input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
Analyze the security implications of: Asset Manager - Arbitrary File Upload | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Acc Autos 4.0 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: Acc Autos 4.0 - Insecure Cookie Handling. Author: x0r |
Analyze the security implications of: Acc Autos 4.0 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Exam Hall Management System 1.0 - Unrestricted File Upload (Unauthenticated) | This is a webapps exploit for php platform. Description: Exam Hall Management System 1.0 - Unrestricted File Upload (Unauthenticated). Author: Thamer Almohammadi |
Analyze the security implications of: Exam Hall Management System 1.0 - Unrestricted File Upload (Unauthenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SAP Message Server - 'Group' Remote Buffer Overflow | This is a remote exploit for multiple platform. Description: SAP Message Server - 'Group' Remote Buffer Overflow. Author: Mark Litchfield |
Analyze the security implications of: SAP Message Server - 'Group' Remote Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Klf-Realty 2.0 - 'search_listing.asp' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Klf-Realty 2.0 - 'search_listing.asp' Multiple SQL Injections. Author: laurent gaffie |
Analyze the security implications of: Klf-Realty 2.0 - 'search_listing.asp' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Compro Technology IP Camera - ' index_MJpeg.cgi' Stream Disclosure | This is a webapps exploit for hardware platform. Description: Compro Technology IP Camera - ' index_MJpeg.cgi' Stream Disclosure. Author: icekam |
Analyze the security implications of: Compro Technology IP Camera - ' index_MJpeg.cgi' Stream Disclosure | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Hitachi NAS (HNAS) System Management Unit (SMU) Backup & Restore < 14.8.7825.01 - IDOR | This is a webapps exploit for hardware platform. Description: Hitachi NAS (HNAS) System Management Unit (SMU) Backup & Restore < 14.8.7825.01 - IDOR. Author: Arslan Masood |
Analyze the security implications of: Hitachi NAS (HNAS) System Management Unit (SMU) Backup & Restore < 14.8.7825.01 - IDOR | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: GLPI v10.0.2 - SQL Injection (Authentication Depends on Configuration) | This is a webapps exploit for php platform. Description: GLPI v10.0.2 - SQL Injection (Authentication Depends on Configuration). Author: Nuri Çilengir |
Analyze the security implications of: GLPI v10.0.2 - SQL Injection (Authentication Depends on Configuration) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alex DownloadEngine 1.4.1 - 'comments.php' SQL Injection | This is a webapps exploit for php platform. Description: Alex DownloadEngine 1.4.1 - 'comments.php' SQL Injection. Author: ajann |
Analyze the security implications of: Alex DownloadEngine 1.4.1 - 'comments.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EMC Data Protection Advisor 5.8.1 - Denial of Service | This is a dos exploit for hardware platform. Description: EMC Data Protection Advisor 5.8.1 - Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: EMC Data Protection Advisor 5.8.1 - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: cPassMan 1.82 - Arbitrary File Download | This is a webapps exploit for php platform. Description: cPassMan 1.82 - Arbitrary File Download. Author: Sense of Security |
Analyze the security implications of: cPassMan 1.82 - Arbitrary File Download | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 4images 1.8 - 'limitnumber' SQL Injection (Authenticated) | This is a webapps exploit for php platform. Description: 4images 1.8 - 'limitnumber' SQL Injection (Authenticated). Author: Andrey Stoykov |
Analyze the security implications of: 4images 1.8 - 'limitnumber' SQL Injection (Authenticated) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jenkins CLI - RMI Java Deserialization (Metasploit) | This is a remote exploit for java platform. Description: Jenkins CLI - RMI Java Deserialization (Metasploit). Author: Metasploit |
Analyze the security implications of: Jenkins CLI - RMI Java Deserialization (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: OpenSSL - ASN.1 Parsing | This is a remote exploit for multiple platform. Description: OpenSSL - ASN.1 Parsing. Author: Syzop |
Analyze the security implications of: OpenSSL - ASN.1 Parsing | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: SAP Web Application Server 6.x/7.0 - Input Validation | This is a remote exploit for multiple platform. Description: SAP Web Application Server 6.x/7.0 - Input Validation. Author: Arnold Grossmann |
Analyze the security implications of: SAP Web Application Server 6.x/7.0 - Input Validation | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Linux Kernel 2.4 - 'uselib()' Local Privilege Escalation (2) | This is a local exploit for linux platform. Description: Linux Kernel 2.4 - 'uselib()' Local Privilege Escalation (2). Author: Tim Hsu |
Analyze the security implications of: Linux Kernel 2.4 - 'uselib()' Local Privilege Escalation (2) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Esselbach Storyteller CMS System 1.8 - SQL Injection | This is a webapps exploit for php platform. Description: Esselbach Storyteller CMS System 1.8 - SQL Injection. Author: Shamus |
Analyze the security implications of: Esselbach Storyteller CMS System 1.8 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: UBICOD Medivision Digital Signage 1.5.1 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for hardware platform. Description: UBICOD Medivision Digital Signage 1.5.1 - Cross-Site Request Forgery (Add Admin). Author: LiquidWorm |
Analyze the security implications of: UBICOD Medivision Digital Signage 1.5.1 - Cross-Site Request Forgery (Add Admin) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Clicky Web Pseudo-frames 1.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Clicky Web Pseudo-frames 1.0 - Remote File Inclusion. Author: frog |
Analyze the security implications of: Clicky Web Pseudo-frames 1.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: F3Site 2011 alfa 1 - Cross-Site Scripting / Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: F3Site 2011 alfa 1 - Cross-Site Scripting / Cross-Site Request Forgery. Author: High-Tech Bridge SA |
Analyze the security implications of: F3Site 2011 alfa 1 - Cross-Site Scripting / Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Horde Turba 3.1.7 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Horde Turba 3.1.7 - Multiple Cross-Site Scripting Vulnerabilities. Author: Ivan Javier Sanchez |
Analyze the security implications of: Horde Turba 3.1.7 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Man 1.5.1 - Catalog File Format String | This is a local exploit for linux platform. Description: Man 1.5.1 - Catalog File Format String. Author: V9 |
Analyze the security implications of: Man 1.5.1 - Catalog File Format String | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Maitra Mail Tracking System 1.7.2 - SQL Injection / Database File Download | This is a webapps exploit for php platform. Description: Maitra Mail Tracking System 1.7.2 - SQL Injection / Database File Download. Author: Ihsan Sencan |
Analyze the security implications of: Maitra Mail Tracking System 1.7.2 - SQL Injection / Database File Download | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Customer Support System 1.0 - Stored XSS | This is a webapps exploit for php platform. Description: Customer Support System 1.0 - Stored XSS. Author: Geraldo Alcantara |
Analyze the security implications of: Customer Support System 1.0 - Stored XSS | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component JS Support Ticket (component com_jssupportticket) 1.1.5 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JS Support Ticket (component com_jssupportticket) 1.1.5 - SQL Injection. Author: qw3rTyTy |
Analyze the security implications of: Joomla! Component JS Support Ticket (component com_jssupportticket) 1.1.5 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Made Simple 1.11.9 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: CMS Made Simple 1.11.9 - Multiple Vulnerabilities. Author: Pedro Ribeiro |
Analyze the security implications of: CMS Made Simple 1.11.9 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Acronis True Image Echo Enterprise Server 9.5.0.8072 - Multiple Remote Denial of Service Vulnerabilities | This is a dos exploit for multiple platform. Description: Acronis True Image Echo Enterprise Server 9.5.0.8072 - Multiple Remote Denial of Service Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: Acronis True Image Echo Enterprise Server 9.5.0.8072 - Multiple Remote Denial of Service Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Sun Java Runtime Environment 1.6 - Web Start '.JNLP' File Stack Buffer Overflow | This is a remote exploit for linux platform. Description: Sun Java Runtime Environment 1.6 - Web Start '.JNLP' File Stack Buffer Overflow. Author: Daniel Soeder |
Analyze the security implications of: Sun Java Runtime Environment 1.6 - Web Start '.JNLP' File Stack Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Charity Management System CMS 1.0 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: Charity Management System CMS 1.0 - Multiple Vulnerabilities. Author: Davide Taraschi |
Analyze the security implications of: Charity Management System CMS 1.0 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Riverbed SteelCentral NetProfiler/NetExpress - Remote Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: Riverbed SteelCentral NetProfiler/NetExpress - Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Riverbed SteelCentral NetProfiler/NetExpress - Remote Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: JAKCMS PRO 2.2.5 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: JAKCMS PRO 2.2.5 - Arbitrary File Upload. Author: EgiX |
Analyze the security implications of: JAKCMS PRO 2.2.5 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Claroline 1.x - '/admin/adminusers.php?dir' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Claroline 1.x - '/admin/adminusers.php?dir' Cross-Site Scripting. Author: Fernando Munoz |
Analyze the security implications of: Claroline 1.x - '/admin/adminusers.php?dir' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM RICOH 6400 Printer - HTML Injection | This is a webapps exploit for hardware platform. Description: IBM RICOH 6400 Printer - HTML Injection. Author: Ismail Tasdelen |
Analyze the security implications of: IBM RICOH 6400 Printer - HTML Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: HRSALE 1.1.8 - Cross-Site Request Forgery (Add Admin) | This is a webapps exploit for php platform. Description: HRSALE 1.1.8 - Cross-Site Request Forgery (Add Admin). Author: Ismail Akıcı |
Analyze the security implications of: HRSALE 1.1.8 - Cross-Site Request Forgery (Add Admin) | This exploit targets php systems. Type: webapps. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.