input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ricoh Aficio 450/455 PCL 5e Printer - ICMP Denial of Service | This is a dos exploit for hardware platform. Description: Ricoh Aficio 450/455 PCL 5e Printer - ICMP Denial of Service. Author: x90c |
Analyze the security implications of: Ricoh Aficio 450/455 PCL 5e Printer - ICMP Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Ezboo Webstats 3.03 - Administrative Authentication Bypass | This is a webapps exploit for php platform. Description: Ezboo Webstats 3.03 - Administrative Authentication Bypass. Author: sn0oPy |
Analyze the security implications of: Ezboo Webstats 3.03 - Administrative Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PulseAudio setuid (Ubuntu 9.04 / Slackware 12.2.0) - Local Privilege Escalation | This is a local exploit for linux platform. Description: PulseAudio setuid (Ubuntu 9.04 / Slackware 12.2.0) - Local Privilege Escalation. Author: anonymous |
Analyze the security implications of: PulseAudio setuid (Ubuntu 9.04 / Slackware 12.2.0) - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: @Mail 5.42 and @Mail WebMail 5.0.5 - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: @Mail 5.42 and @Mail WebMail 5.0.5 - Multiple Cross-Site Scripting Vulnerabilities. Author: C1c4Tr1Z |
Analyze the security implications of: @Mail 5.42 and @Mail WebMail 5.0.5 - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Drupal 7.0 < 7.31 - 'Drupalgeddon' SQL Injection (Add Admin User) | This is a webapps exploit for php platform. Description: Drupal 7.0 < 7.31 - 'Drupalgeddon' SQL Injection (Add Admin User). Author: Claudio Viviani |
Analyze the security implications of: Drupal 7.0 < 7.31 - 'Drupalgeddon' SQL Injection (Add Admin User) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Mandrake 6.x / RedHat 6.x / Turbolinux 3.5 b2/4.x/6.0.2 userhelper/PAM - Path (1) | This is a local exploit for linux platform. Description: Mandrake 6.x / RedHat 6.x / Turbolinux 3.5 b2/4.x/6.0.2 userhelper/PAM - Path (1). Author: dildog |
Analyze the security implications of: Mandrake 6.x / RedHat 6.x / Turbolinux 3.5 b2/4.x/6.0.2 userhelper/PAM - Path (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component Micro Deal Factory 2.4.0 - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Micro Deal Factory 2.4.0 - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Micro Deal Factory 2.4.0 - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hosting Controller 1.x - 'Browse.asp' File Disclosure | This is a webapps exploit for asp platform. Description: Hosting Controller 1.x - 'Browse.asp' File Disclosure. Author: Bao Dai Nhan |
Analyze the security implications of: Hosting Controller 1.x - 'Browse.asp' File Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: DbbS 2.0 - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: DbbS 2.0 - Multiple Input Validation Vulnerabilities. Author: rgod |
Analyze the security implications of: DbbS 2.0 - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple iTunes 8.1.1 (Mac OSX) - ITms Overflow (Metasploit) | This is a remote exploit for osx platform. Description: Apple iTunes 8.1.1 (Mac OSX) - ITms Overflow (Metasploit). Author: Metasploit |
Analyze the security implications of: Apple iTunes 8.1.1 (Mac OSX) - ITms Overflow (Metasploit) | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Joomla! 3.9.0 < 3.9.7 - CSV Injection | This is a webapps exploit for php platform. Description: Joomla! 3.9.0 < 3.9.7 - CSV Injection. Author: i4bdullah |
Analyze the security implications of: Joomla! 3.9.0 < 3.9.7 - CSV Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Clear iSpot/Clearspot 2.0.0.0 - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Clear iSpot/Clearspot 2.0.0.0 - Cross-Site Request Forgery. Author: Trustwave's SpiderLabs |
Analyze the security implications of: Clear iSpot/Clearspot 2.0.0.0 - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: CentOS Web Panel 0.9.8.763 - Persistent Cross-Site Scripting | This is a webapps exploit for linux platform. Description: CentOS Web Panel 0.9.8.763 - Persistent Cross-Site Scripting. Author: DKM |
Analyze the security implications of: CentOS Web Panel 0.9.8.763 - Persistent Cross-Site Scripting | This exploit targets linux systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Te Ecard - 'id' Multiple SQL Injections | This is a webapps exploit for asp platform. Description: Te Ecard - 'id' Multiple SQL Injections. Author: Ugurcan Engyn |
Analyze the security implications of: Te Ecard - 'id' Multiple SQL Injections | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: CMS Contentia - 'news.php' SQL Injection | This is a webapps exploit for php platform. Description: CMS Contentia - 'news.php' SQL Injection. Author: GlaDiaT0R |
Analyze the security implications of: CMS Contentia - 'news.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: NEC Univerge Sv9100 WebPro - 6.00 - Predictable Session ID / Clear Text Password Storage | This is a webapps exploit for hardware platform. Description: NEC Univerge Sv9100 WebPro - 6.00 - Predictable Session ID / Clear Text Password Storage. Author: hyp3rlinx |
Analyze the security implications of: NEC Univerge Sv9100 WebPro - 6.00 - Predictable Session ID / Clear Text Password Storage | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: IISWorks FileMan - fileman.mdb Remote User Database Disclosure | This is a webapps exploit for asp platform. Description: IISWorks FileMan - fileman.mdb Remote User Database Disclosure. Author: j0fer |
Analyze the security implications of: IISWorks FileMan - fileman.mdb Remote User Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Libxml2 - Multiple Remote Stack Buffer Overflow Vulnerabilities | This is a remote exploit for linux platform. Description: Libxml2 - Multiple Remote Stack Buffer Overflow Vulnerabilities. Author: Sean |
Analyze the security implications of: Libxml2 - Multiple Remote Stack Buffer Overflow Vulnerabilities | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: D-Link Devices - 'hedwig.cgi' Remote Buffer Overflow in Cookie Header (Metasploit) | This is a remote exploit for hardware platform. Description: D-Link Devices - 'hedwig.cgi' Remote Buffer Overflow in Cookie Header (Metasploit). Author: Metasploit |
Analyze the security implications of: D-Link Devices - 'hedwig.cgi' Remote Buffer Overflow in Cookie Header (Metasploit) | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: EZHomePagePro 1.5 - 'users_search.asp' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: EZHomePagePro 1.5 - 'users_search.asp' Multiple Cross-Site Scripting Vulnerabilities. Author: r0t |
Analyze the security implications of: EZHomePagePro 1.5 - 'users_search.asp' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: ManageEngine ServiceDesk 8.0.0.12 - Database Disclosure | This is a webapps exploit for jsp platform. Description: ManageEngine ServiceDesk 8.0.0.12 - Database Disclosure. Author: @ygoltsev |
Analyze the security implications of: ManageEngine ServiceDesk 8.0.0.12 - Database Disclosure | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: ProFTPd 1.2.10 - Remote Users Enumeration | This is a remote exploit for linux platform. Description: ProFTPd 1.2.10 - Remote Users Enumeration. Author: Leon Juranic |
Analyze the security implications of: ProFTPd 1.2.10 - Remote Users Enumeration | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: FreeWebShop 2.2.9 R2 - Multiple Remote Vulnerabilities | This is a webapps exploit for php platform. Description: FreeWebShop 2.2.9 R2 - Multiple Remote Vulnerabilities. Author: Akita Software Security |
Analyze the security implications of: FreeWebShop 2.2.9 R2 - Multiple Remote Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CJ Dynamic Poll Pro 2.0 - 'admin_index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CJ Dynamic Poll Pro 2.0 - 'admin_index.php' Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: CJ Dynamic Poll Pro 2.0 - 'admin_index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CyberShop Ultimate E-Commerce - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: CyberShop Ultimate E-Commerce - Multiple Cross-Site Scripting Vulnerabilities. Author: B3g0k |
Analyze the security implications of: CyberShop Ultimate E-Commerce - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component Dutch Auction Factory 2.0.2 - 'filter_order_Dir' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Dutch Auction Factory 2.0.2 - 'filter_order_Dir' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component Dutch Auction Factory 2.0.2 - 'filter_order_Dir' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: VUNET Mass Mailer - 'default.asp' SQL Injection | This is a webapps exploit for asp platform. Description: VUNET Mass Mailer - 'default.asp' SQL Injection. Author: Aria-Security Team |
Analyze the security implications of: VUNET Mass Mailer - 'default.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Microsoft Edge 114.0.1823.67 (64-bit) - Information Disclosure | This is a local exploit for multiple platform. Description: Microsoft Edge 114.0.1823.67 (64-bit) - Information Disclosure. Author: nu11secur1ty |
Analyze the security implications of: Microsoft Edge 114.0.1823.67 (64-bit) - Information Disclosure | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Android - Directory Traversal over USB via Injection in blkid Output | This is a local exploit for android platform. Description: Android - Directory Traversal over USB via Injection in blkid Output. Author: Google Security Research |
Analyze the security implications of: Android - Directory Traversal over USB via Injection in blkid Output | This exploit targets android systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: Dolibarr ERP-CRM 8.0.4 - 'rowid' SQL Injection | This is a webapps exploit for php platform. Description: Dolibarr ERP-CRM 8.0.4 - 'rowid' SQL Injection. Author: Mehmet Onder |
Analyze the security implications of: Dolibarr ERP-CRM 8.0.4 - 'rowid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: free QBoard 1.1 - 'contact.php?qb_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: free QBoard 1.1 - 'contact.php?qb_path' Remote File Inclusion. Author: CrAsh_oVeR_rIdE |
Analyze the security implications of: free QBoard 1.1 - 'contact.php?qb_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lazarus Guestbook 1.6 - 'codes-english.php?show' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Lazarus Guestbook 1.6 - 'codes-english.php?show' Cross-Site Scripting. Author: simo64 |
Analyze the security implications of: Lazarus Guestbook 1.6 - 'codes-english.php?show' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bitweaver 1.3.1 Articles and Blogs - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: Bitweaver 1.3.1 Articles and Blogs - Multiple Cross-Site Scripting Vulnerabilities. Author: CorryL |
Analyze the security implications of: Bitweaver 1.3.1 Articles and Blogs - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.