CIRCL/vulnerability-severity-classification-roberta-base
Text Classification • 0.1B • Updated • 564 • 9
id stringlengths 12 47 | title stringlengths 0 256 ⌀ | description stringlengths 3 189k | cpes listlengths 0 5.42k | cvss_v4_0 float64 0 10 ⌀ | cvss_v3_1 float64 0 10 ⌀ | cvss_v3_0 float64 0 10 ⌀ | cvss_v2_0 float64 0 10 ⌀ | patch_commit_url stringlengths 36 232 ⌀ | source stringclasses 6
values |
|---|---|---|---|---|---|---|---|---|---|
GHSA-h4wc-p3wj-466q | A malicious actor may convince a victim to open a malicious USD file that may trigger an uninitialized variable which may result in code execution. | [] | null | 7.8 | null | null | null | github | |
GHSA-399c-wvqc-phrq | The BlackBerry Universal Device Service in BlackBerry Enterprise Service (BES) 10.0 through 10.1.2 does not properly restrict access to the JBoss Remote Method Invocation (RMI) interface, which allows remote attackers to upload and execute arbitrary packages via a request to port 1098. | [] | null | null | null | null | null | github | |
GHSA-mxqw-697j-9cv7 | In the Linux kernel, the following vulnerability has been resolved:scsi: ufs: core: Fix use-after free in init error and remove pathsdevm_blk_crypto_profile_init() registers a cleanup handler to run when
the associated (platform-) device is being released. For UFS, the
crypto private data and pointers are stored as par... | [] | null | 7.8 | null | null | null | github | |
CVE-2024-27940 | A vulnerability has been identified in RUGGEDCOM CROSSBOW (All versions < V5.5). The affected systems allow any authenticated user to send arbitrary SQL commands to the SQL server. An attacker could use this vulnerability to compromise the whole database. | [
"cpe:2.3:a:siemens:ruggedcom_crossbow:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null | cvelistv5 | |
CVE-2023-4311 | Vrm 360 3D Model Viewer <= 1.2.1 - Contributor+ Arbitrary File Upload Leading to RCE | The Vrm 360 3D Model Viewer WordPress plugin through 1.2.1 is vulnerable to arbitrary file upload due to insufficient checks in a plugin shortcode. | [
"cpe:2.3:a:maurice:vrm360:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null | null | cvelistv5 |
GHSA-qf32-jmjm-hhgw | A SQL Injection vulnerability was found in /index.php in PHPGurukul Pre-School Enrollment System v1.0, which allows remote attackers to execute arbitrary code via the visittime parameter. | [] | null | 7.5 | null | null | null | github | |
CVE-2018-5973 | SQL Injection exists in Professional Local Directory Script 1.0 via the sellers_subcategories.php IndustryID parameter, or the suppliers.php IndustryID or CategoryID parameter. | [
"cpe:2.3:a:eihitech:professional_local_directory_script:1.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null | cvelistv5 | |
CVE-2024-3316 | SourceCodester Computer Laboratory Management System view_category.php sql injection | A vulnerability was found in SourceCodester Computer Laboratory Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/category/view_category.php. The manipulation of the argument id leads to sql injection. The attack can be launched remote... | [
"cpe:2.3:a:computer_laboratory_management_system_project:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 | null | cvelistv5 |
GHSA-23v5-hjqv-hwj8 | IBM Security Secret Server 10.7 could disclose sensitive information included in installation files to an unauthorized user. IBM X-Force ID: 178182. | [] | null | null | null | null | null | github | |
GHSA-8jjr-g6fq-c5f8 | Directory traversal vulnerability in the CExpressViewerControl class in the DWF Viewer ActiveX control (AdView.dll 9.0.0.96), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to overwrite arbitrary files via "..\" sequences in the argument to the SaveAS method. | [] | null | null | null | null | null | github | |
GHSA-p46v-v5qj-j2jh | An issue was discovered in Sonatype Nexus Repository Manager 2.x before 2.14.17 and 3.x before 3.22.1. Admin users can retrieve the LDAP server system username/password (as configured in nxrm) in cleartext. | [] | null | null | null | null | null | github | |
CVE-2022-42340 | Adobe ColdFusion Improper Input Validation Arbitrary file system read | Adobe ColdFusion versions Update 14 (and earlier) and Update 4 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary file system read. Exploitation of this issue does not require user interaction. | [
"cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update10:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update11:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update12:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:u... | null | 7.5 | null | null | null | cvelistv5 |
CVE-2021-1008 | In addSubInfo of SubscriptionController.java, there is a possible way to force the user to make a factory reset due to a logic error in the code. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Androi... | [
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] | null | 4.4 | null | 2.1 | null | cvelistv5 | |
CVE-2024-7631 | Openshift-console: openshift console: path traversal | A flaw was found in the OpenShift Console, an endpoint for plugins to serve resources in multiple languages: /locales/resources.json. This endpoint's lng and ns parameters are used to construct a filepath in pkg/plugins/handlers unsafely.go#L112 Because of this unsafe filepath construction, an authenticated user can ma... | [
"cpe:/a:redhat:openshift:3.11",
"cpe:/a:redhat:openshift:4"
] | null | 4.3 | null | null | null | cvelistv5 |
GHSA-32v5-9qwr-hx42 | Vulnerability in the Oracle Hospitality Suite8 component of Oracle Hospitality Applications (subcomponent: XML Interface). Supported versions that are affected are 8.9.6, 8.10.2 and 8.11-8.14. Easily exploitable vulnerability allows low privileged attacker with network access via TCP/IP to compromise Oracle Hospitality... | [] | null | null | null | null | null | github | |
CVE-2018-8859 | Echelon SmartServer 1 all versions, SmartServer 2 all versions prior to release 4.11.007, i.LON 100 all versions, and i.LON 600 all versions. An attacker can bypass the required authentication specified in the security configuration file by including extra characters in the directory name when specifying the directory ... | [
"cpe:2.3:o:echelon:smartserver_1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:echelon:smartserver_1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:echelon:smartserver_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:echelon:smartserver_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:echelon:i.lon_100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:echelon:i.lon_100... | null | null | 9.8 | 7.5 | null | cvelistv5 | |
CVE-2024-1379 | Website Article Monetization By MageNet <= 1.0.11 - Unauthenticated Stored Cross-Site Scripting | The Website Article Monetization By MageNet plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'abp_auth_key' parameter in all versions up to, and including, 1.0.11 due to insufficient input sanitization and output escaping and a missing authorization check. This makes it possible for unauthentic... | [] | null | 6.1 | null | null | null | cvelistv5 |
GHSA-5fm5-f5m7-88f4 | A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP8). If configured in an insecure manner, the web server might be susceptible to a directory listing attack. | [] | null | null | null | null | null | github | |
GHSA-qm6x-9j4m-3gq8 | Cross-site scripting (XSS) vulnerability in MediaWiki 1.13.1, 1.12.0, and possibly other versions before 1.13.2 allows remote attackers to inject arbitrary web script or HTML via the useskin parameter to an unspecified component. | [] | null | null | null | null | null | github | |
GHSA-wjmf-cvm2-jrwm | Stack-based buffer overflow in the NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote attackers to obtain sensitive i... | [] | null | null | 7.3 | null | null | github | |
GHSA-263h-vjvc-gp4w | Rejected reason: Not used | [] | null | null | null | null | null | github | |
GHSA-7g6p-x2rr-6mm4 | Substance3D - Designer versions 14.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 7.8 | null | null | null | github | |
CVE-2020-3227 | Cisco IOx for IOS XE Software Privilege Escalation Vulnerability | A vulnerability in the authorization controls for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an unauthenticated, remote attacker to execute Cisco IOx API commands without proper authorization. The vulnerability is due to incorrect handling of requests for authorization tokens.... | [
"cpe:2.3:o:cisco:ios_xe:3.11.6e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios... | null | null | 9.8 | null | null | cvelistv5 |
GHSA-2c4m-g7rx-63q7 | set-in Affected by Prototype Pollution | SummaryA prototype pollution vulnerability exists in the the npm package set-in (>=2.0.1). Despite a previous fix that attempted to mitigate prototype pollution by checking whether user input contained a forbidden key, it is still possible to pollute Object.prototype via a crafted input using Array.prototype. This has ... | [] | 9.4 | null | null | null | null | github |
CVE-2022-43508 | Use-after free vulnerability exists in CX-Programmer v.9.77 and earlier, which may lead to information disclosure and/or arbitrary code execution by having a user to open a specially crafted CXP file. | [
"cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null | cvelistv5 | |
GHSA-8wf3-m6g4-jx6p | Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW07 allows an attacker to change some special parameters without authentication. This issue affects: WAGO 750-852 version FW07 and prior versions. WAGO 750-880/xxx-xxx version FW07 and prior versions. WAGO 750-881 version FW07 and prior ve... | [] | null | null | null | null | null | github | |
CVE-2024-10238 | fld->used_bytes without sanity check causes stack overflow | A security issue in the firmware image verification implementation
at Supermicro MBD-X12DPG-OA6. An attacker can upload a specially crafted image that will cause a stack overflow is caused by not checking fld->used_bytes. | [] | null | 7.2 | null | null | null | cvelistv5 |
GHSA-3wcm-vppv-p3q9 | IBM Jazz Team Server products could allow an authenticated user to obtain elevated privileges under certain configurations. IBM X-Force ID: 203025. | [] | null | 7.5 | null | null | null | github | |
CVE-2020-23986 | Github Read Me Stats commit 3c7220e4f7144f6cb068fd433c774f6db47ccb95 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the function renderError. | [
"cpe:2.3:a:github_readme_stats_project:github_readme_stats:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null | cvelistv5 | |
CVE-2023-47726 | IBM QRadar Suite improper input validation | IBM QRadar Suite Software 1.10.12.0 through 1.10.21.0 and IBM Cloud Pak for Security 1.10.12.0 through 1.10.21.0 could allow an authenticated user to execute certain arbitrary commands due to improper input validation. IBM X-Force ID: 272087. | [
"cpe:2.3:a:ibm:qradar_suite:1.10.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_suite:1.10.21.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_security:1.10.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_security:1.10.21.0:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null | cvelistv5 |
CVE-2008-7133 | Multiple cross-site scripting (XSS) vulnerabilities in onlinetools.org EasyImageCatalogue 1.3.1 allow remote attackers to inject arbitrary web script or HTML via the (1) search and (2) d index.php parameters to index.php, (3) dir parameter to thumber.php, and the d parameter to (4) describe.php and (5) addcomment.php. ... | [
"cpe:2.3:a:onlinetools:easyimagecatalogue:1.3.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null | cvelistv5 | |
CVE-2020-26560 | Bluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device, reflecting the authentication evidence from a Provisioner, to complete authentication without possessing the AuthValue, and potentially acquire a NetKey and AppKey. | [
"cpe:2.3:a:bluetooth:mesh_profile:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bluetooth:mesh_profile:1.0.1:*:*:*:*:*:*:*"
] | null | 8.1 | null | 4.8 | null | cvelistv5 | |
GHSA-p65g-hv37-ghrh | A vulnerability was found in doomsider shadow. It has been classified as problematic. Affected is an unknown function. The manipulation leads to denial of service. Attacking locally is a requirement. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated... | [] | null | 5.5 | null | null | null | github | |
CVE-2014-1703 | Use-after-free vulnerability in the WebSocketDispatcherHost::SendOrDrop function in content/browser/renderer_host/websocket_dispatcher_host.cc in the Web Sockets implementation in Google Chrome before 33.0.1750.149 might allow remote attackers to bypass the sandbox protection mechanism by leveraging an incorrect deleti... | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:33.0.1750.4:*:*:*:*:*:*:*"... | null | null | null | 7.5 | null | cvelistv5 | |
CVE-2025-39733 | team: replace team lock with rtnl lock | In the Linux kernel, the following vulnerability has been resolved:
team: replace team lock with rtnl lock
syszbot reports various ordering issues for lower instance locks and
team lock. Switch to using rtnl lock for protecting team device,
similar to bonding. Based on the patch by Tetsuo Handa. | [] | null | 5.5 | null | null | null | cvelistv5 |
CVE-2025-54495 | A reflected cross-site scripting (xss) vulnerability exists in the emailfailedjob functionality of MedDream PACS Premium 7.3.6.870. A specially crafted malicious url can lead to arbitrary javascript code execution. An attacker can provide a crafted URL to trigger this vulnerability. | [] | null | 6.1 | null | null | null | cvelistv5 | |
CVE-2006-4779 | PHP remote file inclusion vulnerability in includes/functions_portal.php in Vitrax Premodded phpBB 1.0.6-R3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. | [
"cpe:2.3:a:phpbb_group:vitrax_premodded_phpbb:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null | cvelistv5 | |
CVE-2025-53101 | ImageMagick has Stack Buffer Overflow in image.c | ImageMagick is free and open-source software used for editing and manipulating digital images. In versions prior to 7.1.2-0 and 6.9.13-26, in ImageMagick's `magick mogrify` command, specifying multiple consecutive `%d` format specifiers in a filename template causes internal pointer arithmetic to generate an address be... | [] | null | 7.4 | null | null | null | cvelistv5 |
RHSA-2020:1461 | Red Hat Security Advisory: nss-softokn security update | ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 8.1 | null | null | csaf_redhat |
GHSA-fgc6-r27g-4r9x | A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.3. An application may be able to execute arbitrary code with kernel privileges. | [] | null | null | null | null | null | github | |
CVE-2025-4619 | PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets | A denial-of-service (DoS) vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to reboot a firewall by sending a specially crafted packet through the dataplane. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode.
This issue is applicable to the PAN-O... | [
"cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h3:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h2:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h1:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:-:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:h5:*:*:*:*:*:*",
"c... | 6.6 | null | null | null | null | cvelistv5 |
CVE-2017-7352 | Stored Cross-site scripting (XSS) vulnerability in Pure Storage Purity 4.7.5 allows remote authenticated users to inject arbitrary web script or HTML via the "host" parameter on the 'System > Configuration > SNMP > Add SNMP Trap Manager' screen. | [
"cpe:2.3:a:purestorage:purity:4.7.5:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null | cvelistv5 | |
CVE-2021-21278 | Risk of code injection in RSSHub | RSSHub is an open source, easy to use, and extensible RSS feed generator. In RSSHub before version 7f1c430 (non-semantic versioning) there is a risk of code injection. Some routes use `eval` or `Function constructor`, which may be injected by the target site with unsafe code, causing server-side security issues The fix... | [
"cpe:2.3:a:rsshub:rsshub:*:*:*:*:*:node.js:*:*"
] | null | 8.6 | null | null | null | cvelistv5 |
GHSA-rr2v-hv85-27hv | Bitcoin Core 0.12.0 through 0.17.1 and Bitcoin Knots 0.12.0 through 0.17.x before 0.17.1.knots20181229 have Incorrect Access Control. Local users can exploit this to steal currency by binding the RPC IPv4 localhost port, and forwarding requests to the IPv6 localhost port. | [] | null | null | 5.5 | null | null | github | |
GHSA-6qjp-mm5c-mxxp | Due to lack of proper memory management, when a victim opens a manipulated Encapsulated Post Script (.eps, ai.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of d... | [] | null | 7.8 | null | null | null | github | |
CVE-2020-24987 | Tenda AC18 Router through V15.03.05.05_EN and through V15.03.05.19(6318) CN devices could cause a remote code execution due to incorrect authentication handling of vulnerable logincheck() function in /usr/lib/lua/ngx_authserver/ngx_wdas.lua file if the administrator UI Interface is set to "radius". | [
"cpe:2.3:o:tendacn:ac18_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:ac18:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 6.8 | null | cvelistv5 | |
CVE-2020-28906 | Incorrect File Permissions in Nagios XI 5.7.5 and earlier and Nagios Fusion 4.1.8 and earlier allows for Privilege Escalation to root. Low-privileged users are able to modify files that are included (aka sourced) by scripts executed by root. | [
"cpe:2.3:a:nagios:fusion:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9 | null | cvelistv5 | |
GHSA-p753-mpj8-9jcg | A logic issue in Intel Unite(R) Client for Android prior to version 4.0 may allow a remote attacker to potentially enable escalation of privilege via network access. | [] | null | null | null | null | null | github | |
GHSA-9838-c2wv-jc32 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in avalex GmbH avalex – Automatically secure legal texts plugin <= 3.0.3 versions. | [] | null | 4.8 | null | null | null | github | |
GHSA-qfpg-mw2p-44hg | An issue has been discovered in GitLab CE/EE affecting all versions from 13.2 before 18.0.6, 18.1 before 18.1.4, and 18.2 before 18.2.2 that could have allowed authenticated users to create a denial of service condition by sending specially crafted markdown payloads to the Wiki feature. | [] | null | 6.5 | null | null | null | github | |
GHSA-8xwv-54r7-jg42 | Memory leak in the web framework in the server in Cisco Unified Presence (CUP) allows remote attackers to cause a denial of service (memory consumption) via malformed TCP packets, aka Bug ID CSCug38080. | [] | null | null | null | null | null | github | |
GHSA-x84m-5cgj-h97g | Kofax Power PDF PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a... | [] | null | null | 7.8 | null | null | github | |
GHSA-864h-5wf6-hrwh | WolfCMS v0.8.3.1 allows XSS via an SVG file to /?/admin/plugin/file_manager/browse/. | [] | null | null | null | null | null | github | |
GHSA-433c-j67w-mcg5 | bvlc.c in skarg BACnet Protocol Stack bacserv 0.9.1 and 0.8.5 is affected by a Buffer Overflow because of a lack of packet-size validation. The affected component is bacserv BACnet/IP BVLC forwarded NPDU. The function bvlc_bdt_forward_npdu() calls bvlc_encode_forwarded_npdu() which copies the content from the request i... | [] | null | null | 9.8 | null | null | github | |
CVE-2020-8016 | race condition in the packaging of texlive-filesysten | A Race Condition Enabling Link Following vulnerability in the packaging of texlive-filesystem of SUSE Linux Enterprise Module for Desktop Applications 15-SP1, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows local users to corrupt fi... | [
"cpe:2.3:a:opensuse:texlive-filesystem:*:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:15:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp5:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:texlive-fil... | null | 4.9 | null | null | null | cvelistv5 |
CVE-2024-22472 | Long S0 frames received by 500 series Z-Wave devices may cause buffer overflow |
A buffer Overflow vulnerability in Silicon Labs 500 Series Z-Wave devices may allow Denial of Service, and potential Remote Code execution
This issue affects all versions of Silicon Labs 500 Series SDK prior to v6.85.2
running on Silicon Labs 500 series Z-wave devices.
| [
"cpe:2.3:a:silabs:z-wave_software_development_kit:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null | cvelistv5 |
CVE-2008-0043 | Format string vulnerability in Apple iPhoto before 7.1.2 allows remote attackers to execute arbitrary code via photocast subscriptions. | [
"cpe:2.3:a:apple:iphoto:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null | cvelistv5 | |
GHSA-3vx3-2qpf-jvhh | The Serious Slider WordPress plugin before 1.2.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | [] | null | 5.4 | null | null | null | github | |
CVE-2016-2457 | server/pm/UserManagerService.java in Wi-Fi in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-05-01 allows attackers to bypass intended restrictions on Wi-Fi configuration changes by leveraging guest access, aka internal bug 27411179. | [
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 | null | cvelistv5 | |
GHSA-hqjw-gwc4-63xm | www/soap/application/MCSoap/Logs.php in MailCleaner Community Edition 2018.08 allows remote attackers to execute arbitrary OS commands. | [] | null | null | 8.8 | null | null | github | |
GHSA-826p-4gcg-35vw | GeoTools has XML External Entity (XXE) Processing Vulnerability in XSD schema handling | SummaryGeoTools Schema class use of Eclipse XSD library to represent schema data structure is vulnerable to XML External Entity (XXE) exploit.ImpactThis impacts whoever exposes XML processing with ``gt-xsd-core`` involved in parsing, when the documents carry a reference to an external XML schema. The ``gt-xsd-core`` Sc... | [] | null | 9.9 | null | null | null | github |
ICSA-13-079-03 | Siemens WinCC TIA Portal Vulnerabilities | Siemens WinCC (TIA Portal) 11 uses a reversible algorithm for storing HMI web-application passwords in world-readable and world-writable files, which allows local users to obtain sensitive information by leveraging (1) physical access or (2) Sm@rt Server access. Cross-site scripting (XSS) vulnerability in the HMI web a... | [] | null | null | null | null | null | csaf_cisa |
CVE-2016-10634 | scala-standalone-bin is a Binary wrapper for ScalaJS. scala-standalone-bin downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network o... | [
"cpe:2.3:a:scalajs-standalone-bin_project:scalajs-standalone-bin:*:*:*:*:*:node.js:*:*"
] | null | null | 8.1 | 9.3 | null | cvelistv5 | |
CVE-2017-14892 | In the function msm_pcm_hw_params() in Android for MSM, Firefox OS for MSM, and QRD Android before 2017-09-19, the return value of q6asm_open_shared_io() is not checked properly potentially leading to a possible dangling pointer access. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null | cvelistv5 | |
CVE-2017-11796 | ChakraCore and Microsoft Edge in Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11797, ... | [
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 | null | cvelistv5 | |
GHSA-6wjr-cr9m-279q | Improper Access Control vulnerability in the patchesUpdate API as implemented in Bitdefender Endpoint Security Tools for Linux as a relay role allows an attacker to manipulate the remote address used for pulling patches. This issue affects: Bitdefender Endpoint Security Tools for Linux versions prior to 6.6.27.390; ver... | [] | null | 10 | null | null | null | github | |
CVE-2024-10973 | Keycloak: cli option for encrypted jgroups ignored | A vulnerability was found in Keycloak. The environment option `KC_CACHE_EMBEDDED_MTLS_ENABLED` does not work and the JGroups replication configuration is always used in plain text which can allow an attacker that has access to adjacent networks related to JGroups to read sensitive information. | [
"cpe:/a:redhat:build_keycloak:",
"cpe:/a:redhat:jboss_enterprise_application_platform:8",
"cpe:/a:redhat:jbosseapxp"
] | null | 5.7 | null | null | null | cvelistv5 |
GHSA-rr46-96rc-r6xm | Out-of-bounds write in parsing h.263+ format in librtppayload.so prior to SMR Oct-2024 Release 1 allows remote attackers to execute arbitrary code with system privilege. User interaction is required for triggering this vulnerability. | [] | null | 7.5 | null | null | null | github | |
ICSA-22-132-04 | Cambium Networks cnMaestro | The affected On-Premise cnMaestro allows an unauthenticated attacker to access the cnMaestro server and execute arbitrary code in the privileges of the web server. This lack of validation could allow an attacker to append arbitrary data to the logger command.CVE-2022-1357 has been assigned to this vulnerability. A CVSS... | [] | null | null | 7.1 | null | null | csaf_cisa |
GHSA-8r7v-mw7m-624x | Certain HP Print devices may be vulnerable to potential information disclosure, denial of service, or remote code execution. | [] | null | 9.8 | null | null | null | github | |
GHSA-v596-cf8q-xgjv | The Preloader Plus – WordPress Loading Screen Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access... | [] | null | 6.4 | null | null | null | github | |
CVE-2024-14024 | Video Station | An improper certificate validation vulnerability has been reported to affect Video Station. If an attacker gains local network access who have also gained an administrator account, they can then exploit the vulnerability to compromise the security of the system.
We have already fixed the vulnerability in the following... | [] | 0.1 | null | null | null | null | cvelistv5 |
CVE-2025-13844 | CWE-415: Double Free vulnerability exists that could cause heap memory corruption when the end user imports a malicious project file (SSD file) shared by the attacker into Rapsody. | [] | 8.4 | null | null | null | null | cvelistv5 | |
GHSA-94pm-3mm9-g7fq | In libxaac, there is a possible out of bounds read due to uninitialized data. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111050781 | [] | null | null | null | null | null | github | |
CVE-2018-0181 | Cisco Policy Suite for Mobile and Cisco Policy Suite Diameter Routing Agent Software Redis Server Unauthenticated Access Vulnerability | A vulnerability in the Redis implementation used by the Cisco Policy Suite for Mobile and Cisco Policy Suite Diameter Routing Agent software could allow an unauthenticated, remote attacker to modify key-value pairs for short-lived events stored by the Redis server. The vulnerability is due to improper authentication wh... | [
"cpe:2.3:a:cisco:cisco_policy_suite_diameter_routing_agent:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:cisco_policy_suite_for_mobile:13.0.0:*:*:*:*:*:*:*"
] | null | null | 7.3 | null | null | cvelistv5 |
CVE-2022-47443 | WordPress Multi Rating Plugin <= 5.0.5 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Daniel Powney Multi Rating plugin <= 5.0.5 versions. | [
"cpe:2.3:a:multi_rating_project:multi_rating:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null | cvelistv5 |
CVE-2013-3093 | ASUS RT-N56U devices allow CSRF. | [
"cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.374_979:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-n10u_firmware:3.0.0.4.374_168:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-n10u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n55u_firmware:3.0.0.4.374_1397:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n55u:... | null | 8.8 | null | 9.3 | null | cvelistv5 | |
GHSA-8xp2-qvq2-xhpx | An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp. | [] | null | 8.8 | null | null | null | github | |
CVE-2024-49517 | Substance3D - Painter | Heap-based Buffer Overflow (CWE-122) | Substance3D - Painter versions 10.1.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null | cvelistv5 |
CVE-2013-5573 | Cross-site scripting (XSS) vulnerability in the default markup formatter in Jenkins 1.523 allows remote attackers to inject arbitrary web script or HTML via the Description field in the user configuration. | [
"cpe:2.3:a:jenkins:jenkins:1.523:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null | cvelistv5 | |
GHSA-4h9q-5577-5432 | Certain NETGEAR devices are affected by authentication bypass. This affects D6220 before 1.0.0.28, D6400 before 1.0.0.60, D8500 before 1.0.3.29, R6250 before 1.0.4.8, R6400 before 1.0.1.22, R6400v2 before 1.0.2.32, R7100LG before 1.0.0.32, R7300DST before 1.0.0.52, R8300 before 1.0.2.94, and R8500 before 1.0.2.100. | [] | null | null | null | null | null | github | |
CVE-2011-1842 | dbus_backend/lsd.py in the D-Bus backend in language-selector before 0.6.7 does not validate the arguments to the (1) SetSystemDefaultLangEnv and (2) SetSystemDefaultLanguageEnv functions, which allows local users to gain privileges via shell metacharacters in a string argument, a different vulnerability than CVE-2011-... | [
"cpe:2.3:a:ubuntu:language-selector:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ubuntu:language-selector:0.0\\+baz20050531:*:*:*:*:*:*:*",
"cpe:2.3:a:ubuntu:language-selector:0.0\\+baz20050609:*:*:*:*:*:*:*",
"cpe:2.3:a:ubuntu:language-selector:0.0\\+baz20050614:*:*:*:*:*:*:*",
"cpe:2.3:a:ubuntu:language-selector:0.0\\+ba... | null | null | null | 7.2 | null | cvelistv5 | |
RHSA-2021:3173 | Red Hat Security Advisory: kernel security update | kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c kernel: race condition for removal of the HCI controller | [
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7 | null | null | null | csaf_redhat |
GHSA-8xvc-mxv2-c4gq | OTCMS 3.61 allows remote attackers to execute arbitrary PHP code via the accBackupDir parameter. | [] | null | null | 8.1 | null | null | github | |
GHSA-jghm-h6jr-7r5q | A remote cross-site scripting (XSS) vulnerability was identified in HPE Intelligent Management Center (iMC) PLAT version v7.3 (E0506). The vulnerability is fixed in Intelligent Management Center PLAT 7.3 E0605P04 or subsequent version. | [] | null | null | 6.1 | null | null | github | |
RHSA-2014:1834 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | 4.8 | null | null | csaf_redhat |
GHSA-5p4p-wvh9-4j82 | NVIDIA NeMo Curator for all platforms contains a vulnerability where a malicious file created by an attacker could allow code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering. | [] | null | 7.8 | null | null | null | github | |
CVE-2024-30042 | Microsoft Excel Remote Code Execution Vulnerability | Microsoft Excel Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:*:*",
"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:... | null | 7.8 | null | null | null | cvelistv5 |
GHSA-gmrg-vvgm-3rp4 | Integer overflow in Microsoft Publisher 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Publisher file that triggers an improper allocation-size calculation, aka "Publisher Integer Overflow Vulnerability." | [] | null | null | null | null | null | github | |
CVE-2023-39663 | Mathjax up to v2.7.9 was discovered to contain two Regular expression Denial of Service (ReDoS) vulnerabilities in MathJax.js via the components pattern and markdownPattern. NOTE: the vendor disputes this because the regular expressions are not applied to user input; thus, there is no risk. | [
"cpe:2.3:a:mathjax:mathjax:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null | cvelistv5 | |
CVE-2019-4129 | IBM Spectrum Protect Operations Center 7.1 and 8.1 could allow a remote attacker to obtain sensitive information, caused by an error message containing a stack trace. By creating an error with a stack trace, an attacker could exploit this vulnerability to potentially obtain details on the Operations Center architecture... | [
"cpe:2.3:a:ibm:spectrum_protect_operations_center:*:*:*:*:*:*:*:*"
] | null | null | 3.1 | null | null | cvelistv5 | |
GHSA-3vhm-q5hx-6hjp | The read_header function in libavcodec/ffv1dec.c in FFmpeg before 2.1 does not prevent changes to global parameters, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted FFV1 data. | [] | null | null | null | null | null | github | |
CVE-2026-21222 | Windows Kernel Information Disclosure Vulnerability | Insertion of sensitive information into log file in Windows Kernel allows an authorized attacker to disclose information locally. | [] | null | 5.5 | null | null | null | cvelistv5 |
GHSA-chc9-wpf7-cm4q | Cross-Site Request Forgery (CSRF) vulnerability in Uncanny Owl Uncanny Toolkit for LearnDash plugin <= 3.6.4.1 versions. | [] | null | 4.3 | null | null | null | github | |
GHSA-xm5p-cw89-f4rg | Smartwares cameras CIP-37210AT and C724IP, as well as others which share the same firmware in versions up to 3.3.0, might share same credentials for telnet service. Hash of the password can be retrieved through physical access to SPI connected memory.
For the telnet service to be enabled, the inserted SD card needs to ... | [] | 7.5 | null | null | null | null | github | |
CVE-2025-58729 | Windows Local Session Manager (LSM) Denial of Service Vulnerability | Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. | [] | null | 6.5 | null | null | null | cvelistv5 |
CVE-2020-17541 | Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service. | [
"cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null | cvelistv5 | |
CVE-2005-0081 | MySQL MaxDB 7.5.0.0, and other versions before 7.5.0.21, allows remote attackers to cause a denial of service (crash) via an HTTP request with invalid headers. | [
"cpe:2.3:a:mysql:maxdb:7.5.00:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:maxdb:7.5.00.08:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:maxdb:7.5.00.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:maxdb:7.5.00.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:maxdb:7.5.00.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:maxdb:7.5.00.15:*:*:*:*:*:*:*",
"cpe:2.3:a:my... | null | null | null | 5 | null | cvelistv5 | |
GHSA-jc4p-c566-vgxg | An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product.An attacker must first obtain the ability to execute low-privileged code on the target in order to explo... | [] | null | null | null | null | null | github | |
PYSEC-2006-3 | null | Cross-site request forgery (CSRF) vulnerability in Edgewall Trac 0.10 and earlier allows remote attackers to perform unauthorized actions as other users via unknown vectors. | [] | null | null | null | null | null | pysec |
This dataset comprises 699,117 real-world vulnerabilities used to train and evaluate VLAI, a transformer-based model designed to predict software vulnerability severity levels directly from text descriptions, enabling faster and more consistent triage.
The dataset is presented in the paper VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification.
| Source | Label | Entries | Share |
|---|---|---|---|
cvelistv5 |
CVE Program (enriched with vulnrichment and Fraunhofer FKIE) | 331,204 | 47.4% |
github |
GitHub Security Advisories | 330,956 | 47.3% |
csaf_redhat |
CSAF Red Hat | 23,986 | 3.4% |
csaf_cisa |
CSAF CISA | 5,825 | 0.8% |
csaf_cisco |
CSAF Cisco | 3,916 | 0.6% |
pysec |
PySec advisories | 3,230 | 0.5% |
Extracted from the database of Vulnerability-Lookup with the VulnTrain project. Dumps of the data are available here.
| Split | Examples |
|---|---|
| train | 629,205 |
| test | 69,912 |
| Field | Type | Description |
|---|---|---|
id |
string | Vulnerability identifier (e.g., CVE-2024-1234, GHSA-xxxx, PYSEC-2024-xxx) |
title |
string | Vulnerability title |
description |
string | Vulnerability description in English |
cpes |
list[string] | Common Platform Enumeration identifiers |
cvss_v4_0 |
float | CVSS v4.0 score |
cvss_v3_1 |
float | CVSS v3.1 score |
cvss_v3_0 |
float | CVSS v3.0 score |
cvss_v2_0 |
float | CVSS v2.0 score |
patch_commit_url |
string | URL to the patch commit on GitHub, if available |
source |
string | Data source identifier |
import json
from datasets import load_dataset
dataset = load_dataset("CIRCL/vulnerability-scores")
vulnerabilities = ["CVE-2012-2339", "RHSA-2023:5964", "GHSA-7chm-34j8-4f22", "PYSEC-2024-225"]
filtered_entries = dataset.filter(lambda elem: elem["id"] in vulnerabilities)
for entry in filtered_entries["train"]:
print(json.dumps(entry, indent=4))