description: InnovaPortal - 'tc/contents/home001.jsp?contentid' Cross-Site Scripting. Author: JosS
|
Analyze the security implications of: InnovaPortal - 'tc/contents/home001.jsp?contentid' Cross-Site Scripting
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: EgO 0.7b - 'FCKeditor' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: EgO 0.7b - 'FCKeditor' Arbitrary File Upload. Author: ITSecTeam
|
Analyze the security implications of: EgO 0.7b - 'FCKeditor' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ahsay Backup 8.1.1.50 - Insecure File Upload and Code Execution (Authenticated)
|
This is a webapps exploit for jsp platform. Description: Ahsay Backup 8.1.1.50 - Insecure File Upload and Code Execution (Authenticated). Author: Wietse Boonstra
|
Analyze the security implications of: Ahsay Backup 8.1.1.50 - Insecure File Upload and Code Execution (Authenticated)
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Atlassian Confluence 3.4.x - Error Page Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: Atlassian Confluence 3.4.x - Error Page Cross-Site Scripting. Author: D. Niedermaier
|
Analyze the security implications of: Atlassian Confluence 3.4.x - Error Page Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: i-dreams Mailer 1.2 Final - 'admin.dat' File Disclosure
|
This is a webapps exploit for cgi platform. Description: i-dreams Mailer 1.2 Final - 'admin.dat' File Disclosure. Author: Pouya_Server
|
Analyze the security implications of: i-dreams Mailer 1.2 Final - 'admin.dat' File Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: FreeForum 0.9.7 - 'forum.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: FreeForum 0.9.7 - 'forum.php' Remote File Inclusion. Author: Mehmet Ince
|
Analyze the security implications of: FreeForum 0.9.7 - 'forum.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CGIScript.net csNews 1.0 - Header File Type Restriction Bypass
|
This is a webapps exploit for cgi platform. Description: CGIScript.net csNews 1.0 - Header File Type Restriction Bypass. Author: Steve Gustin
|
Analyze the security implications of: CGIScript.net csNews 1.0 - Header File Type Restriction Bypass
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: NetFlow Analyzer 5 - '/jspui/applicationList.jsp?alpha' Cross-Site Scripting
|
This is a webapps exploit for jsp platform. Description: NetFlow Analyzer 5 - '/jspui/applicationList.jsp?alpha' Cross-Site Scripting. Author: Lostmon
|
Analyze the security implications of: NetFlow Analyzer 5 - '/jspui/applicationList.jsp?alpha' Cross-Site Scripting
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Alienvault OSSIM/USM 5.3.1 - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Alienvault OSSIM/USM 5.3.1 - Persistent Cross-Site Scripting. Author: Peter Lapp
|
Analyze the security implications of: Alienvault OSSIM/USM 5.3.1 - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ArbitroWeb PHP Proxy 0.5/0.6 - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: ArbitroWeb PHP Proxy 0.5/0.6 - Cross-Site Scripting. Author: Josh Gilmour
|
Analyze the security implications of: ArbitroWeb PHP Proxy 0.5/0.6 - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Content Management System 1.0 - 'First Name' Stored XSS
|
This is a webapps exploit for php platform. Description: Content Management System 1.0 - 'First Name' Stored XSS. Author: Zhaiyi
|
Analyze the security implications of: Content Management System 1.0 - 'First Name' Stored XSS
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 1st Class Internet Solutions 1st Class Mail Server 4.0 - Remote Buffer Overflow (PoC)
|
This is a dos exploit for multiple platform. Description: 1st Class Internet Solutions 1st Class Mail Server 4.0 - Remote Buffer Overflow (PoC). Author: JeFFOsZ
|
Analyze the security implications of: 1st Class Internet Solutions 1st Class Mail Server 4.0 - Remote Buffer Overflow (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Library Management System 3.0 - _Add Category_ Stored XSS
|
This is a webapps exploit for php platform. Description: Library Management System 3.0 - _Add Category_ Stored XSS. Author: Kislay Kumar
|
Analyze the security implications of: Library Management System 3.0 - _Add Category_ Stored XSS
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Judging Management System v1.0 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Judging Management System v1.0 - Authentication Bypass. Author: Angelo Pio Amirante
|
Analyze the security implications of: Judging Management System v1.0 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JForum 'adminUsers' Module - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: JForum 'adminUsers' Module - Cross-Site Request Forgery. Author: arno
|
Analyze the security implications of: JForum 'adminUsers' Module - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ivanti Endpoint Manager 4.6 - Remote Code Execution (RCE)
|
This is a remote exploit for multiple platform. Description: Ivanti Endpoint Manager 4.6 - Remote Code Execution (RCE). Author: d7x
|
Analyze the security implications of: Ivanti Endpoint Manager 4.6 - Remote Code Execution (RCE)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: OpenKM 5.1.7 - Cross-Site Request Forgery
|
This is a webapps exploit for jsp platform. Description: OpenKM 5.1.7 - Cross-Site Request Forgery. Author: Cyrill Brunschwiler
|
Analyze the security implications of: OpenKM 5.1.7 - Cross-Site Request Forgery
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Jogjacamp JProfile Gold - 'id_news' SQL Injection
|
This is a webapps exploit for php platform. Description: Jogjacamp JProfile Gold - 'id_news' SQL Injection. Author: kecemplungkalen
|
Analyze the security implications of: Jogjacamp JProfile Gold - 'id_news' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jobberbase 2.0 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Jobberbase 2.0 - Multiple Vulnerabilities. Author: Ross Marks
|
Analyze the security implications of: Jobberbase 2.0 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_pinboard - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Joomla! Component com_pinboard - Arbitrary File Upload. Author: ViRuSMaN
|
Analyze the security implications of: Joomla! Component com_pinboard - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle WebLogic - POST Session Fixation
|
This is a webapps exploit for multiple platform. Description: Oracle WebLogic - POST Session Fixation. Author: Roberto Suggi Liverani
|
Analyze the security implications of: Oracle WebLogic - POST Session Fixation
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: gdb (GNU debugger) 7.5.1 - Null Pointer Dereference
|
This is a dos exploit for linux platform. Description: gdb (GNU debugger) 7.5.1 - Null Pointer Dereference. Author: nitr0us
|
Analyze the security implications of: gdb (GNU debugger) 7.5.1 - Null Pointer Dereference
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AirStar Airbnb Clone Script 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: AirStar Airbnb Clone Script 1.0 - SQL Injection. Author: 8bitsec
|
Analyze the security implications of: AirStar Airbnb Clone Script 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Sun Cobalt RaQ 4.0 - Predictable Temporary Filename Symbolic Link Attack
|
This is a local exploit for linux platform. Description: Sun Cobalt RaQ 4.0 - Predictable Temporary Filename Symbolic Link Attack. Author: Charles Stevenson
|
Analyze the security implications of: Sun Cobalt RaQ 4.0 - Predictable Temporary Filename Symbolic Link Attack
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: 68 Classifieds 4.1 - 'login.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: 68 Classifieds 4.1 - 'login.php' Cross-Site Scripting. Author: Moudi
|
Analyze the security implications of: 68 Classifieds 4.1 - 'login.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Barracuda Web Application Firewall - Authentication Bypass
|
This is a remote exploit for hardware platform. Description: Barracuda Web Application Firewall - Authentication Bypass. Author: Nick Hayes
|
Analyze the security implications of: Barracuda Web Application Firewall - Authentication Bypass
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Zoom Telephonics X4/X5 ADSL Modem - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Zoom Telephonics X4/X5 ADSL Modem - Multiple Vulnerabilities. Author: Kyle Lovett
|
Analyze the security implications of: Zoom Telephonics X4/X5 ADSL Modem - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Jenkins CI Script Console - Command Execution (Metasploit)
|
This is a remote exploit for multiple platform. Description: Jenkins CI Script Console - Command Execution (Metasploit). Author: Spencer McIntyre
|
Analyze the security implications of: Jenkins CI Script Console - Command Execution (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Computer Software Manufaktur Alibaba 2.0 - Piped Command
|
This is a remote exploit for cgi platform. Description: Computer Software Manufaktur Alibaba 2.0 - Piped Command. Author: Prizm
|
Analyze the security implications of: Computer Software Manufaktur Alibaba 2.0 - Piped Command
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.