input
stringlengths 39
228
| output
stringlengths 32
324
|
|---|---|
Analyze the security implications of: Asset Manager - Arbitrary File Upload
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Acc Autos 4.0 - Insecure Cookie Handling
|
This is a webapps exploit for php platform. Description: Acc Autos 4.0 - Insecure Cookie Handling. Author: x0r
|
Analyze the security implications of: Acc Autos 4.0 - Insecure Cookie Handling
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Exam Hall Management System 1.0 - Unrestricted File Upload (Unauthenticated)
|
This is a webapps exploit for php platform. Description: Exam Hall Management System 1.0 - Unrestricted File Upload (Unauthenticated). Author: Thamer Almohammadi
|
Analyze the security implications of: Exam Hall Management System 1.0 - Unrestricted File Upload (Unauthenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SAP Message Server - 'Group' Remote Buffer Overflow
|
This is a remote exploit for multiple platform. Description: SAP Message Server - 'Group' Remote Buffer Overflow. Author: Mark Litchfield
|
Analyze the security implications of: SAP Message Server - 'Group' Remote Buffer Overflow
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Klf-Realty 2.0 - 'search_listing.asp' Multiple SQL Injections
|
This is a webapps exploit for asp platform. Description: Klf-Realty 2.0 - 'search_listing.asp' Multiple SQL Injections. Author: laurent gaffie
|
Analyze the security implications of: Klf-Realty 2.0 - 'search_listing.asp' Multiple SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Compro Technology IP Camera - ' index_MJpeg.cgi' Stream Disclosure
|
This is a webapps exploit for hardware platform. Description: Compro Technology IP Camera - ' index_MJpeg.cgi' Stream Disclosure. Author: icekam
|
Analyze the security implications of: Compro Technology IP Camera - ' index_MJpeg.cgi' Stream Disclosure
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Hitachi NAS (HNAS) System Management Unit (SMU) Backup & Restore < 14.8.7825.01 - IDOR
|
This is a webapps exploit for hardware platform. Description: Hitachi NAS (HNAS) System Management Unit (SMU) Backup & Restore < 14.8.7825.01 - IDOR. Author: Arslan Masood
|
Analyze the security implications of: Hitachi NAS (HNAS) System Management Unit (SMU) Backup & Restore < 14.8.7825.01 - IDOR
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: GLPI v10.0.2 - SQL Injection (Authentication Depends on Configuration)
|
This is a webapps exploit for php platform. Description: GLPI v10.0.2 - SQL Injection (Authentication Depends on Configuration). Author: Nuri Çilengir
|
Analyze the security implications of: GLPI v10.0.2 - SQL Injection (Authentication Depends on Configuration)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alex DownloadEngine 1.4.1 - 'comments.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Alex DownloadEngine 1.4.1 - 'comments.php' SQL Injection. Author: ajann
|
Analyze the security implications of: Alex DownloadEngine 1.4.1 - 'comments.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: EMC Data Protection Advisor 5.8.1 - Denial of Service
|
This is a dos exploit for hardware platform. Description: EMC Data Protection Advisor 5.8.1 - Denial of Service. Author: Luigi Auriemma
|
Analyze the security implications of: EMC Data Protection Advisor 5.8.1 - Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: cPassMan 1.82 - Arbitrary File Download
|
This is a webapps exploit for php platform. Description: cPassMan 1.82 - Arbitrary File Download. Author: Sense of Security
|
Analyze the security implications of: cPassMan 1.82 - Arbitrary File Download
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 4images 1.8 - 'limitnumber' SQL Injection (Authenticated)
|
This is a webapps exploit for php platform. Description: 4images 1.8 - 'limitnumber' SQL Injection (Authenticated). Author: Andrey Stoykov
|
Analyze the security implications of: 4images 1.8 - 'limitnumber' SQL Injection (Authenticated)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jenkins CLI - RMI Java Deserialization (Metasploit)
|
This is a remote exploit for java platform. Description: Jenkins CLI - RMI Java Deserialization (Metasploit). Author: Metasploit
|
Analyze the security implications of: Jenkins CLI - RMI Java Deserialization (Metasploit)
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: OpenSSL - ASN.1 Parsing
|
This is a remote exploit for multiple platform. Description: OpenSSL - ASN.1 Parsing. Author: Syzop
|
Analyze the security implications of: OpenSSL - ASN.1 Parsing
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: SAP Web Application Server 6.x/7.0 - Input Validation
|
This is a remote exploit for multiple platform. Description: SAP Web Application Server 6.x/7.0 - Input Validation. Author: Arnold Grossmann
|
Analyze the security implications of: SAP Web Application Server 6.x/7.0 - Input Validation
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Linux Kernel 2.4 - 'uselib()' Local Privilege Escalation (2)
|
This is a local exploit for linux platform. Description: Linux Kernel 2.4 - 'uselib()' Local Privilege Escalation (2). Author: Tim Hsu
|
Analyze the security implications of: Linux Kernel 2.4 - 'uselib()' Local Privilege Escalation (2)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Esselbach Storyteller CMS System 1.8 - SQL Injection
|
This is a webapps exploit for php platform. Description: Esselbach Storyteller CMS System 1.8 - SQL Injection. Author: Shamus
|
Analyze the security implications of: Esselbach Storyteller CMS System 1.8 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: UBICOD Medivision Digital Signage 1.5.1 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for hardware platform. Description: UBICOD Medivision Digital Signage 1.5.1 - Cross-Site Request Forgery (Add Admin). Author: LiquidWorm
|
Analyze the security implications of: UBICOD Medivision Digital Signage 1.5.1 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Clicky Web Pseudo-frames 1.0 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Clicky Web Pseudo-frames 1.0 - Remote File Inclusion. Author: frog
|
Analyze the security implications of: Clicky Web Pseudo-frames 1.0 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: F3Site 2011 alfa 1 - Cross-Site Scripting / Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: F3Site 2011 alfa 1 - Cross-Site Scripting / Cross-Site Request Forgery. Author: High-Tech Bridge SA
|
Analyze the security implications of: F3Site 2011 alfa 1 - Cross-Site Scripting / Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Horde Turba 3.1.7 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Horde Turba 3.1.7 - Multiple Cross-Site Scripting Vulnerabilities. Author: Ivan Javier Sanchez
|
Analyze the security implications of: Horde Turba 3.1.7 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Man 1.5.1 - Catalog File Format String
|
This is a local exploit for linux platform. Description: Man 1.5.1 - Catalog File Format String. Author: V9
|
Analyze the security implications of: Man 1.5.1 - Catalog File Format String
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Maitra Mail Tracking System 1.7.2 - SQL Injection / Database File Download
|
This is a webapps exploit for php platform. Description: Maitra Mail Tracking System 1.7.2 - SQL Injection / Database File Download. Author: Ihsan Sencan
|
Analyze the security implications of: Maitra Mail Tracking System 1.7.2 - SQL Injection / Database File Download
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Customer Support System 1.0 - Stored XSS
|
This is a webapps exploit for php platform. Description: Customer Support System 1.0 - Stored XSS. Author: Geraldo Alcantara
|
Analyze the security implications of: Customer Support System 1.0 - Stored XSS
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component JS Support Ticket (component com_jssupportticket) 1.1.5 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component JS Support Ticket (component com_jssupportticket) 1.1.5 - SQL Injection. Author: qw3rTyTy
|
Analyze the security implications of: Joomla! Component JS Support Ticket (component com_jssupportticket) 1.1.5 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CMS Made Simple 1.11.9 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: CMS Made Simple 1.11.9 - Multiple Vulnerabilities. Author: Pedro Ribeiro
|
Analyze the security implications of: CMS Made Simple 1.11.9 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Acronis True Image Echo Enterprise Server 9.5.0.8072 - Multiple Remote Denial of Service Vulnerabilities
|
This is a dos exploit for multiple platform. Description: Acronis True Image Echo Enterprise Server 9.5.0.8072 - Multiple Remote Denial of Service Vulnerabilities. Author: Luigi Auriemma
|
Analyze the security implications of: Acronis True Image Echo Enterprise Server 9.5.0.8072 - Multiple Remote Denial of Service Vulnerabilities
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Sun Java Runtime Environment 1.6 - Web Start '.JNLP' File Stack Buffer Overflow
|
This is a remote exploit for linux platform. Description: Sun Java Runtime Environment 1.6 - Web Start '.JNLP' File Stack Buffer Overflow. Author: Daniel Soeder
|
Analyze the security implications of: Sun Java Runtime Environment 1.6 - Web Start '.JNLP' File Stack Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Charity Management System CMS 1.0 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Charity Management System CMS 1.0 - Multiple Vulnerabilities. Author: Davide Taraschi
|
Analyze the security implications of: Charity Management System CMS 1.0 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Riverbed SteelCentral NetProfiler/NetExpress - Remote Code Execution (Metasploit)
|
This is a remote exploit for linux platform. Description: Riverbed SteelCentral NetProfiler/NetExpress - Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Riverbed SteelCentral NetProfiler/NetExpress - Remote Code Execution (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: JAKCMS PRO 2.2.5 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: JAKCMS PRO 2.2.5 - Arbitrary File Upload. Author: EgiX
|
Analyze the security implications of: JAKCMS PRO 2.2.5 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Claroline 1.x - '/admin/adminusers.php?dir' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Claroline 1.x - '/admin/adminusers.php?dir' Cross-Site Scripting. Author: Fernando Munoz
|
Analyze the security implications of: Claroline 1.x - '/admin/adminusers.php?dir' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM RICOH 6400 Printer - HTML Injection
|
This is a webapps exploit for hardware platform. Description: IBM RICOH 6400 Printer - HTML Injection. Author: Ismail Tasdelen
|
Analyze the security implications of: IBM RICOH 6400 Printer - HTML Injection
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: HRSALE 1.1.8 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for php platform. Description: HRSALE 1.1.8 - Cross-Site Request Forgery (Add Admin). Author: Ismail Akıcı
|
Analyze the security implications of: HRSALE 1.1.8 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.