input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ricoh Aficio 450/455 PCL 5e Printer - ICMP Denial of Service
|
This is a dos exploit for hardware platform. Description: Ricoh Aficio 450/455 PCL 5e Printer - ICMP Denial of Service. Author: x90c
|
Analyze the security implications of: Ricoh Aficio 450/455 PCL 5e Printer - ICMP Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Ezboo Webstats 3.03 - Administrative Authentication Bypass
|
This is a webapps exploit for php platform. Description: Ezboo Webstats 3.03 - Administrative Authentication Bypass. Author: sn0oPy
|
Analyze the security implications of: Ezboo Webstats 3.03 - Administrative Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PulseAudio setuid (Ubuntu 9.04 / Slackware 12.2.0) - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: PulseAudio setuid (Ubuntu 9.04 / Slackware 12.2.0) - Local Privilege Escalation. Author: anonymous
|
Analyze the security implications of: PulseAudio setuid (Ubuntu 9.04 / Slackware 12.2.0) - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: @Mail 5.42 and @Mail WebMail 5.0.5 - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: @Mail 5.42 and @Mail WebMail 5.0.5 - Multiple Cross-Site Scripting Vulnerabilities. Author: C1c4Tr1Z
|
Analyze the security implications of: @Mail 5.42 and @Mail WebMail 5.0.5 - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Drupal 7.0 < 7.31 - 'Drupalgeddon' SQL Injection (Add Admin User)
|
This is a webapps exploit for php platform. Description: Drupal 7.0 < 7.31 - 'Drupalgeddon' SQL Injection (Add Admin User). Author: Claudio Viviani
|
Analyze the security implications of: Drupal 7.0 < 7.31 - 'Drupalgeddon' SQL Injection (Add Admin User)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mandrake 6.x / RedHat 6.x / Turbolinux 3.5 b2/4.x/6.0.2 userhelper/PAM - Path (1)
|
This is a local exploit for linux platform. Description: Mandrake 6.x / RedHat 6.x / Turbolinux 3.5 b2/4.x/6.0.2 userhelper/PAM - Path (1). Author: dildog
|
Analyze the security implications of: Mandrake 6.x / RedHat 6.x / Turbolinux 3.5 b2/4.x/6.0.2 userhelper/PAM - Path (1)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component Micro Deal Factory 2.4.0 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Micro Deal Factory 2.4.0 - 'id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Micro Deal Factory 2.4.0 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Hosting Controller 1.x - 'Browse.asp' File Disclosure
|
This is a webapps exploit for asp platform. Description: Hosting Controller 1.x - 'Browse.asp' File Disclosure. Author: Bao Dai Nhan
|
Analyze the security implications of: Hosting Controller 1.x - 'Browse.asp' File Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: DbbS 2.0 - Multiple Input Validation Vulnerabilities
|
This is a webapps exploit for php platform. Description: DbbS 2.0 - Multiple Input Validation Vulnerabilities. Author: rgod
|
Analyze the security implications of: DbbS 2.0 - Multiple Input Validation Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple iTunes 8.1.1 (Mac OSX) - ITms Overflow (Metasploit)
|
This is a remote exploit for osx platform. Description: Apple iTunes 8.1.1 (Mac OSX) - ITms Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: Apple iTunes 8.1.1 (Mac OSX) - ITms Overflow (Metasploit)
|
This exploit targets osx systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Joomla! 3.9.0 < 3.9.7 - CSV Injection
|
This is a webapps exploit for php platform. Description: Joomla! 3.9.0 < 3.9.7 - CSV Injection. Author: i4bdullah
|
Analyze the security implications of: Joomla! 3.9.0 < 3.9.7 - CSV Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Clear iSpot/Clearspot 2.0.0.0 - Cross-Site Request Forgery
|
This is a webapps exploit for hardware platform. Description: Clear iSpot/Clearspot 2.0.0.0 - Cross-Site Request Forgery. Author: Trustwave's SpiderLabs
|
Analyze the security implications of: Clear iSpot/Clearspot 2.0.0.0 - Cross-Site Request Forgery
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: CentOS Web Panel 0.9.8.763 - Persistent Cross-Site Scripting
|
This is a webapps exploit for linux platform. Description: CentOS Web Panel 0.9.8.763 - Persistent Cross-Site Scripting. Author: DKM
|
Analyze the security implications of: CentOS Web Panel 0.9.8.763 - Persistent Cross-Site Scripting
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Te Ecard - 'id' Multiple SQL Injections
|
This is a webapps exploit for asp platform. Description: Te Ecard - 'id' Multiple SQL Injections. Author: Ugurcan Engyn
|
Analyze the security implications of: Te Ecard - 'id' Multiple SQL Injections
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: CMS Contentia - 'news.php' SQL Injection
|
This is a webapps exploit for php platform. Description: CMS Contentia - 'news.php' SQL Injection. Author: GlaDiaT0R
|
Analyze the security implications of: CMS Contentia - 'news.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: NEC Univerge Sv9100 WebPro - 6.00 - Predictable Session ID / Clear Text Password Storage
|
This is a webapps exploit for hardware platform. Description: NEC Univerge Sv9100 WebPro - 6.00 - Predictable Session ID / Clear Text Password Storage. Author: hyp3rlinx
|
Analyze the security implications of: NEC Univerge Sv9100 WebPro - 6.00 - Predictable Session ID / Clear Text Password Storage
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: IISWorks FileMan - fileman.mdb Remote User Database Disclosure
|
This is a webapps exploit for asp platform. Description: IISWorks FileMan - fileman.mdb Remote User Database Disclosure. Author: j0fer
|
Analyze the security implications of: IISWorks FileMan - fileman.mdb Remote User Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Libxml2 - Multiple Remote Stack Buffer Overflow Vulnerabilities
|
This is a remote exploit for linux platform. Description: Libxml2 - Multiple Remote Stack Buffer Overflow Vulnerabilities. Author: Sean
|
Analyze the security implications of: Libxml2 - Multiple Remote Stack Buffer Overflow Vulnerabilities
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: D-Link Devices - 'hedwig.cgi' Remote Buffer Overflow in Cookie Header (Metasploit)
|
This is a remote exploit for hardware platform. Description: D-Link Devices - 'hedwig.cgi' Remote Buffer Overflow in Cookie Header (Metasploit). Author: Metasploit
|
Analyze the security implications of: D-Link Devices - 'hedwig.cgi' Remote Buffer Overflow in Cookie Header (Metasploit)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: EZHomePagePro 1.5 - 'users_search.asp' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for asp platform. Description: EZHomePagePro 1.5 - 'users_search.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t
|
Analyze the security implications of: EZHomePagePro 1.5 - 'users_search.asp' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: ManageEngine ServiceDesk 8.0.0.12 - Database Disclosure
|
This is a webapps exploit for jsp platform. Description: ManageEngine ServiceDesk 8.0.0.12 - Database Disclosure. Author: @ygoltsev
|
Analyze the security implications of: ManageEngine ServiceDesk 8.0.0.12 - Database Disclosure
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: ProFTPd 1.2.10 - Remote Users Enumeration
|
This is a remote exploit for linux platform. Description: ProFTPd 1.2.10 - Remote Users Enumeration. Author: Leon Juranic
|
Analyze the security implications of: ProFTPd 1.2.10 - Remote Users Enumeration
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: FreeWebShop 2.2.9 R2 - Multiple Remote Vulnerabilities
|
This is a webapps exploit for php platform. Description: FreeWebShop 2.2.9 R2 - Multiple Remote Vulnerabilities. Author: Akita Software Security
|
Analyze the security implications of: FreeWebShop 2.2.9 R2 - Multiple Remote Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CJ Dynamic Poll Pro 2.0 - 'admin_index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: CJ Dynamic Poll Pro 2.0 - 'admin_index.php' Cross-Site Scripting. Author: Moudi
|
Analyze the security implications of: CJ Dynamic Poll Pro 2.0 - 'admin_index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CyberShop Ultimate E-Commerce - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for asp platform. Description: CyberShop Ultimate E-Commerce - Multiple Cross-Site Scripting Vulnerabilities. Author: B3g0k
|
Analyze the security implications of: CyberShop Ultimate E-Commerce - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Joomla! Component Dutch Auction Factory 2.0.2 - 'filter_order_Dir' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Dutch Auction Factory 2.0.2 - 'filter_order_Dir' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Dutch Auction Factory 2.0.2 - 'filter_order_Dir' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: VUNET Mass Mailer - 'default.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: VUNET Mass Mailer - 'default.asp' SQL Injection. Author: Aria-Security Team
|
Analyze the security implications of: VUNET Mass Mailer - 'default.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Microsoft Edge 114.0.1823.67 (64-bit) - Information Disclosure
|
This is a local exploit for multiple platform. Description: Microsoft Edge 114.0.1823.67 (64-bit) - Information Disclosure. Author: nu11secur1ty
|
Analyze the security implications of: Microsoft Edge 114.0.1823.67 (64-bit) - Information Disclosure
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Android - Directory Traversal over USB via Injection in blkid Output
|
This is a local exploit for android platform. Description: Android - Directory Traversal over USB via Injection in blkid Output. Author: Google Security Research
|
Analyze the security implications of: Android - Directory Traversal over USB via Injection in blkid Output
|
This exploit targets android systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets android platform
|
What is this exploit about: Dolibarr ERP-CRM 8.0.4 - 'rowid' SQL Injection
|
This is a webapps exploit for php platform. Description: Dolibarr ERP-CRM 8.0.4 - 'rowid' SQL Injection. Author: Mehmet Onder
|
Analyze the security implications of: Dolibarr ERP-CRM 8.0.4 - 'rowid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: free QBoard 1.1 - 'contact.php?qb_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: free QBoard 1.1 - 'contact.php?qb_path' Remote File Inclusion. Author: CrAsh_oVeR_rIdE
|
Analyze the security implications of: free QBoard 1.1 - 'contact.php?qb_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Lazarus Guestbook 1.6 - 'codes-english.php?show' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Lazarus Guestbook 1.6 - 'codes-english.php?show' Cross-Site Scripting. Author: simo64
|
Analyze the security implications of: Lazarus Guestbook 1.6 - 'codes-english.php?show' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bitweaver 1.3.1 Articles and Blogs - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Bitweaver 1.3.1 Articles and Blogs - Multiple Cross-Site Scripting Vulnerabilities. Author: CorryL
|
Analyze the security implications of: Bitweaver 1.3.1 Articles and Blogs - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.