input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Chicomas 2.0.4 - Database Backup / File Disclosure / Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ATutor - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities | This is a webapps exploit for php platform. Description: ATutor - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities. Author: HauntIT |
Analyze the security implications of: ATutor - Multiple Cross-Site Scripting / HTML Injection Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Atlassian Confluence Data Center and Server - Authentication Bypass (Metasploit) | This is a webapps exploit for multiple platform. Description: Atlassian Confluence Data Center and Server - Authentication Bypass (Metasploit). Author: Emir Polat |
Analyze the security implications of: Atlassian Confluence Data Center and Server - Authentication Bypass (Metasploit) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: HyperVM - File Permissions Credential Disclosure | This is a local exploit for multiple platform. Description: HyperVM - File Permissions Credential Disclosure. Author: Xia Shing Zee |
Analyze the security implications of: HyperVM - File Permissions Credential Disclosure | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ZTE ZXHN H108L - Authentication Bypass (2) | This is a webapps exploit for hardware platform. Description: ZTE ZXHN H108L - Authentication Bypass (2). Author: Project Zero Labs |
Analyze the security implications of: ZTE ZXHN H108L - Authentication Bypass (2) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: InnovaPortal - 'tc/contents/home001.jsp?contentid' Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: InnovaPortal - 'tc/contents/home001.jsp?contentid' Cross-Site Scripting. Author: JosS |
Analyze the security implications of: InnovaPortal - 'tc/contents/home001.jsp?contentid' Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: EgO 0.7b - 'FCKeditor' Arbitrary File Upload | This is a webapps exploit for php platform. Description: EgO 0.7b - 'FCKeditor' Arbitrary File Upload. Author: ITSecTeam |
Analyze the security implications of: EgO 0.7b - 'FCKeditor' Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ahsay Backup 8.1.1.50 - Insecure File Upload and Code Execution (Authenticated) | This is a webapps exploit for jsp platform. Description: Ahsay Backup 8.1.1.50 - Insecure File Upload and Code Execution (Authenticated). Author: Wietse Boonstra |
Analyze the security implications of: Ahsay Backup 8.1.1.50 - Insecure File Upload and Code Execution (Authenticated) | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Atlassian Confluence 3.4.x - Error Page Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Atlassian Confluence 3.4.x - Error Page Cross-Site Scripting. Author: D. Niedermaier |
Analyze the security implications of: Atlassian Confluence 3.4.x - Error Page Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: i-dreams Mailer 1.2 Final - 'admin.dat' File Disclosure | This is a webapps exploit for cgi platform. Description: i-dreams Mailer 1.2 Final - 'admin.dat' File Disclosure. Author: Pouya_Server |
Analyze the security implications of: i-dreams Mailer 1.2 Final - 'admin.dat' File Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: FreeForum 0.9.7 - 'forum.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: FreeForum 0.9.7 - 'forum.php' Remote File Inclusion. Author: Mehmet Ince |
Analyze the security implications of: FreeForum 0.9.7 - 'forum.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CGIScript.net csNews 1.0 - Header File Type Restriction Bypass | This is a webapps exploit for cgi platform. Description: CGIScript.net csNews 1.0 - Header File Type Restriction Bypass. Author: Steve Gustin |
Analyze the security implications of: CGIScript.net csNews 1.0 - Header File Type Restriction Bypass | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: NetFlow Analyzer 5 - '/jspui/applicationList.jsp?alpha' Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: NetFlow Analyzer 5 - '/jspui/applicationList.jsp?alpha' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: NetFlow Analyzer 5 - '/jspui/applicationList.jsp?alpha' Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Alienvault OSSIM/USM 5.3.1 - Persistent Cross-Site Scripting | This is a webapps exploit for php platform. Description: Alienvault OSSIM/USM 5.3.1 - Persistent Cross-Site Scripting. Author: Peter Lapp |
Analyze the security implications of: Alienvault OSSIM/USM 5.3.1 - Persistent Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ArbitroWeb PHP Proxy 0.5/0.6 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: ArbitroWeb PHP Proxy 0.5/0.6 - Cross-Site Scripting. Author: Josh Gilmour |
Analyze the security implications of: ArbitroWeb PHP Proxy 0.5/0.6 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Content Management System 1.0 - 'First Name' Stored XSS | This is a webapps exploit for php platform. Description: Content Management System 1.0 - 'First Name' Stored XSS. Author: Zhaiyi |
Analyze the security implications of: Content Management System 1.0 - 'First Name' Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 1st Class Internet Solutions 1st Class Mail Server 4.0 - Remote Buffer Overflow (PoC) | This is a dos exploit for multiple platform. Description: 1st Class Internet Solutions 1st Class Mail Server 4.0 - Remote Buffer Overflow (PoC). Author: JeFFOsZ |
Analyze the security implications of: 1st Class Internet Solutions 1st Class Mail Server 4.0 - Remote Buffer Overflow (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Library Management System 3.0 - _Add Category_ Stored XSS | This is a webapps exploit for php platform. Description: Library Management System 3.0 - _Add Category_ Stored XSS. Author: Kislay Kumar |
Analyze the security implications of: Library Management System 3.0 - _Add Category_ Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Judging Management System v1.0 - Authentication Bypass | This is a webapps exploit for php platform. Description: Judging Management System v1.0 - Authentication Bypass. Author: Angelo Pio Amirante |
Analyze the security implications of: Judging Management System v1.0 - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JForum 'adminUsers' Module - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: JForum 'adminUsers' Module - Cross-Site Request Forgery. Author: arno |
Analyze the security implications of: JForum 'adminUsers' Module - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ivanti Endpoint Manager 4.6 - Remote Code Execution (RCE) | This is a remote exploit for multiple platform. Description: Ivanti Endpoint Manager 4.6 - Remote Code Execution (RCE). Author: d7x |
Analyze the security implications of: Ivanti Endpoint Manager 4.6 - Remote Code Execution (RCE) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: OpenKM 5.1.7 - Cross-Site Request Forgery | This is a webapps exploit for jsp platform. Description: OpenKM 5.1.7 - Cross-Site Request Forgery. Author: Cyrill Brunschwiler |
Analyze the security implications of: OpenKM 5.1.7 - Cross-Site Request Forgery | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Jogjacamp JProfile Gold - 'id_news' SQL Injection | This is a webapps exploit for php platform. Description: Jogjacamp JProfile Gold - 'id_news' SQL Injection. Author: kecemplungkalen |
Analyze the security implications of: Jogjacamp JProfile Gold - 'id_news' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jobberbase 2.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Jobberbase 2.0 - Multiple Vulnerabilities. Author: Ross Marks |
Analyze the security implications of: Jobberbase 2.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_pinboard - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component com_pinboard - Arbitrary File Upload. Author: ViRuSMaN |
Analyze the security implications of: Joomla! Component com_pinboard - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle WebLogic - POST Session Fixation | This is a webapps exploit for multiple platform. Description: Oracle WebLogic - POST Session Fixation. Author: Roberto Suggi Liverani |
Analyze the security implications of: Oracle WebLogic - POST Session Fixation | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: gdb (GNU debugger) 7.5.1 - Null Pointer Dereference | This is a dos exploit for linux platform. Description: gdb (GNU debugger) 7.5.1 - Null Pointer Dereference. Author: nitr0us |
Analyze the security implications of: gdb (GNU debugger) 7.5.1 - Null Pointer Dereference | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AirStar Airbnb Clone Script 1.0 - SQL Injection | This is a webapps exploit for php platform. Description: AirStar Airbnb Clone Script 1.0 - SQL Injection. Author: 8bitsec |
Analyze the security implications of: AirStar Airbnb Clone Script 1.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sun Cobalt RaQ 4.0 - Predictable Temporary Filename Symbolic Link Attack | This is a local exploit for linux platform. Description: Sun Cobalt RaQ 4.0 - Predictable Temporary Filename Symbolic Link Attack. Author: Charles Stevenson |
Analyze the security implications of: Sun Cobalt RaQ 4.0 - Predictable Temporary Filename Symbolic Link Attack | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: 68 Classifieds 4.1 - 'login.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: 68 Classifieds 4.1 - 'login.php' Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: 68 Classifieds 4.1 - 'login.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Barracuda Web Application Firewall - Authentication Bypass | This is a remote exploit for hardware platform. Description: Barracuda Web Application Firewall - Authentication Bypass. Author: Nick Hayes |
Analyze the security implications of: Barracuda Web Application Firewall - Authentication Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Zoom Telephonics X4/X5 ADSL Modem - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Zoom Telephonics X4/X5 ADSL Modem - Multiple Vulnerabilities. Author: Kyle Lovett |
Analyze the security implications of: Zoom Telephonics X4/X5 ADSL Modem - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Jenkins CI Script Console - Command Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Jenkins CI Script Console - Command Execution (Metasploit). Author: Spencer McIntyre |
Analyze the security implications of: Jenkins CI Script Console - Command Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Computer Software Manufaktur Alibaba 2.0 - Piped Command | This is a remote exploit for cgi platform. Description: Computer Software Manufaktur Alibaba 2.0 - Piped Command. Author: Prizm |
Analyze the security implications of: Computer Software Manufaktur Alibaba 2.0 - Piped Command | This exploit targets cgi systems. Type: remote. Risk level: High |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.