input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Samba 3.0.21 < 3.0.24 - LSA trans names Heap Overflow (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Web Ofisi Emlak 2 - 'ara' SQL Injection
|
This is a webapps exploit for linux platform. Description: Web Ofisi Emlak 2 - 'ara' SQL Injection. Author: Ahmet Ümit BAYRAM
|
Analyze the security implications of: Web Ofisi Emlak 2 - 'ara' SQL Injection
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Ocean12 Technologies Calendar Manager Pro 1.0 1 - '/admin/view.asp?searchFor' SQL Injection
|
This is a webapps exploit for asp platform. Description: Ocean12 Technologies Calendar Manager Pro 1.0 1 - '/admin/view.asp?searchFor' SQL Injection. Author: dj_eyes2005
|
Analyze the security implications of: Ocean12 Technologies Calendar Manager Pro 1.0 1 - '/admin/view.asp?searchFor' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: D-Link DSL-2640B ADSL Router - 'dnscfg' Remote DNS Change
|
This is a webapps exploit for hardware platform. Description: D-Link DSL-2640B ADSL Router - 'dnscfg' Remote DNS Change. Author: Todor Donev
|
Analyze the security implications of: D-Link DSL-2640B ADSL Router - 'dnscfg' Remote DNS Change
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Downline Goldmine newdownlinebuilder - SQL Injection
|
This is a webapps exploit for php platform. Description: Downline Goldmine newdownlinebuilder - SQL Injection. Author: Hussin X
|
Analyze the security implications of: Downline Goldmine newdownlinebuilder - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Peplink Balance Routers 7.0.0-build1904 - SQL Injection / Cross-Site Scripting / Information Disclosure
|
This is a webapps exploit for cgi platform. Description: Peplink Balance Routers 7.0.0-build1904 - SQL Injection / Cross-Site Scripting / Information Disclosure. Author: X41 D-Sec GmbH
|
Analyze the security implications of: Peplink Balance Routers 7.0.0-build1904 - SQL Injection / Cross-Site Scripting / Information Disclosure
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Joomla! Component BookLibrary 1.5.2.4 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component BookLibrary 1.5.2.4 - Remote File Inclusion. Author: Mehmet Ince
|
Analyze the security implications of: Joomla! Component BookLibrary 1.5.2.4 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple QuickTime RTSP 10.4.0 < 10.5.0 (OSX) - Content-Type Overflow (Metasploit)
|
This is a remote exploit for osx platform. Description: Apple QuickTime RTSP 10.4.0 < 10.5.0 (OSX) - Content-Type Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: Apple QuickTime RTSP 10.4.0 < 10.5.0 (OSX) - Content-Type Overflow (Metasploit)
|
This exploit targets osx systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Opera 9.x - FTP PASV Port-Scanning
|
This is a remote exploit for linux platform. Description: Opera 9.x - FTP PASV Port-Scanning. Author: mark
|
Analyze the security implications of: Opera 9.x - FTP PASV Port-Scanning
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Apache CXF < 2.5.10/2.6.7/2.7.4 - Denial of Service
|
This is a dos exploit for multiple platform. Description: Apache CXF < 2.5.10/2.6.7/2.7.4 - Denial of Service. Author: SEC Consult
|
Analyze the security implications of: Apache CXF < 2.5.10/2.6.7/2.7.4 - Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: JobStar Monster Clone Script 1.0 - SQL Injection
|
This is a webapps exploit for php platform. Description: JobStar Monster Clone Script 1.0 - SQL Injection. Author: 8bitsec
|
Analyze the security implications of: JobStar Monster Clone Script 1.0 - SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CafeLog B2 0.6.1 Weblog and News Publishing Tool - 'b2mail.php?b2inc' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: CafeLog B2 0.6.1 Weblog and News Publishing Tool - 'b2mail.php?b2inc' Remote File Inclusion. Author: alijsb
|
Analyze the security implications of: CafeLog B2 0.6.1 Weblog and News Publishing Tool - 'b2mail.php?b2inc' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Mac OSX Regex Engine (TRE) - Integer Signedness / Overflow
|
This is a dos exploit for osx platform. Description: Apple Mac OSX Regex Engine (TRE) - Integer Signedness / Overflow. Author: Google Security Research
|
Analyze the security implications of: Apple Mac OSX Regex Engine (TRE) - Integer Signedness / Overflow
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: Vivotek IP Cameras - Remote Stack Overflow (PoC)
|
This is a remote exploit for multiple platform. Description: Vivotek IP Cameras - Remote Stack Overflow (PoC). Author: bashis
|
Analyze the security implications of: Vivotek IP Cameras - Remote Stack Overflow (PoC)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Screen SFT DAB 600/C - Authentication Bypass Reset Board Config
|
This is a remote exploit for hardware platform. Description: Screen SFT DAB 600/C - Authentication Bypass Reset Board Config. Author: LiquidWorm
|
Analyze the security implications of: Screen SFT DAB 600/C - Authentication Bypass Reset Board Config
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Joomla! Component com_artportal 1.0 - 'portalid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component com_artportal 1.0 - 'portalid' SQL Injection. Author: 599eme Man
|
Analyze the security implications of: Joomla! Component com_artportal 1.0 - 'portalid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Drupal 11.x-dev - Full Path Disclosure
|
This is a webapps exploit for php platform. Description: Drupal 11.x-dev - Full Path Disclosure. Author: Milad karimi
|
Analyze the security implications of: Drupal 11.x-dev - Full Path Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Digital Scribe 1.x - Error Function Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Digital Scribe 1.x - Error Function Cross-Site Scripting. Author: Secunia
|
Analyze the security implications of: Digital Scribe 1.x - Error Function Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: AIOCP 1.3.x - 'cp_news.php' SQL Injection
|
This is a webapps exploit for php platform. Description: AIOCP 1.3.x - 'cp_news.php' SQL Injection. Author: laurent gaffie
|
Analyze the security implications of: AIOCP 1.3.x - 'cp_news.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: D-Link DIR-645 1.03B08 - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: D-Link DIR-645 1.03B08 - Multiple Vulnerabilities. Author: Roberto Paleari
|
Analyze the security implications of: D-Link DIR-645 1.03B08 - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Samba 3.5.11/3.6.3 - Remote Code Execution
|
This is a remote exploit for linux platform. Description: Samba 3.5.11/3.6.3 - Remote Code Execution. Author: kb
|
Analyze the security implications of: Samba 3.5.11/3.6.3 - Remote Code Execution
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: netkar-PRO 1.1 - Remote Stack Buffer Overflow
|
This is a remote exploit for multiple platform. Description: netkar-PRO 1.1 - Remote Stack Buffer Overflow. Author: Luigi Auriemma
|
Analyze the security implications of: netkar-PRO 1.1 - Remote Stack Buffer Overflow
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Land Down Under 800 - 'journal.php?w' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Land Down Under 800 - 'journal.php?w' Cross-Site Scripting. Author: bl2k
|
Analyze the security implications of: Land Down Under 800 - 'journal.php?w' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: e-topbiz banner exchange PHP - Authentication Bypass
|
This is a webapps exploit for php platform. Description: e-topbiz banner exchange PHP - Authentication Bypass. Author: Hussin X
|
Analyze the security implications of: e-topbiz banner exchange PHP - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Samba 2.2.8 (Linux x86) - 'trans2open' Remote Overflow (Metasploit)
|
This is a remote exploit for linux_x86 platform. Description: Samba 2.2.8 (Linux x86) - 'trans2open' Remote Overflow (Metasploit). Author: Metasploit
|
Analyze the security implications of: Samba 2.2.8 (Linux x86) - 'trans2open' Remote Overflow (Metasploit)
|
This exploit targets linux_x86 systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux_x86 platform
|
What is this exploit about: ModSecurity - Remote Null Pointer Dereference
|
This is a dos exploit for multiple platform. Description: ModSecurity - Remote Null Pointer Dereference. Author: Younes JAAIDI
|
Analyze the security implications of: ModSecurity - Remote Null Pointer Dereference
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ECI Telecom B-Focus ADSL2+ Combo332+ Wireless Router - Information Disclosure
|
This is a remote exploit for hardware platform. Description: ECI Telecom B-Focus ADSL2+ Combo332+ Wireless Router - Information Disclosure. Author: LegendaryZion
|
Analyze the security implications of: ECI Telecom B-Focus ADSL2+ Combo332+ Wireless Router - Information Disclosure
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: ProFTPd 1.2.9 rc2 - '.ASCII' File Remote Code Execution (1)
|
This is a remote exploit for linux platform. Description: ProFTPd 1.2.9 rc2 - '.ASCII' File Remote Code Execution (1). Author: bkbll
|
Analyze the security implications of: ProFTPd 1.2.9 rc2 - '.ASCII' File Remote Code Execution (1)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: EuroTel ETL3100 - Transmitter Authorization Bypass (IDOR)
|
This is a remote exploit for hardware platform. Description: EuroTel ETL3100 - Transmitter Authorization Bypass (IDOR). Author: LiquidWorm
|
Analyze the security implications of: EuroTel ETL3100 - Transmitter Authorization Bypass (IDOR)
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: JVC HDRs / Net (Multiple Cameras) - Multiple Vulnerabilities
|
This is a webapps exploit for hardware platform. Description: JVC HDRs / Net (Multiple Cameras) - Multiple Vulnerabilities. Author: Orwelllabs
|
Analyze the security implications of: JVC HDRs / Net (Multiple Cameras) - Multiple Vulnerabilities
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: humanCMS - Authentication Bypass
|
This is a webapps exploit for php platform. Description: humanCMS - Authentication Bypass. Author: next
|
Analyze the security implications of: humanCMS - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Joomla! Component com_bbs - Multiple SQL Injections
|
This is a webapps exploit for php platform. Description: Joomla! Component com_bbs - Multiple SQL Injections. Author: the_cyber_nuxbie
|
Analyze the security implications of: Joomla! Component com_bbs - Multiple SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Infoproject Business Hero - Multiple Vulnerabilities
|
This is a webapps exploit for php platform. Description: Infoproject Business Hero - Multiple Vulnerabilities. Author: LiquidWorm
|
Analyze the security implications of: Infoproject Business Hero - Multiple Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: McMurtrey/Whitaker & Associates Cart32 2-5 GetLatestBuilds Script - Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: McMurtrey/Whitaker & Associates Cart32 2-5 GetLatestBuilds Script - Cross-Site Scripting. Author: Dr.Ponidi Haryanto
|
Analyze the security implications of: McMurtrey/Whitaker & Associates Cart32 2-5 GetLatestBuilds Script - Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.