CIRCL/vulnerability-severity-classification-roberta-base
Text Classification • 0.1B • Updated • 851 • 9
id stringlengths 12 47 | title stringlengths 0 256 ⌀ | description stringlengths 3 189k | cpes listlengths 0 5.42k | cvss_v4_0 float64 0 10 ⌀ | cvss_v3_1 float64 0 10 ⌀ | cvss_v3_0 float64 0 10 ⌀ | cvss_v2_0 float64 0 10 ⌀ | patch_commit_url stringlengths 36 232 ⌀ | source stringclasses 6
values |
|---|---|---|---|---|---|---|---|---|---|
GHSA-cmh2-2g79-cxcq | The function "Token& Scanner::peek" in scanner.cpp in yaml-cpp 0.5.3 and earlier allows remote attackers to cause a denial of service (assertion failure and application exit) via a '!2' string. | [] | null | null | 7.5 | null | null | github | |
CVE-2010-0717 | The default configuration of cfg.packagepages_actions_excluded in MoinMoin before 1.8.7 does not prevent unsafe package actions, which has unspecified impact and attack vectors. | [
"cpe:2.3:a:moinmo:moinmoin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta4:*:*:*:*:*:*",
... | null | null | null | 7.5 | null | cvelistv5 | |
GHSA-xvx6-rgcr-cjh6 | The MDx theme for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mdx_list_item' shortcode in all versions up to, and including, 2.0.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-lev... | [] | null | 6.4 | null | null | null | github | |
GHSA-pf85-6vfc-9453 | BMC Smart Reporting 7.3 20180418 allows authenticated XXE within the import functionality. One can import a malicious XML file and perform XXE attacks to download local files from the server, or do DoS attacks with XML expansion attacks. XXE with direct response and XXE OOB are allowed. | [] | null | 6.5 | null | null | null | github | |
GHSA-8vm8-w94h-5m67 | Subrion CMS 4.0.5 has CSRF in admin/blog/add/. The attacker can add any tag, and can optionally insert XSS via the tags parameter. | [] | null | null | 8.8 | null | null | github | |
GHSA-jq52-rw89-pc3g | Alps Alpine Touchpad Driver 10.3201.101.215 is vulnerable to DLL Injection. | [] | null | 7.8 | null | null | null | github | |
CVE-2023-5430 | Jquery news ticker <= 3.0 - Authenticated (Subscriber+) SQL Injection via Shortcode | The Jquery news ticker plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 3.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with su... | [
"cpe:2.3:a:gopiplus:jquery_news_ticker:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null | null | cvelistv5 |
GHSA-w7hw-fm35-mf9m | An open redirect issue was discovered in Kibana that could lead to a user being redirected to an arbitrary website if they use a maliciously crafted Kibana URL. | [] | null | 6.1 | null | null | null | github | |
CVE-2015-8152 | Cross-site request forgery (CSRF) vulnerability in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6-MP4 allows remote authenticated users to hijack the authentication of administrators for requests that execute arbitrary code by adding lines to a logging script. | [
"cpe:2.3:a:symantec:endpoint_protection_manager:*:ru6-mp4:*:*:*:*:*:*"
] | null | null | 8 | 8.5 | null | cvelistv5 | |
CVE-2025-32792 | ses's global contour bindings leak into Compartment lexical scope | SES safely executes third-party JavaScript 'strict' mode programs in compartments that have no excess authority in their global scope. Prior to version 1.12.0, web pages and web extensions using `ses` and the Compartment API to evaluate third-party code in an isolated execution environment that have also elsewhere used... | [] | 8.7 | null | null | null | null | cvelistv5 |
CVE-2023-40372 | IBM Db2 denial of service | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to denial of service with a specially crafted SQL statement using External Tables. IBM X-Force ID: 263499. | [
"cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null | cvelistv5 |
CVE-2009-4847 | Deliantra Server before 2.82 allows remote authenticated users to cause a denial of service (daemon crash) via vectors involving an empty treasure list. | [
"cpe:2.3:a:deliantra:deliantra:*:*:*:*:*:*:*:*",
"cpe:2.3:a:deliantra:deliantra:0.99:*:*:*:*:*:*:*",
"cpe:2.3:a:deliantra:deliantra:0.9955:*:*:*:*:*:*:*",
"cpe:2.3:a:deliantra:deliantra:0.9956:*:*:*:*:*:*:*",
"cpe:2.3:a:deliantra:deliantra:0.9959:*:*:*:*:*:*:*",
"cpe:2.3:a:deliantra:deliantra:0.9960:*:*:*... | null | null | null | 4 | null | cvelistv5 | |
CVE-2016-2814 | Heap-based buffer overflow in the stagefright::SampleTable::parseSampleCencInfo function in libstagefright in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code via crafted CENC offsets that lead to mismanagement of the sizes tab... | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:... | null | null | 8.8 | 6.8 | null | cvelistv5 | |
GHSA-5xc8-cv7x-vq3g | The Columns by BestWebSoft plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' shortcode attribute of the [print_clmns] shortcode in all versions up to and including 1.0.3. This is due to insufficient input sanitization and output escaping on the 'id' attribute. The shortcode receives the 'id... | [] | null | 6.4 | null | null | null | github | |
GHSA-w957-wf7w-cwmp | A flaw has been found in AMTT Hotel Broadband Operation System 1.0. The impacted element is an unknown function of the file /user/portal/get_firstdate.php. Executing manipulation of the argument uid can lead to sql injection. It is possible to launch the attack remotely. The exploit has been published and may be used. ... | [] | 2.1 | 6.3 | null | null | null | github | |
CVE-2021-1412 | Cisco Identity Services Engine Sensitive Information Disclosure Vulnerabilities | Multiple vulnerabilities in the Admin portal of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information. These vulnerabilities are due to improper enforcement of administrator privilege levels for sensitive data. An attacker with read-only administrator access ... | [
"cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.3.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.3.... | null | 6.5 | null | null | null | cvelistv5 |
CVE-2018-9161 | Prisma Industriale Checkweigher PrismaWEB 1.21 allows remote attackers to discover the hardcoded prisma password for the prismaweb account by reading user/scripts/login_par.js. | [
"cpe:2.3:a:prismaindustriale:checkweigher_prismaweb:1.21:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null | cvelistv5 | |
CVE-2021-21007 | Uncontrolled search path element vulnerability in Illustrator 25.0 could lead to arbitrary code execution | Adobe Illustrator version 25.0 (and earlier) is affected by an uncontrolled search path element that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7 | null | null | null | cvelistv5 |
GHSA-r6pw-rw8p-5cr9 | In the Linux kernel, the following vulnerability has been resolved:vt: Clear selection before changing the fontWhen changing the console font with ioctl(KDFONTOP) the new font size
can be bigger than the previous font. A previous selection may thus now
be outside of the new screen size and thus trigger out-of-bounds
ac... | [] | null | 7.1 | null | null | null | github | |
GHSA-4h5v-5ww8-f945 | The feiron (aka es.sw.feironmobile.app) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null | null | github | |
CVE-2022-1764 | WP-chgFontSize <= 1.8 - Arbitrary Settings Update via CSRF to Stored XSS | The WP-chgFontSize WordPress plugin through 1.8 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping | [
"cpe:2.3:a:wp-chgfontsize_project:wp-chgfontsize:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | 3.5 | null | cvelistv5 |
GHSA-6p5q-h963-pwwf | Apache AGE: Python and Golang drivers allow data manipulation and exposure due to SQL injection | There are issues with the AGE drivers for Golang and Python that enable SQL injections to occur. This impacts AGE for PostgreSQL 11 & AGE for PostgreSQL 12, all versions up-to-and-including 1.1.0, when using those drivers. The fix is to update to the latest Golang and Python drivers in addition to the latest version of... | [] | null | 8.1 | null | null | null | github |
GHSA-r6j7-prqg-pp3v | In the Linux kernel before 4.13.5, a local user could create keyrings for other users via keyctl commands, setting unwanted defaults or causing a denial of service. | [] | null | null | 7.1 | null | null | github | |
GHSA-389x-wmfp-32w9 | SQL injection vulnerability in the Webmail Plus module for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [] | null | null | null | null | null | github | |
CVE-2009-4783 | Multiple SQL injection vulnerabilities in Theeta CMS, possibly 0.01, allow remote attackers to execute arbitrary SQL commands via the start parameter to (1) forum.php and (2) thread.php in community/, and (3) blog/index.php. | [
"cpe:2.3:a:mntechsolutions:theeta_cms:0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mntechsolutions:theeta_cms:0.01:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null | cvelistv5 | |
GHSA-78qh-4227-qc45 | SQL Injection vulnerability in flatCore version 1.4.6 allows an attacker to read and write to the users database. | [] | null | null | 9.8 | null | null | github | |
CVE-2012-1687 | Unspecified vulnerability in Oracle Solaris 10 and 11 allows local users to affect integrity and availability, related to Logical Domains (LDOM). | [
"cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.11:*:*:*:*:*:*:*"
] | null | null | null | 5.6 | null | cvelistv5 | |
GHSA-w6hh-2vxj-xw69 | A type confusion vulnerability vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a Lock object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the... | [] | null | 8.8 | null | null | null | github | |
GHSA-68qg-cgxp-wxcf | The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request. | [] | null | null | null | null | null | github | |
GHSA-j6gg-2g8r-32vf | Multiple SQL injection vulnerabilities in ActiveNews Manager allow remote attackers to execute arbitrary SQL commands via the (1) articleID parameter to activenews_view.asp or the (2) page parameter to default.asp. NOTE: the activeNews_categories.asp and activeNews_comments.asp vectors are already covered by CVE-2006-... | [] | null | null | null | null | null | github | |
GHSA-fp8m-5h9q-mjmp | The mostActiveCommitters.do resource in Atlassian Fisheye and Crucible, before version 4.4.1 allows anonymous remote attackers to access sensitive information, for example email addresses of committers, as it lacked permission checks. | [] | null | null | 7.5 | null | null | github | |
GHSA-9344-383f-rw33 | Online Examination System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'feedback' parameter of the feed.php resource does not validate the characters received and they are sent unfiltered to the database. | [] | null | 9.8 | null | null | null | github | |
GHSA-p42c-v7q9-397h | An security agent resource exhaustion denial-of-service vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow an attacker to flood a temporary log location and consume all disk ... | [] | null | null | null | null | null | github | |
CVE-2016-1247 | The nginx package before 1.6.2-5+deb8u3 on Debian jessie, the nginx packages before 1.4.6-1ubuntu3.6 on Ubuntu 14.04 LTS, before 1.10.0-0ubuntu0.16.04.3 on Ubuntu 16.04 LTS, and before 1.10.1-0ubuntu1.1 on Ubuntu 16.10, and the nginx ebuild before 1.10.2-r3 on Gentoo allow local users with access to the web server user... | [
"cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:... | null | 7.8 | null | 7.2 | null | cvelistv5 | |
GHSA-wgmv-5488-h5p5 | The Drag and Drop Multiple File Upload – Contact Form 7 plugin for WordPress is vulnerable to limited arbitrary file deletion due to insufficient file path validation in the dnd_codedropz_upload_delete() function in all versions up to, and including, 1.3.8.5. This makes it possible for unauthenticated attackers to dele... | [] | null | 5.3 | null | null | null | github | |
GHSA-2wv5-fxxc-g48c | The Bug Genie before 3.2.6 has Multiple XSS and HTML Injection Vulnerabilities | [] | null | null | null | null | null | github | |
GHSA-9qcg-p796-2q2v | On version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3, 14.1.x before 14.1.4.1, 13.1.x before 13.1.4, 12.1.x before 12.1.6, and 11.6.x before 11.6.5.3, an authenticated user may perform a privilege escalation on the BIG-IP Advanced WAF and ASM Configuration utility. Note: Software versions which have reached End of Te... | [] | null | null | null | null | null | github | |
GHSA-6jxx-g5pf-9mhg | The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, watchOS 9.6. Processing web content may disclose sensitive information. | [] | null | 7.8 | null | null | null | github | |
CVE-2009-2949 | Integer overflow in the XPMReader::ReadXPM function in filter.vcl/ixpm/svt_xpmread.cxx in OpenOffice.org (OOo) before 3.2 allows remote attackers to execute arbitrary code via a crafted XPM file that triggers a heap-based buffer overflow. | [
"cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:*:... | null | null | null | 9.3 | null | cvelistv5 | |
GHSA-527c-8rxj-jcj9 | InfBlocks.java in JCraft JZlib before 0.0.7 allow remote attackers to cause a denial of service (NullPointerException) via an invalid block of deflated data. | [] | null | null | null | null | null | github | |
GHSA-fv5f-j75m-8c2j | An uncontrolled search path vulnerability in the Trend Micro Apex One Data Loss Prevention module could allow an attacker to inject malicious code leading to arbitrary code execution on affected installations. | [] | null | 8.8 | null | null | null | github | |
GHSA-c4xj-m5hq-4w5p | In wifi driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220420068; Issue ID: GN20220420068. | [] | null | 6.7 | null | null | null | github | |
GHSA-qp96-9hxv-3xx4 | A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been declared as critical. Affected by this vulnerability is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument name leads to os command injection. The attac... | [] | 9.2 | 8.1 | null | null | null | github | |
CVE-2022-32648 | In disp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06535964; Issue ID: ALPS06535964. | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757:-:*... | null | 6.4 | null | null | null | cvelistv5 | |
GHSA-c8vh-949m-7h9h | The Carnegie Mellon Silicon Valley (aka edu.cmu.sv.mobile) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null | null | github | |
GHSA-q6v3-24wc-vg36 | Improper access control in Elenos ETG150 FM transmitter v3.12 allows attackers to make arbitrary configuration edits that are only accessed by privileged users. | [] | null | 2.7 | null | null | null | github | |
CVE-2016-7083 | VMware Workstation Pro 12.x before 12.5.0 and VMware Workstation Player 12.x before 12.5.0 on Windows, when Cortado ThinPrint virtual printing is enabled, allow guest OS users to execute arbitrary code on the host OS or cause a denial of service (host OS memory corruption) via TrueType fonts embedded in EMFSPOOL. | [
"cpe:2.3:a:vmware:workstation_player:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_player:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_player:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_player:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_pro:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:... | null | null | 7.8 | 5.9 | null | cvelistv5 | |
CVE-2019-8720 | A vulnerability was found in WebKit. The flaw is triggered when processing maliciously crafted web content that may lead to arbitrary code execution. Improved memory handling addresses the multiple memory corruption issues. | [
"cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:re... | null | 8.8 | null | null | null | cvelistv5 | |
GHSA-q3j6-jpv5-vp5g | When the pointer lock is enabled by a website though requestPointerLock(), no user notification is given. This could allow a malicious website to hijack the mouse pointer and confuse users. This vulnerability affects Firefox < 69.0.1. | [] | null | null | null | null | null | github | |
GHSA-25j9-9wxp-hpp7 | Format string vulnerability in the auth_debug function in Courier-IMAP 1.6.0 through 2.2.1 and 3.x through 3.0.3, when login debugging (DEBUG_LOGIN) is enabled, allows remote attackers to execute arbitrary code. | [] | null | null | null | null | null | github | |
GHSA-4jfc-569c-hghm | GPAC v1.1.0 was discovered to contain a stack overflow via the function gf_node_get_name () at scenegraph/base_scenegraph.c. This vulnerability can lead to a program crash, causing a Denial of Service (DoS). | [] | null | null | null | null | null | github | |
GHSA-45pw-h44c-jmqc | C-blosc2 before 2.9.3 was discovered to contain a NULL pointer dereference via the function zfp_rate_decompress at zfp/blosc2-zfp.c. | [] | null | 7.5 | null | null | null | github | |
GHSA-mc9v-rq2q-h4r4 | The Client secret is not checked when using the OAuth Password grant type.By exploiting this vulnerability, an attacker could connect to a web server using a client application not explicitly authorized as part of the OAuth deployment.
Exploitation requires valid credentials and does not permit the attacker to bypass u... | [] | 2.3 | null | null | null | null | github | |
CVE-2025-38136 | usb: renesas_usbhs: Reorder clock handling and power management in probe | In the Linux kernel, the following vulnerability has been resolved:
usb: renesas_usbhs: Reorder clock handling and power management in probe
Reorder the initialization sequence in `usbhs_probe()` to enable runtime
PM before accessing registers, preventing potential crashes due to
uninitialized clocks.
Currently, in ... | [] | null | 5.5 | null | null | null | cvelistv5 |
CVE-2025-57714 | NetBak Replicator | An unquoted search path or element vulnerability has been reported to affect NetBak Replicator. If a local attacker gains a user account, they can then exploit the vulnerability to execute unauthorized code or commands.
We have already fixed the vulnerability in the following version:
NetBak Replicator 4.5.15.0807 and... | [] | 8.5 | null | null | null | null | cvelistv5 |
GHSA-3677-xxcr-wjqv | jose4j is vulnerable to DoS via compressed JWE content | In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. | [] | null | 7.5 | null | null | null | github |
CVE-2006-0800 | Interpretation conflict in PostNuke 0.761 and earlier allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML tags with a trailing "<" character, which is interpreted as a ">" character by some web browsers but bypasses the blacklist protection in (1) the pnVarCleanFromInput function in pnAPI.php... | [
"cpe:2.3:a:postnuke_software_foundation:postnuke:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postnuke_software_foundation:postnuke:0.62:*:*:*:*:*:*:*",
"cpe:2.3:a:postnuke_software_foundation:postnuke:0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:postnuke_software_foundation:postnuke:0.64:*:*:*:*:*:*:*",
"cpe:2.3:a:postnuke_software_... | null | null | null | 2.6 | null | cvelistv5 | |
GHSA-2mf6-7w4r-rx44 | IBM Rational Quality Manager and IBM Rational Collaborative Lifecycle Management 5.0 through 5.0.2 and 6.0 through 6.0.5 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials di... | [] | null | null | 5.4 | null | null | github | |
GHSA-9h74-mx6m-3v5r | The IWS WordPress plugin through 1.0 does not properly escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to an unauthenticated SQL injection. | [] | null | 9.8 | null | null | null | github | |
CVE-2019-18828 | Barco ClickShare Button R9861500D01 devices before 1.9.0 have Insufficiently Protected Credentials. The root account (present for access via debug interfaces, which are by default not enabled on production devices) of the embedded Linux on the ClickShare Button is using a weak password. | [
"cpe:2.3:o:barco:clickshare_cs-100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:barco:clickshare_cs-100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:barco:clickshare_cse-200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:barco:clickshare_cse-200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:barco:clickshare_cse-200\\+_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3... | null | 6.8 | null | 7.2 | null | cvelistv5 | |
GHSA-wx44-vgjw-fr2j | Sensitive Information Exposure in E4J s.r.l. VikBooking Hotel Booking Engine & PMS plugin <= 1.5.3 on WordPress allows attackers to get the booking data by guessing / brute-forcing easy predictable booking IDs via search POST requests. | [] | null | 5.3 | null | null | null | github | |
CVE-2024-0534 | Tenda A15 Web-based Management Interface SetOnlineDevName stack-based overflow | A vulnerability classified as critical has been found in Tenda A15 15.13.07.13. Affected is an unknown function of the file /goform/SetOnlineDevName of the component Web-based Management Interface. The manipulation of the argument mac leads to stack-based buffer overflow. It is possible to launch the attack remotely. T... | [
"cpe:2.3:o:tenda:a15_firmware:15.13.07.13:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:a15:-:*:*:*:*:*:*:*"
] | null | 7.2 | 7.2 | 8.3 | null | cvelistv5 |
CVE-2018-9193 | A researcher has disclosed several vulnerabilities against FortiClient for Windows version 6.0.5 and below, version 5.6.6, the combination of these vulnerabilities can turn into an exploit chain, which allows a user to gain system privileges on Microsoft Windows. | [
"cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*"
] | null | 7.1 | null | null | null | cvelistv5 | |
CVE-2025-3674 | TOTOLINK A3700R cstecgi.cgi setUrlFilterRules access control | A vulnerability was found in TOTOLINK A3700R 9.1.2u.5822_B20200513. It has been declared as critical. Affected by this vulnerability is the function setUrlFilterRules of the file /cgi-bin/cstecgi.cgi. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed... | [] | 6.9 | 5.3 | 5.3 | 5 | null | cvelistv5 |
CVE-2021-1947 | Use-after-free vulnerability in kernel graphics driver because of storing an invalid pointer in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking | [
"cpe:2.3:o:qualcomm:apq8009w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8009w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar9380:-:*:*:*:*:*:*:*",
"... | null | 8.4 | null | null | null | cvelistv5 | |
RHSA-2022:4801 | Red Hat Security Advisory: rsyslog security update | rsyslog: Heap-based overflow in TCP syslog server | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.1 | null | null | null | csaf_redhat |
CVE-2017-18793 | NETGEAR R7800 devices before 1.0.2.36 are affected by command injection. | [
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*"
] | null | null | 6.7 | null | null | cvelistv5 | |
GHSA-m625-c2m5-3rmr | An unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to copy arbitrary files on the server filesystem to the web root (with an arbitrary filename) via the tempFile and fileName parameters in the HTTP POST body. | [] | null | null | null | null | null | github | |
RHSA-2024:1763 | Red Hat Security Advisory: OpenShift Container Platform 4.13.40 packages and security update | golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null | null | csaf_redhat |
CVE-2022-21164 | Denial of Service (DoS) | The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check. | [
"cpe:2.3:a:node-lmdb_project:node-lmdb:*:*:*:*:*:node.js:*:*"
] | null | 3.7 | null | null | null | cvelistv5 |
GHSA-3jfq-g458-7qm9 | Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization | ImpactArbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution`node-tar` aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file path... | [] | null | 8.2 | null | null | null | github |
CVE-2005-1902 | Directory traversal vulnerability in the IMAP service for SPA-PRO Mail @Solomon 4.00 allows remote authenticated users to read other users' mail and perform operations on arbitrary directories via .. sequences in the (1) SELECT, (2) CREATE, (3) DELETE, and (4) RENAME commands. | [
"cpe:2.3:a:e-post_corporation:spa-pro_mail_atsolomon:4.00:*:*:*:*:*:*:*"
] | null | null | null | 3.6 | null | cvelistv5 | |
CVE-2022-45458 | Sensitive information disclosure and manipulation due to improper certification validation. The following products are affected: Acronis Agent (Windows, macOS, Linux) before build 29633, Acronis Cyber Protect 15 (Windows, macOS, Linux) before build 30984. | [
"cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update3:... | null | null | 4.2 | null | null | cvelistv5 | |
GHSA-fpq3-c96f-26mv | An issue was discovered on the Forvia Hella HELLA Driving Recorder DR 820. Bypassing of Device Pairing can occur. The pairing mechanism relies solely on the connecting device's MAC address. By obtaining the MAC address through network scanning and spoofing it, an attacker can bypass the authentication process and gain ... | [] | null | 9.1 | null | null | null | github | |
CVE-2008-3040 | Unspecified vulnerability in the DAM Frontend (dam_frontend) extension 0.1.0 and earlier for TYPO3 allows remote attackers to obtain sensitive information via unknown vectors. | [
"cpe:2.3:a:typo3:dam_frontend_extension:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null | cvelistv5 | |
GHSA-mfvp-7ffm-g4r6 | Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2799, CVE-2014-4059, CVE-2014-4065, CVE-2014-4079, CVE-2014... | [] | null | null | null | null | null | github | |
GHSA-8h93-28hg-fj84 | Composio Command Execution vulnerability | composio >=0.5.40 is vulnerable to Command Execution in composio_openai, composio_claude, and composio_julep via the handle_tool_calls function. | [] | null | 6.4 | null | null | null | github |
GHSA-fpxv-w2jp-mwfq | PHP Scripts Mall advanced-real-estate-script 4.0.9 allows remote attackers to cause a denial of service (page structure loss) via crafted JavaScript code in the Name field of a profile. | [] | null | null | 6.5 | null | null | github | |
CVE-2008-5119 | Cross-site scripting (XSS) vulnerability in search.php in Scripts4Profit DXShopCart 4.30mc allows remote attackers to inject arbitrary web script or HTML via the keyword parameter. | [
"cpe:2.3:a:scripts4profit:dxshopcart:4.30mc:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null | cvelistv5 | |
CVE-2017-18414 | cPanel before 67.9999.103 allows an open redirect in /unprotected/redirect.html (SEC-300). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 7.4 | 5.8 | null | cvelistv5 | |
GHSA-xw5h-h3cf-m4mx | Directory traversal vulnerability in repository/repository_attachment.php in AlienVault Open Source Security Information Management (OSSIM) 2.1.5, and possibly other versions before 2.1.5-4, allows remote attackers to upload files into arbitrary directories via a .. (dot dot) in the id_document parameter. | [] | null | null | null | null | null | github | |
GHSA-w5qh-vv4g-4g87 | Cisco IOS XR before 4.2.1 on ASR 9000 series devices and CRS series devices allows remote attackers to cause a denial of service (packet transmission outage) via a crafted packet, aka Bug IDs CSCty94537 and CSCtz62593. | [] | null | null | null | null | null | github | |
CVE-2020-2191 | Jenkins Self-Organizing Swarm Plug-in Modules Plugin 3.20 and earlier does not check permissions on API endpoints that allow adding and removing agent labels. | [
"cpe:2.3:a:jenkins:self-organizing_swarm_modules:*:*:*:*:*:jenkins:*:*"
] | null | 4.3 | null | 4 | null | cvelistv5 | |
CVE-2026-22408 | WordPress Justicia theme <= 1.2 - Local File Inclusion vulnerability | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Justicia justicia allows PHP Local File Inclusion.This issue affects Justicia: from n/a through <= 1.2. | [] | null | 8.1 | null | null | null | cvelistv5 |
CVE-2022-42909 | WEPA Print Away does not verify that a user has authorization to access documents before generating print orders and associated release codes. This could allow an attacker to generate print orders and release codes for documents they don´t own and print hem without authorization. In order to exploit this vulnerability,... | [
"cpe:2.3:a:wepanow:print_away:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null | cvelistv5 | |
CVE-2004-2483 | Kerio WinRoute Firewall before 6.0.9 uses information from PTR queries in response to A queries, which allows remote attackers to poison the DNS cache or cause a denial of service (connection loss). | [
"cpe:2.3:a:kerio:winroute_firewall:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winroute_firewall:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:kerio:winrou... | null | null | null | 6.4 | null | cvelistv5 | |
GHSA-3h4r-2q6q-wfr8 | VMware Cloud Director Availability contains an HTML injection vulnerability.
A
malicious actor with network access to VMware Cloud Director
Availability can craft malicious HTML tags to execute within replication
tasks. | [] | null | 6.4 | null | null | null | github | |
CVE-2013-4046 | Open redirect vulnerability in IBM SPSS Collaboration and Deployment Services 4.2.1 before 4.2.1.3 IF3 and 5.0 before FP3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. | [
"cpe:2.3:a:ibm:spss_collaboration_and_deployment_services:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spss_collaboration_and_deployment_services:4.2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spss_collaboration_and_deployment_services:4.2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spss_collaboration_and_deployment_services:4.2.1.3:... | null | null | null | 5.8 | null | cvelistv5 | |
CVE-2005-3879 | Multiple SQL injection vulnerabilities in Softbiz Resource Repository Script 1.1 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) sbres_id parameter in (a) details_res.php, (b) refer_friend.php, and (c) report_link.php, and (2) the sbcat_id parameter in (d) showcats.php. | [
"cpe:2.3:a:softbiz:resource_repository_script:1.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null | cvelistv5 | |
CVE-2022-0990 | Server-Side Request Forgery (SSRF) in janeczku/calibre-web | Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.18. | [
"cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*"
] | null | null | 9.3 | null | null | cvelistv5 |
CVE-2018-1000038 | In Artifex MuPDF 1.12.0 and earlier, a stack buffer overflow in function pdf_lookup_cmap_full in pdf/pdf-cmap.c could allow an attacker to execute arbitrary code via a crafted file. | [
"cpe:2.3:a:artifex:mupdf:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null | cvelistv5 | |
CVE-2018-17496 | eVisitorPass could allow a local attacker to gain elevated privileges on the system, caused by an error while in kiosk mode. By visiting the kiosk and typing ctrl+shift+esc, an attacker could exploit this vulnerability to open the task manager to kill the process or launch new processes on the system. | [
"cpe:2.3:a:thresholdsecurity:evisitorpass:1.5.5.2:*:*:*:*:*:*:*"
] | null | null | 8.4 | null | null | cvelistv5 | |
GHSA-v5h4-3gwf-6343 | In the Linux kernel, the following vulnerability has been resolved:btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info()Instead of doing a BUG_ON() handle the error by returning -EUCLEAN,
aborting the transaction and logging an error message. | [] | null | 5.5 | null | null | null | github | |
CVE-2003-1263 | ICAL.EXE in iCal 3.7 allows remote attackers to cause a denial of service (crash) via a malformed HTTP request, possibly due to an invalid method name. | [
"cpe:2.3:a:brown_bear_software:ical:3.7:*:*:*:*:*:*:*"
] | null | null | null | 5 | null | cvelistv5 | |
GHSA-jmw7-g9jf-52hh | The Vitogate 300 web interface fails to enforce proper server-side authentication and relies on frontend-based authentication controls. This allows an attacker to simply modify HTML elements in the browser’s developer tools to bypass login restrictions. By removing specific UI elements, an attacker can reveal the hidde... | [] | 8.7 | null | null | null | null | github | |
CVE-2022-31757 | The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality. | [
"cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui... | null | 7.5 | null | 5 | null | cvelistv5 | |
CVE-2022-20338 | In HierarchicalUri.readFrom of Uri.java, there is a possible way to craft a malformed Uri object due to improper input validation. This could lead to a local escalation of privilege, preventing processes from validating URIs correctly, with no additional execution privileges needed. User interaction is not needed for e... | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 3.3 | null | null | null | cvelistv5 | |
CVE-2023-48460 | Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79) | Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null | cvelistv5 |
CVE-2025-55277 | HCL Aftermarket DPC is affected by Use of Vulnerable/Outdated Versions vulnerability | HCL Aftermarket DPC is affected by Use of Vulnerable/Outdated Versions vulnerability using which an attacker may make use of the exploits available across the internet and craft attacks against the application. | [] | null | 2.6 | null | null | null | cvelistv5 |
CVE-2014-9453 | Multiple cross-site scripting (XSS) vulnerabilities in simple-visitor-stat.php in the Simple visitor stat plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) HTTP User-Agent or (2) HTTP Referer header. | [
"cpe:2.3:a:simple_visitor_stat_project:simple_visitor_stat:-:*:*:*:*:wordpress:*:*"
] | null | null | null | 4.3 | null | cvelistv5 |
This dataset comprises 693,220 real-world vulnerabilities used to train and evaluate VLAI, a transformer-based model designed to predict software vulnerability severity levels directly from text descriptions, enabling faster and more consistent triage.
The dataset is presented in the paper VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification.
| Source | Label | Entries | Share |
|---|---|---|---|
cvelistv5 |
CVE Program (enriched with vulnrichment and Fraunhofer FKIE) | 328,555 | 47.4% |
github |
GitHub Security Advisories | 327,995 | 47.3% |
csaf_redhat |
CSAF Red Hat | 23,715 | 3.4% |
csaf_cisa |
CSAF CISA | 5,811 | 0.8% |
csaf_cisco |
CSAF Cisco | 3,914 | 0.6% |
pysec |
PySec advisories | 3,230 | 0.5% |
Extracted from the database of Vulnerability-Lookup with the VulnTrain project. Dumps of the data are available here.
| Split | Examples |
|---|---|
| train | 623,898 |
| test | 69,322 |
| Field | Type | Description |
|---|---|---|
id |
string | Vulnerability identifier (e.g., CVE-2024-1234, GHSA-xxxx, PYSEC-2024-xxx) |
title |
string | Vulnerability title |
description |
string | Vulnerability description in English |
cpes |
list[string] | Common Platform Enumeration identifiers |
cvss_v4_0 |
float | CVSS v4.0 score |
cvss_v3_1 |
float | CVSS v3.1 score |
cvss_v3_0 |
float | CVSS v3.0 score |
cvss_v2_0 |
float | CVSS v2.0 score |
patch_commit_url |
string | URL to the patch commit on GitHub, if available |
source |
string | Data source identifier |
import json
from datasets import load_dataset
dataset = load_dataset("CIRCL/vulnerability-scores")
vulnerabilities = ["CVE-2012-2339", "RHSA-2023:5964", "GHSA-7chm-34j8-4f22", "PYSEC-2024-225"]
filtered_entries = dataset.filter(lambda elem: elem["id"] in vulnerabilities)
for entry in filtered_entries["train"]:
print(json.dumps(entry, indent=4))