input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Scopia XT Desktop 8.3.915.4 - Cross-Site Request Forgery (change admin password)
|
This is a webapps exploit for java platform. Description: Scopia XT Desktop 8.3.915.4 - Cross-Site Request Forgery (change admin password). Author: V1n1v131r4
|
Analyze the security implications of: Scopia XT Desktop 8.3.915.4 - Cross-Site Request Forgery (change admin password)
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: JBMC Software DirectAdmin 1.403 - 'domain' Cross-Site Scripting
|
This is a webapps exploit for java platform. Description: JBMC Software DirectAdmin 1.403 - 'domain' Cross-Site Scripting. Author: Dawid Golak
|
Analyze the security implications of: JBMC Software DirectAdmin 1.403 - 'domain' Cross-Site Scripting
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: CodetoSell ViArt Shop Enterprise 2.1.6 - 'basket.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: CodetoSell ViArt Shop Enterprise 2.1.6 - 'basket.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Lostmon
|
Analyze the security implications of: CodetoSell ViArt Shop Enterprise 2.1.6 - 'basket.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Battle.net Clan Script for PHP 1.5.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: Battle.net Clan Script for PHP 1.5.1 - SQL Injection. Author: h a c k e r _ X
|
Analyze the security implications of: Battle.net Clan Script for PHP 1.5.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BSD/OS 2.1/3.0 / Larry Wall Perl 5.0 03 / RedHat 4.0/4.1 / SGI Freeware 1.0/2.0 SUIDPerl - Local Overflow (1)
|
This is a local exploit for multiple platform. Description: BSD/OS 2.1/3.0 / Larry Wall Perl 5.0 03 / RedHat 4.0/4.1 / SGI Freeware 1.0/2.0 SUIDPerl - Local Overflow (1). Author: Pavel Kankovsky
|
Analyze the security implications of: BSD/OS 2.1/3.0 / Larry Wall Perl 5.0 03 / RedHat 4.0/4.1 / SGI Freeware 1.0/2.0 SUIDPerl - Local Overflow (1)
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ClipBucket 2.8 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: ClipBucket 2.8 - 'id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: ClipBucket 2.8 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FreeBSD 7.0/7.1 - 'ktimer' Local Privilege Escalation
|
This is a local exploit for freebsd platform. Description: FreeBSD 7.0/7.1 - 'ktimer' Local Privilege Escalation. Author: mu-b
|
Analyze the security implications of: FreeBSD 7.0/7.1 - 'ktimer' Local Privilege Escalation
|
This exploit targets freebsd systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: Jive Forums 5.5.25 - Directory Traversal
|
This is a webapps exploit for jsp platform. Description: Jive Forums 5.5.25 - Directory Traversal. Author: ZhaoHuAn
|
Analyze the security implications of: Jive Forums 5.5.25 - Directory Traversal
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: CuteNews 0.88/1.3 - 'example2.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: CuteNews 0.88/1.3 - 'example2.php' Cross-Site Scripting. Author: DarkBicho
|
Analyze the security implications of: CuteNews 0.88/1.3 - 'example2.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dolphin 7.0.x - 'viewFriends.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Dolphin 7.0.x - 'viewFriends.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Aung Khant
|
Analyze the security implications of: Dolphin 7.0.x - 'viewFriends.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Maian Survey 1.1 - 'survey' SQL Injection
|
This is a webapps exploit for php platform. Description: Maian Survey 1.1 - 'survey' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Maian Survey 1.1 - 'survey' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JitBit HelpDesk < 9.0.2 - Authentication Bypass
|
This is a webapps exploit for asp platform. Description: JitBit HelpDesk < 9.0.2 - Authentication Bypass. Author: Kc57
|
Analyze the security implications of: JitBit HelpDesk < 9.0.2 - Authentication Bypass
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: DC Scripts DCShop Beta 1.0 02 - File Disclosure (1)
|
This is a remote exploit for cgi platform. Description: DC Scripts DCShop Beta 1.0 02 - File Disclosure (1). Author: Peter Helms
|
Analyze the security implications of: DC Scripts DCShop Beta 1.0 02 - File Disclosure (1)
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Snitz Forums 2000 3.0/3.1/3.3 - Image Tag Cross-Agent Scripting
|
This is a webapps exploit for asp platform. Description: Snitz Forums 2000 3.0/3.1/3.3 - Image Tag Cross-Agent Scripting. Author: Justin
|
Analyze the security implications of: Snitz Forums 2000 3.0/3.1/3.3 - Image Tag Cross-Agent Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Advantech SUSIAccess < 3.0 - Directory Traversal / Information Disclosure (Metasploit)
|
This is a webapps exploit for jsp platform. Description: Advantech SUSIAccess < 3.0 - Directory Traversal / Information Disclosure (Metasploit). Author: James Fitts
|
Analyze the security implications of: Advantech SUSIAccess < 3.0 - Directory Traversal / Information Disclosure (Metasploit)
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Apple Safari / QuickTime 7.3 - RTSP Content-Type Remote Buffer Overflow
|
This is a remote exploit for osx platform. Description: Apple Safari / QuickTime 7.3 - RTSP Content-Type Remote Buffer Overflow. Author: krafty
|
Analyze the security implications of: Apple Safari / QuickTime 7.3 - RTSP Content-Type Remote Buffer Overflow
|
This exploit targets osx systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Ilch CMS 1.1 - 'HTTP_X_FORWARDED_FOR' SQL Injection
|
This is a webapps exploit for php platform. Description: Ilch CMS 1.1 - 'HTTP_X_FORWARDED_FOR' SQL Injection. Author: Gizmore
|
Analyze the security implications of: Ilch CMS 1.1 - 'HTTP_X_FORWARDED_FOR' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HP-UX 10.x - stmkfont Alternate Typeface Library Buffer Overflow (2)
|
This is a local exploit for hp-ux platform. Description: HP-UX 10.x - stmkfont Alternate Typeface Library Buffer Overflow (2). Author: watercloud
|
Analyze the security implications of: HP-UX 10.x - stmkfont Alternate Typeface Library Buffer Overflow (2)
|
This exploit targets hp-ux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hp-ux platform
|
What is this exploit about: Horde 3.0.9/3.1.0 - Help Viewer Remote Code Execution (Metasploit)
|
This is a webapps exploit for php platform. Description: Horde 3.0.9/3.1.0 - Help Viewer Remote Code Execution (Metasploit). Author: Inkubus
|
Analyze the security implications of: Horde 3.0.9/3.1.0 - Help Viewer Remote Code Execution (Metasploit)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alcatel OmniPCX Office 210/061.1 - Remote Command Execution
|
This is a webapps exploit for cgi platform. Description: Alcatel OmniPCX Office 210/061.1 - Remote Command Execution. Author: DSecRG
|
Analyze the security implications of: Alcatel OmniPCX Office 210/061.1 - Remote Command Execution
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: File Uploader 1.1 - 'datei.php?config[root_ordner]' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: File Uploader 1.1 - 'datei.php?config[root_ordner]' Remote File Inclusion. Author: Rizgar
|
Analyze the security implications of: File Uploader 1.1 - 'datei.php?config[root_ordner]' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: WebKit - 'ContainerNode::parserRemoveChild' Universal Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: WebKit - 'ContainerNode::parserRemoveChild' Universal Cross-Site Scripting. Author: Google Security Research
|
Analyze the security implications of: WebKit - 'ContainerNode::parserRemoveChild' Universal Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apache Tomcat / Geronimo 1.0 - 'Sample Script cal2.jsp?time' Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: Apache Tomcat / Geronimo 1.0 - 'Sample Script cal2.jsp?time' Cross-Site Scripting. Author: Oliver Karow
|
Analyze the security implications of: Apache Tomcat / Geronimo 1.0 - 'Sample Script cal2.jsp?time' Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: cubecart 2.0.7 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: cubecart 2.0.7 - Multiple Vulnerabilities. Author: Shamus
|
Analyze the security implications of: cubecart 2.0.7 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Absolut Engine 1.73 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Absolut Engine 1.73 - Multiple Vulnerabilities. Author: Steffen Rösemann
|
Analyze the security implications of: Absolut Engine 1.73 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Belchior Foundry VCard 2.9 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Belchior Foundry VCard 2.9 - Remote File Inclusion. Author: X
|
Analyze the security implications of: Belchior Foundry VCard 2.9 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component CamelcityDB 2.2 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component CamelcityDB 2.2 - SQL Injection. Author: Amine_92
|
Analyze the security implications of: Joomla! Component CamelcityDB 2.2 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: dMx READ - Remote Database Disclosure
|
This is a webapps exploit for asp platform. Description: dMx READ - Remote Database Disclosure. Author: Cyber-Zone
|
Analyze the security implications of: dMx READ - Remote Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Apple iTunes - Playlist Parsing Local Buffer Overflow
|
This is a local exploit for osx platform. Description: Apple iTunes - Playlist Parsing Local Buffer Overflow. Author: nemo
|
Analyze the security implications of: Apple iTunes - Playlist Parsing Local Buffer Overflow
|
This exploit targets osx systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: M/Monit 3.7.4 - Privilege Escalation
|
This is a webapps exploit for multiple platform. Description: M/Monit 3.7.4 - Privilege Escalation. Author: Dolev Farhi
|
Analyze the security implications of: M/Monit 3.7.4 - Privilege Escalation
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Manage Engine Exchange Reporter Plus - Remote Code Execution (Metasploit)
|
This is a remote exploit for java platform. Description: Manage Engine Exchange Reporter Plus - Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Manage Engine Exchange Reporter Plus - Remote Code Execution (Metasploit)
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Varient 1.6.1 - SQL Injection
|
This is a webapps exploit for multiple platform. Description: Varient 1.6.1 - SQL Injection. Author: Mehmet EMIROGLU
|
Analyze the security implications of: Varient 1.6.1 - SQL Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Siemens Desigo PX 6.00 - Denial of Service (PoC)
|
This is a dos exploit for hardware platform. Description: Siemens Desigo PX 6.00 - Denial of Service (PoC). Author: LiquidWorm
|
Analyze the security implications of: Siemens Desigo PX 6.00 - Denial of Service (PoC)
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: e107 0.7.23 - SQL Injection
|
This is a webapps exploit for php platform. Description: e107 0.7.23 - SQL Injection. Author: High-Tech Bridge SA
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.