input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Customer Support System 1.0 - 'description' Stored XSS in The Admin Panel
|
This is a webapps exploit for php platform. Description: Customer Support System 1.0 - 'description' Stored XSS in The Admin Panel. Author: Ahmed Abbas
|
Analyze the security implications of: Customer Support System 1.0 - 'description' Stored XSS in The Admin Panel
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Audins Audiens 3.3 - '/system/index.php?Cookie PHPSESSID' SQL Injection
|
This is a webapps exploit for php platform. Description: Audins Audiens 3.3 - '/system/index.php?Cookie PHPSESSID' SQL Injection. Author: r00t
|
Analyze the security implications of: Audins Audiens 3.3 - '/system/index.php?Cookie PHPSESSID' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: I-Gallery - Folder Argument Directory Traversal
|
This is a webapps exploit for asp platform. Description: I-Gallery - Folder Argument Directory Traversal. Author: Seyed Hamid Kashfi
|
Analyze the security implications of: I-Gallery - Folder Argument Directory Traversal
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Apple Safari 4.0.1 - Error Page Address Bar URI Spoofing
|
This is a remote exploit for multiple platform. Description: Apple Safari 4.0.1 - Error Page Address Bar URI Spoofing. Author: Juan Pablo Lopez Yacubian
|
Analyze the security implications of: Apple Safari 4.0.1 - Error Page Address Bar URI Spoofing
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Alienvault Open Source SIEM (OSSIM) 3.1 - 'date_from' Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Alienvault Open Source SIEM (OSSIM) 3.1 - 'date_from' Multiple SQL Injections. Author: Yu-Chi Ding
|
Analyze the security implications of: Alienvault Open Source SIEM (OSSIM) 3.1 - 'date_from' Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Xfinity Gateway - Remote Code Execution
|
This is a webapps exploit for hardware platform. Description: Xfinity Gateway - Remote Code Execution. Author: Gregory Smiley
|
Analyze the security implications of: Xfinity Gateway - Remote Code Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Fork CMS 3.x - '/private/en/locale/index?name' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Fork CMS 3.x - '/private/en/locale/index?name' Cross-Site Scripting. Author: anonymous
|
Analyze the security implications of: Fork CMS 3.x - '/private/en/locale/index?name' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: MPlayer 1.0rc2 - TwinVQ Stack Buffer Overflow (PoC)
|
This is a dos exploit for multiple platform. Description: MPlayer 1.0rc2 - TwinVQ Stack Buffer Overflow (PoC). Author: sCORPINo
|
Analyze the security implications of: MPlayer 1.0rc2 - TwinVQ Stack Buffer Overflow (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_class.php?base_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_class.php?base_path' Remote File Inclusion. Author: indoushka
|
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_class.php?base_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Detrix EDMS 1.2.3.1505 - SQL Injection
|
This is a webapps exploit for php platform. Description: Detrix EDMS 1.2.3.1505 - SQL Injection. Author: Burov Konstantin
|
Analyze the security implications of: Detrix EDMS 1.2.3.1505 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Oracle PeopleSoft 8.5x - Remote Code Execution
|
This is a webapps exploit for java platform. Description: Oracle PeopleSoft 8.5x - Remote Code Execution. Author: Vahagn Vardanyan
|
Analyze the security implications of: Oracle PeopleSoft 8.5x - Remote Code Execution
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: JM CMS 1.0 - Authentication Bypass
|
This is a webapps exploit for asp platform. Description: JM CMS 1.0 - Authentication Bypass. Author: Red-D3v1L
|
Analyze the security implications of: JM CMS 1.0 - Authentication Bypass
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: RedHat Stronghold Web Server 2.3 - Cross-Site Scripting
|
This is a remote exploit for linux platform. Description: RedHat Stronghold Web Server 2.3 - Cross-Site Scripting. Author: Xia Shing Zee
|
Analyze the security implications of: RedHat Stronghold Web Server 2.3 - Cross-Site Scripting
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: THOMSON ST585 - 'user.ini' Arbitrary Disclosure
|
This is a remote exploit for hardware platform. Description: THOMSON ST585 - 'user.ini' Arbitrary Disclosure. Author: aBo MoHaMeD
|
Analyze the security implications of: THOMSON ST585 - 'user.ini' Arbitrary Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Overland Guardian OS 5.1.041 - Local Privilege Escalation
|
This is a local exploit for hardware platform. Description: Overland Guardian OS 5.1.041 - Local Privilege Escalation. Author: trompele
|
Analyze the security implications of: Overland Guardian OS 5.1.041 - Local Privilege Escalation
|
This exploit targets hardware systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: GnuPG 1.x - Signed Message Arbitrary Content Injection
|
This is a remote exploit for linux platform. Description: GnuPG 1.x - Signed Message Arbitrary Content Injection. Author: Gerardo Richarte
|
Analyze the security implications of: GnuPG 1.x - Signed Message Arbitrary Content Injection
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Bizon-CMS 2.0 - 'Id' SQL Injection
|
This is a webapps exploit for php platform. Description: Bizon-CMS 2.0 - 'Id' SQL Injection. Author: Mr.SQL
|
Analyze the security implications of: Bizon-CMS 2.0 - 'Id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 3.15.6 - PPP-over-L2TP Socket Level Handling Crash (PoC)
|
This is a dos exploit for linux platform. Description: Linux Kernel 3.15.6 - PPP-over-L2TP Socket Level Handling Crash (PoC). Author: Emeric Nasi
|
Analyze the security implications of: Linux Kernel 3.15.6 - PPP-over-L2TP Socket Level Handling Crash (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AwindInc SNMP Service - Command Injection (Metasploit)
|
This is a remote exploit for linux platform. Description: AwindInc SNMP Service - Command Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: AwindInc SNMP Service - Command Injection (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: LiveJournal - Cleanhtml.pl HTML Injection
|
This is a webapps exploit for cgi platform. Description: LiveJournal - Cleanhtml.pl HTML Injection. Author: Andrew Farmer
|
Analyze the security implications of: LiveJournal - Cleanhtml.pl HTML Injection
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: D-Link DCS-931L - Arbitrary File Upload (Metasploit)
|
This is a webapps exploit for hardware platform. Description: D-Link DCS-931L - Arbitrary File Upload (Metasploit). Author: Metasploit
|
Analyze the security implications of: D-Link DCS-931L - Arbitrary File Upload (Metasploit)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Plunet BusinessManager 4.1 - 'pagesUTF8/Sys_DirAnzeige.jsp?Pfad' Direct Request Information Disclosure
|
This is a webapps exploit for jsp platform. Description: Plunet BusinessManager 4.1 - 'pagesUTF8/Sys_DirAnzeige.jsp?Pfad' Direct Request Information Disclosure. Author: Matteo Ignaccolo
|
Analyze the security implications of: Plunet BusinessManager 4.1 - 'pagesUTF8/Sys_DirAnzeige.jsp?Pfad' Direct Request Information Disclosure
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Lizge 20 - 'index.php' Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: Lizge 20 - 'index.php' Multiple Remote File Inclusions. Author: Crackers_Child
|
Analyze the security implications of: Lizge 20 - 'index.php' Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: eCMS 0.4.2 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: eCMS 0.4.2 - Multiple Vulnerabilities. Author: hadihadi
|
Analyze the security implications of: eCMS 0.4.2 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Axous 1.1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: Axous 1.1.0 - SQL Injection. Author: H4ckCity Secuirty TeaM
|
Analyze the security implications of: Axous 1.1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 4Images 1.7.1 - 'top.php?sessionid' SQL Injection
|
This is a webapps exploit for php platform. Description: 4Images 1.7.1 - 'top.php?sessionid' SQL Injection. Author: CrAzY.CrAcKeR
|
Analyze the security implications of: 4Images 1.7.1 - 'top.php?sessionid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GeoCore MAX DB Ver. 7.3.3 - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: GeoCore MAX DB Ver. 7.3.3 - Blind SQL Injection. Author: Esac
|
Analyze the security implications of: GeoCore MAX DB Ver. 7.3.3 - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: OpenLDAP 2.2.29 - Remote Denial of Service (Metasploit)
|
This is a dos exploit for linux platform. Description: OpenLDAP 2.2.29 - Remote Denial of Service (Metasploit). Author: Evgeny Legerov
|
Analyze the security implications of: OpenLDAP 2.2.29 - Remote Denial of Service (Metasploit)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Cisco CallManager 4.2 / CUCM 4.2 - Logon Page 'lang' SQL Injection
|
This is a webapps exploit for asp platform. Description: Cisco CallManager 4.2 / CUCM 4.2 - Logon Page 'lang' SQL Injection. Author: anonymous
|
Analyze the security implications of: Cisco CallManager 4.2 / CUCM 4.2 - Logon Page 'lang' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: LokiCMS 0.3.4 - 'writeconfig()' Remote Command Execution
|
This is a webapps exploit for php platform. Description: LokiCMS 0.3.4 - 'writeconfig()' Remote Command Execution. Author: girex
|
Analyze the security implications of: LokiCMS 0.3.4 - 'writeconfig()' Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Noticeware Email Server 4.6 - NG LOGIN Messages Denial of Service
|
This is a dos exploit for multiple platform. Description: Noticeware Email Server 4.6 - NG LOGIN Messages Denial of Service. Author: Antunes
|
Analyze the security implications of: Noticeware Email Server 4.6 - NG LOGIN Messages Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: iScripts AutoHoster - 'id' Local File Inclusion
|
This is a webapps exploit for php platform. Description: iScripts AutoHoster - 'id' Local File Inclusion. Author: i-Hmx
|
Analyze the security implications of: iScripts AutoHoster - 'id' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 3.2.1 - Tracing Multiple Local Denial of Service Vulnerabilities
|
This is a dos exploit for linux platform. Description: Linux Kernel 3.2.1 - Tracing Multiple Local Denial of Service Vulnerabilities. Author: anonymous
|
Analyze the security implications of: Linux Kernel 3.2.1 - Tracing Multiple Local Denial of Service Vulnerabilities
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Web-APP.net WebAPP 0.9.x - '/mods/calendar/index.cgi?vsSD' Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: Web-APP.net WebAPP 0.9.x - '/mods/calendar/index.cgi?vsSD' Cross-Site Scripting. Author: r0t
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.