input
stringlengths 39
228
| output
stringlengths 32
324
|
|---|---|
Analyze the security implications of: Text File Search Classic - 'TextFileSearch.asp' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Eibiz i-Media Server Digital Signage 3.8.0 - Directory Traversal
|
This is a webapps exploit for multiple platform. Description: Eibiz i-Media Server Digital Signage 3.8.0 - Directory Traversal. Author: LiquidWorm
|
Analyze the security implications of: Eibiz i-Media Server Digital Signage 3.8.0 - Directory Traversal
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution
|
This is a webapps exploit for php platform. Description: Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution. Author: Julien Ahrens
|
Analyze the security implications of: Dell KACE Systems Management Appliance (K1000) 6.4.120756 - Unauthenticated Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: agorum core Pro 7.8.1.4-251 - Persistent Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: agorum core Pro 7.8.1.4-251 - Persistent Cross-Site Scripting. Author: SySS GmbH
|
Analyze the security implications of: agorum core Pro 7.8.1.4-251 - Persistent Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ECOA Building Automation System - Cookie Poisoning Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: ECOA Building Automation System - Cookie Poisoning Authentication Bypass. Author: Neurogenesia
|
Analyze the security implications of: ECOA Building Automation System - Cookie Poisoning Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Drupal avatar_uploader v7.x-1.0-beta8 - Cross Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Drupal avatar_uploader v7.x-1.0-beta8 - Cross Site Scripting (XSS). Author: Milad karimi
|
Analyze the security implications of: Drupal avatar_uploader v7.x-1.0-beta8 - Cross Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Corda Highwire - 'Highwire.ashx' Full Path Disclosure
|
This is a webapps exploit for asp platform. Description: Corda Highwire - 'Highwire.ashx' Full Path Disclosure. Author: Adam Willard
|
Analyze the security implications of: Corda Highwire - 'Highwire.ashx' Full Path Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: BIG-IP 15.0.0 < 15.1.0.3 / 14.1.0 < 14.1.2.5 / 13.1.0 < 13.1.3.3 / 12.1.0 < 12.1.5.1 / 11.6.1 < 11.6.5.1 - Traffic Management User Interface 'TMUI' Remote Code Execution (PoC)
|
This is a webapps exploit for linux platform. Description: BIG-IP 15.0.0 < 15.1.0.3 / 14.1.0 < 14.1.2.5 / 13.1.0 < 13.1.3.3 / 12.1.0 < 12.1.5.1 / 11.6.1 < 11.6.5.1 - Traffic Management User Interface 'TMUI' Remote Code Execution (PoC). Author: Budi Khoirudin
|
Analyze the security implications of: BIG-IP 15.0.0 < 15.1.0.3 / 14.1.0 < 14.1.2.5 / 13.1.0 < 13.1.3.3 / 12.1.0 < 12.1.5.1 / 11.6.1 < 11.6.5.1 - Traffic Management User Interface 'TMUI' R
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Maian Music 1.0 - Insecure Cookie Handling
|
This is a webapps exploit for php platform. Description: Maian Music 1.0 - Insecure Cookie Handling. Author: Saime
|
Analyze the security implications of: Maian Music 1.0 - Insecure Cookie Handling
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: xorg-x11-server < 1.20.3 - 'modulepath' Local Privilege Escalation
|
This is a local exploit for multiple platform. Description: xorg-x11-server < 1.20.3 - 'modulepath' Local Privilege Escalation. Author: Marco Ivaldi
|
Analyze the security implications of: xorg-x11-server < 1.20.3 - 'modulepath' Local Privilege Escalation
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component com_frontenduseraccess - Local File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component com_frontenduseraccess - Local File Inclusion. Author: wishnusakti
|
Analyze the security implications of: Joomla! Component com_frontenduseraccess - Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Webmin 1.920 - Remote Code Execution
|
This is a webapps exploit for linux platform. Description: Webmin 1.920 - Remote Code Execution. Author: Fernando A. Lagos B
|
Analyze the security implications of: Webmin 1.920 - Remote Code Execution
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: RarCrack 0.2 - 'Filename init() .bss' (PoC)
|
This is a dos exploit for linux platform. Description: RarCrack 0.2 - 'Filename init() .bss' (PoC). Author: Stoke
|
Analyze the security implications of: RarCrack 0.2 - 'Filename init() .bss' (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: FreeBSD 5.4-RELEASE ftpd 6.00LS - 'sendfile' Memory Leak
|
This is a local exploit for freebsd platform. Description: FreeBSD 5.4-RELEASE ftpd 6.00LS - 'sendfile' Memory Leak. Author: kingcope
|
Analyze the security implications of: FreeBSD 5.4-RELEASE ftpd 6.00LS - 'sendfile' Memory Leak
|
This exploit targets freebsd systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets freebsd platform
|
What is this exploit about: Funeral Script PHP - Cross-Site Scripting / SQL Injection
|
This is a webapps exploit for php platform. Description: Funeral Script PHP - Cross-Site Scripting / SQL Injection. Author: snup
|
Analyze the security implications of: Funeral Script PHP - Cross-Site Scripting / SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Axis Communications 207W Network Camera - Web Interface axis-cgi/admin/restart.cgi Cross-Site Request Forgery
|
This is a webapps exploit for cgi platform. Description: Axis Communications 207W Network Camera - Web Interface axis-cgi/admin/restart.cgi Cross-Site Request Forgery. Author: Seth Fogie
|
Analyze the security implications of: Axis Communications 207W Network Camera - Web Interface axis-cgi/admin/restart.cgi Cross-Site Request Forgery
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Apache 1.3 + PHP 3 - File Disclosure
|
This is a remote exploit for multiple platform. Description: Apache 1.3 + PHP 3 - File Disclosure. Author: china nsl
|
Analyze the security implications of: Apache 1.3 + PHP 3 - File Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apple iOS Mobile Safari - LibTIFF Buffer Overflow (Metasploit)
|
This is a remote exploit for ios platform. Description: Apple iOS Mobile Safari - LibTIFF Buffer Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: Apple iOS Mobile Safari - LibTIFF Buffer Overflow (Metasploit)
|
This exploit targets ios systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: RSA WebID 5.3 - 'IISWebAgentIF.dll' Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: RSA WebID 5.3 - 'IISWebAgentIF.dll' Cross-Site Scripting. Author: quentin.berdugo
|
Analyze the security implications of: RSA WebID 5.3 - 'IISWebAgentIF.dll' Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: LifeSize Room 5.0.9 - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: LifeSize Room 5.0.9 - Multiple Vulnerabilities. Author: Xiphos Research Ltd
|
Analyze the security implications of: LifeSize Room 5.0.9 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: KimsQ 040109 - Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: KimsQ 040109 - Multiple Remote File Inclusions. Author: mat
|
Analyze the security implications of: KimsQ 040109 - Multiple Remote File Inclusions
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CMS Loko Media - Local File Download
|
This is a webapps exploit for php platform. Description: CMS Loko Media - Local File Download. Author: Xr0b0t
|
Analyze the security implications of: CMS Loko Media - Local File Download
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Diesel Pay Script - 'area' SQL Injection
|
This is a webapps exploit for php platform. Description: Diesel Pay Script - 'area' SQL Injection. Author: ZoRLu
|
Analyze the security implications of: Diesel Pay Script - 'area' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cygnus Network Security 4.0/KerbNet 5.0 / MIT Kerberos 4/5 / RedHat 6.2 - Compatibility 'krb_rd_req()' Remote Buffer Overflow (1)
|
This is a remote exploit for bsd platform. Description: Cygnus Network Security 4.0/KerbNet 5.0 / MIT Kerberos 4/5 / RedHat 6.2 - Compatibility 'krb_rd_req()' Remote Buffer Overflow (1). Author: duke
|
Analyze the security implications of: Cygnus Network Security 4.0/KerbNet 5.0 / MIT Kerberos 4/5 / RedHat 6.2 - Compatibility 'krb_rd_req()' Remote Buffer Overflow (1)
|
This exploit targets bsd systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets bsd platform
|
What is this exploit about: PyPAM Python bindings for PAM - Double-Free Corruption
|
This is a dos exploit for linux platform. Description: PyPAM Python bindings for PAM - Double-Free Corruption. Author: Markus Vervier
|
Analyze the security implications of: PyPAM Python bindings for PAM - Double-Free Corruption
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AppFusions Doxygen for Atlassian Confluence 1.3.2 - Cross-Site Scripting
|
This is a webapps exploit for java platform. Description: AppFusions Doxygen for Atlassian Confluence 1.3.2 - Cross-Site Scripting. Author: Julien Ahrens
|
Analyze the security implications of: AppFusions Doxygen for Atlassian Confluence 1.3.2 - Cross-Site Scripting
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: D-Link DSL-2640B ADSL Router - Authentication Bypass
|
This is a webapps exploit for hardware platform. Description: D-Link DSL-2640B ADSL Router - Authentication Bypass. Author: Ivano Binetti
|
Analyze the security implications of: D-Link DSL-2640B ADSL Router - Authentication Bypass
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: HP Insight Diagnostics Online Edition 8.4 - 'idstatusframe.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: HP Insight Diagnostics Online Edition 8.4 - 'idstatusframe.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Mr Teatime
|
Analyze the security implications of: HP Insight Diagnostics Online Edition 8.4 - 'idstatusframe.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BitchX 1.0 - Remote 'Send_CTCP()' Memory Corruption
|
This is a remote exploit for linux platform. Description: BitchX 1.0 - Remote 'Send_CTCP()' Memory Corruption. Author: eSDee
|
Analyze the security implications of: BitchX 1.0 - Remote 'Send_CTCP()' Memory Corruption
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apache Tomcat 6.0.16 - 'HttpServletResponse.sendError()' Cross-Site Scripting
|
This is a remote exploit for multiple platform. Description: Apache Tomcat 6.0.16 - 'HttpServletResponse.sendError()' Cross-Site Scripting. Author: Konstantin Kolinko
|
Analyze the security implications of: Apache Tomcat 6.0.16 - 'HttpServletResponse.sendError()' Cross-Site Scripting
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: QNAP myQNAPcloud Connect 1.3.4.0317 - 'Username/Password' Denial of Service
|
This is a dos exploit for hardware platform. Description: QNAP myQNAPcloud Connect 1.3.4.0317 - 'Username/Password' Denial of Service. Author: Dino Covotsos
|
Analyze the security implications of: QNAP myQNAPcloud Connect 1.3.4.0317 - 'Username/Password' Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Sun Calendar Express Web Server - Denial of Service / Cross-Site Scripting
|
This is a dos exploit for multiple platform. Description: Sun Calendar Express Web Server - Denial of Service / Cross-Site Scripting. Author: Core Security
|
Analyze the security implications of: Sun Calendar Express Web Server - Denial of Service / Cross-Site Scripting
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: OpenJournal 2.0 - Authentication Bypassing
|
This is a webapps exploit for cgi platform. Description: OpenJournal 2.0 - Authentication Bypassing. Author: Tri Huynh
|
Analyze the security implications of: OpenJournal 2.0 - Authentication Bypassing
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: amoeba CMS 1.01 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: amoeba CMS 1.01 - Multiple Vulnerabilities. Author: mr_me
|
Analyze the security implications of: amoeba CMS 1.01 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.