input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: HP PageWide Printers / HP OfficeJet Pro Printers (OfficeJet Pro 8210) - Arbitrary Code Execution | This is a remote exploit for hardware platform. Description: HP PageWide Printers / HP OfficeJet Pro Printers (OfficeJet Pro 8210) - Arbitrary Code Execution. Author: Jacob Baines |
Analyze the security implications of: HP PageWide Printers / HP OfficeJet Pro Printers (OfficeJet Pro 8210) - Arbitrary Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: D-Link DIR-850L Wireless AC1200 Dual Band Gigabit Cloud Router - Authentication Bypass | This is a webapps exploit for php platform. Description: D-Link DIR-850L Wireless AC1200 Dual Band Gigabit Cloud Router - Authentication Bypass. Author: Gem George |
Analyze the security implications of: D-Link DIR-850L Wireless AC1200 Dual Band Gigabit Cloud Router - Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Vavoom 1.24 - str.cpp VStr::Resize Function Crafted UDP Packet Remote Denial of Service | This is a dos exploit for multiple platform. Description: Vavoom 1.24 - str.cpp VStr::Resize Function Crafted UDP Packet Remote Denial of Service. Author: Luigi Auriemma |
Analyze the security implications of: Vavoom 1.24 - str.cpp VStr::Resize Function Crafted UDP Packet Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: ActiveCampaign SupportTrio 2.50.2 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: ActiveCampaign SupportTrio 2.50.2 - Multiple Cross-Site Scripting Vulnerabilities. Author: r0t |
Analyze the security implications of: ActiveCampaign SupportTrio 2.50.2 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: HP OpenView Network Node Manager (OV NNM) - 'Toolbar.exe' CGI Buffer Overflow (Metasploit) | This is a remote exploit for cgi platform. Description: HP OpenView Network Node Manager (OV NNM) - 'Toolbar.exe' CGI Buffer Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: HP OpenView Network Node Manager (OV NNM) - 'Toolbar.exe' CGI Buffer Overflow (Metasploit) | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: freepost 0.1 r1 - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: freepost 0.1 r1 - Multiple Vulnerabilities. Author: ThE g0bL!N |
Analyze the security implications of: freepost 0.1 r1 - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache Superset 2.0.0 - Authentication Bypass | This is a webapps exploit for multiple platform. Description: Apache Superset 2.0.0 - Authentication Bypass. Author: MaanVader |
Analyze the security implications of: Apache Superset 2.0.0 - Authentication Bypass | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component NeoReferences 1.3.1 - 'catid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component NeoReferences 1.3.1 - 'catid' SQL Injection. Author: S@BUN |
Analyze the security implications of: Joomla! Component NeoReferences 1.3.1 - 'catid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IRIX 5.2/5.3/6.x - TelnetD Environment Variable Format String | This is a remote exploit for irix platform. Description: IRIX 5.2/5.3/6.x - TelnetD Environment Variable Format String. Author: Last Stage of Delirium |
Analyze the security implications of: IRIX 5.2/5.3/6.x - TelnetD Environment Variable Format String | This exploit targets irix systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets irix platform |
What is this exploit about: ManageEngine ADManager Plus 5.2 Build 5210 - 'domainName' Cross-Site Scripting | This is a webapps exploit for java platform. Description: ManageEngine ADManager Plus 5.2 Build 5210 - 'domainName' Cross-Site Scripting. Author: LiquidWorm |
Analyze the security implications of: ManageEngine ADManager Plus 5.2 Build 5210 - 'domainName' Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: ASPThai.Net WebBoard 6.0 - SQL Injection | This is a webapps exploit for php platform. Description: ASPThai.Net WebBoard 6.0 - SQL Injection. Author: DaiMon |
Analyze the security implications of: ASPThai.Net WebBoard 6.0 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dell SonicWALL Global Management System GMS 8.1 - Blind SQL Injection | This is a webapps exploit for hardware platform. Description: Dell SonicWALL Global Management System GMS 8.1 - Blind SQL Injection. Author: LiquidWorm |
Analyze the security implications of: Dell SonicWALL Global Management System GMS 8.1 - Blind SQL Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component vBizz 1.0.7 - Remote Code Execution | This is a webapps exploit for php platform. Description: Joomla! Component vBizz 1.0.7 - Remote Code Execution. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component vBizz 1.0.7 - Remote Code Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FunkBoard 0.66 - 'profile.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: FunkBoard 0.66 - 'profile.php' Multiple Cross-Site Scripting Vulnerabilities. Author: rgod |
Analyze the security implications of: FunkBoard 0.66 - 'profile.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jupiter CMS 1.1.5 - 'index.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: Jupiter CMS 1.1.5 - 'index.php' Remote File Inclusion. Author: D3nGeR |
Analyze the security implications of: Jupiter CMS 1.1.5 - 'index.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: AfterLogic WebMail Lite PHP 7.0.1 - Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: AfterLogic WebMail Lite PHP 7.0.1 - Cross-Site Request Forgery. Author: Pablo Ribeiro |
Analyze the security implications of: AfterLogic WebMail Lite PHP 7.0.1 - Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alstrasoft ProTaxi Enterprise 3.5 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Alstrasoft ProTaxi Enterprise 3.5 - Arbitrary File Upload. Author: Ihsan Sencan |
Analyze the security implications of: Alstrasoft ProTaxi Enterprise 3.5 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Xerox DocuShare - SQL Injection | This is a webapps exploit for hardware platform. Description: Xerox DocuShare - SQL Injection. Author: Brandon Perry |
Analyze the security implications of: Xerox DocuShare - SQL Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component YOOtheme Warp5 - 'yt_color' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Joomla! Component YOOtheme Warp5 - 'yt_color' Cross-Site Scripting. Author: andresg888 |
Analyze the security implications of: Joomla! Component YOOtheme Warp5 - 'yt_color' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: C-Cart 1.0 - Full Path Disclosure | This is a webapps exploit for php platform. Description: C-Cart 1.0 - Full Path Disclosure. Author: G00db0y |
Analyze the security implications of: C-Cart 1.0 - Full Path Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PalmOS 3/4 - ICMP Flood Remote Denial of Service | This is a dos exploit for palm_os platform. Description: PalmOS 3/4 - ICMP Flood Remote Denial of Service. Author: Shaun Colley |
Analyze the security implications of: PalmOS 3/4 - ICMP Flood Remote Denial of Service | This exploit targets palm_os systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets palm_os platform |
What is this exploit about: Australian Education App - Remote Code Execution | This is a remote exploit for android platform. Description: Australian Education App - Remote Code Execution. Author: intern0t |
Analyze the security implications of: Australian Education App - Remote Code Execution | This exploit targets android systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Mambo Component EstateAgent 0.1 - SQL Injection | This is a webapps exploit for php platform. Description: Mambo Component EstateAgent 0.1 - SQL Injection. Author: S@BUN |
Analyze the security implications of: Mambo Component EstateAgent 0.1 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Jettweb PHP Hazır Haber Sitesi Scripti V2 - SQL Injection (Authentication Bypass) | This is a webapps exploit for php platform. Description: Jettweb PHP Hazır Haber Sitesi Scripti V2 - SQL Injection (Authentication Bypass). Author: Ahmet Ümit BAYRAM |
Analyze the security implications of: Jettweb PHP Hazır Haber Sitesi Scripti V2 - SQL Injection (Authentication Bypass) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component MediaLibrary Free 4.0.12 - SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component MediaLibrary Free 4.0.12 - SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component MediaLibrary Free 4.0.12 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM AIX 4.2 - 'ping' Local Buffer Overflow | This is a local exploit for aix platform. Description: IBM AIX 4.2 - 'ping' Local Buffer Overflow. Author: Bryan P. Self |
Analyze the security implications of: IBM AIX 4.2 - 'ping' Local Buffer Overflow | This exploit targets aix systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets aix platform |
What is this exploit about: Coship Wireless Router 4.0.0.48 / 4.0.0.40 / 5.0.0.54 / 5.0.0.55 / 10.0.0.49 - Unauthenticated Admin Password Reset | This is a webapps exploit for hardware platform. Description: Coship Wireless Router 4.0.0.48 / 4.0.0.40 / 5.0.0.54 / 5.0.0.55 / 10.0.0.49 - Unauthenticated Admin Password Reset. Author: Adithyan AK |
Analyze the security implications of: Coship Wireless Router 4.0.0.48 / 4.0.0.40 / 5.0.0.54 / 5.0.0.55 / 10.0.0.49 - Unauthenticated Admin Password Reset | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Mozilla Firefox and SeaMonkey Plugin Parameters - Remote Buffer Overflow | This is a remote exploit for linux platform. Description: Mozilla Firefox and SeaMonkey Plugin Parameters - Remote Buffer Overflow. Author: J23 |
Analyze the security implications of: Mozilla Firefox and SeaMonkey Plugin Parameters - Remote Buffer Overflow | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: MoinMoin 1.8 - 'AttachFile.py' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: MoinMoin 1.8 - 'AttachFile.py' Cross-Site Scripting. Author: SecureState |
Analyze the security implications of: MoinMoin 1.8 - 'AttachFile.py' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: SimpleBlog 2.0 - 'comments.asp' SQL Injection (1) | This is a webapps exploit for asp platform. Description: SimpleBlog 2.0 - 'comments.asp' SQL Injection (1). Author: Chironex Fleckeri |
Analyze the security implications of: SimpleBlog 2.0 - 'comments.asp' SQL Injection (1) | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Qbik WinGate 6.2.2 - 'LIST' Remote Denial of Service | This is a dos exploit for multiple platform. Description: Qbik WinGate 6.2.2 - 'LIST' Remote Denial of Service. Author: Antunes |
Analyze the security implications of: Qbik WinGate 6.2.2 - 'LIST' Remote Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: EasySite 2.0 - 'browser.php' Remote File Inclusion | This is a webapps exploit for php platform. Description: EasySite 2.0 - 'browser.php' Remote File Inclusion. Author: ZoRLu |
Analyze the security implications of: EasySite 2.0 - 'browser.php' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ARD-9808 DVR Card Security Camera - Arbitrary Configuration Disclosure | This is a remote exploit for hardware platform. Description: ARD-9808 DVR Card Security Camera - Arbitrary Configuration Disclosure. Author: Septemb0x |
Analyze the security implications of: ARD-9808 DVR Card Security Camera - Arbitrary Configuration Disclosure | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Cemetry Mapping and Information System 1.0 - Multiple Stored Cross-Site Scripting | This is a webapps exploit for php platform. Description: Cemetry Mapping and Information System 1.0 - Multiple Stored Cross-Site Scripting. Author: Mesut Cetin |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.