input
stringlengths 39
228
| output
stringlengths 32
324
|
---|---|
Analyze the security implications of: Hospitals Patient Records Management System 1.0 - 'room_list' Stored Cross Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Online Work Order Suite Lite Edition - Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for asp platform. Description: Online Work Order Suite Lite Edition - Multiple Cross-Site Scripting Vulnerabilities. Author: Moudi |
Analyze the security implications of: Online Work Order Suite Lite Edition - Multiple Cross-Site Scripting Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: vqSoft vqServer 1.4.49 - Denial of Service | This is a dos exploit for multiple platform. Description: vqSoft vqServer 1.4.49 - Denial of Service. Author: sinfony |
Analyze the security implications of: vqSoft vqServer 1.4.49 - Denial of Service | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Back-End CMS 0.4.5 - 'Facts.php?includes_path' Remote File Inclusion | This is a webapps exploit for php platform. Description: Back-End CMS 0.4.5 - 'Facts.php?includes_path' Remote File Inclusion. Author: Root3r_H3ll |
Analyze the security implications of: Back-End CMS 0.4.5 - 'Facts.php?includes_path' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: BbZL.php 0.92 - Insecure Cookie Handling | This is a webapps exploit for php platform. Description: BbZL.php 0.92 - Insecure Cookie Handling. Author: Stack |
Analyze the security implications of: BbZL.php 0.92 - Insecure Cookie Handling | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Linux Kernel 3.13/3.14 (Ubuntu) - 'splice()' System Call Local Denial of Service | This is a dos exploit for linux platform. Description: Linux Kernel 3.13/3.14 (Ubuntu) - 'splice()' System Call Local Denial of Service. Author: Emeric Nasi |
Analyze the security implications of: Linux Kernel 3.13/3.14 (Ubuntu) - 'splice()' System Call Local Denial of Service | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Campsite 2.6.1 - 'ArticleTopic.php?g_documentRoot' Remote File Inclusion | This is a webapps exploit for php platform. Description: Campsite 2.6.1 - 'ArticleTopic.php?g_documentRoot' Remote File Inclusion. Author: anonymous |
Analyze the security implications of: Campsite 2.6.1 - 'ArticleTopic.php?g_documentRoot' Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Rough Auditing Tool for Security (RATS) 2.3 - Crash (PoC) | This is a dos exploit for linux platform. Description: Rough Auditing Tool for Security (RATS) 2.3 - Crash (PoC). Author: David Silveiro |
Analyze the security implications of: Rough Auditing Tool for Security (RATS) 2.3 - Crash (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Google Nest Cam 5.2.1
- Buffer Overflow Conditions Over Bluetooth LE | This is a dos exploit for hardware platform. Description: Google Nest Cam 5.2.1
- Buffer Overflow Conditions Over Bluetooth LE. Author: Jason Doyle |
Analyze the security implications of: Google Nest Cam 5.2.1
- Buffer Overflow Conditions Over Bluetooth LE | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Verso NetPerformer Frame Relay Access Device - Telnet Buffer Overflow | This is a dos exploit for multiple platform. Description: Verso NetPerformer Frame Relay Access Device - Telnet Buffer Overflow. Author: Arif Jatmoko |
Analyze the security implications of: Verso NetPerformer Frame Relay Access Device - Telnet Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CuteNews 1.4.6 - 'search.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: CuteNews 1.4.6 - 'search.php' Multiple Cross-Site Scripting Vulnerabilities. Author: Andrew Horton |
Analyze the security implications of: CuteNews 1.4.6 - 'search.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Acidcat CMS 3.5 - Multiple Vulnerabilities | This is a webapps exploit for asp platform. Description: Acidcat CMS 3.5 - Multiple Vulnerabilities. Author: LionTurk |
Analyze the security implications of: Acidcat CMS 3.5 - Multiple Vulnerabilities | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Aprox CMS Engine 5.1.0.4 - 'index.php' SQL Injection | This is a webapps exploit for php platform. Description: Aprox CMS Engine 5.1.0.4 - 'index.php' SQL Injection. Author: Mr.SQL |
Analyze the security implications of: Aprox CMS Engine 5.1.0.4 - 'index.php' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FlatNuke 2.5.5 - 'structure.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: FlatNuke 2.5.5 - 'structure.php' Multiple Cross-Site Scripting Vulnerabilities. Author: rgod |
Analyze the security implications of: FlatNuke 2.5.5 - 'structure.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Folder Lock 5.9.5 - Weak Password Encryption Local Information Disclosure | This is a webapps exploit for php platform. Description: Folder Lock 5.9.5 - Weak Password Encryption Local Information Disclosure. Author: Charalambous Glafkos |
Analyze the security implications of: Folder Lock 5.9.5 - Weak Password Encryption Local Information Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ICStudents 1.2 - 'key' SQL Injection | This is a webapps exploit for php platform. Description: ICStudents 1.2 - 'key' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: ICStudents 1.2 - 'key' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Cisco RV110W - Password Disclosure / Command Execution | This is a remote exploit for hardware platform. Description: Cisco RV110W - Password Disclosure / Command Execution. Author: RySh |
Analyze the security implications of: Cisco RV110W - Password Disclosure / Command Execution | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Firefox ESR 115.11 - PDF.js Arbitrary JavaScript execution | This is a remote exploit for multiple platform. Description: Firefox ESR 115.11 - PDF.js Arbitrary JavaScript execution. Author: Milad karimi |
Analyze the security implications of: Firefox ESR 115.11 - PDF.js Arbitrary JavaScript execution | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Ghostscript < 8.64 - 'gdevpdtb.c' Local Buffer Overflow | This is a local exploit for multiple platform. Description: Ghostscript < 8.64 - 'gdevpdtb.c' Local Buffer Overflow. Author: Wolfgang Hamann |
Analyze the security implications of: Ghostscript < 8.64 - 'gdevpdtb.c' Local Buffer Overflow | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Joomla! Component Akobook 2.3 - 'gbid' SQL Injection | This is a webapps exploit for php platform. Description: Joomla! Component Akobook 2.3 - 'gbid' SQL Injection. Author: Ab1i |
Analyze the security implications of: Joomla! Component Akobook 2.3 - 'gbid' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Bus Pass Management System 1.0 - Stored Cross-Site Scripting (XSS) | This is a webapps exploit for php platform. Description: Bus Pass Management System 1.0 - Stored Cross-Site Scripting (XSS). Author: Matteo Conti |
Analyze the security implications of: Bus Pass Management System 1.0 - Stored Cross-Site Scripting (XSS) | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: SHTTPD 1.38 - Filename Parse Error Information Disclosure | This is a remote exploit for multiple platform. Description: SHTTPD 1.38 - Filename Parse Error Information Disclosure. Author: Shay Priel |
Analyze the security implications of: SHTTPD 1.38 - Filename Parse Error Information Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Alibaba Clone Tritanium Version - 'news_desc.html' SQL Injection | This is a webapps exploit for php platform. Description: Alibaba Clone Tritanium Version - 'news_desc.html' SQL Injection. Author: IRAQ_JAGUAR |
Analyze the security implications of: Alibaba Clone Tritanium Version - 'news_desc.html' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PEGA Platform <= 7.2 ML0 - Missing Access Control / Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: PEGA Platform <= 7.2 ML0 - Missing Access Control / Cross-Site Scripting. Author: Daniel Correa |
Analyze the security implications of: PEGA Platform <= 7.2 ML0 - Missing Access Control / Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Wavemaker Studio 6.6 - Server-Side Request Forgery | This is a webapps exploit for java platform. Description: Wavemaker Studio 6.6 - Server-Side Request Forgery. Author: Gionathan Reale |
Analyze the security implications of: Wavemaker Studio 6.6 - Server-Side Request Forgery | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Joomla! Component Kochsuite 0.9.4 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component Kochsuite 0.9.4 - Remote File Inclusion. Author: camino |
Analyze the security implications of: Joomla! Component Kochsuite 0.9.4 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Adobe Flash Player 24.0.0.186 - 'ActionGetURL2' Out-of-Bounds Memory Corruption (1) | This is a dos exploit for multiple platform. Description: Adobe Flash Player 24.0.0.186 - 'ActionGetURL2' Out-of-Bounds Memory Corruption (1). Author: COSIG |
Analyze the security implications of: Adobe Flash Player 24.0.0.186 - 'ActionGetURL2' Out-of-Bounds Memory Corruption (1) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: PunkBuster < 1.229 - WebTool Service Remote Buffer Overflow (Denial of Service) (PoC) | This is a dos exploit for multiple platform. Description: PunkBuster < 1.229 - WebTool Service Remote Buffer Overflow (Denial of Service) (PoC). Author: Luigi Auriemma |
Analyze the security implications of: PunkBuster < 1.229 - WebTool Service Remote Buffer Overflow (Denial of Service) (PoC) | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CollegeManagementSystem-CMS 1.3 - 'batch' SQL Injection | This is a webapps exploit for php platform. Description: CollegeManagementSystem-CMS 1.3 - 'batch' SQL Injection. Author: cakes |
Analyze the security implications of: CollegeManagementSystem-CMS 1.3 - 'batch' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lua 5.3.5 - 'debug.upvaluejoin' Use After Free | This is a dos exploit for multiple platform. Description: Lua 5.3.5 - 'debug.upvaluejoin' Use After Free. Author: Fady Mohammed Osman |
Analyze the security implications of: Lua 5.3.5 - 'debug.upvaluejoin' Use After Free | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: cPanel 5/6/7/8/9 - 'dir' Cross-Site Scripting | This is a webapps exploit for cgi platform. Description: cPanel 5/6/7/8/9 - 'dir' Cross-Site Scripting. Author: Fable |
Analyze the security implications of: cPanel 5/6/7/8/9 - 'dir' Cross-Site Scripting | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: DiamondList - '/user/main/update_category?category[description]' Cross-Site Scripting | This is a webapps exploit for php platform. Description: DiamondList - '/user/main/update_category?category[description]' Cross-Site Scripting. Author: High-Tech Bridge SA |
Analyze the security implications of: DiamondList - '/user/main/update_category?category[description]' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CrossWind CyberScheduler 2.1 - websyncd Remote Buffer Overflow | This is a remote exploit for cgi platform. Description: CrossWind CyberScheduler 2.1 - websyncd Remote Buffer Overflow. Author: Enrique A. |
Analyze the security implications of: CrossWind CyberScheduler 2.1 - websyncd Remote Buffer Overflow | This exploit targets cgi systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: ADB Broadband Gateways / Routers - Privilege Escalation | This is a local exploit for hardware platform. Description: ADB Broadband Gateways / Routers - Privilege Escalation. Author: SEC Consult |
Analyze the security implications of: ADB Broadband Gateways / Routers - Privilege Escalation | This exploit targets hardware systems. Type: local. Risk level: Medium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.