CIRCL/vulnerability-severity-classification-roberta-base
Text Classification • 0.1B • Updated • 935 • 9
id stringlengths 12 47 | title stringlengths 0 256 ⌀ | description stringlengths 3 189k | cpes listlengths 0 4.89k | cvss_v4_0 float64 0 10 ⌀ | cvss_v3_1 float64 0 10 ⌀ | cvss_v3_0 float64 0 10 ⌀ | cvss_v2_0 float64 0 10 ⌀ | patch_commit_url stringlengths 36 232 ⌀ | source stringclasses 6
values |
|---|---|---|---|---|---|---|---|---|---|
GHSA-3hx6-3qqx-qhvf | Improper encoding or escaping of output vulnerability in the system plugin daemon in Synology BeeStation Manager (BSM) before 1.1-65374, Synology DiskStation Manager (DSM) before 6.2.4-25556-8, 7.1.1-42962-7, 7.2-64570-4, 7.2.1-69057-6 and 7.2.2-72806-1 and Synology Unified Controller (DSMUC) before 3.1.4-23079 allows ... | [] | null | 9.8 | null | null | null | github | |
CVE-2023-23429 |
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions.
| [
"cpe:2.3:o:hihonor:magic_os:*:*:*:*:*:*:*:*"
] | null | 4 | null | null | null | cvelistv5 | |
GHSA-p5j5-69wq-jfpm | The Flex Store Users plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.1.0. This is due to the 'fsUserHandle::signup' and the 'fsSellerRole::add_role_seller' functions not restricting what user roles a user can register with. This makes it possible for unauthenticated at... | [] | null | 9.8 | null | null | null | github | |
RHSA-2018:1737 | Red Hat Security Advisory: kernel security and bug fix update | kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 5.6 | null | null | csaf_redhat |
CVE-2018-12871 | Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*... | null | null | 5.5 | 4.3 | null | cvelistv5 | |
GHSA-8qwj-23mm-hgfr | retrieve_password.pl in DCForum 6.x and 2000 generates predictable new passwords based on a sessionID, which allows remote attackers to request a new password on behalf of another user and use the sessionID to calculate the new password for that user. | [] | null | null | null | null | null | github | |
RHSA-2025:9432 | Red Hat Security Advisory: iputils security update | iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null | null | csaf_redhat |
GHSA-qvqg-6rp8-4p9h | github.com/ipfs/kubo affected by DOS Bitswap unbounded persistent memory leak | ImpactAn attacker is able allocate arbitrarily many bytes in the Bitswap server by sending many `WANT_BLOCK` and or `WANT_HAVE` requests which are queued in an unbounded queue, with allocations that persist even if the connection is closed.This affects users accepting or connecting untrusted connections such as by runn... | [] | null | 5.3 | null | null | null | github |
GHSA-chjw-9fmq-6p9g | In the Linux kernel, the following vulnerability has been resolved:firmware: arm_ffa: Check if ffa_driver remove is present before executingCurrently ffa_drv->remove() is called unconditionally from
ffa_device_remove(). Since the driver registration doesn't check for it
and allows it to be registered without .remove ca... | [] | null | null | null | null | null | github | |
CVE-2024-1123 | EventPrime – Events Calendar, Bookings and Tickets <= 3.4.2 - Missing Authorization to Arbitrary Post Overwrite | The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_frontend_event_submission() function in all versions up to, and including, 3.4.2. This makes it possible for authenticated attackers, with subscrib... | [] | null | 6.5 | null | null | null | cvelistv5 |
CVE-2026-4488 | UTT HiPER 1250GW setSysAdm strcpy buffer overflow | A vulnerability was identified in UTT HiPER 1250GW up to 3.2.7-210907-180535. Affected is the function strcpy of the file /goform/setSysAdm. Such manipulation of the argument GroupName leads to buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used. | [] | 8.7 | 8.8 | 8.8 | 9 | null | cvelistv5 |
GHSA-5pr8-4599-w79v | Cross-site scripting (XSS) vulnerability in LinPHA allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null | null | github | |
CVE-2026-23403 | apparmor: fix memory leak in verify_header | In the Linux kernel, the following vulnerability has been resolved:
apparmor: fix memory leak in verify_header
The function sets `*ns = NULL` on every call, leaking the namespace
string allocated in previous iterations when multiple profiles are
unpacked. This also breaks namespace consistency checking since *ns
is a... | [] | null | null | null | null | null | cvelistv5 |
CVE-2010-3579 | Unspecified vulnerability in the (1) Sun Convergence 1 and (2) Sun Java Communications Suite 7 components in Oracle Sun Products Suite 1.0 and 7.0 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Webmail. | [
"cpe:2.3:a:oracle:sun_products_suite:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:sun_products_suite:7.0:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null | cvelistv5 | |
GHSA-8wc2-8f8r-6722 | Buffer overflow in Midnight Commander (mc) 4.5.55 and earlier may allow attackers to execute arbitrary code. | [] | null | null | null | null | null | github | |
GHSA-rw54-6826-c8j5 | yiisoft/yii2-authclient's Oauth2 PKCE implementation is vulnerable | Impact_What kind of vulnerability is it? Who is impacted?_Original Report:The Oauth2 PKCE implementation is vulnerable in 2 ways:The `authCodeVerifier` should be removed after usage (similar to 'authState')There is a risk for a "downgrade attack" if PKCE is being relied on for CSRF protection.Patches_Has the problem be... | [] | null | 6.8 | null | null | null | github |
GHSA-vfpq-j5vq-3476 | The WP Talroo WordPress plugin through 2.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin and unauthenticated users. | [] | null | 7.1 | null | null | null | github | |
GHSA-c577-76q8-rjr3 | IBM Spectrum Scale (5.1.0.0 through 5.1.2.8 and 5.1.3.0 through 5.1.5.1) and IBM Elastic Storage System (6.1.0.0 through 6.1.2.4 and 6.1.3.0 through 6.1.4.1) could allow an authenticated user to cause a denial of service through the GUI using a format string attack. IBM X-Force ID: 239539. | [] | null | 6.5 | null | null | null | github | |
GHSA-c3m3-28hq-w97p | Vulnerability of residual files not being deleted after an update in the ChinaDRM module. Successful exploitation of this vulnerability may affect availability. | [] | null | 7.5 | null | null | null | github | |
GHSA-pmf7-jg2w-c5f4 | An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameter 'Id_usuario' and 'Id_evaluacion’ in ‘/evaluacion_hca_evalua.aspx’, could allow an attacker to extract sens... | [] | 9.3 | 7.5 | null | null | null | github | |
GHSA-vqg9-2p7h-mvpq | Laravel v5.1 was discovered to contain a remote code execution (RCE) vulnerability via the component ChanceGenerator in __call. | [] | null | null | null | null | null | github | |
GHSA-hq4f-5qjv-fwrg | The Backup Plus extension for TYPO3 (ns_backup) has a Predictable Resource Location | The ns_backup extension through 13.0.0 for TYPO3 has a Predictable Resource Location. This allows an unauthenticated remote user to download created backups and configuration files. | [] | null | 8.6 | null | null | null | github |
GHSA-7xcp-5fvh-7fwm | LuaTeX before 1.17.0 allows execution of arbitrary shell commands when compiling a TeX file obtained from an untrusted source. This occurs because luatex-core.lua lets the original io.popen be accessed. This also affects TeX Live before 2023 r66984 and MiKTeX before 23.5. | [] | null | 7.8 | null | null | null | github | |
CVE-2025-30934 | WordPress 診断ジェネレータ作成プラグイン plugin <= 1.4.16 - Broken Access Control Vulnerability | Missing Authorization vulnerability in OLIVESYSTEM 診断ジェネレータ作成プラグイン os-diagnosis-generator allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects 診断ジェネレータ作成プラグイン: from n/a through <= 1.4.16. | [] | null | null | null | null | null | cvelistv5 |
GHSA-x96g-95fq-4xv4 | libostree vulnerable to denial of service attack | An issue was discovered in ostree before version 0.17.1 allows attackers to cause a denial of service via the print_panic function in repo_checkout_filter.rs. | [] | null | null | null | null | null | github |
CVE-2024-43295 | WordPress WP Data Access plugin <= 5.5.7 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Passionate Programmers B.V. WP Data Access.This issue affects WP Data Access: from n/a through 5.5.7. | [
"cpe:2.3:a:wpdataaccess:wp_data_access:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null | cvelistv5 |
GHSA-jqvm-5g74-g525 | A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setNtpCfg of the file /cgi-bin/cstecgi.cgi. Performing a manipulation of the argument tz results in os command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. | [] | 5.5 | 7.3 | null | null | null | github | |
RHSA-2023:5869 | Red Hat Security Advisory: nodejs:18 security update | nodejs: integrity checks according to policies can be circumvented nodejs: code injection via WebAssembly export names HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) node-undici: cookie leakage | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 3.9 | null | null | null | csaf_redhat |
CVE-2021-42312 | Microsoft Defender for IoT Elevation of Privilege Vulnerability | Microsoft Defender for IoT Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:defender_for_iot:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:defender_for_iot:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null | cvelistv5 |
CVE-2022-41191 | Due to lack of proper memory management, when a victim opens a manipulated Jupiter Tesselation (.jt, JTReader.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of d... | [
"cpe:2.3:a:sap:3d_visual_enterprise_viewer:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null | cvelistv5 | |
GHSA-8r9r-6f5g-px79 | Firefly III 4.7.17.3 is vulnerable to stored XSS due to the lack of filtration of user-supplied data in the transaction description field. The JavaScript code is executed during deletion of a transaction link. | [] | null | null | null | null | null | github | |
CVE-2024-35338 | Tenda i29V1.0 V1.0.0.5 was discovered to contain a hardcoded password for root. | [
"cpe:2.3:o:tendacn:i29_firmware:1.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:i29:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null | cvelistv5 | |
GHSA-qhc9-mv9r-wv6m | The workspace client, openspace client, app development client, and REST API of TIBCO Software Inc.'s TIBCO ActiveMatrix BPM, TIBCO ActiveMatrix BPM Distribution for TIBCO Silver Fabric, and TIBCO Silver Fabric Enabler for ActiveMatrix BPM contain cross site scripting (XSS) and cross-site request forgery vulnerabilitie... | [] | null | null | null | null | null | github | |
GHSA-h9v8-cj85-fcwj | 4D WebSTAR 5.3.2 and earlier allows local users to read and modify arbitrary files via a symlink attack. | [] | null | null | null | null | null | github | |
GHSA-9gjx-2rfp-gv42 | Cross-site scripting (XSS) vulnerability in x_stat_admin.php in x-stat 2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via a parameter to the phpinfo action. | [] | null | null | null | null | null | github | |
CVE-2018-18563 | An issue was discovered in Roche Accu-Chek Inform II Instrument before 03.06.00 (Serial number below 14000) and 04.x before 04.03.00 (Serial Number above 14000), CoaguChek Pro II before 04.03.00, CoaguChek XS Plus before 03.01.06, CoaguChek XS Pro before 03.01.06, cobas h 232 before 03.01.03 (Serial Number below KQ0400... | [
"cpe:2.3:o:roche:accu-chek_inform_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:roche:accu-chek_inform_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:roche:cobas_h_232_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:roche:cobas_h_232:-:*:*:*:*:*:*:*",
"cpe:2.3:o:roche:coaguchek_pro_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:roche:coaguc... | null | null | 9.6 | 8.3 | null | cvelistv5 | |
GHSA-pj28-h6vh-g59w | Undocumented administrative accounts were getting created to facilitate access for applications running on board.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5. | [] | 10 | 9.8 | null | null | null | github | |
GHSA-mrj6-gwrp-fxf5 | Buffer Overflow vulnerability in scan function in stdscan.c in nasm 2.15rc0 allows remote attackers to cause a denial of service via crafted asm file. | [] | null | 5.5 | null | null | null | github | |
CVE-2020-1343 | An information disclosure vulnerability exists in Visual Studio Code Live Share Extension when it exposes tokens in plain text, aka 'Visual Studio Code Live Share Information Disclosure Vulnerability'. | [
"cpe:2.3:a:microsoft:visual_studio_live_share:-:*:*:*:*:*:*:*"
] | null | 5.9 | null | 5 | null | cvelistv5 | |
CVE-2026-21875 | ClipBucket v5 Vulnerable to Blind SQL Injection through Channel Comments | ClipBucket v5 is an open source video sharing platform. Versions 5.5.2-#187 and below allow an attacker to perform Blind SQL Injection through the add comment section within a channel. When adding a comment within a channel, there is a POST request to the /actions/ajax.php endpoint. The obj_id parameter within the POST... | [] | null | 9.8 | null | null | null | cvelistv5 |
CVE-2020-5885 | On versions 15.0.0-15.1.0.1, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, and 12.1.0-12.1.5.1, BIG-IP systems set up for connection mirroring in a high availability (HA) pair transfer sensitive cryptographic objects over an insecure communications channel. This is a control plane issue which is exposed only on the network used fo... | [
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*... | null | 9.1 | null | 6.4 | null | cvelistv5 | |
CVE-2024-3192 | MailCleaner Admin Interface cross site scripting | A vulnerability, which was classified as problematic, was found in MailCleaner up to 2023.03.14. Affected is an unknown function of the component Admin Interface. The manipulation as part of Mail Message leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the p... | [] | null | 4.3 | 4.3 | 5 | https://github.com/MailCleaner/MailCleaner/pull/601 | cvelistv5 |
RHSA-2003:085 | Red Hat Security Advisory: tcpdump security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null | null | csaf_redhat |
GHSA-6vp8-72hx-47vm | Cross-site scripting vulnerability in Namazu 2.0.9 and earlier allows remote attackers to execute arbitrary Javascript as other web users via an error message that is returned when an invalid index file is specified in the idxname parameter. | [] | null | null | null | null | null | github | |
GHSA-wcfr-wfm2-2rjm | An exploitable denial of service vulnerability exists within the reading of proprietary server certificates in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to... | [] | null | null | 5.9 | null | null | github | |
GHSA-5vgp-64gj-j392 | Directory traversal vulnerability in the bitrix.mpbuilder module before 1.0.12 for Bitrix allows remote administrators to include and execute arbitrary local files via a .. (dot dot) in the element name of the "work" array parameter to admin/bitrix.mpbuilder_step2.php. | [] | null | null | null | null | null | github | |
CVE-2022-0981 | A flaw was found in Quarkus. The state and potentially associated permissions can leak from one web request to another in RestEasy Reactive. This flaw allows a low-privileged user to perform operations on the database with a different set of privileges than intended. | [
"cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null | cvelistv5 | |
GHSA-64pp-r5x2-fgff | An issue was discovered in St. Jude Medical Merlin@home, versions prior to Version 8.2.2 (RF models: EX1150; Inductive models: EX1100; and Inductive models: EX1100 with MerlinOnDemand capability). The identities of the endpoints for the communication channel between the transmitter and St. Jude Medical's web site, Merl... | [] | null | null | 8.9 | null | null | github | |
CVE-2002-1602 | Buffer overflow in the Braille module for GNU screen 3.9.11, when HAVE_BRAILLE is defined, allows local users to execute arbitrary code. | [
"cpe:2.3:a:gnu:screen:3.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:screen:3.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:screen:3.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:screen:3.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:screen:3.9.11:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null | cvelistv5 | |
GHSA-33vg-9h99-96pc | A denial of service issue was addressed with improved input validation. | [] | null | null | null | null | null | github | |
CVE-2023-3652 | Reflected XSS in Digital Ant E-Commerce Software | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Digital Ant E-Commerce Software allows Reflected XSS.This issue affects E-Commerce Software: before 11. | [
"cpe:2.3:a:digital-ant:digital_ant:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null | cvelistv5 |
CVE-2021-38991 | IBM AIX 7.0, 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the lscore command which could lead to code execution. IBM X-Force ID: 212953. | [
"cpe:2.3:a:ibm:vios:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.2:*:*:*:*:*:*:*"
] | null | null | 8.4 | null | null | cvelistv5 | |
CVE-2014-125082 | nivit redports model.py sql injection | A vulnerability was found in nivit redports. It has been declared as critical. This vulnerability affects unknown code of the file redports-trac/redports/model.py. The manipulation leads to sql injection. The name of the patch is fc2c1ea1b8d795094abb15ac73cab90830534e04. It is recommended to apply a patch to fix this i... | [
"cpe:2.3:a:redports_project:redports:*:*:*:*:*:*:*:*"
] | null | 5.5 | 5.5 | 5.2 | https://github.com/nivit/redports/commit/fc2c1ea1b8d795094abb15ac73cab90830534e04 | cvelistv5 |
RHSA-2015:0249 | Red Hat Security Advisory: samba3x security update | samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null | csaf_redhat |
GHSA-5w5r-8xc6-2xhw | Apache Answer Exposure of Private Personal Information to an Unauthorized Actor vulnerability | Exposure of Private Personal Information to an Unauthorized Actor vulnerability in Apache Answer.This issue affects Apache Answer: through 1.7.1.An unauthenticated API endpoint incorrectly exposes full revision history for deleted content. This allows unauthorized users to retrieve restricted or sensitive information. ... | [] | 6.6 | 7.5 | null | null | null | github |
CVE-2016-3083 | Apache Hive (JDBC + HiveServer2) implements SSL for plain TCP and HTTP connections (it supports both transport modes). While validating the server's certificate during the connection setup, the client in Apache Hive before 1.2.2 and 2.0.x before 2.0.1 doesn't seem to be verifying the common name attribute of the certif... | [
"cpe:2.3:a:apache:hive:0.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hive:0.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hive:0.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hive:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hive:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hive:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hive:1.1.1:*:... | null | null | 7.5 | 5 | null | cvelistv5 | |
CVE-2022-31969 | ChatBot App with Suggestion v1.0 is vulnerable to SQL Injection via /simple_chat_bot/admin/?page=user/manage_user&id=. | [
"cpe:2.3:a:chatbot_app_with_suggestion_project:chatbot_app_with_suggestion:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null | cvelistv5 | |
CVE-2009-1884 | Off-by-one error in the bzinflate function in Bzip2.xs in the Compress-Raw-Bzip2 module before 2.018 for Perl allows context-dependent attackers to cause a denial of service (application hang or crash) via a crafted bzip2 compressed stream that triggers a buffer overflow, a related issue to CVE-2009-1391. | [
"cpe:2.3:a:bzip:compress-raw-bzip2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bzip:compress-raw-bzip2:2.0.00_10:*:*:*:*:*:*:*",
"cpe:2.3:a:bzip:compress-raw-bzip2:2.0.00_12:*:*:*:*:*:*:*",
"cpe:2.3:a:bzip:compress-raw-bzip2:2.0.00_14:*:*:*:*:*:*:*",
"cpe:2.3:a:bzip:compress-raw-bzip2:2.0.01:*:*:*:*:*:*:*",
"cpe:2.3:a:b... | null | null | null | 4.3 | null | cvelistv5 | |
GHSA-6vwc-64mx-78v2 | An attacker with low privileges can manipulate the requested memory size, causing the application to use an invalid memory area. This could lead to a crash of the application but it does not affected other applications. | [] | null | 5.4 | null | null | null | github | |
GHSA-qvr7-7g55-69xj | Pimcore Has an Incomplete Patch for CVE-2023-30848 | SummaryAn **incomplete SQL injection patch** in the Admin Search Find API allows an authenticated attacker to perform **blind SQL injection**.
Although CVE-2023-30848 attempted to mitigate SQL injection by removing SQL comments (--) and catching syntax errors, the fix is insufficient. Attackers can still inject SQL pay... | [] | null | 8.8 | null | null | null | github |
GHSA-pjqr-wv9q-gvhf | In the Linux kernel, the following vulnerability has been resolved:md-raid: destroy the bitmap after destroying the threadWhen we ran the lvm test "shell/integrity-blocksize-3.sh" on a kernel with
kasan, we got failure in write_page.The reason for the failure is that md_bitmap_destroy is called before
destroying the th... | [] | null | null | null | null | null | github | |
CVE-2025-21700 | net: sched: Disallow replacing of child qdisc from one parent to another | In the Linux kernel, the following vulnerability has been resolved:
net: sched: Disallow replacing of child qdisc from one parent to another
Lion Ackermann was able to create a UAF which can be abused for privilege
escalation with the following script
Step 1. create root qdisc
tc qdisc add dev lo root handle 1:0 drr... | [] | null | 7.8 | null | null | null | cvelistv5 |
CVE-2022-46369 | Rumpus - FTP server Persistent cross-site scripting (PXSS) – Unspecified vector | Rumpus - FTP server version 9.0.7.1 Persistent cross-site scripting (PXSS) – vulnerability may allow inserting scripts into unspecified input fields. | [
"cpe:2.3:a:maxum:rumpus:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null | cvelistv5 |
GHSA-w2m4-xqg7-pfhg | An issue was discovered in LAOBANCMS 2.0. /admin/login.php allows spoofing of the id and guanliyuan cookies. | [] | null | null | 7.5 | null | null | github | |
GHSA-8m5r-w6r4-2wp7 | The IKEv1 parser in tcpdump before 4.9.3 has a buffer over-read in print-isakmp.c:ikev1_n_print(). | [] | null | 7.5 | null | null | null | github | |
GHSA-ww87-2v2v-cmfc | A vulnerability was identified in neurobin shc up to 4.0.3. This issue affects the function make of the file src/shc.c. The manipulation leads to stack-based buffer overflow. The attack can only be performed from a local environment. The exploit is publicly available and might be used. | [] | 1.9 | 5.3 | null | null | null | github | |
GHSA-6xcx-78g4-qrhj | The BuddyPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘user_name’ parameter in versions up to, and including, 12.4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to inject a... | [] | null | 6.4 | null | null | null | github | |
GHSA-pfv8-5qjr-758g | Auth. (subscriber+) Cross-Site Scripting (XSS) vulnerability in Soledad premium theme <= 8.2.5 on WordPress. | [] | null | 5.4 | null | null | null | github | |
GHSA-j37r-fj8f-2g89 | Use of hard-coded password to the patients' database allows an attacker to retrieve sensitive data stored in the database. The password is the same among all drEryk Gabinet installations.This issue affects drEryk Gabinet software versions from 7.0.0.0 through 9.17.0.0. | [] | 9.3 | 9.8 | null | null | null | github | |
GHSA-mrcj-5qxr-vhp2 | angular-ui-notification Cross-site Scripting vulnerability | angular-ui-notification v0.1.0, v0.2.0, and v0.3.6 was discovered to contain a cross-site scripting (XSS) vulnerability. | [] | null | 6.1 | null | null | null | github |
CVE-2014-3740 | Cross-site scripting (XSS) vulnerability in SpiceWorks before 7.2.00195 allows remote authenticated users to inject arbitrary web script or HTML via the Summary field in a ticket request to the portal page. | [
"cpe:2.3:a:spiceworks:spiceworks:*:*:*:*:*:*:*:*",
"cpe:2.3:a:spiceworks:spiceworks:7.2.00174:*:*:*:*:*:*:*",
"cpe:2.3:a:spiceworks:spiceworks:7.2.00189:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null | cvelistv5 | |
CVE-2018-1000078 | RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Cross Site Scripting (XSS) vulnerability in gem server display of homepage attribute that can result in XSS. This atta... | [
"cpe:2.3:a:rubygems:rubygems:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null | cvelistv5 | |
CVE-2024-29964 | Brocade SANnav versions before v2.3.0a do not correctly set permissions on files, including docker files | Brocade SANnav versions before v2.3.0a do not correctly set permissions on files, including docker files. An unprivileged attacker who gains access to the server can read sensitive information from these files. | [
"cpe:2.3:a:brocade:sannav:*:*:*:*:*:*:*:*"
] | null | 5.7 | null | null | null | cvelistv5 |
CVE-2023-27929 | An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.3, tvOS 16.4, iOS 16.4 and iPadOS 16.4, watchOS 9.4. Processing a maliciously crafted image may result in disclosure of process memory. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null | cvelistv5 | |
GHSA-vmrh-mj92-7wj2 | Huawei AR1200 V200R006C10SPC300, AR160 V200R006C10SPC300, AR200 V200R006C10SPC300, AR2200 V200R006C10SPC300, AR3200 V200R006C10SPC300 devices have an improper resource management vulnerability. Due to the improper implementation of ACL mechanism, a remote attacker may send TCP messages to the management interface of th... | [] | null | null | 7.5 | null | null | github | |
GHSA-c4mw-pxcp-988m | AVTECH SECURITY Corporation DGM1104 FullImg-1015-1004-1006-1003 was discovered to contain an authenticated command injection vulnerability in the test_mail function. This vulnerability allows attackers to execute arbitrary commands via a crafted input. | [] | null | 6.5 | null | null | null | github | |
GHSA-fgwh-frh9-vm43 | In Pure-FTPd 1.0.49, a stack exhaustion issue was discovered in the listdir function in ls.c. | [] | null | 7.5 | null | null | null | github | |
CVE-2018-18977 | An issue was discovered in the Ascensia Contour NEXT ONE application for Android before 2019-01-15. An attacker may reverse engineer the codebase to extract sensitive data that contributes to the disclosure of medical information of patients utilizing the Ascensia platform. This occurs because of weak obfuscation. | [
"cpe:2.3:a:ascensia:contour_diabetes:*:*:*:*:*:android:*:*"
] | null | null | 7.5 | 5 | null | cvelistv5 | |
GHSA-rw88-vh2c-q47r | When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox < 63. | [] | null | null | 4.3 | null | null | github | |
GHSA-3qg4-vrhv-p2hp | Integer overflow in calculating estimated output buffer size when getting a list of installed Feature IDs, Serial Numbers or checking Feature ID status in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure... | [] | null | null | null | null | null | github | |
CVE-2023-0577 | Multiple XSS in ASOS Information Technologies' Sobiad | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ASOS Information Technologies SOBIAD allows Cross-Site Scripting (XSS).This issue affects SOBIAD: before 23.02.01.
| [
"cpe:2.3:a:asosegitim:sobiad:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null | cvelistv5 |
CVE-2023-39224 | Archer C5 firmware all versions and Archer C7 firmware versions prior to 'Archer C7(JP)_V2_230602' allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Note that Archer C5 is no longer supported, therefore the update for this product is not provided. | [
"cpe:2.3:h:tp-link:archer_c5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:archer_c7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:archer_c7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:archer_c7:2.0:*:*:*:*:*:*:*"
] | null | 8 | null | null | null | cvelistv5 | |
CVE-2018-2749 | Vulnerability in the Oracle Banking Corporate Lending component of Oracle Financial Services Applications (subcomponent: Core module). Supported versions that are affected are 12.3.0, 12.4.0, 12.5.0 and 14.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Or... | [
"cpe:2.3:a:oracle:banking_corporate_lending:12.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_corporate_lending:12.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_corporate_lending:12.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_corporate_lending:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_payments:12.3.... | null | null | 5.4 | 4.9 | null | cvelistv5 | |
GHSA-jgv7-84w9-f4h3 | A vulnerability, which was classified as critical, was found in Totolink LR1200GB 9.1.0u.6619_B20230130. Affected is the function setOpModeCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument pppoeUser leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has ... | [] | null | 8.8 | null | null | null | github | |
GHSA-rxxg-6hh6-9xv2 | Stack-based buffer overflow in Easy File Sharing (EFS) Web Server 6.8 allows remote attackers to execute arbitrary code via a long string in a cookie UserID parameter to vfolder.ghp. | [] | null | null | null | null | null | github | |
GHSA-3784-9734-2v5f | A vulnerability classified as problematic was found in Open5GS up to 2.7.3. Affected by this vulnerability is the function ngap_handle_path_switch_request_transfer of the file src/smf/ngap-handler.c of the component NGAP PathSwitchRequest Message Handler. The manipulation leads to reachable assertion. The attack can be... | [] | 6.9 | 5.3 | null | null | null | github | |
CVE-2018-17234 | Memory leak in the H5O__chunk_deserialize() function in H5Ocache.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service (memory consumption) via a crafted HDF5 file. | [
"cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null | cvelistv5 | |
GHSA-pfmx-v4xw-gw27 | Microsoft Excel 2002 SP3, 2003 SP3, and 2007 SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 do not properly validate record information during parsing of Excel spreadsheets, which allows rem... | [] | null | null | null | null | null | github | |
GHSA-g59r-5x5x-93wp | A Structured Exception Handler (SEH) based buffer overflow in File Sharing Wizard 1.5.0 26-8-2008 allows remote unauthenticated attackers to execute arbitrary code via the HTTP DELETE method, a similar issue to CVE-2019-16724 and CVE-2010-2331. | [] | null | 9.8 | null | null | null | github | |
CVE-2025-28889 | WordPress Custom Product Stickers for Woocommerce plugin <= 1.9.0 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in starblank Custom Product Stickers for Woocommerce custom-product-stickers-for-woocommerce allows Reflected XSS.This issue affects Custom Product Stickers for Woocommerce: from n/a through <= 1.9.0. | [] | null | null | null | null | null | cvelistv5 |
CVE-2002-1538 | Acuma Acusend 4, and possibly earlier versions, allows remote authenticated users to read the reports of other users by inferring the full URL, whose name is easily predictable. | [
"cpe:2.3:a:acuma:acusend:4.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null | cvelistv5 | |
CVE-2020-0658 | An information disclosure vulnerability exists in the Windows Common Log File System (CLFS) driver when it fails to properly handle objects in memory, aka 'Windows Common Log File System Driver Information Disclosure Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*... | null | 5.5 | null | 2.1 | null | cvelistv5 | |
CVE-2025-59385 | QTS, QuTS hero | An authentication bypass by spoofing vulnerability has been reported to affect several QNAP operating system versions. The remote attackers can then exploit the vulnerability to access resources which are not otherwise accessible without proper authentication.
We have already fixed the vulnerability in the following v... | [] | 8.1 | null | null | null | null | cvelistv5 |
GHSA-qxrx-mx2h-xjr9 | The (1) pty_init_terminal and (2) pipe_init_terminal functions in main.c in s3dvt 0.2.2 and earlier allows local users to gain privileges by leveraging setuid permissions and usage of bash 4.3 and earlier. NOTE: this vulnerability was fixed with commit ad732f00b411b092c66a04c359da0f16ec3b387, but the version number wa... | [] | null | null | 7.8 | null | null | github | |
GHSA-p8w7-f589-855p | Certain types of malformed Path Computation Element Protocol (PCEP) packets when received and processed by a Juniper Networks Junos OS device serving as a Path Computation Client (PCC) in a PCEP environment using Juniper's path computational element protocol daemon (pccd) process allows an attacker to cause the pccd pr... | [] | null | null | null | null | null | github | |
GHSA-mfx4-8w23-hm3j | SQL injection vulnerability in the "Bazar" page in Yeswiki Cercopitheque 2018-06-19-1 and earlier allows attackers to execute arbitrary SQL commands via the "id" parameter. | [] | null | null | 9.8 | null | null | github | |
GHSA-7fqp-g334-ghhw | The Secure flag is not set in the SSL Cookie of Kiwi Syslog Server 9.7.2 and previous versions. The Secure attribute tells the browser to only send the cookie if the request is being sent over a secure channel such as HTTPS. This will help protect the cookie from being passed over unencrypted requests. If the applicati... | [] | null | 5.3 | null | null | null | github | |
GHSA-wghp-x8f8-p2w5 | A flaw has been found in Verysync 微力同步 up to 2.21.3. This impacts an unknown function of the file /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false of the component Web Administration Module. Executing manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit ha... | [] | 2.1 | 6.3 | null | null | null | github | |
CVE-2013-7064 | Cross-site scripting (XSS) vulnerability in the EU Cookie Compliance module 7.x-1.x before 7.x-1.12 for Drupal allows remote authenticated administrators with the "Administer EU Cookie Compliance popup" permission to inject arbitrary web script or HTML via unspecified configuration values. | [
"cpe:2.3:a:freelance-it-consultant:eu_cookie_compliance:*:*:*:*:*:drupal:*:*",
"cpe:2.3:a:freelance-it-consultant:eu_cookie_compliance:7.x-1.0:*:*:*:*:drupal:*:*",
"cpe:2.3:a:freelance-it-consultant:eu_cookie_compliance:7.x-1.1:*:*:*:*:drupal:*:*",
"cpe:2.3:a:freelance-it-consultant:eu_cookie_compliance:7.x-1... | null | null | null | 2.1 | null | cvelistv5 | |
GHSA-7hrc-f2hg-5rgj | A vulnerability has been found in fossology and classified as problematic. This vulnerability affects unknown code. The manipulation of the argument sql/VarValue leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 8e0eba001662c7eb35f045b70dd458a4643b4553. It is recommended to a... | [] | null | 6.1 | null | null | null | github |
This dataset comprises 689,220 real-world vulnerabilities used to train and evaluate VLAI, a transformer-based model designed to predict software vulnerability severity levels directly from text descriptions, enabling faster and more consistent triage.
The dataset is presented in the paper VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification.
| Source | Label | Entries | Share |
|---|---|---|---|
cvelistv5 |
CVE Program (enriched with vulnrichment and Fraunhofer FKIE) | 326,619 | 47.4% |
github |
GitHub Security Advisories | 326,145 | 47.3% |
csaf_redhat |
CSAF Red Hat | 23,529 | 3.4% |
csaf_cisa |
CSAF CISA | 5,794 | 0.8% |
csaf_cisco |
CSAF Cisco | 3,903 | 0.6% |
pysec |
PySec advisories | 3,230 | 0.5% |
Extracted from the database of Vulnerability-Lookup with the VulnTrain project. Dumps of the data are available here.
| Split | Examples |
|---|---|
| train | 620,298 |
| test | 68,922 |
| Field | Type | Description |
|---|---|---|
id |
string | Vulnerability identifier (e.g., CVE-2024-1234, GHSA-xxxx, PYSEC-2024-xxx) |
title |
string | Vulnerability title |
description |
string | Vulnerability description in English |
cpes |
list[string] | Common Platform Enumeration identifiers |
cvss_v4_0 |
float | CVSS v4.0 score |
cvss_v3_1 |
float | CVSS v3.1 score |
cvss_v3_0 |
float | CVSS v3.0 score |
cvss_v2_0 |
float | CVSS v2.0 score |
patch_commit_url |
string | URL to the patch commit on GitHub, if available |
source |
string | Data source identifier |
import json
from datasets import load_dataset
dataset = load_dataset("CIRCL/vulnerability-scores")
vulnerabilities = ["CVE-2012-2339", "RHSA-2023:5964", "GHSA-7chm-34j8-4f22", "PYSEC-2024-225"]
filtered_entries = dataset.filter(lambda elem: elem["id"] in vulnerabilities)
for entry in filtered_entries["train"]:
print(json.dumps(entry, indent=4))