input
stringlengths 39
228
| output
stringlengths 32
324
|
|---|---|
What is this exploit about: Openfire 4.6.0 - 'users' Stored XSS
|
This is a webapps exploit for jsp platform. Description: Openfire 4.6.0 - 'users' Stored XSS. Author: j5s
|
Analyze the security implications of: Openfire 4.6.0 - 'users' Stored XSS
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: jQuery Uploadify 2.1.0 - Arbitrary File Upload
|
This is a webapps exploit for multiple platform. Description: jQuery Uploadify 2.1.0 - Arbitrary File Upload. Author: k4cp3r/Ablus
|
Analyze the security implications of: jQuery Uploadify 2.1.0 - Arbitrary File Upload
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: DVGuestbook 1.0/1.2.2 - 'index.php?page' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DVGuestbook 1.0/1.2.2 - 'index.php?page' Cross-Site Scripting. Author: Liz0ziM
|
Analyze the security implications of: DVGuestbook 1.0/1.2.2 - 'index.php?page' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IF-CMS 2.07 - Local File Inclusion (Metasploit) (2)
|
This is a webapps exploit for php platform. Description: IF-CMS 2.07 - Local File Inclusion (Metasploit) (2). Author: TecR0c
|
Analyze the security implications of: IF-CMS 2.07 - Local File Inclusion (Metasploit) (2)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Wolters Kluwer TeamMate 3.1 - Cross-Site Request Forgery
|
This is a webapps exploit for multiple platform. Description: Wolters Kluwer TeamMate 3.1 - Cross-Site Request Forgery. Author: Bhadresh Patel
|
Analyze the security implications of: Wolters Kluwer TeamMate 3.1 - Cross-Site Request Forgery
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apache Subversion 1.6.x - 'mod_dav_svn/lock.c' Remote Denial of Service
|
This is a dos exploit for linux platform. Description: Apache Subversion 1.6.x - 'mod_dav_svn/lock.c' Remote Denial of Service. Author: anonymous
|
Analyze the security implications of: Apache Subversion 1.6.x - 'mod_dav_svn/lock.c' Remote Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: SmartAgent 3.1.0 - Privilege Escalation
|
This is a webapps exploit for multiple platform. Description: SmartAgent 3.1.0 - Privilege Escalation. Author: Orion Hridoy
|
Analyze the security implications of: SmartAgent 3.1.0 - Privilege Escalation
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Control Web Panel 7 (CWP7) v0.9.8.1147 - Remote Code Execution (RCE)
|
This is a webapps exploit for php platform. Description: Control Web Panel 7 (CWP7) v0.9.8.1147 - Remote Code Execution (RCE). Author: Mayank Deshmukh
|
Analyze the security implications of: Control Web Panel 7 (CWP7) v0.9.8.1147 - Remote Code Execution (RCE)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BSW Gallery - 'uploadpic.php' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: BSW Gallery - 'uploadpic.php' Arbitrary File Upload. Author: cr4wl3r
|
Analyze the security implications of: BSW Gallery - 'uploadpic.php' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 4x CMS - 'login.php' Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: 4x CMS - 'login.php' Multiple SQL Injections. Author: cr4wl3r
|
Analyze the security implications of: 4x CMS - 'login.php' Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SearchBlox - Multiple Information Disclosure Vulnerabilities
|
This is a webapps exploit for java platform. Description: SearchBlox - Multiple Information Disclosure Vulnerabilities. Author: Ricky Roane Jr
|
Analyze the security implications of: SearchBlox - Multiple Information Disclosure Vulnerabilities
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: BoastMachine - 'blog' SQL Injection
|
This is a webapps exploit for php platform. Description: BoastMachine - 'blog' SQL Injection. Author: Omar Kurt
|
Analyze the security implications of: BoastMachine - 'blog' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dir2web - '/system/src/dispatcher.php?oid' SQL Injection
|
This is a webapps exploit for php platform. Description: Dir2web - '/system/src/dispatcher.php?oid' SQL Injection. Author: Daniel Correa
|
Analyze the security implications of: Dir2web - '/system/src/dispatcher.php?oid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CMSsite 1.0 - Multiple Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: CMSsite 1.0 - Multiple Cross-Site Request Forgery. Author: Mr Winst0n
|
Analyze the security implications of: CMSsite 1.0 - Multiple Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ASP Indir Iltaweb Alisveris Sistemi - 'xurunler.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: ASP Indir Iltaweb Alisveris Sistemi - 'xurunler.asp' SQL Injection. Author: tRoot
|
Analyze the security implications of: ASP Indir Iltaweb Alisveris Sistemi - 'xurunler.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Apple Mac OSX 10.4.8 - DMG UFS FFS_MountFS Integer Overflow
|
This is a dos exploit for osx platform. Description: Apple Mac OSX 10.4.8 - DMG UFS FFS_MountFS Integer Overflow. Author: LMH
|
Analyze the security implications of: Apple Mac OSX 10.4.8 - DMG UFS FFS_MountFS Integer Overflow
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Command School Student Management System - '/sw/Admin_change_Password.php' Cross-Site Request Forgery (Admin Password Manipulation)
|
This is a webapps exploit for php platform. Description: Command School Student Management System - '/sw/Admin_change_Password.php' Cross-Site Request Forgery (Admin Password Manipulation). Author: AtT4CKxT3rR0r1ST
|
Analyze the security implications of: Command School Student Management System - '/sw/Admin_change_Password.php' Cross-Site Request Forgery (Admin Password Manipulation)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HolaCMS 1.2.x/1.4.x Voting Module - Directory Traversal Remote File Corruption
|
This is a webapps exploit for php platform. Description: HolaCMS 1.2.x/1.4.x Voting Module - Directory Traversal Remote File Corruption. Author: Virginity Security
|
Analyze the security implications of: HolaCMS 1.2.x/1.4.x Voting Module - Directory Traversal Remote File Corruption
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Nessus 8.2.1 - Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: Nessus 8.2.1 - Cross-Site Scripting. Author: Ozer Goker
|
Analyze the security implications of: Nessus 8.2.1 - Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: AlkalinePHP 0.77.35 - 'adduser.php' Arbitrary Add Admin
|
This is a webapps exploit for php platform. Description: AlkalinePHP 0.77.35 - 'adduser.php' Arbitrary Add Admin. Author: t0pP8uZz
|
Analyze the security implications of: AlkalinePHP 0.77.35 - 'adduser.php' Arbitrary Add Admin
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Squid Proxy 2.5/2.6 - FTP URI Remote Denial of Service
|
This is a dos exploit for linux platform. Description: Squid Proxy 2.5/2.6 - FTP URI Remote Denial of Service. Author: David Duncan Ross Palmer
|
Analyze the security implications of: Squid Proxy 2.5/2.6 - FTP URI Remote Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apple macOS 10.12 - Double vm_deallocate in Userspace MIG Code Use-After-Free
|
This is a dos exploit for macos platform. Description: Apple macOS 10.12 - Double vm_deallocate in Userspace MIG Code Use-After-Free. Author: Google Security Research
|
Analyze the security implications of: Apple macOS 10.12 - Double vm_deallocate in Userspace MIG Code Use-After-Free
|
This exploit targets macos systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: dagger Web engine 23jan2007 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: dagger Web engine 23jan2007 - Remote File Inclusion. Author: Katatafish
|
Analyze the security implications of: dagger Web engine 23jan2007 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: LibTiff 3.7.1 - BitsPerSample Tag Local Buffer Overflow
|
This is a local exploit for multiple platform. Description: LibTiff 3.7.1 - BitsPerSample Tag Local Buffer Overflow. Author: Agustin Gianni
|
Analyze the security implications of: LibTiff 3.7.1 - BitsPerSample Tag Local Buffer Overflow
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: D-Link DCS Series Cameras - Insecure Crossdomain
|
This is a webapps exploit for hardware platform. Description: D-Link DCS Series Cameras - Insecure Crossdomain. Author: SlidingWindow
|
Analyze the security implications of: D-Link DCS Series Cameras - Insecure Crossdomain
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: e107 Hupsi_fancybox Plugin - 'Uploadify.php' Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: e107 Hupsi_fancybox Plugin - 'Uploadify.php' Arbitrary File Upload. Author: Sammy FORGIT
|
Analyze the security implications of: e107 Hupsi_fancybox Plugin - 'Uploadify.php' Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component is 1.0.1 - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Joomla! Component is 1.0.1 - Multiple SQL Injections. Author: Houssamix
|
Analyze the security implications of: Joomla! Component is 1.0.1 - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BareNuked CMS 1.1.0 - Arbitrary Add Admin
|
This is a webapps exploit for php platform. Description: BareNuked CMS 1.1.0 - Arbitrary Add Admin. Author: CWH Underground
|
Analyze the security implications of: BareNuked CMS 1.1.0 - Arbitrary Add Admin
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: VMware Remote Console e.x.p build-158248 - Format String
|
This is a dos exploit for multiple platform. Description: VMware Remote Console e.x.p build-158248 - Format String. Author: Alexey Sintsov
|
Analyze the security implications of: VMware Remote Console e.x.p build-158248 - Format String
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: TerminatorX 3.8 - Multiple Command-Line and Environment Buffer Overrun Vulnerabilities (1)
|
This is a local exploit for linux platform. Description: TerminatorX 3.8 - Multiple Command-Line and Environment Buffer Overrun Vulnerabilities (1). Author: c0wboy
|
Analyze the security implications of: TerminatorX 3.8 - Multiple Command-Line and Environment Buffer Overrun Vulnerabilities (1)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: HumHub 1.3.12 - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: HumHub 1.3.12 - Cross-Site Scripting. Author: Kağan EĞLENCE
|
Analyze the security implications of: HumHub 1.3.12 - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component Acymailing Starter 5.9.5 - CSV Macro Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Acymailing Starter 5.9.5 - CSV Macro Injection. Author: Sureshbabu Narvaneni
|
Analyze the security implications of: Joomla! Component Acymailing Starter 5.9.5 - CSV Macro Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Front Accounting 2.3.4 - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: Front Accounting 2.3.4 - Cross-Site Request Forgery. Author: AutoSec Tools
|
Analyze the security implications of: Front Accounting 2.3.4 - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DeluxeBB 1.0 - 'topic.php' SQL Injection
|
This is a webapps exploit for php platform. Description: DeluxeBB 1.0 - 'topic.php' SQL Injection. Author: abducter
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.