input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Atlassian Jira - (Authenticated) Upload Code Execution (Metasploit)
|
This is a remote exploit for java platform. Description: Atlassian Jira - (Authenticated) Upload Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Atlassian Jira - (Authenticated) Upload Code Execution (Metasploit)
|
This exploit targets java systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Nagios XI 5.2.6-5.4.12 - Chained Remote Code Execution (Metasploit)
|
This is a remote exploit for linux platform. Description: Nagios XI 5.2.6-5.4.12 - Chained Remote Code Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Nagios XI 5.2.6-5.4.12 - Chained Remote Code Execution (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: emergecolab 1.0 - 'sitecode' Local File Inclusion
|
This is a webapps exploit for php platform. Description: emergecolab 1.0 - 'sitecode' Local File Inclusion. Author: dun
|
Analyze the security implications of: emergecolab 1.0 - 'sitecode' Local File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Muratsoft Haber Portal 3.6 - 'tr' SQL Injection
|
This is a webapps exploit for asp platform. Description: Muratsoft Haber Portal 3.6 - 'tr' SQL Injection. Author: ASIANEAGLE
|
Analyze the security implications of: Muratsoft Haber Portal 3.6 - 'tr' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: amember 3.1.7 - Cross-Site Scripting / SQL Injection / HTML Injection
|
This is a webapps exploit for php platform. Description: amember 3.1.7 - Cross-Site Scripting / SQL Injection / HTML Injection. Author: intern0t
|
Analyze the security implications of: amember 3.1.7 - Cross-Site Scripting / SQL Injection / HTML Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FubarForum 1.6 - Authentication Bypass Change User Password
|
This is a webapps exploit for php platform. Description: FubarForum 1.6 - Authentication Bypass Change User Password. Author: R31P0l
|
Analyze the security implications of: FubarForum 1.6 - Authentication Bypass Change User Password
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DigitalHive - 'mt' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DigitalHive - 'mt' Cross-Site Scripting. Author: ViRuSMaN
|
Analyze the security implications of: DigitalHive - 'mt' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JBoss & JMX Console - Misconfigured Deployment Scanner
|
This is a webapps exploit for jsp platform. Description: JBoss & JMX Console - Misconfigured Deployment Scanner. Author: y0ug
|
Analyze the security implications of: JBoss & JMX Console - Misconfigured Deployment Scanner
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: Frog CMS 0.9.5 - Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Frog CMS 0.9.5 - Cross-Site Scripting. Author: WangDudu
|
Analyze the security implications of: Frog CMS 0.9.5 - Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: i-doit 1.12 - 'qr.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: i-doit 1.12 - 'qr.php' Cross-Site Scripting. Author: BlackFog Team
|
Analyze the security implications of: i-doit 1.12 - 'qr.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BandSite CMS 1.1.4 - Download Backup / Cross-Site Scripting / Cross-Site Request Forgery
|
This is a webapps exploit for php platform. Description: BandSite CMS 1.1.4 - Download Backup / Cross-Site Scripting / Cross-Site Request Forgery. Author: SirGod
|
Analyze the security implications of: BandSite CMS 1.1.4 - Download Backup / Cross-Site Scripting / Cross-Site Request Forgery
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CutePHP CuteNews 1.3.6 - 'x-forwarded-for' Script Injection
|
This is a webapps exploit for php platform. Description: CutePHP CuteNews 1.3.6 - 'x-forwarded-for' Script Injection. Author: FraMe
|
Analyze the security implications of: CutePHP CuteNews 1.3.6 - 'x-forwarded-for' Script Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: GNU glibc 2.x - 'strfmon()' Integer Overflow
|
This is a dos exploit for linux platform. Description: GNU glibc 2.x - 'strfmon()' Integer Overflow. Author: Maksymilian Arciemowicz
|
Analyze the security implications of: GNU glibc 2.x - 'strfmon()' Integer Overflow
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Blog 0.2.3/0.2.4 Mod - 'Weblog_posting.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Blog 0.2.3/0.2.4 Mod - 'Weblog_posting.php' SQL Injection. Author: Qex
|
Analyze the security implications of: Blog 0.2.3/0.2.4 Mod - 'Weblog_posting.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Dragonfly CMS 9.0.6.1 Downloads Module - 'c' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Dragonfly CMS 9.0.6.1 Downloads Module - 'c' Cross-Site Scripting. Author: Lostmon
|
Analyze the security implications of: Dragonfly CMS 9.0.6.1 Downloads Module - 'c' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: JNM Guestbook 3.0 - 'index.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: JNM Guestbook 3.0 - 'index.php' Cross-Site Scripting. Author: Moudi
|
Analyze the security implications of: JNM Guestbook 3.0 - 'index.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Discussion Web 4 - Remote Database Disclosure
|
This is a webapps exploit for asp platform. Description: Discussion Web 4 - Remote Database Disclosure. Author: Pouya_Server
|
Analyze the security implications of: Discussion Web 4 - Remote Database Disclosure
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Islam Sound IV2 - 'details.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Islam Sound IV2 - 'details.php' SQL Injection. Author: ZxH-Labs
|
Analyze the security implications of: Islam Sound IV2 - 'details.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Free Directory Script 1.1.1 - 'API_HOME_DIR' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Free Directory Script 1.1.1 - 'API_HOME_DIR' Remote File Inclusion. Author: Ghost Hacker
|
Analyze the security implications of: Free Directory Script 1.1.1 - 'API_HOME_DIR' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apache Tomcat - AJP 'Ghostcat File Read/Inclusion
|
This is a webapps exploit for multiple platform. Description: Apache Tomcat - AJP 'Ghostcat File Read/Inclusion. Author: YDHCUI
|
Analyze the security implications of: Apache Tomcat - AJP 'Ghostcat File Read/Inclusion
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: LibreNMS - Collectd Command Injection (Metasploit)
|
This is a remote exploit for linux platform. Description: LibreNMS - Collectd Command Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: LibreNMS - Collectd Command Injection (Metasploit)
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: PeerCast 0.1211 - Remote Format String
|
This is a remote exploit for linux platform. Description: PeerCast 0.1211 - Remote Format String. Author: darkeagle
|
Analyze the security implications of: PeerCast 0.1211 - Remote Format String
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: toutvirtual virtualiq pro 3.2 - Multiple Vulnerabilities
|
This is a webapps exploit for jsp platform. Description: toutvirtual virtualiq pro 3.2 - Multiple Vulnerabilities. Author: Alberto Trivero
|
Analyze the security implications of: toutvirtual virtualiq pro 3.2 - Multiple Vulnerabilities
|
This exploit targets jsp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets jsp platform
|
What is this exploit about: CMS Openpage - 'index.php' SQL Injection
|
This is a webapps exploit for php platform. Description: CMS Openpage - 'index.php' SQL Injection. Author: Phenom
|
Analyze the security implications of: CMS Openpage - 'index.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: 4Images 1.7.9 - Multiple Remote File Inclusions / SQL Injections
|
This is a webapps exploit for php platform. Description: 4Images 1.7.9 - Multiple Remote File Inclusions / SQL Injections. Author: KedAns-Dz
|
Analyze the security implications of: 4Images 1.7.9 - Multiple Remote File Inclusions / SQL Injections
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cacti 0.8.7 - 'data_input.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Cacti 0.8.7 - 'data_input.php' Cross-Site Scripting. Author: fgeek
|
Analyze the security implications of: Cacti 0.8.7 - 'data_input.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FiberHome Modem Router HG-110 - Authentication Bypass To Remote Change DNS Servers
|
This is a remote exploit for hardware platform. Description: FiberHome Modem Router HG-110 - Authentication Bypass To Remote Change DNS Servers. Author: Javier Perez
|
Analyze the security implications of: FiberHome Modem Router HG-110 - Authentication Bypass To Remote Change DNS Servers
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Content-Builder (CMS) 0.7.5 - Multiple Include Vulnerabilities
|
This is a webapps exploit for php platform. Description: Content-Builder (CMS) 0.7.5 - Multiple Include Vulnerabilities. Author: Federico Fazzi
|
Analyze the security implications of: Content-Builder (CMS) 0.7.5 - Multiple Include Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Ananda Image Gallery - SQL Injection
|
This is a webapps exploit for asp platform. Description: Ananda Image Gallery - SQL Injection. Author: L0rd CrusAd3r
|
Analyze the security implications of: Ananda Image Gallery - SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Mavi Emlak - 'newDetail.asp' SQL Injection
|
This is a webapps exploit for asp platform. Description: Mavi Emlak - 'newDetail.asp' SQL Injection. Author: Sina Yazdanmehr
|
Analyze the security implications of: Mavi Emlak - 'newDetail.asp' SQL Injection
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: CoSoSys Endpoint Protector - Predictable Password Generation
|
This is a remote exploit for hardware platform. Description: CoSoSys Endpoint Protector - Predictable Password Generation. Author: Christopher Campbell
|
Analyze the security implications of: CoSoSys Endpoint Protector - Predictable Password Generation
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: FaceTime - 'VCPDecompressionDecodeFrame' Memory Corruption
|
This is a dos exploit for macos platform. Description: FaceTime - 'VCPDecompressionDecodeFrame' Memory Corruption. Author: Google Security Research
|
Analyze the security implications of: FaceTime - 'VCPDecompressionDecodeFrame' Memory Corruption
|
This exploit targets macos systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: Expinion.net News Manager Lite 2.5 - 'search.asp' Cross-Site Scripting
|
This is a webapps exploit for asp platform. Description: Expinion.net News Manager Lite 2.5 - 'search.asp' Cross-Site Scripting. Author: Manuel Lopez
|
Analyze the security implications of: Expinion.net News Manager Lite 2.5 - 'search.asp' Cross-Site Scripting
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Chicomas 2.0.4 - Database Backup / File Disclosure / Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Chicomas 2.0.4 - Database Backup / File Disclosure / Cross-Site Scripting. Author: BugReport.IR
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.