input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: InnovaPortal - 'msg.jsp?msg' Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: InnovaPortal - 'msg.jsp?msg' Cross-Site Scripting. Author: JosS |
Analyze the security implications of: InnovaPortal - 'msg.jsp?msg' Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: JSPWiki 2.1 - Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: JSPWiki 2.1 - Cross-Site Scripting. Author: Jeremy Bae |
Analyze the security implications of: JSPWiki 2.1 - Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Apple Safari 5.0.6/5.1 - SVG DOM Processing (PoC) | This is a dos exploit for osx platform. Description: Apple Safari 5.0.6/5.1 - SVG DOM Processing (PoC). Author: Nikita Tarakanov |
Analyze the security implications of: Apple Safari 5.0.6/5.1 - SVG DOM Processing (PoC) | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: IwebNegar 1.1 - 'comments.php' SQL Injection | This is a webapps exploit for php platform. Description: IwebNegar 1.1 - 'comments.php' SQL Injection. Author: Hessam-x |
Analyze the security implications of: IwebNegar 1.1 - 'comments.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Polycom HDX - Telnet Authentication Bypass (Metasploit) | This is a remote exploit for hardware platform. Description: Polycom HDX - Telnet Authentication Bypass (Metasploit). Author: Paul Haas |
Analyze the security implications of: Polycom HDX - Telnet Authentication Bypass (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: 24online SMS_2500i 8.3.6 build 9.0 - SQL Injection | This is a webapps exploit for jsp platform. Description: 24online SMS_2500i 8.3.6 build 9.0 - SQL Injection. Author: Rahul Raz |
Analyze the security implications of: 24online SMS_2500i 8.3.6 build 9.0 - SQL Injection | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: apemCMS - SQL Injection | This is a webapps exploit for php platform. Description: apemCMS - SQL Injection. Author: Ariko-Security |
Analyze the security implications of: apemCMS - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CMS Made Simple 1.4.1 - Local File Inclusion | This is a webapps exploit for php platform. Description: CMS Made Simple 1.4.1 - Local File Inclusion. Author: M4ck-h@cK |
Analyze the security implications of: CMS Made Simple 1.4.1 - Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HomeSeer HS2 2.5.0.20 - Web Interface Log Viewer Page URI Cross-Site Scripting | This is a remote exploit for hardware platform. Description: HomeSeer HS2 2.5.0.20 - Web Interface Log Viewer Page URI Cross-Site Scripting. Author: Silent Dream |
Analyze the security implications of: HomeSeer HS2 2.5.0.20 - Web Interface Log Viewer Page URI Cross-Site Scripting | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: JDownloader 2 Beta - Directory Traversal | This is a remote exploit for multiple platform. Description: JDownloader 2 Beta - Directory Traversal. Author: PizzaHatHacker |
Analyze the security implications of: JDownloader 2 Beta - Directory Traversal | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Feng Office 1.7.4 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Feng Office 1.7.4 - Arbitrary File Upload. Author: AutoSec Tools |
Analyze the security implications of: Feng Office 1.7.4 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FlexBB 0.5.5 - '/function/showprofile.php' SQL Injection | This is a webapps exploit for php platform. Description: FlexBB 0.5.5 - '/function/showprofile.php' SQL Injection. Author: Devil-00 |
Analyze the security implications of: FlexBB 0.5.5 - '/function/showprofile.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Acrobat and Reader - Array Indexing Remote Code Execution | This is a dos exploit for osx platform. Description: Adobe Acrobat and Reader - Array Indexing Remote Code Execution. Author: Knud & nSense |
Analyze the security implications of: Adobe Acrobat and Reader - Array Indexing Remote Code Execution | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: (Bitcoin / Dogecoin) PHP Cloud Mining Script - Authentication Bypass | This is a webapps exploit for php platform. Description: (Bitcoin / Dogecoin) PHP Cloud Mining Script - Authentication Bypass. Author: Ihsan Sencan |
Analyze the security implications of: (Bitcoin / Dogecoin) PHP Cloud Mining Script - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CNStats 2.9 - 'who_r.php?bj' Remote File Inclusion | This is a webapps exploit for php platform. Description: CNStats 2.9 - 'who_r.php?bj' Remote File Inclusion. Author: irvian |
Analyze the security implications of: CNStats 2.9 - 'who_r.php?bj' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Coppermine Gallery < 1.5.44 - Directory Traversal | This is a webapps exploit for php platform. Description: Coppermine Gallery < 1.5.44 - Directory Traversal. Author: Hacker Fantastic |
Analyze the security implications of: Coppermine Gallery < 1.5.44 - Directory Traversal | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Putty pscp 0.66 - Stack Buffer Overwrite | This is a dos exploit for multiple platform. Description: Putty pscp 0.66 - Stack Buffer Overwrite. Author: tintinweb |
Analyze the security implications of: Putty pscp 0.66 - Stack Buffer Overwrite | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Humax HG100R 2.0.6 - Backup File Download | This is a webapps exploit for hardware platform. Description: Humax HG100R 2.0.6 - Backup File Download. Author: gambler |
Analyze the security implications of: Humax HG100R 2.0.6 - Backup File Download | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: cURL 6.1 < 7.4 - Remote Buffer Overflow (1) | This is a remote exploit for freebsd platform. Description: cURL 6.1 < 7.4 - Remote Buffer Overflow (1). Author: zillion |
Analyze the security implications of: cURL 6.1 < 7.4 - Remote Buffer Overflow (1) | This exploit targets freebsd systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets freebsd platform |
What is this exploit about: Alfresco - '/proxy?endpoint' Server-Side Request Forgery | This is a remote exploit for multiple platform. Description: Alfresco - '/proxy?endpoint' Server-Side Request Forgery. Author: V. Paulikas |
Analyze the security implications of: Alfresco - '/proxy?endpoint' Server-Side Request Forgery | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cotonti 0.9.13 - SQL Injection | This is a webapps exploit for php platform. Description: Cotonti 0.9.13 - SQL Injection. Author: High-Tech Bridge SA |
Analyze the security implications of: Cotonti 0.9.13 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flatpress 0.804 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Flatpress 0.804 - Multiple Cross-Site Scripting Vulnerabilities. Author: Fabian Fingerle |
Analyze the security implications of: Flatpress 0.804 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Microsoft OneNote (Version 2305 Build 16.0.16501.20074) 64-bit - Spoofing | This is a remote exploit for multiple platform. Description: Microsoft OneNote (Version 2305 Build 16.0.16501.20074) 64-bit - Spoofing. Author: nu11secur1ty |
Analyze the security implications of: Microsoft OneNote (Version 2305 Build 16.0.16501.20074) 64-bit - Spoofing | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Wireshark CAPWAP Dissector - Denial of Service (Metasploit) | This is a dos exploit for multiple platform. Description: Wireshark CAPWAP Dissector - Denial of Service (Metasploit). Author: j0sm1 |
Analyze the security implications of: Wireshark CAPWAP Dissector - Denial of Service (Metasploit) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache Tomcat Manager - Application Upload (Authenticated) Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Apache Tomcat Manager - Application Upload (Authenticated) Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Apache Tomcat Manager - Application Upload (Authenticated) Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Apache Tomcat - Account Scanner / 'PUT' Request Command Execution | This is a remote exploit for multiple platform. Description: Apache Tomcat - Account Scanner / 'PUT' Request Command Execution. Author: kingcope |
Analyze the security implications of: Apache Tomcat - Account Scanner / 'PUT' Request Command Execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Permis 1.0 (com_groups) - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Permis 1.0 (com_groups) - 'id' SQL Injection. Author: Prince_Pwn3r |
Analyze the security implications of: Joomla! Component Permis 1.0 (com_groups) - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JPM Article Script 6 - 'page2' SQL Injection | This is a webapps exploit for php platform. Description: JPM Article Script 6 - 'page2' SQL Injection. Author: Vulnerability Research Laboratory |
Analyze the security implications of: JPM Article Script 6 - 'page2' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX - Install.framework suid Helper Privilege Escalation | This is a local exploit for osx platform. Description: Apple Mac OSX - Install.framework suid Helper Privilege Escalation. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX - Install.framework suid Helper Privilege Escalation | This exploit targets osx systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Integria IMS 5.0.83 - 'search_string' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Integria IMS 5.0.83 - 'search_string' Cross-Site Scripting. Author: Javier Olmedo |
Analyze the security implications of: Integria IMS 5.0.83 - 'search_string' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Recover Data for Novell Netware 1.0 - '.sav' Remote Denial of Service | This is a dos exploit for novell platform. Description: Recover Data for Novell Netware 1.0 - '.sav' Remote Denial of Service. Author: AbdulAziz Hariri |
Analyze the security implications of: Recover Data for Novell Netware 1.0 - '.sav' Remote Denial of Service | This exploit targets novell systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets novell platform |
What is this exploit about: Axway Secure Transport 5.1 SP2 - Arbitrary File Upload (via Cross-Site Request Forgery) | This is a webapps exploit for php platform. Description: Axway Secure Transport 5.1 SP2 - Arbitrary File Upload (via Cross-Site Request Forgery). Author: Emmanuel Law |
Analyze the security implications of: Axway Secure Transport 5.1 SP2 - Arbitrary File Upload (via Cross-Site Request Forgery) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Movable Type 4.2x/4.3x - Web Upgrade Remote Code Execution (Metasploit) | This is a remote exploit for multiple platform. Description: Movable Type 4.2x/4.3x - Web Upgrade Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Movable Type 4.2x/4.3x - Web Upgrade Remote Code Execution (Metasploit) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DieselScripts jokes - Cross-Site Scripting | This is a webapps exploit for php platform. Description: DieselScripts jokes - Cross-Site Scripting. Author: indoushka |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.