input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Printer Pro 5.4.3 IOS - Persistent Cross-Site Scripting | This is a webapps exploit for ios platform. Description: Printer Pro 5.4.3 IOS - Persistent Cross-Site Scripting. Author: Taurus Omar |
Analyze the security implications of: Printer Pro 5.4.3 IOS - Persistent Cross-Site Scripting | This exploit targets ios systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets ios platform |
What is this exploit about: DB Top Sites 1.0 - Remote Command Execution | This is a webapps exploit for php platform. Description: DB Top Sites 1.0 - Remote Command Execution. Author: SirGod |
Analyze the security implications of: DB Top Sites 1.0 - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SMC Router 1.2x - Random UDP Packet Denial of Service | This is a dos exploit for hardware platform. Description: SMC Router 1.2x - Random UDP Packet Denial of Service. Author: _6mO_HaCk |
Analyze the security implications of: SMC Router 1.2x - Random UDP Packet Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Gigaset SE461 WiMAX Router - Remote Denial of Service | This is a dos exploit for hardware platform. Description: Gigaset SE461 WiMAX Router - Remote Denial of Service. Author: Benkei |
Analyze the security implications of: Gigaset SE461 WiMAX Router - Remote Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: iScripts EasyCreate 3.2 - 'siteid' SQL Injection | This is a webapps exploit for php platform. Description: iScripts EasyCreate 3.2 - 'siteid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: iScripts EasyCreate 3.2 - 'siteid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 2.0/2.0.33 - i_count Overflow (PoC) | This is a dos exploit for linux platform. Description: Linux Kernel 2.0/2.0.33 - i_count Overflow (PoC). Author: Aleph One |
Analyze the security implications of: Linux Kernel 2.0/2.0.33 - i_count Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Loan Management System 1.0 - SQLi Authentication Bypass | This is a webapps exploit for php platform. Description: Loan Management System 1.0 - SQLi Authentication Bypass. Author: Merve Oral |
Analyze the security implications of: Loan Management System 1.0 - SQLi Authentication Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: .ELF Binaries - Local Privilege Escalation | This is a local exploit for linux platform. Description: .ELF Binaries - Local Privilege Escalation. Author: Sha0 |
Analyze the security implications of: .ELF Binaries - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Joomla! Component com_calendario - Blind SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_calendario - Blind SQL Injection. Author: Mr.tro0oqy |
Analyze the security implications of: Joomla! Component com_calendario - Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ServletExec - Directory Traversal / Authentication Bypass | This is a remote exploit for multiple platform. Description: ServletExec - Directory Traversal / Authentication Bypass. Author: Stefano Di Paola |
Analyze the security implications of: ServletExec - Directory Traversal / Authentication Bypass | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Silc Server 1.0.2 - New Channel Remote Denial of Service | This is a dos exploit for linux platform. Description: Silc Server 1.0.2 - New Channel Remote Denial of Service. Author: Frank Benkstein |
Analyze the security implications of: Silc Server 1.0.2 - New Channel Remote Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Inim Electronics Smartliving SmartLAN 6.x - Remote Command Execution | This is a webapps exploit for hardware platform. Description: Inim Electronics Smartliving SmartLAN 6.x - Remote Command Execution. Author: LiquidWorm |
Analyze the security implications of: Inim Electronics Smartliving SmartLAN 6.x - Remote Command Execution | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Cisco Prime Collaboration Provisioning < 12.1 - Authentication Bypass / Remote Code Execution | This is a remote exploit for hardware platform. Description: Cisco Prime Collaboration Provisioning < 12.1 - Authentication Bypass / Remote Code Execution. Author: Adam Brown |
Analyze the security implications of: Cisco Prime Collaboration Provisioning < 12.1 - Authentication Bypass / Remote Code Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Aigaion 1.2.1 - 'DIR' Remote File Inclusion | This is a webapps exploit for php platform. Description: Aigaion 1.2.1 - 'DIR' Remote File Inclusion. Author: navairum |
Analyze the security implications of: Aigaion 1.2.1 - 'DIR' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cory Support - 'pr' SQL Injection | This is a webapps exploit for php platform. Description: Cory Support - 'pr' SQL Injection. Author: v3n0m |
Analyze the security implications of: Cory Support - 'pr' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Kayako SupportSuite 3.x - 'index.php?filter' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Kayako SupportSuite 3.x - 'index.php?filter' Cross-Site Scripting. Author: GulfTech Security |
Analyze the security implications of: Kayako SupportSuite 3.x - 'index.php?filter' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apple Mac OSX - 'IOHDIXControllerUserClient::convertClient' Buffer Integer Overflow | This is a dos exploit for osx platform. Description: Apple Mac OSX - 'IOHDIXControllerUserClient::convertClient' Buffer Integer Overflow. Author: Google Security Research |
Analyze the security implications of: Apple Mac OSX - 'IOHDIXControllerUserClient::convertClient' Buffer Integer Overflow | This exploit targets osx systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Mozilla Firefox 3.0.7 - OnbeforeUnLoad DesignMode Dereference Crash | This is a dos exploit for multiple platform. Description: Mozilla Firefox 3.0.7 - OnbeforeUnLoad DesignMode Dereference Crash. Author: Skylined |
Analyze the security implications of: Mozilla Firefox 3.0.7 - OnbeforeUnLoad DesignMode Dereference Crash | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: bloofoxCMS 0.5.2.1 - CSRF (Add user) | This is a webapps exploit for php platform. Description: bloofoxCMS 0.5.2.1 - CSRF (Add user). Author: LiPeiYi |
Analyze the security implications of: bloofoxCMS 0.5.2.1 - CSRF (Add user) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cpanel PHP - Restriction Bypass | This is a webapps exploit for php platform. Description: Cpanel PHP - Restriction Bypass. Author: Abysssec |
Analyze the security implications of: Cpanel PHP - Restriction Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Check Point Connectra R62 - '/Login/Login' Arbitrary Script Injection | This is a remote exploit for hardware platform. Description: Check Point Connectra R62 - '/Login/Login' Arbitrary Script Injection. Author: Stefan Friedli |
Analyze the security implications of: Check Point Connectra R62 - '/Login/Login' Arbitrary Script Injection | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Brickcom Corporation Network Cameras - Multiple Vulnerabilities | This is a webapps exploit for hardware platform. Description: Brickcom Corporation Network Cameras - Multiple Vulnerabilities. Author: Orwelllabs |
Analyze the security implications of: Brickcom Corporation Network Cameras - Multiple Vulnerabilities | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: ManageEngine Firewall Analyzer 7.2 - 'fw/createAnomaly.do?subTab' Cross-Site Scripting | This is a webapps exploit for java platform. Description: ManageEngine Firewall Analyzer 7.2 - 'fw/createAnomaly.do?subTab' Cross-Site Scripting. Author: Vulnerability Research Laboratory |
Analyze the security implications of: ManageEngine Firewall Analyzer 7.2 - 'fw/createAnomaly.do?subTab' Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: eshtery CMS - 'FileManager.aspx' Local File Disclosure | This is a webapps exploit for asp platform. Description: eshtery CMS - 'FileManager.aspx' Local File Disclosure. Author: peng.deng |
Analyze the security implications of: eshtery CMS - 'FileManager.aspx' Local File Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: iScripts AutoHoster - 'checktransferstatus.php' SQL Injection | This is a webapps exploit for php platform. Description: iScripts AutoHoster - 'checktransferstatus.php' SQL Injection. Author: i-Hmx |
Analyze the security implications of: iScripts AutoHoster - 'checktransferstatus.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CubeCart 3.0.x - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: CubeCart 3.0.x - Multiple Input Validation Vulnerabilities. Author: rgod |
Analyze the security implications of: CubeCart 3.0.x - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Redis-cli < 5.0 - Buffer Overflow (PoC) | This is a local exploit for linux platform. Description: Redis-cli < 5.0 - Buffer Overflow (PoC). Author: Fakhri Zulkifli |
Analyze the security implications of: Redis-cli < 5.0 - Buffer Overflow (PoC) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: JoWood Chaser 1.0/1.50 - Remote Buffer Overflow | This is a remote exploit for multiple platform. Description: JoWood Chaser 1.0/1.50 - Remote Buffer Overflow. Author: Luigi Auriemma |
Analyze the security implications of: JoWood Chaser 1.0/1.50 - Remote Buffer Overflow | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: RealPlayer 9 *nix - Local Privilege Escalation | This is a local exploit for linux platform. Description: RealPlayer 9 *nix - Local Privilege Escalation. Author: Jon Hart |
Analyze the security implications of: RealPlayer 9 *nix - Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: TP-Link TL-WR740N / TL-WR740ND 150M Wireless Lite N Router - HTTP Denial of Service | This is a dos exploit for hardware platform. Description: TP-Link TL-WR740N / TL-WR740ND 150M Wireless Lite N Router - HTTP Denial of Service. Author: Dino Causevic |
Analyze the security implications of: TP-Link TL-WR740N / TL-WR740ND 150M Wireless Lite N Router - HTTP Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: iDevAffiliate - 'idevads.php' SQL Injection | This is a webapps exploit for php platform. Description: iDevAffiliate - 'idevads.php' SQL Injection. Author: Robert Cooper |
Analyze the security implications of: iDevAffiliate - 'idevads.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Teleport v10.1.1 - Remote Code Execution (RCE) | This is a remote exploit for multiple platform. Description: Teleport v10.1.1 - Remote Code Execution (RCE). Author: Brandon Roach |
Analyze the security implications of: Teleport v10.1.1 - Remote Code Execution (RCE) | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: GuppY 4.5 - 'archbatch.php?lng' Traversal Arbitrary File Access | This is a webapps exploit for php platform. Description: GuppY 4.5 - 'archbatch.php?lng' Traversal Arbitrary File Access. Author: retrogod@aliceposta.it |
Analyze the security implications of: GuppY 4.5 - 'archbatch.php?lng' Traversal Arbitrary File Access | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Les Visiteurs 2.0 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Les Visiteurs 2.0 - Multiple Remote File Inclusions. Author: D_7J |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.