input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: KiviCare Clinic & Patient Management System (EHR) 3.6.4 - Unauthenticated SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Dora Emlak 1.0 Script - Multiple Input Validation Vulnerabilities | This is a webapps exploit for asp platform. Description: Dora Emlak 1.0 Script - Multiple Input Validation Vulnerabilities. Author: GeFORC3 |
Analyze the security implications of: Dora Emlak 1.0 Script - Multiple Input Validation Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component JE Portfolio Creator 1.2 - 'd_itemid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component JE Portfolio Creator 1.2 - 'd_itemid' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Joomla! Component JE Portfolio Creator 1.2 - 'd_itemid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Joomla! Component com_seek - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component com_seek - 'id' SQL Injection. Author: DevilZ TM |
Analyze the security implications of: Joomla! Component com_seek - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: QiHang Media Web Digital Signage 3.0.9 - Remote Code Execution (Unauthenticated) | This is a webapps exploit for hardware platform. Description: QiHang Media Web Digital Signage 3.0.9 - Remote Code Execution (Unauthenticated). Author: LiquidWorm |
Analyze the security implications of: QiHang Media Web Digital Signage 3.0.9 - Remote Code Execution (Unauthenticated) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Seowon 130-SLC router 1.0.11 - 'ipAddr' RCE (Authenticated) | This is a webapps exploit for hardware platform. Description: Seowon 130-SLC router 1.0.11 - 'ipAddr' RCE (Authenticated). Author: maj0rmil4d |
Analyze the security implications of: Seowon 130-SLC router 1.0.11 - 'ipAddr' RCE (Authenticated) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Linux Kernel 2.6.32 (Ubuntu 10.04) - '/proc' Handling SUID Privilege Escalation | This is a local exploit for linux platform. Description: Linux Kernel 2.6.32 (Ubuntu 10.04) - '/proc' Handling SUID Privilege Escalation. Author: halfdog |
Analyze the security implications of: Linux Kernel 2.6.32 (Ubuntu 10.04) - '/proc' Handling SUID Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Stelian Pop dump 0.4 - restore Buffer Overflow | This is a local exploit for linux platform. Description: Stelian Pop dump 0.4 - restore Buffer Overflow. Author: Stan Bubrouski |
Analyze the security implications of: Stelian Pop dump 0.4 - restore Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: ManageEngine Firewall Analyzer 7.2 - '/fw/index2.do' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for java platform. Description: ManageEngine Firewall Analyzer 7.2 - '/fw/index2.do' Multiple Cross-Site Scripting Vulnerabilities. Author: Vulnerability Research Laboratory |
Analyze the security implications of: ManageEngine Firewall Analyzer 7.2 - '/fw/index2.do' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Active Bids - 'search' Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Active Bids - 'search' Cross-Site Scripting. Author: Pouya_Server |
Analyze the security implications of: Active Bids - 'search' Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: CartWIZ 1.10 - 'login.asp' Redirect Argument Cross-Site Scripting | This is a webapps exploit for asp platform. Description: CartWIZ 1.10 - 'login.asp' Redirect Argument Cross-Site Scripting. Author: Dcrab |
Analyze the security implications of: CartWIZ 1.10 - 'login.asp' Redirect Argument Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Kallithea 0.2.9 - 'came_from' HTTP Response Splitting | This is a webapps exploit for multiple platform. Description: Kallithea 0.2.9 - 'came_from' HTTP Response Splitting. Author: LiquidWorm |
Analyze the security implications of: Kallithea 0.2.9 - 'came_from' HTTP Response Splitting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: FlashChat - 'connection.php' Role Filter Security Bypass | This is a webapps exploit for php platform. Description: FlashChat - 'connection.php' Role Filter Security Bypass. Author: eLiSiA |
Analyze the security implications of: FlashChat - 'connection.php' Role Filter Security Bypass | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Contrexx ShopSystem 2.2 SP3 - 'catId' Blind SQL Injection | This is a webapps exploit for php platform. Description: Contrexx ShopSystem 2.2 SP3 - 'catId' Blind SQL Injection. Author: Penguin |
Analyze the security implications of: Contrexx ShopSystem 2.2 SP3 - 'catId' Blind SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Flexmonster Pivot Table & Charts 2.7.17 - 'To remote CSV' Reflected XSS | This is a webapps exploit for multiple platform. Description: Flexmonster Pivot Table & Charts 2.7.17 - 'To remote CSV' Reflected XSS. Author: Marco Nappi |
Analyze the security implications of: Flexmonster Pivot Table & Charts 2.7.17 - 'To remote CSV' Reflected XSS | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Cisco CallManager 4.1 - Search Form Cross-Site Scripting | This is a webapps exploit for asp platform. Description: Cisco CallManager 4.1 - Search Form Cross-Site Scripting. Author: Marc Ruef |
Analyze the security implications of: Cisco CallManager 4.1 - Search Form Cross-Site Scripting | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Gradman 0.1.3 - 'info.php' Local File Inclusion | This is a webapps exploit for php platform. Description: Gradman 0.1.3 - 'info.php' Local File Inclusion. Author: Syndr0me |
Analyze the security implications of: Gradman 0.1.3 - 'info.php' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BlueCat Networks Adonis 5.0.2.8 - CLI Privilege Escalation | This is a local exploit for linux platform. Description: BlueCat Networks Adonis 5.0.2.8 - CLI Privilege Escalation. Author: forloop |
Analyze the security implications of: BlueCat Networks Adonis 5.0.2.8 - CLI Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple Mac OSX 10.x - BlueTooth Directory Traversal | This is a remote exploit for osx platform. Description: Apple Mac OSX 10.x - BlueTooth Directory Traversal. Author: Kevin Finisterre |
Analyze the security implications of: Apple Mac OSX 10.x - BlueTooth Directory Traversal | This exploit targets osx systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets osx platform |
What is this exploit about: Limbo CMS - Private Messaging Component SQL Injection | This is a webapps exploit for php platform. Description: Limbo CMS - Private Messaging Component SQL Injection. Author: StAkeR |
Analyze the security implications of: Limbo CMS - Private Messaging Component SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Juniper Junos 8.5/9.0 J-Web Interface - '/diagnose' Multiple Cross-Site Scripting Vulnerabilities | This is a remote exploit for hardware platform. Description: Juniper Junos 8.5/9.0 J-Web Interface - '/diagnose' Multiple Cross-Site Scripting Vulnerabilities. Author: Amir Azam |
Analyze the security implications of: Juniper Junos 8.5/9.0 J-Web Interface - '/diagnose' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Bitweaver 1.x - '/blogs/list_blogs.php?sort_mode' SQL Injection | This is a webapps exploit for php platform. Description: Bitweaver 1.x - '/blogs/list_blogs.php?sort_mode' SQL Injection. Author: laurent gaffie |
Analyze the security implications of: Bitweaver 1.x - '/blogs/list_blogs.php?sort_mode' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Alkacon OpenCMS 7.x - Multiple Input Validation Vulnerabilities | This is a webapps exploit for php platform. Description: Alkacon OpenCMS 7.x - Multiple Input Validation Vulnerabilities. Author: Katie French |
Analyze the security implications of: Alkacon OpenCMS 7.x - Multiple Input Validation Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache Tomcat 5.5.15 - cal2.jsp Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Apache Tomcat 5.5.15 - cal2.jsp Cross-Site Scripting. Author: Tushar Vartak |
Analyze the security implications of: Apache Tomcat 5.5.15 - cal2.jsp Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: OpenSSH < 6.6 SFTP - Command Execution | This is a remote exploit for linux platform. Description: OpenSSH < 6.6 SFTP - Command Execution. Author: SECFORCE |
Analyze the security implications of: OpenSSH < 6.6 SFTP - Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: PHP 5.0.0 - 'xmldocfile()' Local Denial of Service | This is a dos exploit for php platform. Description: PHP 5.0.0 - 'xmldocfile()' Local Denial of Service. Author: Yakir Wizman |
Analyze the security implications of: PHP 5.0.0 - 'xmldocfile()' Local Denial of Service | This exploit targets php systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Android - ashmem Readonly Bypasses via remap_file_pages() and ASHMEM_UNPIN | This is a dos exploit for android platform. Description: Android - ashmem Readonly Bypasses via remap_file_pages() and ASHMEM_UNPIN. Author: Google Security Research |
Analyze the security implications of: Android - ashmem Readonly Bypasses via remap_file_pages() and ASHMEM_UNPIN | This exploit targets android systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets android platform |
What is this exploit about: LaVague 0.3 - 'printbar.php?views_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: LaVague 0.3 - 'printbar.php?views_path' Remote File Inclusion. Author: kezzap66345 |
Analyze the security implications of: LaVague 0.3 - 'printbar.php?views_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BrightSign Digital Signage Diagnostic Web Server 8.2.26 - Server-Side Request Forgery (Unauthenticated) | This is a webapps exploit for hardware platform. Description: BrightSign Digital Signage Diagnostic Web Server 8.2.26 - Server-Side Request Forgery (Unauthenticated). Author: LiquidWorm |
Analyze the security implications of: BrightSign Digital Signage Diagnostic Web Server 8.2.26 - Server-Side Request Forgery (Unauthenticated) | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: verlihub 0.9.8d-RC2 - Remote Command Execution | This is a remote exploit for linux platform. Description: verlihub 0.9.8d-RC2 - Remote Command Execution. Author: v4lkyrius |
Analyze the security implications of: verlihub 0.9.8d-RC2 - Remote Command Execution | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: AWCM 2.x - 'search.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: AWCM 2.x - 'search.php' Cross-Site Scripting. Author: Antu Sanadi |
Analyze the security implications of: AWCM 2.x - 'search.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CodeThatShoppingCart 1.3.1 - 'catalog.php?id' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CodeThatShoppingCart 1.3.1 - 'catalog.php?id' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: CodeThatShoppingCart 1.3.1 - 'catalog.php?id' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DMXReady Blog Manager 1.1 - Remote File Delete | This is a webapps exploit for php platform. Description: DMXReady Blog Manager 1.1 - Remote File Delete. Author: ajann |
Analyze the security implications of: DMXReady Blog Manager 1.1 - Remote File Delete | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash - SetNative Use-After-Free | This is a dos exploit for multiple platform. Description: Adobe Flash - SetNative Use-After-Free. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - SetNative Use-After-Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.