input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: HP PageWide Printers / HP OfficeJet Pro Printers (OfficeJet Pro 8210) - Arbitrary Code Execution
|
This is a remote exploit for hardware platform. Description: HP PageWide Printers / HP OfficeJet Pro Printers (OfficeJet Pro 8210) - Arbitrary Code Execution. Author: Jacob Baines
|
Analyze the security implications of: HP PageWide Printers / HP OfficeJet Pro Printers (OfficeJet Pro 8210) - Arbitrary Code Execution
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: D-Link DIR-850L Wireless AC1200 Dual Band Gigabit Cloud Router - Authentication Bypass
|
This is a webapps exploit for php platform. Description: D-Link DIR-850L Wireless AC1200 Dual Band Gigabit Cloud Router - Authentication Bypass. Author: Gem George
|
Analyze the security implications of: D-Link DIR-850L Wireless AC1200 Dual Band Gigabit Cloud Router - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Vavoom 1.24 - str.cpp VStr::Resize Function Crafted UDP Packet Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Vavoom 1.24 - str.cpp VStr::Resize Function Crafted UDP Packet Remote Denial of Service. Author: Luigi Auriemma
|
Analyze the security implications of: Vavoom 1.24 - str.cpp VStr::Resize Function Crafted UDP Packet Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ActiveCampaign SupportTrio 2.50.2 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: ActiveCampaign SupportTrio 2.50.2 - Multiple Cross-Site Scripting Vulnerabilities. Author: r0t
|
Analyze the security implications of: ActiveCampaign SupportTrio 2.50.2 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: HP OpenView Network Node Manager (OV NNM) - 'Toolbar.exe' CGI Buffer Overflow (Metasploit)
|
This is a remote exploit for cgi platform. Description: HP OpenView Network Node Manager (OV NNM) - 'Toolbar.exe' CGI Buffer Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: HP OpenView Network Node Manager (OV NNM) - 'Toolbar.exe' CGI Buffer Overflow (Metasploit)
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: freepost 0.1 r1 - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: freepost 0.1 r1 - Multiple Vulnerabilities. Author: ThE g0bL!N
|
Analyze the security implications of: freepost 0.1 r1 - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apache Superset 2.0.0 - Authentication Bypass
|
This is a webapps exploit for multiple platform. Description: Apache Superset 2.0.0 - Authentication Bypass. Author: MaanVader
|
Analyze the security implications of: Apache Superset 2.0.0 - Authentication Bypass
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component NeoReferences 1.3.1 - 'catid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component NeoReferences 1.3.1 - 'catid' SQL Injection. Author: S@BUN
|
Analyze the security implications of: Joomla! Component NeoReferences 1.3.1 - 'catid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IRIX 5.2/5.3/6.x - TelnetD Environment Variable Format String
|
This is a remote exploit for irix platform. Description: IRIX 5.2/5.3/6.x - TelnetD Environment Variable Format String. Author: Last Stage of Delirium
|
Analyze the security implications of: IRIX 5.2/5.3/6.x - TelnetD Environment Variable Format String
|
This exploit targets irix systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets irix platform
|
What is this exploit about: ManageEngine ADManager Plus 5.2 Build 5210 - 'domainName' Cross-Site Scripting
|
This is a webapps exploit for java platform. Description: ManageEngine ADManager Plus 5.2 Build 5210 - 'domainName' Cross-Site Scripting. Author: LiquidWorm
|
Analyze the security implications of: ManageEngine ADManager Plus 5.2 Build 5210 - 'domainName' Cross-Site Scripting
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: ASPThai.Net WebBoard 6.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: ASPThai.Net WebBoard 6.0 - SQL Injection. Author: DaiMon
|
Analyze the security implications of: ASPThai.Net WebBoard 6.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dell SonicWALL Global Management System GMS 8.1 - Blind SQL Injection
|
This is a webapps exploit for hardware platform. Description: Dell SonicWALL Global Management System GMS 8.1 - Blind SQL Injection. Author: LiquidWorm
|
Analyze the security implications of: Dell SonicWALL Global Management System GMS 8.1 - Blind SQL Injection
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component vBizz 1.0.7 - Remote Code Execution
|
This is a webapps exploit for php platform. Description: Joomla! Component vBizz 1.0.7 - Remote Code Execution. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component vBizz 1.0.7 - Remote Code Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FunkBoard 0.66 - 'profile.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: FunkBoard 0.66 - 'profile.php' Multiple Cross-Site Scripting Vulnerabilities. Author: rgod
|
Analyze the security implications of: FunkBoard 0.66 - 'profile.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jupiter CMS 1.1.5 - 'index.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Jupiter CMS 1.1.5 - 'index.php' Remote File Inclusion. Author: D3nGeR
|
Analyze the security implications of: Jupiter CMS 1.1.5 - 'index.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AfterLogic WebMail Lite PHP 7.0.1 - Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: AfterLogic WebMail Lite PHP 7.0.1 - Cross-Site Request Forgery. Author: Pablo Ribeiro
|
Analyze the security implications of: AfterLogic WebMail Lite PHP 7.0.1 - Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Alstrasoft ProTaxi Enterprise 3.5 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: Alstrasoft ProTaxi Enterprise 3.5 - Arbitrary File Upload. Author: Ihsan Sencan
|
Analyze the security implications of: Alstrasoft ProTaxi Enterprise 3.5 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Xerox DocuShare - SQL Injection
|
This is a webapps exploit for hardware platform. Description: Xerox DocuShare - SQL Injection. Author: Brandon Perry
|
Analyze the security implications of: Xerox DocuShare - SQL Injection
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component YOOtheme Warp5 - 'yt_color' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Joomla! Component YOOtheme Warp5 - 'yt_color' Cross-Site Scripting. Author: andresg888
|
Analyze the security implications of: Joomla! Component YOOtheme Warp5 - 'yt_color' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: C-Cart 1.0 - Full Path Disclosure
|
This is a webapps exploit for php platform. Description: C-Cart 1.0 - Full Path Disclosure. Author: G00db0y
|
Analyze the security implications of: C-Cart 1.0 - Full Path Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PalmOS 3/4 - ICMP Flood Remote Denial of Service
|
This is a dos exploit for palm_os platform. Description: PalmOS 3/4 - ICMP Flood Remote Denial of Service. Author: Shaun Colley
|
Analyze the security implications of: PalmOS 3/4 - ICMP Flood Remote Denial of Service
|
This exploit targets palm_os systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets palm_os platform
|
What is this exploit about: Australian Education App - Remote Code Execution
|
This is a remote exploit for android platform. Description: Australian Education App - Remote Code Execution. Author: intern0t
|
Analyze the security implications of: Australian Education App - Remote Code Execution
|
This exploit targets android systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Mambo Component EstateAgent 0.1 - SQL Injection
|
This is a webapps exploit for php platform. Description: Mambo Component EstateAgent 0.1 - SQL Injection. Author: S@BUN
|
Analyze the security implications of: Mambo Component EstateAgent 0.1 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jettweb PHP Hazır Haber Sitesi Scripti V2 - SQL Injection (Authentication Bypass)
|
This is a webapps exploit for php platform. Description: Jettweb PHP Hazır Haber Sitesi Scripti V2 - SQL Injection (Authentication Bypass). Author: Ahmet Ümit BAYRAM
|
Analyze the security implications of: Jettweb PHP Hazır Haber Sitesi Scripti V2 - SQL Injection (Authentication Bypass)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component MediaLibrary Free 4.0.12 - SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component MediaLibrary Free 4.0.12 - SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component MediaLibrary Free 4.0.12 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IBM AIX 4.2 - 'ping' Local Buffer Overflow
|
This is a local exploit for aix platform. Description: IBM AIX 4.2 - 'ping' Local Buffer Overflow. Author: Bryan P. Self
|
Analyze the security implications of: IBM AIX 4.2 - 'ping' Local Buffer Overflow
|
This exploit targets aix systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets aix platform
|
What is this exploit about: Coship Wireless Router 4.0.0.48 / 4.0.0.40 / 5.0.0.54 / 5.0.0.55 / 10.0.0.49 - Unauthenticated Admin Password Reset
|
This is a webapps exploit for hardware platform. Description: Coship Wireless Router 4.0.0.48 / 4.0.0.40 / 5.0.0.54 / 5.0.0.55 / 10.0.0.49 - Unauthenticated Admin Password Reset. Author: Adithyan AK
|
Analyze the security implications of: Coship Wireless Router 4.0.0.48 / 4.0.0.40 / 5.0.0.54 / 5.0.0.55 / 10.0.0.49 - Unauthenticated Admin Password Reset
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Mozilla Firefox and SeaMonkey Plugin Parameters - Remote Buffer Overflow
|
This is a remote exploit for linux platform. Description: Mozilla Firefox and SeaMonkey Plugin Parameters - Remote Buffer Overflow. Author: J23
|
Analyze the security implications of: Mozilla Firefox and SeaMonkey Plugin Parameters - Remote Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: MoinMoin 1.8 - 'AttachFile.py' Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: MoinMoin 1.8 - 'AttachFile.py' Cross-Site Scripting. Author: SecureState
|
Analyze the security implications of: MoinMoin 1.8 - 'AttachFile.py' Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: SimpleBlog 2.0 - 'comments.asp' SQL Injection (1)
|
This is a webapps exploit for asp platform. Description: SimpleBlog 2.0 - 'comments.asp' SQL Injection (1). Author: Chironex Fleckeri
|
Analyze the security implications of: SimpleBlog 2.0 - 'comments.asp' SQL Injection (1)
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Qbik WinGate 6.2.2 - 'LIST' Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Qbik WinGate 6.2.2 - 'LIST' Remote Denial of Service. Author: Antunes
|
Analyze the security implications of: Qbik WinGate 6.2.2 - 'LIST' Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: EasySite 2.0 - 'browser.php' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: EasySite 2.0 - 'browser.php' Remote File Inclusion. Author: ZoRLu
|
Analyze the security implications of: EasySite 2.0 - 'browser.php' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ARD-9808 DVR Card Security Camera - Arbitrary Configuration Disclosure
|
This is a remote exploit for hardware platform. Description: ARD-9808 DVR Card Security Camera - Arbitrary Configuration Disclosure. Author: Septemb0x
|
Analyze the security implications of: ARD-9808 DVR Card Security Camera - Arbitrary Configuration Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Cemetry Mapping and Information System 1.0 - Multiple Stored Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Cemetry Mapping and Information System 1.0 - Multiple Stored Cross-Site Scripting. Author: Mesut Cetin
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.