input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Atlassian Jira - (Authenticated) Upload Code Execution (Metasploit) | This is a remote exploit for java platform. Description: Atlassian Jira - (Authenticated) Upload Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Atlassian Jira - (Authenticated) Upload Code Execution (Metasploit) | This exploit targets java systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Nagios XI 5.2.6-5.4.12 - Chained Remote Code Execution (Metasploit) | This is a remote exploit for linux platform. Description: Nagios XI 5.2.6-5.4.12 - Chained Remote Code Execution (Metasploit). Author: Metasploit |
Analyze the security implications of: Nagios XI 5.2.6-5.4.12 - Chained Remote Code Execution (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: emergecolab 1.0 - 'sitecode' Local File Inclusion | This is a webapps exploit for php platform. Description: emergecolab 1.0 - 'sitecode' Local File Inclusion. Author: dun |
Analyze the security implications of: emergecolab 1.0 - 'sitecode' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Muratsoft Haber Portal 3.6 - 'tr' SQL Injection | This is a webapps exploit for asp platform. Description: Muratsoft Haber Portal 3.6 - 'tr' SQL Injection. Author: ASIANEAGLE |
Analyze the security implications of: Muratsoft Haber Portal 3.6 - 'tr' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: amember 3.1.7 - Cross-Site Scripting / SQL Injection / HTML Injection | This is a webapps exploit for php platform. Description: amember 3.1.7 - Cross-Site Scripting / SQL Injection / HTML Injection. Author: intern0t |
Analyze the security implications of: amember 3.1.7 - Cross-Site Scripting / SQL Injection / HTML Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FubarForum 1.6 - Authentication Bypass Change User Password | This is a webapps exploit for php platform. Description: FubarForum 1.6 - Authentication Bypass Change User Password. Author: R31P0l |
Analyze the security implications of: FubarForum 1.6 - Authentication Bypass Change User Password | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DigitalHive - 'mt' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DigitalHive - 'mt' Cross-Site Scripting. Author: ViRuSMaN |
Analyze the security implications of: DigitalHive - 'mt' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JBoss & JMX Console - Misconfigured Deployment Scanner | This is a webapps exploit for jsp platform. Description: JBoss & JMX Console - Misconfigured Deployment Scanner. Author: y0ug |
Analyze the security implications of: JBoss & JMX Console - Misconfigured Deployment Scanner | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Frog CMS 0.9.5 - Cross-Site Scripting | This is a webapps exploit for php platform. Description: Frog CMS 0.9.5 - Cross-Site Scripting. Author: WangDudu |
Analyze the security implications of: Frog CMS 0.9.5 - Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: i-doit 1.12 - 'qr.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: i-doit 1.12 - 'qr.php' Cross-Site Scripting. Author: BlackFog Team |
Analyze the security implications of: i-doit 1.12 - 'qr.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BandSite CMS 1.1.4 - Download Backup / Cross-Site Scripting / Cross-Site Request Forgery | This is a webapps exploit for php platform. Description: BandSite CMS 1.1.4 - Download Backup / Cross-Site Scripting / Cross-Site Request Forgery. Author: SirGod |
Analyze the security implications of: BandSite CMS 1.1.4 - Download Backup / Cross-Site Scripting / Cross-Site Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CutePHP CuteNews 1.3.6 - 'x-forwarded-for' Script Injection | This is a webapps exploit for php platform. Description: CutePHP CuteNews 1.3.6 - 'x-forwarded-for' Script Injection. Author: FraMe |
Analyze the security implications of: CutePHP CuteNews 1.3.6 - 'x-forwarded-for' Script Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: GNU glibc 2.x - 'strfmon()' Integer Overflow | This is a dos exploit for linux platform. Description: GNU glibc 2.x - 'strfmon()' Integer Overflow. Author: Maksymilian Arciemowicz |
Analyze the security implications of: GNU glibc 2.x - 'strfmon()' Integer Overflow | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Blog 0.2.3/0.2.4 Mod - 'Weblog_posting.php' SQL Injection | This is a webapps exploit for php platform. Description: Blog 0.2.3/0.2.4 Mod - 'Weblog_posting.php' SQL Injection. Author: Qex |
Analyze the security implications of: Blog 0.2.3/0.2.4 Mod - 'Weblog_posting.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dragonfly CMS 9.0.6.1 Downloads Module - 'c' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Dragonfly CMS 9.0.6.1 Downloads Module - 'c' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: Dragonfly CMS 9.0.6.1 Downloads Module - 'c' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: JNM Guestbook 3.0 - 'index.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: JNM Guestbook 3.0 - 'index.php' Cross-Site Scripting. Author: Moudi |
Analyze the security implications of: JNM Guestbook 3.0 - 'index.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Discussion Web 4 - Remote Database Disclosure | This is a webapps exploit for asp platform. Description: Discussion Web 4 - Remote Database Disclosure. Author: Pouya_Server |
Analyze the security implications of: Discussion Web 4 - Remote Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Islam Sound IV2 - 'details.php' SQL Injection | This is a webapps exploit for php platform. Description: Islam Sound IV2 - 'details.php' SQL Injection. Author: ZxH-Labs |
Analyze the security implications of: Islam Sound IV2 - 'details.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Free Directory Script 1.1.1 - 'API_HOME_DIR' Remote File Inclusion | This is a webapps exploit for php platform. Description: Free Directory Script 1.1.1 - 'API_HOME_DIR' Remote File Inclusion. Author: Ghost Hacker |
Analyze the security implications of: Free Directory Script 1.1.1 - 'API_HOME_DIR' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache Tomcat - AJP 'Ghostcat File Read/Inclusion | This is a webapps exploit for multiple platform. Description: Apache Tomcat - AJP 'Ghostcat File Read/Inclusion. Author: YDHCUI |
Analyze the security implications of: Apache Tomcat - AJP 'Ghostcat File Read/Inclusion | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: LibreNMS - Collectd Command Injection (Metasploit) | This is a remote exploit for linux platform. Description: LibreNMS - Collectd Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: LibreNMS - Collectd Command Injection (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PeerCast 0.1211 - Remote Format String | This is a remote exploit for linux platform. Description: PeerCast 0.1211 - Remote Format String. Author: darkeagle |
Analyze the security implications of: PeerCast 0.1211 - Remote Format String | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: toutvirtual virtualiq pro 3.2 - Multiple Vulnerabilities | This is a webapps exploit for jsp platform. Description: toutvirtual virtualiq pro 3.2 - Multiple Vulnerabilities. Author: Alberto Trivero |
Analyze the security implications of: toutvirtual virtualiq pro 3.2 - Multiple Vulnerabilities | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: CMS Openpage - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: CMS Openpage - 'index.php' SQL Injection. Author: Phenom |
Analyze the security implications of: CMS Openpage - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: 4Images 1.7.9 - Multiple Remote File Inclusions / SQL Injections | This is a webapps exploit for php platform. Description: 4Images 1.7.9 - Multiple Remote File Inclusions / SQL Injections. Author: KedAns-Dz |
Analyze the security implications of: 4Images 1.7.9 - Multiple Remote File Inclusions / SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cacti 0.8.7 - 'data_input.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Cacti 0.8.7 - 'data_input.php' Cross-Site Scripting. Author: fgeek |
Analyze the security implications of: Cacti 0.8.7 - 'data_input.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FiberHome Modem Router HG-110 - Authentication Bypass To Remote Change DNS Servers | This is a remote exploit for hardware platform. Description: FiberHome Modem Router HG-110 - Authentication Bypass To Remote Change DNS Servers. Author: Javier Perez |
Analyze the security implications of: FiberHome Modem Router HG-110 - Authentication Bypass To Remote Change DNS Servers | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Content-Builder (CMS) 0.7.5 - Multiple Include Vulnerabilities | This is a webapps exploit for php platform. Description: Content-Builder (CMS) 0.7.5 - Multiple Include Vulnerabilities. Author: Federico Fazzi |
Analyze the security implications of: Content-Builder (CMS) 0.7.5 - Multiple Include Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Ananda Image Gallery - SQL Injection | This is a webapps exploit for asp platform. Description: Ananda Image Gallery - SQL Injection. Author: L0rd CrusAd3r |
Analyze the security implications of: Ananda Image Gallery - SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Mavi Emlak - 'newDetail.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Mavi Emlak - 'newDetail.asp' SQL Injection. Author: Sina Yazdanmehr |
Analyze the security implications of: Mavi Emlak - 'newDetail.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: CoSoSys Endpoint Protector - Predictable Password Generation | This is a remote exploit for hardware platform. Description: CoSoSys Endpoint Protector - Predictable Password Generation. Author: Christopher Campbell |
Analyze the security implications of: CoSoSys Endpoint Protector - Predictable Password Generation | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FaceTime - 'VCPDecompressionDecodeFrame' Memory Corruption | This is a dos exploit for macos platform. Description: FaceTime - 'VCPDecompressionDecodeFrame' Memory Corruption. Author: Google Security Research |
Analyze the security implications of: FaceTime - 'VCPDecompressionDecodeFrame' Memory Corruption | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Expinion.net News Manager Lite 2.5 - 'search.asp' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Expinion.net News Manager Lite 2.5 - 'search.asp' Cross-Site Scripting. Author: Manuel Lopez |
Analyze the security implications of: Expinion.net News Manager Lite 2.5 - 'search.asp' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Chicomas 2.0.4 - Database Backup / File Disclosure / Cross-Site Scripting | This is a webapps exploit for php platform. Description: Chicomas 2.0.4 - Database Backup / File Disclosure / Cross-Site Scripting. Author: BugReport.IR |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.