input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Maian Support Helpdesk 4.3 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: Maian Support Helpdesk 4.3 - Cross-Site Request Forgery (Add Admin). Author: Besim |
Analyze the security implications of: Maian Support Helpdesk 4.3 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_djcatalog - SQL Injection / Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_djcatalog - SQL Injection / Blind SQL Injection. Author: Chip d3 bi0s |
Analyze the security implications of: Joomla! Component com_djcatalog - SQL Injection / Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dragon Business Directory 3.01.12 - 'ID' SQL Injection | This is a webapps exploit for asp platform. Description: Dragon Business Directory 3.01.12 - 'ID' SQL Injection. Author: ajann |
Analyze the security implications of: Dragon Business Directory 3.01.12 - 'ID' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Horde IMP 2.2.x - Session Hijacking | This is a remote exploit for linux platform. Description: Horde IMP 2.2.x - Session Hijacking. Author: Joao Pedro Goncalves |
Analyze the security implications of: Horde IMP 2.2.x - Session Hijacking | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Oracle Application Server 9i - Webcache Cache_dump_file Cross-Site Scripting | This is a remote exploit for multiple platform. Description: Oracle Application Server 9i - Webcache Cache_dump_file Cross-Site Scripting. Author: Alexander Kornbrust |
Analyze the security implications of: Oracle Application Server 9i - Webcache Cache_dump_file Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component com_aprice - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_aprice - Blind SQL Injection. Author: FL0RiX |
Analyze the security implications of: Joomla! Component com_aprice - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Feng Office 1.7.4 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Feng Office 1.7.4 - Cross-Site Scripting. Author: AutoSec Tools |
Analyze the security implications of: Feng Office 1.7.4 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kasseler CMS - File Disclosure / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Kasseler CMS - File Disclosure / Cross-Site Scripting. Author: S(r1pt |
Analyze the security implications of: Kasseler CMS - File Disclosure / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache CouchDB - Arbitrary Command Execution (Metasploit) | This is a remote exploit for linux platform. Description: Apache CouchDB - Arbitrary Command Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Apache CouchDB - Arbitrary Command Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: JReport - 'dealSchedules.jsp' Cross-Site Request Forgery | This is a webapps exploit for jsp platform. Description: JReport - 'dealSchedules.jsp' Cross-Site Request Forgery. Author: Poonam Singh |
Analyze the security implications of: JReport - 'dealSchedules.jsp' Cross-Site Request Forgery | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Camtasia Studio 4.0.2 - 'csPreloader' Remote Code Execution | This is a remote exploit for multiple platform. Description: Camtasia Studio 4.0.2 - 'csPreloader' Remote Code Execution. Author: Rich Cannings |
Analyze the security implications of: Camtasia Studio 4.0.2 - 'csPreloader' Remote Code Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Google AD Sync Tool - Exposure of Sensitive Information | This is a local exploit for multiple platform. Description: Google AD Sync Tool - Exposure of Sensitive Information. Author: Sense of Security |
Analyze the security implications of: Google AD Sync Tool - Exposure of Sensitive Information | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SAP Internet Transaction Server 6.10/6.20 - Cross-Site Scripting | This is a remote exploit for multiple platform. Description: SAP Internet Transaction Server 6.10/6.20 - Cross-Site Scripting. Author: ILION Research |
Analyze the security implications of: SAP Internet Transaction Server 6.10/6.20 - Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Icinga Web 2.10 - Authenticated Remote Code Execution | This is a webapps exploit for php platform. Description: Icinga Web 2.10 - Authenticated Remote Code Execution. Author: Dante Corona |
Analyze the security implications of: Icinga Web 2.10 - Authenticated Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Grokability Snipe-IT 8.0.4 - Insecure Direct Object Reference (IDOR) | This is a webapps exploit for php platform. Description: Grokability Snipe-IT 8.0.4 - Insecure Direct Object Reference (IDOR). Author: Sn1p3r-H4ck3r |
Analyze the security implications of: Grokability Snipe-IT 8.0.4 - Insecure Direct Object Reference (IDOR) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WebKit JavaScriptCore - Out-Of-Bounds Access in FTL JIT due to LICM Moving Array Access Before the Bounds Check | This is a dos exploit for multiple platform. Description: WebKit JavaScriptCore - Out-Of-Bounds Access in FTL JIT due to LICM Moving Array Access Before the Bounds Check. Author: Google Security Research |
Analyze the security implications of: WebKit JavaScriptCore - Out-Of-Bounds Access in FTL JIT due to LICM Moving Array Access Before the Bounds Check | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Confixx Pro 3.3.1 - 'saveserver.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Confixx Pro 3.3.1 - 'saveserver.php' Remote File Inclusion. Author: H4 / XPK |
Analyze the security implications of: Confixx Pro 3.3.1 - 'saveserver.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ContentKeeper Web Appliance < 125.10 - Command Execution (Metasploit) | This is a webapps exploit for multiple platform. Description: ContentKeeper Web Appliance < 125.10 - Command Execution (Metasploit). Author: patrick |
Analyze the security implications of: ContentKeeper Web Appliance < 125.10 - Command Execution (Metasploit) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: python-wrapper - Untrusted Search Path/Code Execution | This is a local exploit for linux platform. Description: python-wrapper - Untrusted Search Path/Code Execution. Author: ShadowHatesYou |
Analyze the security implications of: python-wrapper - Untrusted Search Path/Code Execution | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Eyeland Studio Inc. - 'game.php' SQL Injection | This is a webapps exploit for php platform. Description: Eyeland Studio Inc. - 'game.php' SQL Injection. Author: CoBRa_21 |
Analyze the security implications of: Eyeland Studio Inc. - 'game.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Engeman 6.x - SQL Injection | This is a webapps exploit for multiple platform. Description: Engeman 6.x - SQL Injection. Author: crashbrz |
Analyze the security implications of: Engeman 6.x - SQL Injection | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GNUBoard 4.31.04 (09.01.30) - Multiple Local/Remote Vulnerabilities | This is a webapps exploit for php platform. Description: GNUBoard 4.31.04 (09.01.30) - Multiple Local/Remote Vulnerabilities. Author: make0day |
Analyze the security implications of: GNUBoard 4.31.04 (09.01.30) - Multiple Local/Remote Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DIR-8xx Routers - Leak Credentials | This is a webapps exploit for hardware platform. Description: D-Link DIR-8xx Routers - Leak Credentials. Author: embedi |
Analyze the security implications of: D-Link DIR-8xx Routers - Leak Credentials | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: BeOS 5.0 - TCP Fragmentation Remote Denial of Service | This is a dos exploit for beos platform. Description: BeOS 5.0 - TCP Fragmentation Remote Denial of Service. Author: visi0n |
Analyze the security implications of: BeOS 5.0 - TCP Fragmentation Remote Denial of Service | This exploit targets beos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets beos platform |
What is this exploit about: Advantech Webaccess HMI/SCADA Software - Persistence Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Advantech Webaccess HMI/SCADA Software - Persistence Cross-Site Scripting. Author: SecPod Research |
Analyze the security implications of: Advantech Webaccess HMI/SCADA Software - Persistence Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: FreeHostShop Website Generator 3.3 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: FreeHostShop Website Generator 3.3 - Arbitrary File Upload. Author: NSA Group |
Analyze the security implications of: FreeHostShop Website Generator 3.3 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Daily Expenses Management System 1.0 - 'item' SQL Injection | This is a webapps exploit for php platform. Description: Daily Expenses Management System 1.0 - 'item' SQL Injection. Author: screetsec |
Analyze the security implications of: Daily Expenses Management System 1.0 - 'item' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ABC estore 3.0 - 'cat_id' Blind SQL Injection | This is a webapps exploit for php platform. Description: ABC estore 3.0 - 'cat_id' Blind SQL Injection. Author: k1tk4t |
Analyze the security implications of: ABC estore 3.0 - 'cat_id' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! / Mambo Component com_scheduling - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! / Mambo Component com_scheduling - 'id' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! / Mambo Component com_scheduling - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ClipBucket - 'beats_uploader' Arbitrary File Upload (Metasploit) | This is a webapps exploit for php platform. Description: ClipBucket - 'beats_uploader' Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: ClipBucket - 'beats_uploader' Arbitrary File Upload (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hot Project 7.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: Hot Project 7.0 - Authentication Bypass. Author: HCOCA_MAN |
Analyze the security implications of: Hot Project 7.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.4.x/2.6.x - BlueTooth Signed Buffer Index (PoC) | This is a dos exploit for linux platform. Description: Linux Kernel 2.4.x/2.6.x - BlueTooth Signed Buffer Index (PoC). Author: ilja van sprundel |
Analyze the security implications of: Linux Kernel 2.4.x/2.6.x - BlueTooth Signed Buffer Index (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: HP JetDirect rev. G.08.x/rev. H.08.x/x.08.x/J3111A - LCD Display Modification | This is a remote exploit for hardware platform. Description: HP JetDirect rev. G.08.x/rev. H.08.x/x.08.x/J3111A - LCD Display Modification. Author: sili |
Analyze the security implications of: HP JetDirect rev. G.08.x/rev. H.08.x/x.08.x/J3111A - LCD Display Modification | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: KCFinder 2.51 - Local File Disclosure | This is a webapps exploit for php platform. Description: KCFinder 2.51 - Local File Disclosure. Author: DaOne |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.