input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GlassFish Enterprise Server 2.1 - Admin Console /resourceNode/resources.jsf URI Cross-Site Scripting | This is a remote exploit for multiple platform. Description: GlassFish Enterprise Server 2.1 - Admin Console /resourceNode/resources.jsf URI Cross-Site Scripting. Author: DSecRG |
Analyze the security implications of: GlassFish Enterprise Server 2.1 - Admin Console /resourceNode/resources.jsf URI Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Supervisor 3.0a1 < 3.3.2 - XML-RPC (Authenticated) Remote Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: Supervisor 3.0a1 < 3.3.2 - XML-RPC (Authenticated) Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Supervisor 3.0a1 < 3.3.2 - XML-RPC (Authenticated) Remote Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Fibaro Home Center 2 - Remote Command Execution / Privilege Escalation | This is a webapps exploit for multiple platform. Description: Fibaro Home Center 2 - Remote Command Execution / Privilege Escalation. Author: forsec |
Analyze the security implications of: Fibaro Home Center 2 - Remote Command Execution / Privilege Escalation | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Odoo 12.0 - Local File Inclusion | This is a webapps exploit for multiple platform. Description: Odoo 12.0 - Local File Inclusion. Author: Emre ÖVÜNÇ |
Analyze the security implications of: Odoo 12.0 - Local File Inclusion | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: EzBan 5.3 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: EzBan 5.3 - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: EzBan 5.3 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: cf shopkart 5.2.2 - SQL Injection / File Disclosure | This is a webapps exploit for asp platform. Description: cf shopkart 5.2.2 - SQL Injection / File Disclosure. Author: AlpHaNiX |
Analyze the security implications of: cf shopkart 5.2.2 - SQL Injection / File Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Click&Email - Authentication Bypass | This is a webapps exploit for php platform. Description: Click&Email - Authentication Bypass. Author: SuB-ZeRo |
Analyze the security implications of: Click&Email - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: dotProject 2.0 - '/modules/tasks/gantt.php?baseDir' Remote File Inclusion | This is a webapps exploit for php platform. Description: dotProject 2.0 - '/modules/tasks/gantt.php?baseDir' Remote File Inclusion. Author: r.verton |
Analyze the security implications of: dotProject 2.0 - '/modules/tasks/gantt.php?baseDir' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ActiveKB NX 2.6 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: ActiveKB NX 2.6 - 'index.php' Cross-Site Scripting. Author: durito |
Analyze the security implications of: ActiveKB NX 2.6 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mike Bobbitt Album.PL 0.61 - Remote Command Execution | This is a webapps exploit for cgi platform. Description: Mike Bobbitt Album.PL 0.61 - Remote Command Execution. Author: aresu@bosen.net |
Analyze the security implications of: Mike Bobbitt Album.PL 0.61 - Remote Command Execution | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Kayako SupportSuite 3.0.32 - 'PHP_SELF Trigger_Error' Function Cross-Site Scripting | This is a webapps exploit for php platform. Description: Kayako SupportSuite 3.0.32 - 'PHP_SELF Trigger_Error' Function Cross-Site Scripting. Author: imei |
Analyze the security implications of: Kayako SupportSuite 3.0.32 - 'PHP_SELF Trigger_Error' Function Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM OpenAdmin Tool - SOAP welcomeServer PHP Code Execution (Metasploit) | This is a remote exploit for php platform. Description: IBM OpenAdmin Tool - SOAP welcomeServer PHP Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: IBM OpenAdmin Tool - SOAP welcomeServer PHP Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linea21 1.2.1 - 'search' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Linea21 1.2.1 - 'search' Cross-Site Scripting. Author: 599eme Man |
Analyze the security implications of: Linea21 1.2.1 - 'search' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Boss Mini 1.4.0 - local file inclusion | This is a webapps exploit for php platform. Description: Boss Mini 1.4.0 - local file inclusion. Author: nltt0 |
Analyze the security implications of: Boss Mini 1.4.0 - local file inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.6.x - Cryptoloop Information Disclosure | This is a local exploit for linux platform. Description: Linux Kernel 2.6.x - Cryptoloop Information Disclosure. Author: Markku-Juhani O. Saarinen |
Analyze the security implications of: Linux Kernel 2.6.x - Cryptoloop Information Disclosure | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: jQuery 1.2 - Cross-Site Scripting (XSS) | This is a webapps exploit for multiple platform. Description: jQuery 1.2 - Cross-Site Scripting (XSS). Author: Central InfoSec |
Analyze the security implications of: jQuery 1.2 - Cross-Site Scripting (XSS) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: USB Sharp 1.3.4 iPad iPhone - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: USB Sharp 1.3.4 iPad iPhone - Multiple Vulnerabilities. Author: Vulnerability-Lab |
Analyze the security implications of: USB Sharp 1.3.4 iPad iPhone - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Genexis Platinum-4410 P4410-V2-1.28 - Broken Access Control and CSRF | This is a webapps exploit for hardware platform. Description: Genexis Platinum-4410 P4410-V2-1.28 - Broken Access Control and CSRF. Author: Jinson Varghese Behanan |
Analyze the security implications of: Genexis Platinum-4410 P4410-V2-1.28 - Broken Access Control and CSRF | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component ACYMAILING 3.9.0 - Unauthenticated Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component ACYMAILING 3.9.0 - Unauthenticated Arbitrary File Upload. Author: qw3rTyTy |
Analyze the security implications of: Joomla! Component ACYMAILING 3.9.0 - Unauthenticated Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JA Comment - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component JA Comment - Local File Inclusion. Author: AntiSecurity |
Analyze the security implications of: Joomla! Component JA Comment - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BT Voyager 2091 (Wireless ADSL) - Multiple Vulnerabilities | This is a remote exploit for hardware platform. Description: BT Voyager 2091 (Wireless ADSL) - Multiple Vulnerabilities. Author: Adrian _pagvac_ Pastor |
Analyze the security implications of: BT Voyager 2091 (Wireless ADSL) - Multiple Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Sguil/PADS - Remote Server Crash | This is a dos exploit for multiple platform. Description: Sguil/PADS - Remote Server Crash. Author: Ataraxia |
Analyze the security implications of: Sguil/PADS - Remote Server Crash | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Lodging Reservation Management System 1.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: Lodging Reservation Management System 1.0 - Authentication Bypass. Author: Nitin Sharma |
Analyze the security implications of: Lodging Reservation Management System 1.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Campsite 2.6.1 - 'Subscription.php?g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'Subscription.php?g_documentRoot' Remote File Inclusion. Author: anonymous |
Analyze the security implications of: Campsite 2.6.1 - 'Subscription.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Half-Life StatsMe 2.6.x Plugin - CMD_ARGV Buffer Overflow | This is a remote exploit for multiple platform. Description: Half-Life StatsMe 2.6.x Plugin - CMD_ARGV Buffer Overflow. Author: greuff@void.at |
Analyze the security implications of: Half-Life StatsMe 2.6.x Plugin - CMD_ARGV Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: LayerBB 1.1.1 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: LayerBB 1.1.1 - Persistent Cross-Site Scripting. Author: 0xB9 |
Analyze the security implications of: LayerBB 1.1.1 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ZKSoftware Biometric Attendence Managnmnet Hardware[MIPS] 2 - Improper Authentication | This is a remote exploit for hardware platform. Description: ZKSoftware Biometric Attendence Managnmnet Hardware[MIPS] 2 - Improper Authentication. Author: fb1h2s |
Analyze the security implications of: ZKSoftware Biometric Attendence Managnmnet Hardware[MIPS] 2 - Improper Authentication | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: AN Guestbook 0.4 - 'send_email.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: AN Guestbook 0.4 - 'send_email.php' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: AN Guestbook 0.4 - 'send_email.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Battleaxe Software BttlxeForum 2.0 - 'Failure.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Battleaxe Software BttlxeForum 2.0 - 'Failure.asp' Cross-Site Scripting. Author: rUnViRuS |
Analyze the security implications of: Battleaxe Software BttlxeForum 2.0 - 'Failure.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Magic News Plus 1.0.3 - Admin Pass Change | This is a webapps exploit for php platform. Description: Magic News Plus 1.0.3 - Admin Pass Change. Author: cijfer |
Analyze the security implications of: Magic News Plus 1.0.3 - Admin Pass Change | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component allvideos - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component allvideos - Blind SQL Injection. Author: bumble_be |
Analyze the security implications of: Joomla! Component allvideos - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Invision Power Board (IP.Board) 1.x/2.0.3 - SML Code Script Injection | This is a webapps exploit for php platform. Description: Invision Power Board (IP.Board) 1.x/2.0.3 - SML Code Script Injection. Author: Daniel A. |
Analyze the security implications of: Invision Power Board (IP.Board) 1.x/2.0.3 - SML Code Script Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IRCnet IRCD 2.10 - Local Buffer Overflow | This is a dos exploit for linux platform. Description: IRCnet IRCD 2.10 - Local Buffer Overflow. Author: millhouse |
Analyze the security implications of: IRCnet IRCD 2.10 - Local Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.