input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Hospitals Patient Records Management System 1.0 - 'room_list' Stored Cross Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Online Work Order Suite Lite Edition - Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for asp platform. Description: Online Work Order Suite Lite Edition - Multiple Cross-Site Scripting Vulnerabilities. Author: Moudi
|
Analyze the security implications of: Online Work Order Suite Lite Edition - Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: vqSoft vqServer 1.4.49 - Denial of Service
|
This is a dos exploit for multiple platform. Description: vqSoft vqServer 1.4.49 - Denial of Service. Author: sinfony
|
Analyze the security implications of: vqSoft vqServer 1.4.49 - Denial of Service
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Back-End CMS 0.4.5 - 'Facts.php?includes_path' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Back-End CMS 0.4.5 - 'Facts.php?includes_path' Remote File Inclusion. Author: Root3r_H3ll
|
Analyze the security implications of: Back-End CMS 0.4.5 - 'Facts.php?includes_path' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: BbZL.php 0.92 - Insecure Cookie Handling
|
This is a webapps exploit for php platform. Description: BbZL.php 0.92 - Insecure Cookie Handling. Author: Stack
|
Analyze the security implications of: BbZL.php 0.92 - Insecure Cookie Handling
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Linux Kernel 3.13/3.14 (Ubuntu) - 'splice()' System Call Local Denial of Service
|
This is a dos exploit for linux platform. Description: Linux Kernel 3.13/3.14 (Ubuntu) - 'splice()' System Call Local Denial of Service. Author: Emeric Nasi
|
Analyze the security implications of: Linux Kernel 3.13/3.14 (Ubuntu) - 'splice()' System Call Local Denial of Service
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Campsite 2.6.1 - 'ArticleTopic.php?g_documentRoot' Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'ArticleTopic.php?g_documentRoot' Remote File Inclusion. Author: anonymous
|
Analyze the security implications of: Campsite 2.6.1 - 'ArticleTopic.php?g_documentRoot' Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Rough Auditing Tool for Security (RATS) 2.3 - Crash (PoC)
|
This is a dos exploit for linux platform. Description: Rough Auditing Tool for Security (RATS) 2.3 - Crash (PoC). Author: David Silveiro
|
Analyze the security implications of: Rough Auditing Tool for Security (RATS) 2.3 - Crash (PoC)
|
This exploit targets linux systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets linux platform
|
What is this exploit about: Google Nest Cam 5.2.1
- Buffer Overflow Conditions Over Bluetooth LE
|
This is a dos exploit for hardware platform. Description: Google Nest Cam 5.2.1
- Buffer Overflow Conditions Over Bluetooth LE. Author: Jason Doyle
|
Analyze the security implications of: Google Nest Cam 5.2.1
- Buffer Overflow Conditions Over Bluetooth LE
|
This exploit targets hardware systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Verso NetPerformer Frame Relay Access Device - Telnet Buffer Overflow
|
This is a dos exploit for multiple platform. Description: Verso NetPerformer Frame Relay Access Device - Telnet Buffer Overflow. Author: Arif Jatmoko
|
Analyze the security implications of: Verso NetPerformer Frame Relay Access Device - Telnet Buffer Overflow
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CuteNews 1.4.6 - 'search.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: CuteNews 1.4.6 - 'search.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Andrew Horton
|
Analyze the security implications of: CuteNews 1.4.6 - 'search.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Acidcat CMS 3.5 - Multiple Vulnerabilities
|
This is a webapps exploit for asp platform. Description: Acidcat CMS 3.5 - Multiple Vulnerabilities. Author: LionTurk
|
Analyze the security implications of: Acidcat CMS 3.5 - Multiple Vulnerabilities
|
This exploit targets asp systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets asp platform
|
What is this exploit about: Aprox CMS Engine 5.1.0.4 - 'index.php' SQL Injection
|
This is a webapps exploit for php platform. Description: Aprox CMS Engine 5.1.0.4 - 'index.php' SQL Injection. Author: Mr.SQL
|
Analyze the security implications of: Aprox CMS Engine 5.1.0.4 - 'index.php' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: FlatNuke 2.5.5 - 'structure.php' Multiple Cross-Site Scripting Vulnerabilities
|
This is a webapps exploit for php platform. Description: FlatNuke 2.5.5 - 'structure.php' Multiple Cross-Site Scripting Vulnerabilities. Author: rgod
|
Analyze the security implications of: FlatNuke 2.5.5 - 'structure.php' Multiple Cross-Site Scripting Vulnerabilities
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Folder Lock 5.9.5 - Weak Password Encryption Local Information Disclosure
|
This is a webapps exploit for php platform. Description: Folder Lock 5.9.5 - Weak Password Encryption Local Information Disclosure. Author: Charalambous Glafkos
|
Analyze the security implications of: Folder Lock 5.9.5 - Weak Password Encryption Local Information Disclosure
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: ICStudents 1.2 - 'key' SQL Injection
|
This is a webapps exploit for php platform. Description: ICStudents 1.2 - 'key' SQL Injection. Author: Ihsan Sencan
|
Analyze the security implications of: ICStudents 1.2 - 'key' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Cisco RV110W - Password Disclosure / Command Execution
|
This is a remote exploit for hardware platform. Description: Cisco RV110W - Password Disclosure / Command Execution. Author: RySh
|
Analyze the security implications of: Cisco RV110W - Password Disclosure / Command Execution
|
This exploit targets hardware systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets hardware platform
|
What is this exploit about: Firefox ESR 115.11 - PDF.js Arbitrary JavaScript execution
|
This is a remote exploit for multiple platform. Description: Firefox ESR 115.11 - PDF.js Arbitrary JavaScript execution. Author: Milad karimi
|
Analyze the security implications of: Firefox ESR 115.11 - PDF.js Arbitrary JavaScript execution
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Ghostscript < 8.64 - 'gdevpdtb.c' Local Buffer Overflow
|
This is a local exploit for multiple platform. Description: Ghostscript < 8.64 - 'gdevpdtb.c' Local Buffer Overflow. Author: Wolfgang Hamann
|
Analyze the security implications of: Ghostscript < 8.64 - 'gdevpdtb.c' Local Buffer Overflow
|
This exploit targets multiple systems. Type: local. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Joomla! Component Akobook 2.3 - 'gbid' SQL Injection
|
This is a webapps exploit for php platform. Description: Joomla! Component Akobook 2.3 - 'gbid' SQL Injection. Author: Ab1i
|
Analyze the security implications of: Joomla! Component Akobook 2.3 - 'gbid' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Bus Pass Management System 1.0 - Stored Cross-Site Scripting (XSS)
|
This is a webapps exploit for php platform. Description: Bus Pass Management System 1.0 - Stored Cross-Site Scripting (XSS). Author: Matteo Conti
|
Analyze the security implications of: Bus Pass Management System 1.0 - Stored Cross-Site Scripting (XSS)
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: SHTTPD 1.38 - Filename Parse Error Information Disclosure
|
This is a remote exploit for multiple platform. Description: SHTTPD 1.38 - Filename Parse Error Information Disclosure. Author: Shay Priel
|
Analyze the security implications of: SHTTPD 1.38 - Filename Parse Error Information Disclosure
|
This exploit targets multiple systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Alibaba Clone Tritanium Version - 'news_desc.html' SQL Injection
|
This is a webapps exploit for php platform. Description: Alibaba Clone Tritanium Version - 'news_desc.html' SQL Injection. Author: IRAQ_JAGUAR
|
Analyze the security implications of: Alibaba Clone Tritanium Version - 'news_desc.html' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: PEGA Platform <= 7.2 ML0 - Missing Access Control / Cross-Site Scripting
|
This is a webapps exploit for multiple platform. Description: PEGA Platform <= 7.2 ML0 - Missing Access Control / Cross-Site Scripting. Author: Daniel Correa
|
Analyze the security implications of: PEGA Platform <= 7.2 ML0 - Missing Access Control / Cross-Site Scripting
|
This exploit targets multiple systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: Wavemaker Studio 6.6 - Server-Side Request Forgery
|
This is a webapps exploit for java platform. Description: Wavemaker Studio 6.6 - Server-Side Request Forgery. Author: Gionathan Reale
|
Analyze the security implications of: Wavemaker Studio 6.6 - Server-Side Request Forgery
|
This exploit targets java systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets java platform
|
What is this exploit about: Joomla! Component Kochsuite 0.9.4 - Remote File Inclusion
|
This is a webapps exploit for php platform. Description: Joomla! Component Kochsuite 0.9.4 - Remote File Inclusion. Author: camino
|
Analyze the security implications of: Joomla! Component Kochsuite 0.9.4 - Remote File Inclusion
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Adobe Flash Player 24.0.0.186 - 'ActionGetURL2' Out-of-Bounds Memory Corruption (1)
|
This is a dos exploit for multiple platform. Description: Adobe Flash Player 24.0.0.186 - 'ActionGetURL2' Out-of-Bounds Memory Corruption (1). Author: COSIG
|
Analyze the security implications of: Adobe Flash Player 24.0.0.186 - 'ActionGetURL2' Out-of-Bounds Memory Corruption (1)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: PunkBuster < 1.229 - WebTool Service Remote Buffer Overflow (Denial of Service) (PoC)
|
This is a dos exploit for multiple platform. Description: PunkBuster < 1.229 - WebTool Service Remote Buffer Overflow (Denial of Service) (PoC). Author: Luigi Auriemma
|
Analyze the security implications of: PunkBuster < 1.229 - WebTool Service Remote Buffer Overflow (Denial of Service) (PoC)
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: CollegeManagementSystem-CMS 1.3 - 'batch' SQL Injection
|
This is a webapps exploit for php platform. Description: CollegeManagementSystem-CMS 1.3 - 'batch' SQL Injection. Author: cakes
|
Analyze the security implications of: CollegeManagementSystem-CMS 1.3 - 'batch' SQL Injection
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: Lua 5.3.5 - 'debug.upvaluejoin' Use After Free
|
This is a dos exploit for multiple platform. Description: Lua 5.3.5 - 'debug.upvaluejoin' Use After Free. Author: Fady Mohammed Osman
|
Analyze the security implications of: Lua 5.3.5 - 'debug.upvaluejoin' Use After Free
|
This exploit targets multiple systems. Type: dos. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets multiple platform
|
What is this exploit about: cPanel 5/6/7/8/9 - 'dir' Cross-Site Scripting
|
This is a webapps exploit for cgi platform. Description: cPanel 5/6/7/8/9 - 'dir' Cross-Site Scripting. Author: Fable
|
Analyze the security implications of: cPanel 5/6/7/8/9 - 'dir' Cross-Site Scripting
|
This exploit targets cgi systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: DiamondList - '/user/main/update_category?category[description]' Cross-Site Scripting
|
This is a webapps exploit for php platform. Description: DiamondList - '/user/main/update_category?category[description]' Cross-Site Scripting. Author: High-Tech Bridge SA
|
Analyze the security implications of: DiamondList - '/user/main/update_category?category[description]' Cross-Site Scripting
|
This exploit targets php systems. Type: webapps. Risk level: Medium
|
What platform does this exploit target?
|
This exploit targets php platform
|
What is this exploit about: CrossWind CyberScheduler 2.1 - websyncd Remote Buffer Overflow
|
This is a remote exploit for cgi platform. Description: CrossWind CyberScheduler 2.1 - websyncd Remote Buffer Overflow. Author: Enrique A.
|
Analyze the security implications of: CrossWind CyberScheduler 2.1 - websyncd Remote Buffer Overflow
|
This exploit targets cgi systems. Type: remote. Risk level: High
|
What platform does this exploit target?
|
This exploit targets cgi platform
|
What is this exploit about: ADB Broadband Gateways / Routers - Privilege Escalation
|
This is a local exploit for hardware platform. Description: ADB Broadband Gateways / Routers - Privilege Escalation. Author: SEC Consult
|
Analyze the security implications of: ADB Broadband Gateways / Routers - Privilege Escalation
|
This exploit targets hardware systems. Type: local. Risk level: Medium
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.