input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Bus Pass Management System 1.0 - Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Meinberg LANTIME Web Configuration Utility 6.16.008 - Arbitrary File Read | This is a webapps exploit for cgi platform. Description: Meinberg LANTIME Web Configuration Utility 6.16.008 - Arbitrary File Read. Author: Jakub Palaczynski |
Analyze the security implications of: Meinberg LANTIME Web Configuration Utility 6.16.008 - Arbitrary File Read | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: IntranetApp 3.3 - 'login.asp?ret_page' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: IntranetApp 3.3 - 'login.asp?ret_page' Cross-Site Scripting. Author: r0t |
Analyze the security implications of: IntranetApp 3.3 - 'login.asp?ret_page' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Faq-O-Matic 2.6/2.7 - Cross-Site Scripting | This is a remote exploit for cgi platform. Description: Faq-O-Matic 2.6/2.7 - Cross-Site Scripting. Author: superpetz |
Analyze the security implications of: Faq-O-Matic 2.6/2.7 - Cross-Site Scripting | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Easysitenetwork Jokes Complete Website 2.1.3 - 'jokeid' SQL Injection | This is a webapps exploit for php platform. Description: Easysitenetwork Jokes Complete Website 2.1.3 - 'jokeid' SQL Injection. Author: InjEctOr5 |
Analyze the security implications of: Easysitenetwork Jokes Complete Website 2.1.3 - 'jokeid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DRZES Hms 3.2 - Multiple SQL Injections | This is a webapps exploit for php platform. Description: DRZES Hms 3.2 - Multiple SQL Injections. Author: r0t |
Analyze the security implications of: DRZES Hms 3.2 - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Coppermine Photo Gallery 1.4.21 - 'css' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Coppermine Photo Gallery 1.4.21 - 'css' Cross-Site Scripting. Author: Gerendi Sandor Attila |
Analyze the security implications of: Coppermine Photo Gallery 1.4.21 - 'css' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: jPlayer - 'Jplayer.swf' Script Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: jPlayer - 'Jplayer.swf' Script Cross-Site Scripting. Author: Malte Batram |
Analyze the security implications of: jPlayer - 'Jplayer.swf' Script Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Dojo Toolkit 1.4.1 - '/dijit/tests/_testCommon.js?theme' Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Dojo Toolkit 1.4.1 - '/dijit/tests/_testCommon.js?theme' Cross-Site Scripting. Author: Adam Bixby |
Analyze the security implications of: Dojo Toolkit 1.4.1 - '/dijit/tests/_testCommon.js?theme' Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CoolPHP - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CoolPHP - 'index.php' Cross-Site Scripting. Author: black-code |
Analyze the security implications of: CoolPHP - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Brickcom Multiple IP Cameras - Cross-Site Request Forgery | This is a remote exploit for hardware platform. Description: Brickcom Multiple IP Cameras - Cross-Site Request Forgery. Author: Castillo |
Analyze the security implications of: Brickcom Multiple IP Cameras - Cross-Site Request Forgery | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Incredible PBX 2.0.6.5.0 - Remote Command Execution | This is a webapps exploit for php platform. Description: Incredible PBX 2.0.6.5.0 - Remote Command Execution. Author: Simo Ben Youssef |
Analyze the security implications of: Incredible PBX 2.0.6.5.0 - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ocean12 Technologies Calendar Manager Pro 1.0 1 - '/admin/main.asp?date' SQL Injection | This is a webapps exploit for asp platform. Description: Ocean12 Technologies Calendar Manager Pro 1.0 1 - '/admin/main.asp?date' SQL Injection. Author: dj_eyes2005 |
Analyze the security implications of: Ocean12 Technologies Calendar Manager Pro 1.0 1 - '/admin/main.asp?date' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Andy Mack 35mm Slide Gallery 6.0 - 'index.php?imgdir' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Andy Mack 35mm Slide Gallery 6.0 - 'index.php?imgdir' Cross-Site Scripting. Author: black-cod3 |
Analyze the security implications of: Andy Mack 35mm Slide Gallery 6.0 - 'index.php?imgdir' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Clever Copy 3.0 - 'Connect.INC' Information Disclosure | This is a webapps exploit for php platform. Description: Clever Copy 3.0 - 'Connect.INC' Information Disclosure. Author: M.Hasran Addahroni |
Analyze the security implications of: Clever Copy 3.0 - 'Connect.INC' Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component Archery Scores 1.0.6 - Local File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Archery Scores 1.0.6 - Local File Inclusion. Author: wishnusakti + inc0mp13te |
Analyze the security implications of: Joomla! Component Archery Scores 1.0.6 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ruckus Wireless Zoneflex 2942 Wireless Access Point - Authentication Bypass | This is a webapps exploit for hardware platform. Description: Ruckus Wireless Zoneflex 2942 Wireless Access Point - Authentication Bypass. Author: myexploit |
Analyze the security implications of: Ruckus Wireless Zoneflex 2942 Wireless Access Point - Authentication Bypass | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: EasyImageCatalogue 1.31 - 'thumber.php?dir' Cross-Site Scripting | This is a webapps exploit for php platform. Description: EasyImageCatalogue 1.31 - 'thumber.php?dir' Cross-Site Scripting. Author: ZoRLu |
Analyze the security implications of: EasyImageCatalogue 1.31 - 'thumber.php?dir' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cybertek CMS - Local File Inclusion | This is a webapps exploit for php platform. Description: Cybertek CMS - Local File Inclusion. Author: XroGuE |
Analyze the security implications of: Cybertek CMS - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ArticleSetup 1.00 - Cross-Site Request Forgery (Change Admin Password) | This is a webapps exploit for php platform. Description: ArticleSetup 1.00 - Cross-Site Request Forgery (Change Admin Password). Author: Ali Ghanbari |
Analyze the security implications of: ArticleSetup 1.00 - Cross-Site Request Forgery (Change Admin Password) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DreamPics Builder - 'page' SQL Injection | This is a webapps exploit for php platform. Description: DreamPics Builder - 'page' SQL Injection. Author: Hussin X |
Analyze the security implications of: DreamPics Builder - 'page' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MLdonkey 2.5-4 - Cross-Site Scripting | This is a remote exploit for multiple platform. Description: MLdonkey 2.5-4 - Cross-Site Scripting. Author: Chris Sharp |
Analyze the security implications of: MLdonkey 2.5-4 - Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: IBM AIX 4.2.1 / Sun Solaris 7.0 - LC_MESSAGES libc Buffer Overflow (3) | This is a local exploit for aix platform. Description: IBM AIX 4.2.1 / Sun Solaris 7.0 - LC_MESSAGES libc Buffer Overflow (3). Author: UNYUN |
Analyze the security implications of: IBM AIX 4.2.1 / Sun Solaris 7.0 - LC_MESSAGES libc Buffer Overflow (3) | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Joomla! Component com_intuit - Apache Directory listing Download | This is a webapps exploit for php platform. Description: Joomla! Component com_intuit - Apache Directory listing Download. Author: indoushka |
Analyze the security implications of: Joomla! Component com_intuit - Apache Directory listing Download | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Horizon QCMS 4.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Horizon QCMS 4.0 - Multiple Vulnerabilities. Author: High-Tech Bridge SA |
Analyze the security implications of: Horizon QCMS 4.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Snitz Forums 2000 3.4.03 - 'search.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Snitz Forums 2000 3.4.03 - 'search.asp' Cross-Site Scripting. Author: JeiAr |
Analyze the security implications of: Snitz Forums 2000 3.4.03 - 'search.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: PSWD.JS - Insecure Password Hash | This is a webapps exploit for multiple platform. Description: PSWD.JS - Insecure Password Hash. Author: Gianstefano Monni |
Analyze the security implications of: PSWD.JS - Insecure Password Hash | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Magic Home Pro 1.5.1 - Authentication Bypass | This is a webapps exploit for android platform. Description: Magic Home Pro 1.5.1 - Authentication Bypass. Author: Victor Hanna |
Analyze the security implications of: Magic Home Pro 1.5.1 - Authentication Bypass | This exploit targets android systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Mambo Component pc_cookbook 0.3 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Component pc_cookbook 0.3 - Remote File Inclusion. Author: Matdhule |
Analyze the security implications of: Mambo Component pc_cookbook 0.3 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Google SLO-Generator 2.0.0 - Code Execution | This is a local exploit for linux platform. Description: Google SLO-Generator 2.0.0 - Code Execution. Author: Kiran Ghimire |
Analyze the security implications of: Google SLO-Generator 2.0.0 - Code Execution | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: NethServer 7.3.1611 - Cross-Site Request Forgery (Create User / Enable SSH Access) | This is a webapps exploit for json platform. Description: NethServer 7.3.1611 - Cross-Site Request Forgery (Create User / Enable SSH Access). Author: LiquidWorm |
Analyze the security implications of: NethServer 7.3.1611 - Cross-Site Request Forgery (Create User / Enable SSH Access) | This exploit targets json systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets json platform |
What is this exploit about: Cobalt RaQ 2.0/3.0 / qpopper 2.52/2.53 - 'EUIDL' Format String Input | This is a local exploit for linux platform. Description: Cobalt RaQ 2.0/3.0 / qpopper 2.52/2.53 - 'EUIDL' Format String Input. Author: Prizm |
Analyze the security implications of: Cobalt RaQ 2.0/3.0 / qpopper 2.52/2.53 - 'EUIDL' Format String Input | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Barracuda Networks Message Archiver 650 - Persistent Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: Barracuda Networks Message Archiver 650 - Persistent Cross-Site Scripting. Author: Vulnerability-Lab |
Analyze the security implications of: Barracuda Networks Message Archiver 650 - Persistent Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Real Server 7/8/9 (Windows / Linux) - Remote Code Execution | This is a remote exploit for multiple platform. Description: Real Server 7/8/9 (Windows / Linux) - Remote Code Execution. Author: Johnny Cyberpunk |
Analyze the security implications of: Real Server 7/8/9 (Windows / Linux) - Remote Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.