input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Personal.Net Portal - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: eGroupWare 1.0 - '/sitemgr-site/index.php?category_id' Cross-Site Scripting | This is a webapps exploit for php platform. Description: eGroupWare 1.0 - '/sitemgr-site/index.php?category_id' Cross-Site Scripting. Author: GulfTech Security |
Analyze the security implications of: eGroupWare 1.0 - '/sitemgr-site/index.php?category_id' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Crime records Management System 1.0 - 'Multiple' SQL Injection (Authenticated) | This is a webapps exploit for php platform. Description: Crime records Management System 1.0 - 'Multiple' SQL Injection (Authenticated). Author: Davide Taraschi |
Analyze the security implications of: Crime records Management System 1.0 - 'Multiple' SQL Injection (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: xinkaa Web station 1.0.3 - Directory Traversal | This is a remote exploit for multiple platform. Description: xinkaa Web station 1.0.3 - Directory Traversal. Author: Luigi Auriemma |
Analyze the security implications of: xinkaa Web station 1.0.3 - Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Openfire 3.6.4 - Multiple Cross-Site Request Forgery Vulnerabilities | This is a webapps exploit for jsp platform. Description: Openfire 3.6.4 - Multiple Cross-Site Request Forgery Vulnerabilities. Author: Riyaz Ahemed Walikar |
Analyze the security implications of: Openfire 3.6.4 - Multiple Cross-Site Request Forgery Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: ImpressCMS 1.4.2 - Remote Code Execution (RCE) (Authenticated) | This is a webapps exploit for php platform. Description: ImpressCMS 1.4.2 - Remote Code Execution (RCE) (Authenticated). Author: Halit AKAYDIN |
Analyze the security implications of: ImpressCMS 1.4.2 - Remote Code Execution (RCE) (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Chipmunk Blog - (Authentication Bypass) Add Admin | This is a webapps exploit for php platform. Description: Chipmunk Blog - (Authentication Bypass) Add Admin. Author: x0r |
Analyze the security implications of: Chipmunk Blog - (Authentication Bypass) Add Admin | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: bcoos 1.0.13 - 'click.php' SQL Injection | This is a webapps exploit for php platform. Description: bcoos 1.0.13 - 'click.php' SQL Injection. Author: DeltahackingTEAM |
Analyze the security implications of: bcoos 1.0.13 - 'click.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FS Car Rental Script - 'pickup_location' SQL Injection | This is a webapps exploit for php platform. Description: FS Car Rental Script - 'pickup_location' SQL Injection. Author: 8bitsec |
Analyze the security implications of: FS Car Rental Script - 'pickup_location' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: blueimp's jQuery 9.22.0 - (Arbitrary) File Upload (Metasploit) | This is a remote exploit for php platform. Description: blueimp's jQuery 9.22.0 - (Arbitrary) File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: blueimp's jQuery 9.22.0 - (Arbitrary) File Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EMO Realty Manager - 'ida' SQL Injection | This is a webapps exploit for php platform. Description: EMO Realty Manager - 'ida' SQL Injection. Author: HaCkeR_EgY |
Analyze the security implications of: EMO Realty Manager - 'ida' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BloodX CMS 1.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: BloodX CMS 1.0 - Authentication Bypass. Author: BKpatron |
Analyze the security implications of: BloodX CMS 1.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SWAT Samba Web Administration Tool - Cross-Site Request Forgery | This is a webapps exploit for cgi platform. Description: SWAT Samba Web Administration Tool - Cross-Site Request Forgery. Author: Narendra Shinde |
Analyze the security implications of: SWAT Samba Web Administration Tool - Cross-Site Request Forgery | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: WebWasher Classic 2.2/2.3 - HTTP CONNECT Unauthorized Access | This is a remote exploit for multiple platform. Description: WebWasher Classic 2.2/2.3 - HTTP CONNECT Unauthorized Access. Author: Oliver Karow |
Analyze the security implications of: WebWasher Classic 2.2/2.3 - HTTP CONNECT Unauthorized Access | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: KevinLAB BEMS 1.0 - File Path Traversal Information Disclosure (Authenticated) | This is a webapps exploit for hardware platform. Description: KevinLAB BEMS 1.0 - File Path Traversal Information Disclosure (Authenticated). Author: LiquidWorm |
Analyze the security implications of: KevinLAB BEMS 1.0 - File Path Traversal Information Disclosure (Authenticated) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: TORQUE Resource Manager 2.5.x < 2.5.13 - Stack Buffer Overflow Stub | This is a remote exploit for linux platform. Description: TORQUE Resource Manager 2.5.x < 2.5.13 - Stack Buffer Overflow Stub. Author: bwall |
Analyze the security implications of: TORQUE Resource Manager 2.5.x < 2.5.13 - Stack Buffer Overflow Stub | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CS-Cart 4.3.10 - XML External Entity Injection | This is a webapps exploit for php platform. Description: CS-Cart 4.3.10 - XML External Entity Injection. Author: 0x4148 |
Analyze the security implications of: CS-Cart 4.3.10 - XML External Entity Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CVS (Linux/FreeBSD) - Remote Entry Line Heap Overflow | This is a remote exploit for multiple platform. Description: CVS (Linux/FreeBSD) - Remote Entry Line Heap Overflow. Author: Ac1dB1tCh3z |
Analyze the security implications of: CVS (Linux/FreeBSD) - Remote Entry Line Heap Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Kasseler CMS 2.0.5 - Bypass / Download Backup | This is a webapps exploit for php platform. Description: Kasseler CMS 2.0.5 - Bypass / Download Backup. Author: indoushka |
Analyze the security implications of: Kasseler CMS 2.0.5 - Bypass / Download Backup | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HiSilicon DVR Devices - Remote Code Execution | This is a remote exploit for hardware platform. Description: HiSilicon DVR Devices - Remote Code Execution. Author: Istvan Toth |
Analyze the security implications of: HiSilicon DVR Devices - Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Zpanel - Remote Code Execution (Metasploit) | This is a remote exploit for php platform. Description: Zpanel - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Zpanel - Remote Code Execution (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EGallery - Arbitrary '.PHP' File Upload (Metasploit) | This is a webapps exploit for php platform. Description: EGallery - Arbitrary '.PHP' File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: EGallery - Arbitrary '.PHP' File Upload (Metasploit) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BlueSoft (Multiple Products) - Multiple SQL Injections | This is a webapps exploit for php platform. Description: BlueSoft (Multiple Products) - Multiple SQL Injections. Author: Lazmania61 |
Analyze the security implications of: BlueSoft (Multiple Products) - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Logaholic - 'index.php?conf' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Logaholic - 'index.php?conf' Cross-Site Scripting. Author: malibu.r |
Analyze the security implications of: Logaholic - 'index.php?conf' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Church Management System 1.0 - SQL Injection (Authentication Bypass) + Arbitrary File Upload + RCE | This is a webapps exploit for php platform. Description: Church Management System 1.0 - SQL Injection (Authentication Bypass) + Arbitrary File Upload + RCE. Author: Eleonora Guardini |
Analyze the security implications of: Church Management System 1.0 - SQL Injection (Authentication Bypass) + Arbitrary File Upload + RCE | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CityPost PHP LNKX 52.0 - 'message.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CityPost PHP LNKX 52.0 - 'message.php' Cross-Site Scripting. Author: Thom |
Analyze the security implications of: CityPost PHP LNKX 52.0 - 'message.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Agares Media ThemeSiteScript 1.0 - 'loadadminpage' Remote File Inclusion | This is a webapps exploit for php platform. Description: Agares Media ThemeSiteScript 1.0 - 'loadadminpage' Remote File Inclusion. Author: Koller |
Analyze the security implications of: Agares Media ThemeSiteScript 1.0 - 'loadadminpage' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: iisCart2000 - Arbitrary File Upload | This is a webapps exploit for asp platform. Description: iisCart2000 - Arbitrary File Upload. Author: Bosen |
Analyze the security implications of: iisCart2000 - Arbitrary File Upload | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Xerox DocuShare 6 - dsdn/dsweb/Services/User URI Cross-Site Scripting | This is a remote exploit for hardware platform. Description: Xerox DocuShare 6 - dsdn/dsweb/Services/User URI Cross-Site Scripting. Author: Doz |
Analyze the security implications of: Xerox DocuShare 6 - dsdn/dsweb/Services/User URI Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Ziggurat Farsi CMS - 'id' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Ziggurat Farsi CMS - 'id' Cross-Site Scripting. Author: Pouya Daneshmand |
Analyze the security implications of: Ziggurat Farsi CMS - 'id' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Easy File Uploader - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Easy File Uploader - Arbitrary File Upload. Author: Daniel Godoy |
Analyze the security implications of: Easy File Uploader - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Aiglon Web Server 2.0 - Installation Path Information Disclosure | This is a remote exploit for multiple platform. Description: Aiglon Web Server 2.0 - Installation Path Information Disclosure. Author: Ziv Kamir |
Analyze the security implications of: Aiglon Web Server 2.0 - Installation Path Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Pserv 2.0 - HTTP Version Specifier Buffer Overflow | This is a dos exploit for linux platform. Description: Pserv 2.0 - HTTP Version Specifier Buffer Overflow. Author: Matthew Murphy |
Analyze the security implications of: Pserv 2.0 - HTTP Version Specifier Buffer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Android - 'getpidcon' Permission Bypass in KeyStore Service | This is a dos exploit for android platform. Description: Android - 'getpidcon' Permission Bypass in KeyStore Service. Author: Google Security Research |
Analyze the security implications of: Android - 'getpidcon' Permission Bypass in KeyStore Service | This exploit targets android systems. Type: dos. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.