input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
What is this exploit about: Atlassian Confluence Widget Connector Macro - Velocity Template Injection (Metasploit)
|
This is a remote exploit for multiple platform. Description: Atlassian Confluence Widget Connector Macro - Velocity Template Injection (Metasploit). Author: Metasploit
|
Analyze the security implications of: Atlassian Confluence Widget Connector Macro - Velocity Template Injection (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: KubeLance 1.7.6 - Cross-Site Request Forgery (Add Admin)
|
This is a webapps exploit for php platform. Description: KubeLance 1.7.6 - Cross-Site Request Forgery (Add Admin). Author: Milos Zivanovic
|
Analyze the security implications of: KubeLance 1.7.6 - Cross-Site Request Forgery (Add Admin)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: IceWarp Universal WebMail - '/mail/index.html?lang_settings' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: IceWarp Universal WebMail - '/mail/index.html?lang_settings' Remote File Inclusion. Author: Tan Chew Keong
|
Analyze the security implications of: IceWarp Universal WebMail - '/mail/index.html?lang_settings' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Jenkins Gitlab Hook Plugin 1.4.2 - Reflected Cross-Site Scripting
|
This is a webapps exploit for java platform. Description: Jenkins Gitlab Hook Plugin 1.4.2 - Reflected Cross-Site Scripting. Author: Ai Ho
|
Analyze the security implications of: Jenkins Gitlab Hook Plugin 1.4.2 - Reflected Cross-Site Scripting
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Joomla! Component Visual Calendar 3.1.3 - 'id' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Visual Calendar 3.1.3 - 'id' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: Joomla! Component Visual Calendar 3.1.3 - 'id' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Rocket.Chat 3.12.1 - NoSQL Injection (Unauthenticated)
|
This is a webapps exploit for linux platform. Description: Rocket.Chat 3.12.1 - NoSQL Injection (Unauthenticated). Author: enox
|
Analyze the security implications of: Rocket.Chat 3.12.1 - NoSQL Injection (Unauthenticated)
|
This exploit targets linux systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: D-Link DSL-2730B Modem - Cross-Site Scripting Injection Stored DnsProxy.cmd
|
This is a webapps exploit for hardware platform. Description: D-Link DSL-2730B Modem - Cross-Site Scripting Injection Stored DnsProxy.cmd. Author: XLabs Security
|
Analyze the security implications of: D-Link DSL-2730B Modem - Cross-Site Scripting Injection Stored DnsProxy.cmd
|
This exploit targets hardware systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: iMessage - NSKeyedUnarchiver Deserialization Allows file Backed NSData Objects
|
This is a dos exploit for multiple platform. Description: iMessage - NSKeyedUnarchiver Deserialization Allows file Backed NSData Objects. Author: Google Security Research
|
Analyze the security implications of: iMessage - NSKeyedUnarchiver Deserialization Allows file Backed NSData Objects
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Oliver - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for cgi platform. Description: Oliver - Multiple Cross-Site Scripting Vulnerabilities. Author: A. R.
|
Analyze the security implications of: Oliver - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: Wyrestorm Apollo VX20 < 1.3.58 - Incorrect Access Control 'DoS'
|
This is a dos exploit for multiple platform. Description: Wyrestorm Apollo VX20 < 1.3.58 - Incorrect Access Control 'DoS'. Author: hyp3rlinx
|
Analyze the security implications of: Wyrestorm Apollo VX20 < 1.3.58 - Incorrect Access Control 'DoS'
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Google Software Updater macOS - Unsafe use of Distributed Objects Privilege Escalation
|
This is a local exploit for macos platform. Description: Google Software Updater macOS - Unsafe use of Distributed Objects Privilege Escalation. Author: Google Security Research
|
Analyze the security implications of: Google Software Updater macOS - Unsafe use of Distributed Objects Privilege Escalation
|
This exploit targets macos systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: Etano 1.20/1.22 - 'photo_search.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: Etano 1.20/1.22 - 'photo_search.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Aung Khant
|
Analyze the security implications of: Etano 1.20/1.22 - 'photo_search.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: gpEasy CMS 1.6.2 - 'editing_files.php' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: gpEasy CMS 1.6.2 - 'editing_files.php' Cross-Site Scripting. Author: High-Tech Bridge SA
|
Analyze the security implications of: gpEasy CMS 1.6.2 - 'editing_files.php' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: DCP-Portal 3.7/4.x/5.x/6.x - 'forums.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: DCP-Portal 3.7/4.x/5.x/6.x - 'forums.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Nenad Jovanovic
|
Analyze the security implications of: DCP-Portal 3.7/4.x/5.x/6.x - 'forums.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bitweaver 2.8.1 - Persistent Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: Bitweaver 2.8.1 - Persistent Cross-Site Scripting. Author: lemlajt
|
Analyze the security implications of: Bitweaver 2.8.1 - Persistent Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Mozilla Firefox 2.0.0.12 - IFrame Recursion Remote Denial of Service
|
This is a dos exploit for multiple platform. Description: Mozilla Firefox 2.0.0.12 - IFrame Recursion Remote Denial of Service. Author: Carl Hardwick
|
Analyze the security implications of: Mozilla Firefox 2.0.0.12 - IFrame Recursion Remote Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Cyrus IMSP Daemon 1.x - Remote Buffer Overflow
|
This is a remote exploit for linux platform. Description: Cyrus IMSP Daemon 1.x - Remote Buffer Overflow. Author: Carlos Barros
|
Analyze the security implications of: Cyrus IMSP Daemon 1.x - Remote Buffer Overflow
|
This exploit targets linux systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Flat Assembler 1.7.21 - Local Buffer Overflow
|
This is a local exploit for linux platform. Description: Flat Assembler 1.7.21 - Local Buffer Overflow. Author: Juan Sacco
|
Analyze the security implications of: Flat Assembler 1.7.21 - Local Buffer Overflow
|
This exploit targets linux systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: AvailScript Article Script - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: AvailScript Article Script - Arbitrary File Upload. Author: S.W.A.T.
|
Analyze the security implications of: AvailScript Article Script - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Autodealers CMS AutOnline - 'pageid' SQL Injection
|
This is a webapps exploit for php platform. Description: Autodealers CMS AutOnline - 'pageid' SQL Injection. Author: r45c4l
|
Analyze the security implications of: Autodealers CMS AutOnline - 'pageid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple QuickTime 7.2/7.3 (OSX/Windows) - RSTP Response Universal
|
This is a remote exploit for multiple platform. Description: Apple QuickTime 7.2/7.3 (OSX/Windows) - RSTP Response Universal. Author: Subreption LLC.
|
Analyze the security implications of: Apple QuickTime 7.2/7.3 (OSX/Windows) - RSTP Response Universal
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: BlackBoard 5.0 - Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: BlackBoard 5.0 - Cross-Site Scripting. Author: Berend-Jan Wever
|
Analyze the security implications of: BlackBoard 5.0 - Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: LibSMI smiGetNode - Buffer Overflow When Long OID Is Given In Numerical Form
|
This is a dos exploit for linux platform. Description: LibSMI smiGetNode - Buffer Overflow When Long OID Is Given In Numerical Form. Author: Core Security
|
Analyze the security implications of: LibSMI smiGetNode - Buffer Overflow When Long OID Is Given In Numerical Form
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: REDDOXX Appliance Build 2032 / 2.0.625 - Remote Command Execution
|
This is a webapps exploit for json platform. Description: REDDOXX Appliance Build 2032 / 2.0.625 - Remote Command Execution. Author: RedTeam Pentesting
|
Analyze the security implications of: REDDOXX Appliance Build 2032 / 2.0.625 - Remote Command Execution
|
This exploit targets json systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets json platform
|
What is this exploit about: Health Record System 0.1 - Authentication Bypass
|
This is a webapps exploit for php platform. Description: Health Record System 0.1 - Authentication Bypass. Author: lahilote
|
Analyze the security implications of: Health Record System 0.1 - Authentication Bypass
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple macOS 10.15.1 - Denial of Service (PoC)
|
This is a dos exploit for macos platform. Description: Apple macOS 10.15.1 - Denial of Service (PoC). Author: 08Tc3wBB
|
Analyze the security implications of: Apple macOS 10.15.1 - Denial of Service (PoC)
|
This exploit targets macos systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets macos platform
|
What is this exploit about: Cisco ASA - WebVPN CIFS Handling Buffer Overflow
|
This is a dos exploit for hardware platform. Description: Cisco ASA - WebVPN CIFS Handling Buffer Overflow. Author: Google Security Research
|
Analyze the security implications of: Cisco ASA - WebVPN CIFS Handling Buffer Overflow
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Google Chrome 73.0.3683.103 V8 JavaScript Engine - Out-of-Memory in Invalid Table Size Denial of Service (PoC)
|
This is a dos exploit for multiple platform. Description: Google Chrome 73.0.3683.103 V8 JavaScript Engine - Out-of-Memory in Invalid Table Size Denial of Service (PoC). Author: Bogdan Kurinnoy
|
Analyze the security implications of: Google Chrome 73.0.3683.103 V8 JavaScript Engine - Out-of-Memory in Invalid Table Size Denial of Service (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: PHP 3/4/5 - ZendEngine Variable Destruction Remote Denial of Service
|
This is a dos exploit for php platform. Description: PHP 3/4/5 - ZendEngine Variable Destruction Remote Denial of Service. Author: Stefan Esser
|
Analyze the security implications of: PHP 3/4/5 - ZendEngine Variable Destruction Remote Denial of Service
|
This exploit targets php systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CyberArk Enterprise Password Vault 10.7 - XML External Entity Injection
|
This is a webapps exploit for multiple platform. Description: CyberArk Enterprise Password Vault 10.7 - XML External Entity Injection. Author: Marcelo Toran
|
Analyze the security implications of: CyberArk Enterprise Password Vault 10.7 - XML External Entity Injection
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: ArticleFR CMS 3.0.5 - Arbitrary File Upload
|
This is a webapps exploit for php platform. Description: ArticleFR CMS 3.0.5 - Arbitrary File Upload. Author: TranDinhTien
|
Analyze the security implications of: ArticleFR CMS 3.0.5 - Arbitrary File Upload
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Apple Mail.app - Image Attachment Command Execution (Metasploit)
|
This is a remote exploit for multiple platform. Description: Apple Mail.app - Image Attachment Command Execution (Metasploit). Author: Metasploit
|
Analyze the security implications of: Apple Mail.app - Image Attachment Command Execution (Metasploit)
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Apple Safari Web Browser 1.x - Infinite Array Sort Denial of Service
|
This is a dos exploit for osx platform. Description: Apple Safari Web Browser 1.x - Infinite Array Sort Denial of Service. Author: Berend-Jan Wever
|
Analyze the security implications of: Apple Safari Web Browser 1.x - Infinite Array Sort Denial of Service
|
This exploit targets osx systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets osx platform
|
What is this exploit about: SixApart MovableType < 5.2.12 - Storable Perl Code Execution (Metasploit)
|
This is a webapps exploit for linux platform. Description: SixApart MovableType < 5.2.12 - Storable Perl Code Execution (Metasploit). Author: Metasploit
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.