input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Printer Pro 5.4.3 IOS - Persistent Cross-Site Scripting
|
This is a webapps exploit for ios platform. Description: Printer Pro 5.4.3 IOS - Persistent Cross-Site Scripting. Author: Taurus Omar
|
Analyze the security implications of: Printer Pro 5.4.3 IOS - Persistent Cross-Site Scripting
|
This exploit targets ios systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets ios platform
|
What is this exploit about: DB Top Sites 1.0 - Remote Command Execution
|
This is a webapps exploit for php platform. Description: DB Top Sites 1.0 - Remote Command Execution. Author: SirGod
|
Analyze the security implications of: DB Top Sites 1.0 - Remote Command Execution
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SMC Router 1.2x - Random UDP Packet Denial of Service
|
This is a dos exploit for hardware platform. Description: SMC Router 1.2x - Random UDP Packet Denial of Service. Author: _6mO_HaCk
|
Analyze the security implications of: SMC Router 1.2x - Random UDP Packet Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Gigaset SE461 WiMAX Router - Remote Denial of Service
|
This is a dos exploit for hardware platform. Description: Gigaset SE461 WiMAX Router - Remote Denial of Service. Author: Benkei
|
Analyze the security implications of: Gigaset SE461 WiMAX Router - Remote Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: iScripts EasyCreate 3.2 - 'siteid' SQL Injection
|
This is a webapps exploit for php platform. Description: iScripts EasyCreate 3.2 - 'siteid' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: iScripts EasyCreate 3.2 - 'siteid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 2.0/2.0.33 - i_count Overflow (PoC)
|
This is a dos exploit for linux platform. Description: Linux Kernel 2.0/2.0.33 - i_count Overflow (PoC). Author: Aleph One
|
Analyze the security implications of: Linux Kernel 2.0/2.0.33 - i_count Overflow (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Loan Management System 1.0 - SQLi Authentication Bypass
|
This is a webapps exploit for php platform. Description: Loan Management System 1.0 - SQLi Authentication Bypass. Author: Merve Oral
|
Analyze the security implications of: Loan Management System 1.0 - SQLi Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: .ELF Binaries - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: .ELF Binaries - Local Privilege Escalation. Author: Sha0
|
Analyze the security implications of: .ELF Binaries - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Joomla! Component com_calendario - Blind SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_calendario - Blind SQL Injection. Author: Mr.tro0oqy
|
Analyze the security implications of: Joomla! Component com_calendario - Blind SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ServletExec - Directory Traversal / Authentication Bypass
|
This is a remote exploit for multiple platform. Description: ServletExec - Directory Traversal / Authentication Bypass. Author: Stefano Di Paola
|
Analyze the security implications of: ServletExec - Directory Traversal / Authentication Bypass
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Silc Server 1.0.2 - New Channel Remote Denial of Service
|
This is a dos exploit for linux platform. Description: Silc Server 1.0.2 - New Channel Remote Denial of Service. Author: Frank Benkstein
|
Analyze the security implications of: Silc Server 1.0.2 - New Channel Remote Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Inim Electronics Smartliving SmartLAN 6.x - Remote Command Execution
|
This is a webapps exploit for hardware platform. Description: Inim Electronics Smartliving SmartLAN 6.x - Remote Command Execution. Author: LiquidWorm
|
Analyze the security implications of: Inim Electronics Smartliving SmartLAN 6.x - Remote Command Execution
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Cisco Prime Collaboration Provisioning < 12.1 - Authentication Bypass / Remote Code Execution
|
This is a remote exploit for hardware platform. Description: Cisco Prime Collaboration Provisioning < 12.1 - Authentication Bypass / Remote Code Execution. Author: Adam Brown
|
Analyze the security implications of: Cisco Prime Collaboration Provisioning < 12.1 - Authentication Bypass / Remote Code Execution
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Aigaion 1.2.1 - 'DIR' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Aigaion 1.2.1 - 'DIR' Remote File Inclusion. Author: navairum
|
Analyze the security implications of: Aigaion 1.2.1 - 'DIR' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cory Support - 'pr' SQL Injection
|
This is a webapps exploit for php platform. Description: Cory Support - 'pr' SQL Injection. Author: v3n0m
|
Analyze the security implications of: Cory Support - 'pr' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Kayako SupportSuite 3.x - 'index.php?filter' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Kayako SupportSuite 3.x - 'index.php?filter' Cross-Site Scripting. Author: GulfTech Security
|
Analyze the security implications of: Kayako SupportSuite 3.x - 'index.php?filter' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Mac OSX - 'IOHDIXControllerUserClient::convertClient' Buffer Integer Overflow
|
This is a dos exploit for osx platform. Description: Apple Mac OSX - 'IOHDIXControllerUserClient::convertClient' Buffer Integer Overflow. Author: Google Security Research
|
Analyze the security implications of: Apple Mac OSX - 'IOHDIXControllerUserClient::convertClient' Buffer Integer Overflow
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Mozilla Firefox 3.0.7 - OnbeforeUnLoad DesignMode Dereference Crash
|
This is a dos exploit for multiple platform. Description: Mozilla Firefox 3.0.7 - OnbeforeUnLoad DesignMode Dereference Crash. Author: Skylined
|
Analyze the security implications of: Mozilla Firefox 3.0.7 - OnbeforeUnLoad DesignMode Dereference Crash
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: bloofoxCMS 0.5.2.1 - CSRF (Add user)
|
This is a webapps exploit for php platform. Description: bloofoxCMS 0.5.2.1 - CSRF (Add user). Author: LiPeiYi
|
Analyze the security implications of: bloofoxCMS 0.5.2.1 - CSRF (Add user)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cpanel PHP - Restriction Bypass
|
This is a webapps exploit for php platform. Description: Cpanel PHP - Restriction Bypass. Author: Abysssec
|
Analyze the security implications of: Cpanel PHP - Restriction Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Check Point Connectra R62 - '/Login/Login' Arbitrary Script Injection
|
This is a remote exploit for hardware platform. Description: Check Point Connectra R62 - '/Login/Login' Arbitrary Script Injection. Author: Stefan Friedli
|
Analyze the security implications of: Check Point Connectra R62 - '/Login/Login' Arbitrary Script Injection
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Brickcom Corporation Network Cameras - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: Brickcom Corporation Network Cameras - Multiple Vulnerabilities. Author: Orwelllabs
|
Analyze the security implications of: Brickcom Corporation Network Cameras - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ManageEngine Firewall Analyzer 7.2 - 'fw/createAnomaly.do?subTab' Cross-Site Scripting
|
This is a webapps exploit for java platform. Description: ManageEngine Firewall Analyzer 7.2 - 'fw/createAnomaly.do?subTab' Cross-Site Scripting. Author: Vulnerability Research Laboratory
|
Analyze the security implications of: ManageEngine Firewall Analyzer 7.2 - 'fw/createAnomaly.do?subTab' Cross-Site Scripting
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: eshtery CMS - 'FileManager.aspx' Local File Disclosure
|
This is a webapps exploit for asp platform. Description: eshtery CMS - 'FileManager.aspx' Local File Disclosure. Author: peng.deng
|
Analyze the security implications of: eshtery CMS - 'FileManager.aspx' Local File Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: iScripts AutoHoster - 'checktransferstatus.php' SQL Injection
|
This is a webapps exploit for php platform. Description: iScripts AutoHoster - 'checktransferstatus.php' SQL Injection. Author: i-Hmx
|
Analyze the security implications of: iScripts AutoHoster - 'checktransferstatus.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CubeCart 3.0.x - Multiple Input Validation Vulnerabilities
|
This is a webapps exploit for php platform. Description: CubeCart 3.0.x - Multiple Input Validation Vulnerabilities. Author: rgod
|
Analyze the security implications of: CubeCart 3.0.x - Multiple Input Validation Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Redis-cli < 5.0 - Buffer Overflow (PoC)
|
This is a local exploit for linux platform. Description: Redis-cli < 5.0 - Buffer Overflow (PoC). Author: Fakhri Zulkifli
|
Analyze the security implications of: Redis-cli < 5.0 - Buffer Overflow (PoC)
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: JoWood Chaser 1.0/1.50 - Remote Buffer Overflow
|
This is a remote exploit for multiple platform. Description: JoWood Chaser 1.0/1.50 - Remote Buffer Overflow. Author: Luigi Auriemma
|
Analyze the security implications of: JoWood Chaser 1.0/1.50 - Remote Buffer Overflow
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: RealPlayer 9 *nix - Local Privilege Escalation
|
This is a local exploit for linux platform. Description: RealPlayer 9 *nix - Local Privilege Escalation. Author: Jon Hart
|
Analyze the security implications of: RealPlayer 9 *nix - Local Privilege Escalation
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: TP-Link TL-WR740N / TL-WR740ND 150M Wireless Lite N Router - HTTP Denial of Service
|
This is a dos exploit for hardware platform. Description: TP-Link TL-WR740N / TL-WR740ND 150M Wireless Lite N Router - HTTP Denial of Service. Author: Dino Causevic
|
Analyze the security implications of: TP-Link TL-WR740N / TL-WR740ND 150M Wireless Lite N Router - HTTP Denial of Service
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: iDevAffiliate - 'idevads.php' SQL Injection
|
This is a webapps exploit for php platform. Description: iDevAffiliate - 'idevads.php' SQL Injection. Author: Robert Cooper
|
Analyze the security implications of: iDevAffiliate - 'idevads.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Teleport v10.1.1 - Remote Code Execution (RCE)
|
This is a remote exploit for multiple platform. Description: Teleport v10.1.1 - Remote Code Execution (RCE). Author: Brandon Roach
|
Analyze the security implications of: Teleport v10.1.1 - Remote Code Execution (RCE)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: GuppY 4.5 - 'archbatch.php?lng' Traversal Arbitrary File Access
|
This is a webapps exploit for php platform. Description: GuppY 4.5 - 'archbatch.php?lng' Traversal Arbitrary File Access. Author: retrogod@aliceposta.it
|
Analyze the security implications of: GuppY 4.5 - 'archbatch.php?lng' Traversal Arbitrary File Access
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Les Visiteurs 2.0 - Multiple Remote File Inclusions
|
This is a webapps exploit for php platform. Description: Les Visiteurs 2.0 - Multiple Remote File Inclusions. Author: D_7J
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.