CIRCL/vulnerability-severity-classification-roberta-base
Text Classification • 0.1B • Updated • 935 • • 9
id stringlengths 12 47 | title stringlengths 0 256 ⌀ | description stringlengths 3 189k | cpes listlengths 0 4.89k | cvss_v4_0 float64 0 10 ⌀ | cvss_v3_1 float64 0 10 ⌀ | cvss_v3_0 float64 0 10 ⌀ | cvss_v2_0 float64 0 10 ⌀ | patch_commit_url stringlengths 36 232 ⌀ | source stringclasses 6
values |
|---|---|---|---|---|---|---|---|---|---|
CVE-2018-11851 | In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, lack of check on input received to calculate the buffer length can lead to out of bound write to kernel stack. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null | cvelistv5 | |
CVE-2018-11943 | In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, while processing fastboot flash command, memory leak or unexpected behavior may occur due to processing of unintialized data buffers. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null | cvelistv5 | |
GHSA-545w-p7xc-6h8j | SQL injection vulnerability in ajax/coupon.php in Zuitu 1.6, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the id parameter in a consume action. | [] | null | null | null | null | null | github | |
CVE-2020-2753 | Vulnerability in the Oracle Workflow product of Oracle E-Business Suite (component: Workflow Notification Mailer). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Workflow. Successful at... | [
"cpe:2.3:a:oracle:workflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:workflow:12.1.3:*:*:*:*:*:*:*"
] | null | null | 5.3 | null | null | cvelistv5 | |
GHSA-7f3h-w49m-gjpq | Use after free issue while processing error notification from camx driver due to not properly releasing the sequence data in Snapdragon Mobile in Saipan, SM8250, SXR2130 | [] | null | null | null | null | null | github | |
GHSA-5qxr-ghw4-f8rh | Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. | [] | null | 8.8 | null | null | null | github | |
GHSA-gjwj-2jpg-rvfj | A vulnerability was found in code-projects Document Management System 1.0 and classified as critical. This issue affects the function unlink of the file /dell.php. The manipulation of the argument ID leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be u... | [] | 2.1 | 5.4 | null | null | null | github | |
GHSA-2g74-jg6p-c4x3 | Application Virtualization Remote Code Execution Vulnerability | [] | null | 7.8 | null | null | null | github | |
GHSA-qqfp-3f8f-fv6r | In the Linux kernel, the following vulnerability has been resolved:vhost: vringh: Fix copy_to_iter return value checkThe return value of copy_to_iter can't be negative, check whether the
copied length is equal to the requested length instead of checking for
negative values. | [] | null | null | null | null | null | github | |
GHSA-7j4j-xfgq-3hvf | Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to ex... | [] | null | null | null | null | null | github | |
CVE-2015-2659 | Unspecified vulnerability in Oracle Java SE 8u45 and Java SE Embedded 8u33 allows remote attackers to affect availability via unknown vectors related to Security. | [
"cpe:2.3:a:oracle:jdk:1.8.0:update_33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update_33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update_45:*:*:*:*:*:*"
] | null | null | null | 5 | null | cvelistv5 | |
CVE-2013-5719 | epan/dissectors/packet-assa_r3.c in the ASSA R3 dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet. | [
"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:itanium:*",
"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:sparc:*",
"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:... | null | null | null | 4.3 | null | cvelistv5 | |
GHSA-p529-vwrw-98rc | An issue was discovered in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid memory read in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file. | [] | null | null | null | null | null | github | |
CVE-2000-0585 | ISC DHCP client program dhclient allows remote attackers to execute arbitrary commands via shell metacharacters. | [
"cpe:2.3:a:isc:dhcp_client:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp_client:3.0b1:*:*:*:*:*:*:*"
] | null | null | null | 10 | null | cvelistv5 | |
CVE-2007-5988 | blocks/shoutbox_block.php in BtiTracker 1.4.4 does not verify user accounts, which allows remote attackers to post shoutbox entries as arbitrary users via a modified nick field. | [
"cpe:2.3:a:bti-tracker:bti-tracker:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null | cvelistv5 | |
GHSA-37xv-hhg6-7q67 | In TEEI driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06641388; Issue ID: ALPS06641388. | [] | null | 6.7 | null | null | null | github | |
GHSA-94pf-4p5q-jc3r | In the Linux kernel, the following vulnerability has been resolved:iommu/vt-d: Avoid memory allocation in iommu_suspend()The iommu_suspend() syscore suspend callback is invoked with IRQ disabled.
Allocating memory with the GFP_KERNEL flag may re-enable IRQs during
the suspend callback, which can cause intermittent susp... | [] | null | 5.5 | null | null | null | github | |
GHSA-2fgw-ch33-hpgq | Cross-Site Request Forgery (CSRF) vulnerability in LiveChat LiveChat – WP live chat plugin for WordPress.This issue affects LiveChat – WP live chat plugin for WordPress: from n/a through 4.5.15. | [] | null | 5.4 | null | null | null | github | |
GHSA-wqpx-wp8j-gw7r | Missing Authorization vulnerability in yaadsarig Yaad Sarig Payment Gateway For WC yaad-sarig-payment-gateway-for-wc allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Yaad Sarig Payment Gateway For WC: from n/a through <= 2.2.10. | [] | null | 9.1 | null | null | null | github | |
GHSA-f6c2-v47m-87f7 | Multiple integer signedness errors in the printf function family in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 on 64 bit machines allow context-dependent attackers to execute arbitrary code via (1) certain negative argument numbers that arise in the php_formatted_print function because of 64 to 32 bit truncation, and by... | [] | null | null | null | null | null | github | |
GHSA-83hv-jw3v-m24m | Missing Authorization vulnerability in Tips and Tricks HQ WP eMember allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP eMember: from n/a through v10.2.2. | [] | null | 5.3 | null | null | null | github | |
GHSA-gfwv-5762-mwrm | An Authorization Bypass Through User-Controlled Key vulnerability in Hubitat Elevation home automation controllers prior to version 2.4.2.157 could allow a remote authenticated user to control connected devices outside of their authorized scope via client-side request manipulation. | [] | 9.4 | null | null | null | null | github | |
CVE-2024-36615 | FFmpeg n7.0 has a race condition vulnerability in the VP9 decoder. This could lead to a data race if video encoding parameters were being exported, as the side data would be attached in the decoder thread while being read in the output thread. | [] | null | 5.9 | null | null | null | cvelistv5 | |
CVE-2024-45306 | heap-buffer-overflow in Vim | Vim is an open source, command line text editor. Patch v9.1.0038 optimized how the cursor position is calculated and removed a loop, that verified that the cursor position always points inside a line and does not become invalid by pointing beyond the end of
a line. Back then we assumed this loop is unnecessary. However... | [
"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*"
] | null | 4.5 | null | null | null | cvelistv5 |
RHSA-2022:4690 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | argocd: Symlink following allows leaking out-of-bound manifests and JSON files from Argo CD repo-server argocd: Login screen allows message spoofing if SSO is enabled argocd: ArgoCD will blindly trust JWT claims if anonymous access is enabled | [
"cpe:/a:redhat:openshift_gitops:1.5::el8"
] | null | 10 | null | null | null | csaf_redhat |
GHSA-q24g-whhp-wgpm | Improper access control in fall detection for Galaxy Watch prior to SMR Aug-2025 Release 1 allows local attackers to modify fall detection configuration. | [] | null | 5.5 | null | null | null | github | |
CVE-2019-8218 | Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:... | null | 7.5 | null | 5 | null | cvelistv5 | |
GHSA-9qwm-7466-pm49 | In hal_fd_init of hal_fd.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146144463 | [] | null | null | null | null | null | github | |
GHSA-q3xm-878j-qfwr | Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . | [] | null | null | 9.8 | null | null | github | |
CVE-2018-16436 | Gxlcms 2.0 before bug fix 20180915 has SQL Injection exploitable by an administrator. | [
"cpe:2.3:a:gxlcms:gxlcms:2.0:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.5 | null | cvelistv5 | |
CVE-2024-24994 | A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM. | [
"cpe:2.3:a:ivanti:avalanche:6.4.3:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null | cvelistv5 | |
CVE-2023-48343 | In video decoder, there is a possible out of bounds write due to improper input validation. This could lead to local denial of service with no additional execution privileges needed | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*... | null | 5.5 | null | null | null | cvelistv5 | |
GHSA-r3q4-wc3p-2gx3 | While reading the data from buffer in dci_process_ctrl_status() there can be buffer over-read problem if the len is not checked correctly in Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05. | [] | null | null | 7.5 | null | null | github | |
CVE-2022-2357 | WSM Downloader <= 1.4.0 - Unauthenticated Arbitrary File Download | The WSM Downloader WordPress plugin through 1.4.0 allows any visitor to use its remote file download feature to download any local files, including sensitive ones like wp-config.php. | [
"cpe:2.3:a:wsm_downloader_project:wsm_downloader:*:*:*:*:*:wordpress:*:*"
] | null | 7.5 | null | null | null | cvelistv5 |
GHSA-vc25-x8r3-qcjv | Vulnerability in the Oracle Human Resources component of Oracle E-Business Suite (subcomponent: General Utilities). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to... | [] | null | null | 9.1 | null | null | github | |
CVE-2024-5055 | Vulnerability of uncontrolled resource consumption in XAMPP | Uncontrolled resource consumption vulnerability in XAMPP Windows, versions 7.3.2 and earlier. This vulnerability exists when XAMPP attempts to process many incomplete HTTP requests, resulting in resource consumption and system crashes. | [
"cpe:2.3:a:apachefriends:xampp:7.3.2:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null | cvelistv5 |
CVE-2023-30483 | WordPress Watu Quiz Plugin <= 3.3.9.2 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Kiboko Labs Watu Quiz plugin <= 3.3.9.2 versions. | [
"cpe:2.3:a:kibokolabs:watu_quiz:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null | null | cvelistv5 |
GHSA-3fq5-c2gj-gmqj | The Elementor Page Builder plugin before 2.8.4 for WordPress does not sanitize data during creation of a new template. | [] | null | 9.8 | null | null | null | github | |
GHSA-m4j7-pccf-3jcm | Vulnerability in the Oracle Lease and Finance Management product of Oracle E-Business Suite (component: Quotes). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Lease and Finance ... | [] | null | null | null | null | null | github | |
GHSA-w52f-8m83-9j69 | The Microsoft (1) JScript 5.8 and (2) VBScript 5.7 and 5.8 engines, as used in Internet Explorer 9 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different ... | [] | null | null | 7.5 | null | null | github | |
CVE-2026-0518 | XSS in Secure Access Consoles prior to 14.20 | CVE-2026-0518 is a cross-site scripting vulnerability in versions of
Secure Access prior to 14.20. An attacker with administrative privileges
can interfere with another administrator’s use of the console. | [] | 4.8 | null | null | null | null | cvelistv5 |
PYSEC-2021-773 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can generate undefined behavior via a reference binding to nullptr in `BoostedTreesCalculateBestGainsPerFeature` and similar attack can occur in `BoostedTreesCalculateBestFeatureSplitV2`. The [implementation](https:/... | [] | null | null | null | null | null | pysec |
RHSA-2015:0782 | Red Hat Security Advisory: kernel security and bug fix update | kernel: integer overflow in fb_mmap kernel: kvm: vmx: invalid host cr4 handling across vm entries kernel: isofs: unbound recursion when processing relocated directories kernel: isofs: unbound recursion when processing relocated directories kernel: infiniband: uverbs: unprotected physical memory access kernel: usb: buff... | [
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server"
] | null | null | null | null | null | csaf_redhat |
GHSA-vgw6-6p69-qxq7 | AppleGraphicsPowerManagement in Apple OS X before 10.11.3 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors. | [] | null | null | 7.8 | null | null | github | |
CVE-2023-4224 | Chamilo LMS File Upload Functionality Remote Code Execution | Unrestricted file upload in `/main/inc/ajax/dropbox.ajax.php` in Chamilo LMS <= v1.11.24 allows authenticated attackers with learner role to obtain remote code execution via uploading of PHP files. | [
"cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | https://github.com/chamilo/chamilo-lms/commit/6f32625a012d5de2dfe8edbccb4ed14a85e310d4 | cvelistv5 |
GHSA-g2xf-r6pf-g763 | A local file deletion vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a user to delete system files from the endpoint with elevated privileges through a race condition. | [] | null | 6.3 | null | null | null | github | |
GHSA-gq4g-cfc7-fgw7 | The Windows installer that the Apache CouchDB team provides was vulnerable to local privilege escalation. All files in the install inherit the file permissions of the parent directory and therefore a non-privileged user can substitute any executable for the nssm.exe service launcher, or CouchDB batch or binary files. A... | [] | null | null | 7.8 | null | null | github | |
GHSA-r7gv-q6w2-pwmp | Unknown vulnerability in Safari web browser in Mac OS X 10.2.8 and 10.3.2, with unknown impact. | [] | null | null | null | null | null | github | |
GHSA-rf8c-553r-qgf7 | The Allow SVG WordPress plugin before 1.2.0 does not sanitize uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads. | [] | null | 6.1 | null | null | null | github | |
CVE-2022-33027 | LibreDWG v0.12.4.4608 was discovered to contain a heap-use-after-free via the function dwg_add_handleref at dwg.c. | [
"cpe:2.3:a:gnu:libredwg:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null | cvelistv5 | |
GHSA-c5xh-656p-g98m | The swap_char2b function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption. | [] | null | null | null | null | null | github | |
GHSA-r9gm-88g3-6g68 | AdGuard DNS before 2.2 allows remote attackers to cause a denial of service via malformed UDP packets. | [] | null | 7.5 | null | null | null | github | |
GHSA-4323-f82v-f6jr | Magento Open Source Cross-Site Request Forgery (CSRF) vulnerability | Magento Open Source versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor unauthorised actions on behalf of a user. The vulnerability could be exploited by tricking a victim... | [] | 5.3 | 4.3 | null | null | null | github |
CVE-2025-37112 | Hard-Coded Encryption Keys found in System | A vulnerability was discovered in the storage policy for certain sets of encryption keys in the HPE Telco Network Function Virtual Orchestrator. Successful Exploitation could lead to unauthorized parties gaining access to sensitive system information. | [] | null | 6 | null | null | null | cvelistv5 |
GHSA-f97w-xx7w-xwgf | A JSON Injection vulnerability exists in the `mintplex-labs/anything-llm` application, specifically within the username parameter during the login process at the `/api/request-token` endpoint. The vulnerability arises from improper handling of values, allowing attackers to perform brute force attacks without prior know... | [] | null | null | 5.3 | null | null | github | |
GHSA-c9cr-34rr-8gpr | The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server... | [] | null | 9.8 | null | null | null | github | |
GHSA-cwqx-xrfh-m9p5 | Gira TKS-IP-Gateway 4.0.7.7 is vulnerable to unauthenticated path traversal that allows an attacker to download the application database. This can be combined with CVE-2020-10795 for remote root access. | [] | null | null | null | null | null | github | |
CVE-2022-47578 | An issue was discovered in the endpoint protection agent in Zoho ManageEngine Device Control Plus 10.1.2228.15. Despite configuring complete restrictions on USB pendrives, USB HDD devices, memory cards, USB connections to mobile devices, etc., it is still possible to bypass the USB restrictions by booting into Safe Mod... | [
"cpe:2.3:a:zohocorp:manageengine_device_control_plus:10.1.2228.15:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null | cvelistv5 | |
CVE-2012-2856 | The PDF functionality in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger out-of-bounds write operations. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.32:*:*:*:*:*:*:... | null | null | null | 7.5 | null | cvelistv5 | |
CVE-2006-6501 | Unspecified vulnerability in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to gain privileges and install malicious code via the watch Javascript function. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*",
"cpe:2... | null | null | null | 6.8 | null | cvelistv5 | |
GHSA-4ppg-2mx6-fqx9 | Moodle allows attackers to bypass intended login restrictions | login/confirm.php in Moodle through 2.5.9, 2.6.x before 2.6.11, 2.7.x before 2.7.8, and 2.8.x before 2.8.6 allows remote authenticated users to bypass intended login restrictions by leveraging access to an unconfirmed suspended account. | [] | null | null | null | null | null | github |
CVE-2013-2506 | app/models/spree/user.rb in spree_auth_devise in Spree 1.1.x before 1.1.6, 1.2.x, and 1.3.x does not perform mass assignment safely when updating a user, which allows remote authenticated users to assign arbitrary roles to themselves. | [
"cpe:2.3:a:spreecommerce:spree:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:spreecommerce:spree:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:spreecommerce:spree:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:spreecommerce:spree:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:spreecommerce:spree:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:spreecommerce:spree:1.1.5:*:*:... | null | null | null | 4 | null | cvelistv5 | |
CVE-2026-33647 | AVideo Vulnerable to Remote Code Execution via MIME/Extension Mismatch in ImageGallery File Upload | WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `ImageGallery::saveFile()` method validates uploaded file content using `finfo` MIME type detection but derives the saved filename extension from the user-supplied original filename without an allowlist check. An attacker can upload... | [] | null | 8.8 | null | null | null | cvelistv5 |
CVE-2023-4007 | Cross-site Scripting (XSS) - Stored in thorsten/phpmyfaq | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.16. | [
"cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null | cvelistv5 |
CVE-2025-48069 | ejson2env has insufficient input sanitization | ejson2env allows users to decrypt EJSON secrets and export them as environment variables. Prior to version 2.0.8, the `ejson2env` tool has a vulnerability related to how it writes to `stdout`. Specifically, the tool is intended to write an export statement for environment variables and their values. However, due to ina... | [] | null | 6.6 | null | null | null | cvelistv5 |
CVE-2009-4740 | Directory traversal vulnerability in the Webesse E-Card (ws_ecard) extension 1.0.2 and earlier for TYPO3 has unspecified impact and remote attack vectors. | [
"cpe:2.3:a:typo3:ws_ecard:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null | cvelistv5 | |
GHSA-mjfg-f7h7-cr79 | An issue was discovered in Faronics Insight 10.0.19045 on Windows. Attacker-supplied input is not validated/sanitized before being rendered in both the Teacher and Student Console applications, enabling an attacker to execute JavaScript in these applications. Due to the rich and highly privileged functionality offered ... | [] | null | 6.1 | null | null | null | github | |
CVE-2005-2292 | Oracle JDeveloper 9.0.4, 9.0.5, and 10.1.2 stores cleartext passwords in (1) IDEConnections.xml, (2) XSQLConfig.xml and (3) settings.xml, which allows local users to obtain sensitive information. | [
"cpe:2.3:a:oracle:jdeveloper:9.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdeveloper:9.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdeveloper:10.1.2:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null | cvelistv5 | |
GHSA-3w6w-q6rh-xhgj | The MW WP Form plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the '_single_file_upload' function in versions up to, and including, 5.0.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make ... | [] | null | 9.8 | null | null | null | github | |
CVE-2025-29366 | In mupen64plus v2.6.0 there is an array overflow vulnerability in the write_rdram_regs and write_rdram_regs functions, which enables executing arbitrary commands on the host machine. | [] | null | 9.8 | null | null | null | cvelistv5 | |
CVE-2024-46088 | An arbitrary file upload vulnerability in the ProductAction.entphone interface of Zhejiang University Entersoft Customer Resource Management System v2002 to v2024 allows attackers to execute arbitrary code via uploading a crafted file. | [
"cpe:2.3:a:zhejiang_university:entersoft_customer_resource_management:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null | cvelistv5 | |
CVE-2022-23058 | ERPNext - Stored XSS in My Settings | ERPNext in versions v12.0.9-v13.0.3 are affected by a stored XSS vulnerability that allows low privileged users to store malicious scripts in the ‘username’ field in ‘my settings’ which can lead to full account takeover. | [
"cpe:2.3:a:frappe:erpnext:*:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null | cvelistv5 |
CVE-2023-5588 | kphrx pleroma pack.ex Pleroma.Emoji.Pack path traversal | A vulnerability was found in kphrx pleroma. It has been classified as problematic. This affects the function Pleroma.Emoji.Pack of the file lib/pleroma/emoji/pack.ex. The manipulation of the argument name leads to path traversal. The complexity of an attack is rather high. The exploitability is told to be difficult. Th... | [
"cpe:2.3:a:kpherox:pleroma:-:*:*:*:*:*:*:*"
] | null | 2.6 | 2.6 | 1.4 | https://github.com/kphrx/pleroma/commit/2c795094535537a8607cc0d3b7f076a609636f40 | cvelistv5 |
GHSA-xg6j-69w9-f6xv | Blind SQL injection in contactus.php in doctor appointment system 1.0 allows an unauthenticated attacker to insert malicious SQL queries via lastname parameter. | [] | null | null | null | null | null | github | |
CVE-2022-20559 | In revokeOwnPermissionsOnKill of PermissionManager.java, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed... | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 3.3 | null | null | null | cvelistv5 | |
RHSA-2018:2404 | Red Hat Security Advisory: rhev-hypervisor7 security update | Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: hw: cpu: L1 terminal fault (L1TF) | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 5.6 | null | null | csaf_redhat |
RHSA-2023:4415 | Red Hat Security Advisory: iperf3 security update | iperf3: memory allocation hazard and crash | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null | null | csaf_redhat |
GHSA-7cmj-xmp5-mmr2 | The NPort IA5000A Series devices use Telnet as one of the network device management services. Telnet does not support the encryption of client-server communications, making it vulnerable to Man-in-the-Middle attacks. | [] | null | 5.9 | null | null | null | github | |
RHSA-2022:8418 | Red Hat Security Advisory: mingw-glib2 security and bug fix update | glib: g_file_replace() with G_FILE_CREATE_REPLACE_DESTINATION creates empty target for dangling symlink | [
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null | null | csaf_redhat |
GHSA-2f98-4x2w-23pw | A vulnerability has been found in ESAFENET DSM 3.1.2 and classified as critical. Affected by this vulnerability is the function examExportPDF of the file /admin/plan/examExportPDF. The manipulation of the argument s leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the p... | [] | 5.3 | 6.3 | null | null | null | github | |
CVE-2016-5538 | Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect confidentiality, integrity, and availability via vectors related to Core, a different vulnerability than CVE-2016-5501. | [
"cpe:2.3:a:oracle:vm_virtualbox:5.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:5.1.7:*:*:*:*:*:*:*"
] | null | null | 6.7 | 7.2 | null | cvelistv5 | |
CVE-2014-3714 | The ARM image loading functionality in Xen 4.4.x does not properly validate kernel length, which allows local users to read system memory or cause a denial of service (crash) via a crafted 32-bit ARM guest kernel in an image, which triggers a buffer overflow. | [
"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*"
] | null | null | null | 3.3 | null | cvelistv5 | |
CVE-2023-21690 | Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability | Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsof... | null | 9.8 | null | null | null | cvelistv5 |
GHSA-863r-cfhv-7rmg | MicroDicomDICOM Viewer suffers from an out-of-bounds write vulnerability. Remote attackers are able to exploit this issue to potentially execute arbitrary code on affected installations of DICOM Viewer. User interaction is required to exploit the vulnerability in that the user must either visit a malicious website or o... | [] | 8.6 | 8.8 | null | null | null | github | |
CVE-2024-10589 | Leopard <= 3.1.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Options Update | The Leopard - WordPress Offload Media plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the import_settings() function in all versions up to, and including, 3.1.1. This makes it possible for authenticated attackers, with Su... | [
"cpe:2.3:a:nouthemese:leopard:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null | cvelistv5 |
CVE-1999-0492 | The ffingerd 1.19 allows remote attackers to identify users on the target system based on its responses. | [] | null | null | null | 10 | null | cvelistv5 | |
GHSA-j7fq-277w-8778 | The Automatic Translator with Google Translate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the custom font setting in all versions up to, and including, 1.5.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-leve... | [] | null | 4.4 | null | null | null | github | |
CVE-2023-34354 | A stored cross-site scripting (XSS) vulnerability exists in the upload_brand.cgi functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to execution of arbitrary javascript in another user's browser. An attacker can make an authenticated HTTP request to trigger this vulnerabi... | [
"cpe:2.3:o:peplink:surf_soho_firmware:6.3.5:*:*:*:*:*:*:*",
"cpe:2.3:h:peplink:surf_soho:hw1:*:*:*:*:*:*:*"
] | null | 3.4 | null | null | null | cvelistv5 | |
CVE-2024-21394 | Dynamics 365 Field Service Spoofing Vulnerability | Dynamics 365 Field Service Spoofing Vulnerability | [
"cpe:2.3:a:microsoft:dynamics_365:*:*:*:*:on-premises:*:*:*"
] | null | 7.6 | null | null | null | cvelistv5 |
CVE-2006-2021 | Absolute path traversal vulnerability in recordings/misc/audio.php in the Asterisk Recording Interface (ARI) web interface in Asterisk@Home before 2.8 allows remote attackers to read arbitrary MP3, WAV, and GSM files via a full pathname in the recording parameter. NOTE: this issue can also be used to determine existen... | [
"cpe:2.3:a:asteriskathome:asteriskathome:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null | cvelistv5 | |
ICSMA-24-319-01 | Baxter Life2000 Ventilation System | Improper data protection on the ventilator's serial interface could allow an attacker to send and receive messages that result in unauthorized disclosure of information and/or have unintended impacts on device settings and performance. There is no limit on the number of failed login attempts permitted with the Clinicia... | [] | null | 10 | null | null | null | csaf_cisa |
CVE-2023-0259 | WP Google Review Slider < 11.8 - Subscriber+ SQLi | The WP Google Review Slider WordPress plugin before 11.8 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as subscriber. | [
"cpe:2.3:a:ljapps:wp_google_review_slider:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null | null | cvelistv5 |
GHSA-v67h-j6jf-6wcf | NAVER Toolbar before 4.0.30.323 allows remote attackers to execute arbitrary code via a crafted upgrade.xml file. Special characters in filename parameter can be the cause of bypassing code signing check function. | [] | null | 9.8 | null | null | null | github | |
GHSA-v7cr-w5v6-6659 | October CMS Local File Inclusion | October CMS version prior to Build 437 contains a Local File Inclusion vulnerability in [modules/system/traits/ViewMaker.php](https://github.com/octobercms/october/blob/v1.0.436/modules/system/traits/ViewMaker.php#L244) (makeFileContents function) that can result in Sensitive information disclosure and remote code exec... | [] | null | null | 8.1 | null | null | github |
GHSA-4hr5-8pr2-wx36 | Buffer Overflow vulnerability in TRENDnet Trendnet AC1200 TEW-821DAP with firmware version 3.00b06 allows an attacker to execute arbitrary code via the adm_mod_pwd action. | [] | null | 8 | null | null | null | github | |
CVE-2021-37389 | Chamilo 1.11.14 allows stored XSS via main/install/index.php and main/install/ajax.php through the port parameter. | [
"cpe:2.3:a:chamilo:chamilo:1.11.14:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null | cvelistv5 | |
GHSA-hfvc-g252-rp4g | Denial of Service in i18n | This affects the package i18n before version 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs. | [] | null | 7.5 | null | null | null | github |
GHSA-qqvg-66jj-vpq5 | Insufficient policy enforcement in payments in Google Chrome prior to 79.0.3945.79 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. | [] | null | 4.3 | null | null | null | github | |
CVE-2024-50182 | secretmem: disable memfd_secret() if arch cannot set direct map | In the Linux kernel, the following vulnerability has been resolved:
secretmem: disable memfd_secret() if arch cannot set direct map
Return -ENOSYS from memfd_secret() syscall if !can_set_direct_map(). This
is the case for example on some arm64 configurations, where marking 4k
PTEs in the direct map not present can o... | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*"
] | null | 5.5 | null | null | null | cvelistv5 |
GHSA-r3m2-54q4-vqvq | An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka 'Win32k Information Disclosure Vulnerability'. | [] | null | null | null | null | null | github |
This dataset comprises 686,178 real-world vulnerabilities used to train and evaluate VLAI, a transformer-based model designed to predict software vulnerability severity levels directly from text descriptions, enabling faster and more consistent triage.
The dataset is presented in the paper VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification.
| Source | Label | Entries | Share |
|---|---|---|---|
cvelistv5 |
CVE Program (enriched with vulnrichment and Fraunhofer FKIE) | 324,994 | 47.4% |
github |
GitHub Security Advisories | 324,731 | 47.3% |
csaf_redhat |
CSAF Red Hat | 23,529 | 3.4% |
csaf_cisa |
CSAF CISA | 5,791 | 0.8% |
csaf_cisco |
CSAF Cisco | 3,903 | 0.6% |
pysec |
PySec advisories | 3,230 | 0.5% |
Extracted from the database of Vulnerability-Lookup with the VulnTrain project. Dumps of the data are available here.
| Split | Examples |
|---|---|
| train | 617,560 |
| test | 68,618 |
| Field | Type | Description |
|---|---|---|
id |
string | Vulnerability identifier (e.g., CVE-2024-1234, GHSA-xxxx, PYSEC-2024-xxx) |
title |
string | Vulnerability title |
description |
string | Vulnerability description in English |
cpes |
list[string] | Common Platform Enumeration identifiers |
cvss_v4_0 |
float | CVSS v4.0 score |
cvss_v3_1 |
float | CVSS v3.1 score |
cvss_v3_0 |
float | CVSS v3.0 score |
cvss_v2_0 |
float | CVSS v2.0 score |
patch_commit_url |
string | URL to the patch commit on GitHub, if available |
source |
string | Data source identifier |
import json
from datasets import load_dataset
dataset = load_dataset("CIRCL/vulnerability-scores")
vulnerabilities = ["CVE-2012-2339", "RHSA-2023:5964", "GHSA-7chm-34j8-4f22", "PYSEC-2024-225"]
filtered_entries = dataset.filter(lambda elem: elem["id"] in vulnerabilities)
for entry in filtered_entries["train"]:
print(json.dumps(entry, indent=4))