input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Customer Support System 1.0 - 'description' Stored XSS in The Admin Panel | This is a webapps exploit for php platform. Description: Customer Support System 1.0 - 'description' Stored XSS in The Admin Panel. Author: Ahmed Abbas |
Analyze the security implications of: Customer Support System 1.0 - 'description' Stored XSS in The Admin Panel | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Audins Audiens 3.3 - '/system/index.php?Cookie PHPSESSID' SQL Injection | This is a webapps exploit for php platform. Description: Audins Audiens 3.3 - '/system/index.php?Cookie PHPSESSID' SQL Injection. Author: r00t |
Analyze the security implications of: Audins Audiens 3.3 - '/system/index.php?Cookie PHPSESSID' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: I-Gallery - Folder Argument Directory Traversal | This is a webapps exploit for asp platform. Description: I-Gallery - Folder Argument Directory Traversal. Author: Seyed Hamid Kashfi |
Analyze the security implications of: I-Gallery - Folder Argument Directory Traversal | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apple Safari 4.0.1 - Error Page Address Bar URI Spoofing | This is a remote exploit for multiple platform. Description: Apple Safari 4.0.1 - Error Page Address Bar URI Spoofing. Author: Juan Pablo Lopez Yacubian |
Analyze the security implications of: Apple Safari 4.0.1 - Error Page Address Bar URI Spoofing | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Alienvault Open Source SIEM (OSSIM) 3.1 - 'date_from' Multiple SQL Injections | This is a webapps exploit for php platform. Description: Alienvault Open Source SIEM (OSSIM) 3.1 - 'date_from' Multiple SQL Injections. Author: Yu-Chi Ding |
Analyze the security implications of: Alienvault Open Source SIEM (OSSIM) 3.1 - 'date_from' Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Xfinity Gateway - Remote Code Execution | This is a webapps exploit for hardware platform. Description: Xfinity Gateway - Remote Code Execution. Author: Gregory Smiley |
Analyze the security implications of: Xfinity Gateway - Remote Code Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Fork CMS 3.x - '/private/en/locale/index?name' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Fork CMS 3.x - '/private/en/locale/index?name' Cross-Site Scripting. Author: anonymous |
Analyze the security implications of: Fork CMS 3.x - '/private/en/locale/index?name' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MPlayer 1.0rc2 - TwinVQ Stack Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: MPlayer 1.0rc2 - TwinVQ Stack Buffer Overflow (PoC). Author: sCORPINo |
Analyze the security implications of: MPlayer 1.0rc2 - TwinVQ Stack Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_class.php?base_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_class.php?base_path' Remote File Inclusion. Author: indoushka |
Analyze the security implications of: Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_class.php?base_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Detrix EDMS 1.2.3.1505 - SQL Injection | This is a webapps exploit for php platform. Description: Detrix EDMS 1.2.3.1505 - SQL Injection. Author: Burov Konstantin |
Analyze the security implications of: Detrix EDMS 1.2.3.1505 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle PeopleSoft 8.5x - Remote Code Execution | This is a webapps exploit for java platform. Description: Oracle PeopleSoft 8.5x - Remote Code Execution. Author: Vahagn Vardanyan |
Analyze the security implications of: Oracle PeopleSoft 8.5x - Remote Code Execution | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: JM CMS 1.0 - Authentication Bypass | This is a webapps exploit for asp platform. Description: JM CMS 1.0 - Authentication Bypass. Author: Red-D3v1L |
Analyze the security implications of: JM CMS 1.0 - Authentication Bypass | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: RedHat Stronghold Web Server 2.3 - Cross-Site Scripting | This is a remote exploit for linux platform. Description: RedHat Stronghold Web Server 2.3 - Cross-Site Scripting. Author: Xia Shing Zee |
Analyze the security implications of: RedHat Stronghold Web Server 2.3 - Cross-Site Scripting | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: THOMSON ST585 - 'user.ini' Arbitrary Disclosure | This is a remote exploit for hardware platform. Description: THOMSON ST585 - 'user.ini' Arbitrary Disclosure. Author: aBo MoHaMeD |
Analyze the security implications of: THOMSON ST585 - 'user.ini' Arbitrary Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Overland Guardian OS 5.1.041 - Local Privilege Escalation | This is a local exploit for hardware platform. Description: Overland Guardian OS 5.1.041 - Local Privilege Escalation. Author: trompele |
Analyze the security implications of: Overland Guardian OS 5.1.041 - Local Privilege Escalation | This exploit targets hardware systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GnuPG 1.x - Signed Message Arbitrary Content Injection | This is a remote exploit for linux platform. Description: GnuPG 1.x - Signed Message Arbitrary Content Injection. Author: Gerardo Richarte |
Analyze the security implications of: GnuPG 1.x - Signed Message Arbitrary Content Injection | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Bizon-CMS 2.0 - 'Id' SQL Injection | This is a webapps exploit for php platform. Description: Bizon-CMS 2.0 - 'Id' SQL Injection. Author: Mr.SQL |
Analyze the security implications of: Bizon-CMS 2.0 - 'Id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 3.15.6 - PPP-over-L2TP Socket Level Handling Crash (PoC) | This is a dos exploit for linux platform. Description: Linux Kernel 3.15.6 - PPP-over-L2TP Socket Level Handling Crash (PoC). Author: Emeric Nasi |
Analyze the security implications of: Linux Kernel 3.15.6 - PPP-over-L2TP Socket Level Handling Crash (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AwindInc SNMP Service - Command Injection (Metasploit) | This is a remote exploit for linux platform. Description: AwindInc SNMP Service - Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: AwindInc SNMP Service - Command Injection (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: LiveJournal - Cleanhtml.pl HTML Injection | This is a webapps exploit for cgi platform. Description: LiveJournal - Cleanhtml.pl HTML Injection. Author: Andrew Farmer |
Analyze the security implications of: LiveJournal - Cleanhtml.pl HTML Injection | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: D-Link DCS-931L - Arbitrary File Upload (Metasploit) | This is a webapps exploit for hardware platform. Description: D-Link DCS-931L - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: D-Link DCS-931L - Arbitrary File Upload (Metasploit) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Plunet BusinessManager 4.1 - 'pagesUTF8/Sys_DirAnzeige.jsp?Pfad' Direct Request Information Disclosure | This is a webapps exploit for jsp platform. Description: Plunet BusinessManager 4.1 - 'pagesUTF8/Sys_DirAnzeige.jsp?Pfad' Direct Request Information Disclosure. Author: Matteo Ignaccolo |
Analyze the security implications of: Plunet BusinessManager 4.1 - 'pagesUTF8/Sys_DirAnzeige.jsp?Pfad' Direct Request Information Disclosure | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Lizge 20 - 'index.php' Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Lizge 20 - 'index.php' Multiple Remote File Inclusions. Author: Crackers_Child |
Analyze the security implications of: Lizge 20 - 'index.php' Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: eCMS 0.4.2 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: eCMS 0.4.2 - Multiple Vulnerabilities. Author: hadihadi |
Analyze the security implications of: eCMS 0.4.2 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Axous 1.1.0 - SQL Injection | This is a webapps exploit for php platform. Description: Axous 1.1.0 - SQL Injection. Author: H4ckCity Secuirty TeaM |
Analyze the security implications of: Axous 1.1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 4Images 1.7.1 - 'top.php?sessionid' SQL Injection | This is a webapps exploit for php platform. Description: 4Images 1.7.1 - 'top.php?sessionid' SQL Injection. Author: CrAzY.CrAcKeR |
Analyze the security implications of: 4Images 1.7.1 - 'top.php?sessionid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GeoCore MAX DB Ver. 7.3.3 - Blind SQL Injection | This is a webapps exploit for php platform. Description: GeoCore MAX DB Ver. 7.3.3 - Blind SQL Injection. Author: Esac |
Analyze the security implications of: GeoCore MAX DB Ver. 7.3.3 - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: OpenLDAP 2.2.29 - Remote Denial of Service (Metasploit) | This is a dos exploit for linux platform. Description: OpenLDAP 2.2.29 - Remote Denial of Service (Metasploit). Author: Evgeny Legerov |
Analyze the security implications of: OpenLDAP 2.2.29 - Remote Denial of Service (Metasploit) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Cisco CallManager 4.2 / CUCM 4.2 - Logon Page 'lang' SQL Injection | This is a webapps exploit for asp platform. Description: Cisco CallManager 4.2 / CUCM 4.2 - Logon Page 'lang' SQL Injection. Author: anonymous |
Analyze the security implications of: Cisco CallManager 4.2 / CUCM 4.2 - Logon Page 'lang' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: LokiCMS 0.3.4 - 'writeconfig()' Remote Command Execution | This is a webapps exploit for php platform. Description: LokiCMS 0.3.4 - 'writeconfig()' Remote Command Execution. Author: girex |
Analyze the security implications of: LokiCMS 0.3.4 - 'writeconfig()' Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Noticeware Email Server 4.6 - NG LOGIN Messages Denial of Service | This is a dos exploit for multiple platform. Description: Noticeware Email Server 4.6 - NG LOGIN Messages Denial of Service. Author: Antunes |
Analyze the security implications of: Noticeware Email Server 4.6 - NG LOGIN Messages Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: iScripts AutoHoster - 'id' Local File Inclusion | This is a webapps exploit for php platform. Description: iScripts AutoHoster - 'id' Local File Inclusion. Author: i-Hmx |
Analyze the security implications of: iScripts AutoHoster - 'id' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 3.2.1 - Tracing Multiple Local Denial of Service Vulnerabilities | This is a dos exploit for linux platform. Description: Linux Kernel 3.2.1 - Tracing Multiple Local Denial of Service Vulnerabilities. Author: anonymous |
Analyze the security implications of: Linux Kernel 3.2.1 - Tracing Multiple Local Denial of Service Vulnerabilities | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Web-APP.net WebAPP 0.9.x - '/mods/calendar/index.cgi?vsSD' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Web-APP.net WebAPP 0.9.x - '/mods/calendar/index.cgi?vsSD' Cross-Site Scripting. Author: r0t |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.