Dataset Preview
Duplicate
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The information about the size of the dataset is not coherent.
Error code:   UnexpectedError

Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.

instruction
string
input
string
output
string
Explain CVE-2025-52714 in plain language and summarize the risk.
CVE-2025-52714 summary: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in shinetheme Traveler traveler allows SQL Injection.This issue affects Traveler: from n/a through < 3.2.2.
How should CVE-2025-52714 be mitigated in a production environment?
CVE-2025-52714 summary: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in shinetheme Traveler traveler allows SQL Injection.This issue affects Traveler: from n/a through < 3.2.2. Mitigation guidance: - Identify affected product/version and apply vendor patches or upd...
Explain CVE-2017-0870 in plain language and summarize the risk.
CVE-2017-0870 summary: An elevation of privilege vulnerability in the Android framework (libminikin). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID A-62134807.
How should CVE-2017-0870 be mitigated in a production environment?
CVE-2017-0870 summary: An elevation of privilege vulnerability in the Android framework (libminikin). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID A-62134807. Mitigation guidance: - Identify affected product/version and apply vendor patches or updates. - If patching is not possible...
How should CVE-2018-0022 be mitigated in a production environment?
CVE-2018-0022 summary: A Junos device with VPLS routing-instances configured on one or more interfaces may be susceptible to an mbuf leak when processing a specific MPLS packet. Approximately 1 mbuf is leaked per each packet processed. The number of mbufs is platform dependent. The following command provides the number...
What is the impact of CVE-2018-0022 and how serious is it?
CVE-2018-0022 summary: A Junos device with VPLS routing-instances configured on one or more interfaces may be susceptible to an mbuf leak when processing a specific MPLS packet. Approximately 1 mbuf is leaked per each packet processed. The number of mbufs is platform dependent. The following command provides the number...
How should CVE-2015-3120 be mitigated in a production environment?
CVE-2015-3120 summary: Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow attackers to execute arbitrary code by leveraging a...
Summarize CVE-2015-3120 and include severity context.
CVE-2015-3120 summary: Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow attackers to execute arbitrary code by leveraging a...
Summarize CVE-2022-50629 and include severity context.
CVE-2022-50629 summary: In the Linux kernel, the following vulnerability has been resolved: wifi: rsi: Fix memory leak in rsi_coex_attach() The coex_cb needs to be freed when rsi_create_kthread() failed in rsi_coex_attach(). Severity: (No CVSS data available.)
How should CVE-2022-50629 be mitigated in a production environment?
CVE-2022-50629 summary: In the Linux kernel, the following vulnerability has been resolved: wifi: rsi: Fix memory leak in rsi_coex_attach() The coex_cb needs to be freed when rsi_create_kthread() failed in rsi_coex_attach(). Mitigation guidance: - Identify affected product/version and apply vendor patches or updates...
What systems are affected by CVE-2022-33988?
CVE-2022-33988 summary: dproxy-nexgen (aka dproxy nexgen) re-uses the DNS transaction id (TXID) value from client queries, which allows attackers (able to send queries to the resolver) to conduct DNS cache-poisoning attacks because the TXID value is known to the attacker. Affected systems: - Depends on the specific pr...
Explain CVE-2022-33988 in plain language and summarize the risk.
CVE-2022-33988 summary: dproxy-nexgen (aka dproxy nexgen) re-uses the DNS transaction id (TXID) value from client queries, which allows attackers (able to send queries to the resolver) to conduct DNS cache-poisoning attacks because the TXID value is known to the attacker.
What systems are affected by CVE-2000-0735?
CVE-2000-0735 summary: Buffer overflow in Becky! Internet Mail client 1.26.03 and earlier allows remote attackers to cause a denial of service via a long Content-type: MIME header when the user replies to a message. Affected systems: - Depends on the specific product/version described in the advisory. - Confirm by che...
Explain CVE-2000-0735 in plain language and summarize the risk.
CVE-2000-0735 summary: Buffer overflow in Becky! Internet Mail client 1.26.03 and earlier allows remote attackers to cause a denial of service via a long Content-type: MIME header when the user replies to a message.
What is the impact of CVE-2015-0145 and how serious is it?
CVE-2015-0145 summary: Cross-site request forgery (CSRF) vulnerability in IBM OpenPages GRC Platform 6.2 before IF7, 6.2.1 before 6.2.1.1 IF5, 7.0 before FP4, and 7.1 before FP1 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences. Severity: (No CVSS ...
Summarize CVE-2015-0145 and include severity context.
CVE-2015-0145 summary: Cross-site request forgery (CSRF) vulnerability in IBM OpenPages GRC Platform 6.2 before IF7, 6.2.1 before 6.2.1.1 IF5, 7.0 before FP4, and 7.1 before FP1 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences. Severity: (No CVSS ...
Explain CVE-2021-26879 in plain language and summarize the risk.
CVE-2021-26879 summary: Windows Network Address Translation (NAT) Denial of Service Vulnerability
What is the impact of CVE-2021-26879 and how serious is it?
CVE-2021-26879 summary: Windows Network Address Translation (NAT) Denial of Service Vulnerability Severity: (No CVSS data available.) Impact guidance: - Impact varies by affected product and configuration. - Common impacts include remote code execution, privilege escalation, information disclosure, or denial of servi...
Explain CVE-2026-3338 in plain language and summarize the risk.
CVE-2026-3338 summary: Improper signature validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass signature verification when processing PKCS7 objects with Authenticated Attributes. Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC versio...
What is the impact of CVE-2026-3338 and how serious is it?
CVE-2026-3338 summary: Improper signature validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass signature verification when processing PKCS7 objects with Authenticated Attributes. Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC versio...
Summarize CVE-2014-9150 and include severity context.
CVE-2014-9150 summary: Race condition in the MoveFileEx call hook feature in Adobe Reader and Acrobat 11.x before 11.0.09 on Windows allows attackers to bypass a sandbox protection mechanism, and consequently write to files in arbitrary locations, via an NTFS junction attack, a similar issue to CVE-2014-0568. Severity...
What systems are affected by CVE-2014-9150?
CVE-2014-9150 summary: Race condition in the MoveFileEx call hook feature in Adobe Reader and Acrobat 11.x before 11.0.09 on Windows allows attackers to bypass a sandbox protection mechanism, and consequently write to files in arbitrary locations, via an NTFS junction attack, a similar issue to CVE-2014-0568. Affected...
How should CVE-2021-37270 be mitigated in a production environment?
CVE-2021-37270 summary: There is an unauthorized access vulnerability in the CMS Enterprise Website Construction System 5.0. Attackers can use this vulnerability to directly access the specified background path without logging in to the background to obtain the background administrator authority. Mitigation guidance: ...
What is the impact of CVE-2021-37270 and how serious is it?
CVE-2021-37270 summary: There is an unauthorized access vulnerability in the CMS Enterprise Website Construction System 5.0. Attackers can use this vulnerability to directly access the specified background path without logging in to the background to obtain the background administrator authority. Severity: (No CVSS da...
How should CVE-2020-24460 be mitigated in a production environment?
CVE-2020-24460 summary: Incorrect default permissions in the Intel(R) DSA before version 20.8.30.6 may allow an authenticated user to potentially enable denial of service via local access. Mitigation guidance: - Identify affected product/version and apply vendor patches or updates. - If patching is not possible, reduc...
Summarize CVE-2020-24460 and include severity context.
CVE-2020-24460 summary: Incorrect default permissions in the Intel(R) DSA before version 20.8.30.6 may allow an authenticated user to potentially enable denial of service via local access. Severity: (No CVSS data available.)
Explain CVE-2006-4135 in plain language and summarize the risk.
CVE-2006-4135 summary: PHP remote file inclusion vulnerability in cal_config.inc.php in Calendarix 0.7.20060401 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the calpath parameter. NOTE: this issue has been disputed by a third party, who says that the affected $calpath variable is set ...
What is the impact of CVE-2006-4135 and how serious is it?
CVE-2006-4135 summary: PHP remote file inclusion vulnerability in cal_config.inc.php in Calendarix 0.7.20060401 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the calpath parameter. NOTE: this issue has been disputed by a third party, who says that the affected $calpath variable is set ...
Summarize CVE-2025-8151 and include severity context.
CVE-2025-8151 summary: The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 2.9.1 via the 'save_block_css' function. This makes it possible for authenticated attackers, with Author-level access and above, to create CSS files in any direct...
What systems are affected by CVE-2025-8151?
CVE-2025-8151 summary: The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 2.9.1 via the 'save_block_css' function. This makes it possible for authenticated attackers, with Author-level access and above, to create CSS files in any direct...
Explain CVE-2023-40422 in plain language and summarize the risk.
CVE-2023-40422 summary: The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14. An app may be able to cause a denial-of-service.
How should CVE-2023-40422 be mitigated in a production environment?
CVE-2023-40422 summary: The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14. An app may be able to cause a denial-of-service. Mitigation guidance: - Identify affected product/version and apply vendor patches or updates. - If patching is not possible, reduce exposure by restric...
How should CVE-2025-10279 be mitigated in a production environment?
CVE-2025-10279 summary: In mlflow version 2.20.3, the temporary directory used for creating Python virtual environments is assigned insecure world-writable permissions (0o777). This vulnerability allows an attacker with write access to the `/tmp` directory to exploit a race condition and overwrite `.py` files in the vi...
What systems are affected by CVE-2025-10279?
CVE-2025-10279 summary: In mlflow version 2.20.3, the temporary directory used for creating Python virtual environments is assigned insecure world-writable permissions (0o777). This vulnerability allows an attacker with write access to the `/tmp` directory to exploit a race condition and overwrite `.py` files in the vi...
What is the impact of CVE-2018-25214 and how serious is it?
CVE-2018-25214 summary: MegaPing contains a local buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized payload to the Destination Address List field in the Finger function. Attackers can paste a crafted buffer exceeding expected input limits into the vulnerable fi...
What systems are affected by CVE-2018-25214?
CVE-2018-25214 summary: MegaPing contains a local buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized payload to the Destination Address List field in the Finger function. Attackers can paste a crafted buffer exceeding expected input limits into the vulnerable fi...
Summarize CVE-2024-0804 and include severity context.
CVE-2024-0804 summary: Insufficient policy enforcement in iOS Security UI in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium) Severity: (No CVSS data available.)
What systems are affected by CVE-2024-0804?
CVE-2024-0804 summary: Insufficient policy enforcement in iOS Security UI in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium) Affected systems: - Depends on the specific product/version described in the advisory. - Co...
Explain CVE-2021-45034 in plain language and summarize the risk.
CVE-2021-45034 summary: A vulnerability has been identified in CP-8000 MASTER MODULE WITH I/O -25/+70°C (All versions < V16.20), CP-8000 MASTER MODULE WITH I/O -40/+70°C (All versions < V16.20), CP-8021 MASTER MODULE (All versions < V16.20), CP-8022 MASTER MODULE WITH GPRS (All versions < V16.20). The web server of the...
How should CVE-2021-45034 be mitigated in a production environment?
CVE-2021-45034 summary: A vulnerability has been identified in CP-8000 MASTER MODULE WITH I/O -25/+70°C (All versions < V16.20), CP-8000 MASTER MODULE WITH I/O -40/+70°C (All versions < V16.20), CP-8021 MASTER MODULE (All versions < V16.20), CP-8022 MASTER MODULE WITH GPRS (All versions < V16.20). The web server of the...
Summarize CVE-2020-0484 and include severity context.
CVE-2020-0484 summary: In destroyResources of ComposerClient.h, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-1557694...
Explain CVE-2020-0484 in plain language and summarize the risk.
CVE-2020-0484 summary: In destroyResources of ComposerClient.h, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-1557694...
What systems are affected by CVE-2018-13462?
CVE-2018-13462 summary: The mintToken function of a smart contract implementation for MoonToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. Affected systems: - Depends on the specific product/version described in the advisory. ...
Explain CVE-2018-13462 in plain language and summarize the risk.
CVE-2018-13462 summary: The mintToken function of a smart contract implementation for MoonToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
What systems are affected by CVE-2021-47885?
CVE-2021-47885 summary: Multiple payment terminal versions contain non-persistent cross-site scripting vulnerabilities in billing and payment information input fields. Attackers can inject malicious script code through vulnerable parameters to manipulate client-side requests and potentially execute session hijacking or...
Explain CVE-2021-47885 in plain language and summarize the risk.
CVE-2021-47885 summary: Multiple payment terminal versions contain non-persistent cross-site scripting vulnerabilities in billing and payment information input fields. Attackers can inject malicious script code through vulnerable parameters to manipulate client-side requests and potentially execute session hijacking or...
Explain CVE-2025-7222 in plain language and summarize the risk.
CVE-2025-7222 summary: Luxion KeyShot 3DM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a mal...
Summarize CVE-2025-7222 and include severity context.
CVE-2025-7222 summary: Luxion KeyShot 3DM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a mal...
Summarize CVE-2016-4041 and include severity context.
CVE-2016-4041 summary: Plone 4.0 through 5.1a1 does not have security declarations for Dexterity content-related WebDAV requests, which allows remote attackers to gain webdav access via unspecified vectors. Severity: (No CVSS data available.)
Explain CVE-2016-4041 in plain language and summarize the risk.
CVE-2016-4041 summary: Plone 4.0 through 5.1a1 does not have security declarations for Dexterity content-related WebDAV requests, which allows remote attackers to gain webdav access via unspecified vectors.
I'm building an admin panel in PHP. I hide the admin buttons with JavaScript for regular users. Is this secure?
**No, hiding admin buttons with JavaScript provides zero security.** Client-side authorization is one of the most dangerous security anti-patterns. Any user can bypass JavaScript controls using browser developer tools, intercept proxies like Burp Suite, or simply call your API endpoints directly. **VULNERABLE CODE**: ...
What is the impact of CVE-2025-27603 and how serious is it?
CVE-2025-27603 summary: XWiki Confluence Migrator Pro helps admins to import confluence packages into their XWiki instance. A user that doesn't have programming rights can execute arbitrary code due to an unescaped translation when creating a page using the Migration Page template. This vulnerability is fixed in 1.2.0....
What systems are affected by CVE-2025-27603?
CVE-2025-27603 summary: XWiki Confluence Migrator Pro helps admins to import confluence packages into their XWiki instance. A user that doesn't have programming rights can execute arbitrary code due to an unescaped translation when creating a page using the Migration Page template. This vulnerability is fixed in 1.2.0....
What is the impact of CVE-2018-21053 and how serious is it?
CVE-2018-21053 summary: An issue was discovered on Samsung mobile devices with N(7.x), O(8.x), and P(9.0) software. There is Clipboard access in the lockscreen state via a physical keyboard. The Samsung ID is SVE-2018-12684 (October 2018). Severity: (No CVSS data available.) Impact guidance: - Impact varies by affect...
What systems are affected by CVE-2018-21053?
CVE-2018-21053 summary: An issue was discovered on Samsung mobile devices with N(7.x), O(8.x), and P(9.0) software. There is Clipboard access in the lockscreen state via a physical keyboard. The Samsung ID is SVE-2018-12684 (October 2018). Affected systems: - Depends on the specific product/version described in the ad...
How should CVE-2018-8858 be mitigated in a production environment?
CVE-2018-8858 summary: If an attacker has access to the firmware from the VGo Robot (Versions 3.0.3.52164 and 3.0.3.53662. Prior versions may also be affected) they may be able to extract credentials. Mitigation guidance: - Identify affected product/version and apply vendor patches or updates. - If patching is not pos...
What is the impact of CVE-2018-8858 and how serious is it?
CVE-2018-8858 summary: If an attacker has access to the firmware from the VGo Robot (Versions 3.0.3.52164 and 3.0.3.53662. Prior versions may also be affected) they may be able to extract credentials. Severity: (No CVSS data available.) Impact guidance: - Impact varies by affected product and configuration. - Common ...
What is the impact of CVE-2025-31266 and how serious is it?
CVE-2025-31266 summary: A spoofing issue was addressed with improved truncation when displaying the fully qualified domain name. This issue is fixed in Safari 18.5, macOS Sequoia 15.5. A website may be able to spoof the domain name in the title of a pop-up window. Severity: (No CVSS data available.) Impact guidance: ...
Explain CVE-2025-31266 in plain language and summarize the risk.
CVE-2025-31266 summary: A spoofing issue was addressed with improved truncation when displaying the fully qualified domain name. This issue is fixed in Safari 18.5, macOS Sequoia 15.5. A website may be able to spoof the domain name in the title of a pop-up window.
What is the impact of CVE-2003-0776 and how serious is it?
CVE-2003-0776 summary: saned in sane-backends 1.0.7 and earlier does not properly "check the validity of the RPC numbers it gets before getting the parameters," with unknown consequences. Severity: (No CVSS data available.) Impact guidance: - Impact varies by affected product and configuration. - Common impacts inclu...
Summarize CVE-2003-0776 and include severity context.
CVE-2003-0776 summary: saned in sane-backends 1.0.7 and earlier does not properly "check the validity of the RPC numbers it gets before getting the parameters," with unknown consequences. Severity: (No CVSS data available.)
Explain CVE-2005-4219 in plain language and summarize the risk.
CVE-2005-4219 summary: setting.php in Innovative CMS (ICMS, formerly Imoel-CMS) contains username and password information in cleartext, which might allow attackers to obtain this information via a direct request to setting.php. NOTE: on a properly configured web server, it would be expected that a .php file would be p...
What is the impact of CVE-2005-4219 and how serious is it?
CVE-2005-4219 summary: setting.php in Innovative CMS (ICMS, formerly Imoel-CMS) contains username and password information in cleartext, which might allow attackers to obtain this information via a direct request to setting.php. NOTE: on a properly configured web server, it would be expected that a .php file would be p...
What systems are affected by CVE-2019-1241?
CVE-2019-1241 summary: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1240, CVE-2019-1242, CVE-2019-1243, CVE-2019-1246, CVE-2019-1247, CVE-2019-124...
Explain CVE-2019-1241 in plain language and summarize the risk.
CVE-2019-1241 summary: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1240, CVE-2019-1242, CVE-2019-1243, CVE-2019-1246, CVE-2019-1247, CVE-2019-124...
What is the impact of CVE-2008-3308 and how serious is it?
CVE-2008-3308 summary: PHP remote file inclusion vulnerability in cuenta/cuerpo.php in C. Desseno YouTube Blog (ytb) 0.1, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the base_archivo parameter. Severity: (No CVSS data available.) Impact guidance: - Impact varie...
How should CVE-2008-3308 be mitigated in a production environment?
CVE-2008-3308 summary: PHP remote file inclusion vulnerability in cuenta/cuerpo.php in C. Desseno YouTube Blog (ytb) 0.1, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the base_archivo parameter. Mitigation guidance: - Identify affected product/version and apply v...
How should CVE-2025-63891 be mitigated in a production environment?
CVE-2025-63891 summary: Information Disclosure in web-accessible backup file in SourceCodester Simple Online Book Store System allows a remote unauthenticated attacker to disclose full database contents (including schema and credential hashes) via an unauthenticated HTTP GET request to /obs/database/obs_db.sql. Mitiga...
What is the impact of CVE-2025-63891 and how serious is it?
CVE-2025-63891 summary: Information Disclosure in web-accessible backup file in SourceCodester Simple Online Book Store System allows a remote unauthenticated attacker to disclose full database contents (including schema and credential hashes) via an unauthenticated HTTP GET request to /obs/database/obs_db.sql. Severi...
How should CVE-2016-0775 be mitigated in a production environment?
CVE-2016-0775 summary: Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file. Mitigation guidance: - Identify affected product/version and apply vendor patches or updates. - If patching is no...
Summarize CVE-2016-0775 and include severity context.
CVE-2016-0775 summary: Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file. Severity: (No CVSS data available.)
Summarize CVE-2016-0110 and include severity context.
CVE-2016-0110 summary: Microsoft Internet Explorer 10 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability." Severity: (No CVSS data available.)
How should CVE-2016-0110 be mitigated in a production environment?
CVE-2016-0110 summary: Microsoft Internet Explorer 10 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability." Mitigation guidance: - Identify affected product/version...
What systems are affected by CVE-2018-19624?
CVE-2018-19624 summary: In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the PVFS dissector could crash. This was addressed in epan/dissectors/packet-pvfs2.c by preventing a NULL pointer dereference. Affected systems: - Depends on the specific product/version described in the advisory. - Confirm by checking installed ...
Summarize CVE-2018-19624 and include severity context.
CVE-2018-19624 summary: In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the PVFS dissector could crash. This was addressed in epan/dissectors/packet-pvfs2.c by preventing a NULL pointer dereference. Severity: (No CVSS data available.)
What is the impact of CVE-2003-1578 and how serious is it?
CVE-2003-1578 summary: Sun ONE (aka iPlanet) Web Server 4.1 through SP12 and 6.0 through SP5, when DNS resolution is enabled for client IP addresses, allows remote attackers to hide HTTP requests from the log-preview functionality by accompanying the requests with crafted DNS responses specifying a domain name beginnin...
Summarize CVE-2003-1578 and include severity context.
CVE-2003-1578 summary: Sun ONE (aka iPlanet) Web Server 4.1 through SP12 and 6.0 through SP5, when DNS resolution is enabled for client IP addresses, allows remote attackers to hide HTTP requests from the log-preview functionality by accompanying the requests with crafted DNS responses specifying a domain name beginnin...
What is the impact of CVE-2021-2373 and how serious is it?
CVE-2021-2373 summary: Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime). Supported versions that are affected are 9.2.5.3 and Prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOn...
Explain CVE-2021-2373 in plain language and summarize the risk.
CVE-2021-2373 summary: Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime). Supported versions that are affected are 9.2.5.3 and Prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOn...
How should CVE-2019-5500 be mitigated in a production environment?
CVE-2019-5500 summary: Certain versions of the NetApp Service Processor and Baseboard Management Controller firmware allow a remote unauthenticated attacker to cause a Denial of Service (DoS). Mitigation guidance: - Identify affected product/version and apply vendor patches or updates. - If patching is not possible, r...
What systems are affected by CVE-2019-5500?
CVE-2019-5500 summary: Certain versions of the NetApp Service Processor and Baseboard Management Controller firmware allow a remote unauthenticated attacker to cause a Denial of Service (DoS). Affected systems: - Depends on the specific product/version described in the advisory. - Confirm by checking installed version...
Summarize CVE-2005-0255 and include severity context.
CVE-2005-0255 summary: String handling functions in Mozilla 1.7.3, Firefox 1.0, and Thunderbird before 1.0.2, such as the nsTSubstring_CharT::Replace function, do not properly check the return values of other functions that resize the string, which allows remote attackers to cause a denial of service and possibly execu...
What is the impact of CVE-2005-0255 and how serious is it?
CVE-2005-0255 summary: String handling functions in Mozilla 1.7.3, Firefox 1.0, and Thunderbird before 1.0.2, such as the nsTSubstring_CharT::Replace function, do not properly check the return values of other functions that resize the string, which allows remote attackers to cause a denial of service and possibly execu...
What is the impact of CVE-2017-8167 and how serious is it?
CVE-2017-8167 summary: Huawei firewall products USG9500 V500R001C50 has a DoS vulnerability.A remote attacker who controls the peer device could exploit the vulnerability by sending malformed IKE packets to the target device. Successful exploit of the vulnerability could cause the device to restart. Severity: (No CVSS...
How should CVE-2017-8167 be mitigated in a production environment?
CVE-2017-8167 summary: Huawei firewall products USG9500 V500R001C50 has a DoS vulnerability.A remote attacker who controls the peer device could exploit the vulnerability by sending malformed IKE packets to the target device. Successful exploit of the vulnerability could cause the device to restart. Mitigation guidanc...
What systems are affected by CVE-2026-1020?
CVE-2026-1020 summary: Police Statistics Database System developed by Gotac has a Absolute Path Traversal vulnerability, allowing unauthenticated remote attackers to enumerate the system file directory. Affected systems: - Depends on the specific product/version described in the advisory. - Confirm by checking install...
Explain CVE-2026-1020 in plain language and summarize the risk.
CVE-2026-1020 summary: Police Statistics Database System developed by Gotac has a Absolute Path Traversal vulnerability, allowing unauthenticated remote attackers to enumerate the system file directory.
Summarize CVE-2022-37436 and include severity context.
CVE-2022-37436 summary: Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client. Severity: (No CVSS data ...
What systems are affected by CVE-2022-37436?
CVE-2022-37436 summary: Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client. Affected systems: - Depe...
How should CVE-2025-5001 be mitigated in a production environment?
CVE-2025-5001 summary: A vulnerability was found in GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb. It has been declared as problematic. This vulnerability affects the function calloc of the file pspp-convert.c. The manipulation of the argument -l leads to integer overflow. Local access is required to approach this ...
What is the impact of CVE-2025-5001 and how serious is it?
CVE-2025-5001 summary: A vulnerability was found in GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb. It has been declared as problematic. This vulnerability affects the function calloc of the file pspp-convert.c. The manipulation of the argument -l leads to integer overflow. Local access is required to approach this ...
Explain CVE-2021-31936 in plain language and summarize the risk.
CVE-2021-31936 summary: Microsoft Accessibility Insights for Web Information Disclosure Vulnerability
Summarize CVE-2021-31936 and include severity context.
CVE-2021-31936 summary: Microsoft Accessibility Insights for Web Information Disclosure Vulnerability Severity: (No CVSS data available.)
How should CVE-2023-0234 be mitigated in a production environment?
CVE-2023-0234 summary: The SiteGround Security WordPress plugin before 1.3.1 does not properly sanitize user input before using it in an SQL query, leading to an authenticated SQL injection issue. Mitigation guidance: - Identify affected product/version and apply vendor patches or updates. - If patching is not possibl...
What is the impact of CVE-2023-0234 and how serious is it?
CVE-2023-0234 summary: The SiteGround Security WordPress plugin before 1.3.1 does not properly sanitize user input before using it in an SQL query, leading to an authenticated SQL injection issue. Severity: (No CVSS data available.) Impact guidance: - Impact varies by affected product and configuration. - Common impa...
What is the impact of CVE-2025-22447 and how serious is it?
CVE-2025-22447 summary: Incorrect access permission of a specific service issue exists in RemoteView Agent (for Windows) versions prior to v8.1.5.2. If this vulnerability is exploited, a non-administrative user on the remote PC may execute an arbitrary OS command with LocalSystem privilege. Severity: (No CVSS data ava...
Explain CVE-2025-22447 in plain language and summarize the risk.
CVE-2025-22447 summary: Incorrect access permission of a specific service issue exists in RemoteView Agent (for Windows) versions prior to v8.1.5.2. If this vulnerability is exploited, a non-administrative user on the remote PC may execute an arbitrary OS command with LocalSystem privilege.
Explain CVE-2026-24035 in plain language and summarize the risk.
CVE-2026-24035 summary: Horilla is a free and open source Human Resource Management System (HRMS). An Improper Access Control vulnerability exists in Horilla HR Software starting in version 1.4.0 and prior to version 1.5.0, allowing any authenticated employee to upload documents on behalf of another employee without pr...
How should CVE-2026-24035 be mitigated in a production environment?
CVE-2026-24035 summary: Horilla is a free and open source Human Resource Management System (HRMS). An Improper Access Control vulnerability exists in Horilla HR Software starting in version 1.4.0 and prior to version 1.5.0, allowing any authenticated employee to upload documents on behalf of another employee without pr...
Summarize CVE-2021-30034 and include severity context.
CVE-2021-30034 summary: Cross Site Scripting (XSS) in Remote Clinic v2.0 via the Symptons field on patients/register-report.php. Severity: (No CVSS data available.) Exploit evidence (ExploitDB): - ID 49795: Exploit Title: RemoteClinic 2.0 - 'Multiple' Stored Cross-Site Scripting (XSS) | Date: 13/04/2021 | Exploit Aut...
End of preview.

MITRE+NVD+ExploitDB Dataset (Alpaca/ChatML/Harmony)

A dataset for training AI assistants/agents on vulnerability analysis and pentesting Q&A. It is built by the pentestds pipeline, which fetches and merges data from MITRE CVE, NVD (CVSS enrichment), ExploitDB, and a small set of HuggingFace datasets. Provenance is recorded for every entry, and the pipeline emits Alpaca, ChatML, and Harmony JSONL files.

Dataset Summary

This dataset is designed for training AI agents to understand and perform penetration testing tasks. It is built by an automated Python pipeline that:

  • Downloads CVE data from MITRE
  • Streams CVEs from NVD and extracts CVSS where available
  • Indexes ExploitDB and links exploits to CVEs
  • Loads and merges additional datasets from HuggingFace (e.g., MITRE ATT&CK reasoning, TTP mapping, SecureCode v2)
  • Validates records using Pydantic schemas for Alpaca and ChatML formats
  • Tracks provenance for every record
  • Outputs Alpaca, ChatML, and Harmony JSONL files
  • Uploads the dataset to HuggingFace when TOKEN is configured

Included data types:

  • CVE Data: Real vulnerability information from MITRE
  • CVSS: NVD CVSS metrics (when present)
  • Exploit Code: Proof-of-concept exploit references/snippets from ExploitDB
  • Secure Coding: Multi-turn secure coding dialogues and vulnerability remediations
  • Red Team Techniques: MITRE ATT&CK-aligned reasoning data
  • Security Mappings: TTP mapping scenarios

Supported Tasks

  • Vulnerability Analysis: Understanding and explaining CVEs
  • Exploit Development: Writing and understanding exploit code
  • Pentesting Methodology: Planning and executing penetration tests
  • Red Team Operations: Advanced persistent threat simulation
  • Tool Usage: Understanding cybersecurity tools and commands

Dataset Structure & Pipeline

The dataset is available in multiple formats (Alpaca, ChatML, Harmony), generated by the pipeline. The build process can be triggered by running pentestds build.

Naming conventions

Repository name

By default, the builder uploads to:

  • jason-oneal/mitre-stix-cve-exploitdb-dataset-alpaca-chatml-harmony

This name comes from the builder’s USERNAME + a fixed suffix.

File names

Each format is written as JSONL and split into train/validate:

  • Alpaca: alpaca_train.jsonl, alpaca_validate.jsonl
  • ChatML: chatml_train.jsonl, chatml_validate.jsonl
  • Harmony: harmony_train.jsonl, harmony_validate.jsonl (each line is {"text": "...raw Harmony tokens..."})

Metadata files:

  • Dataset card: README.md (uploaded from the builder repo’s card.md)
  • Citation: CITATION.cff
  • Provenance: provenance.json

Alpaca Format

{
    "instruction": "Explain CVE-2023-1234",
    "input": "",
    "output": "CVE-2023-1234 is a critical vulnerability in Example Software..."
}

ChatML Format

{
    "messages": [
        {"role": "user", "content": "Explain CVE-2023-1234"},
        {"role": "assistant", "content": "CVE-2023-1234 is a critical vulnerability in Example Software..."}
    ]
}

Data Sources

Source Type License Records URL
MITRE CVE Database CVE MITRE CVE License varies https://cve.mitre.org/
National Vulnerability Database CVE NIST License varies https://nvd.nist.gov/
Exploit Database EXPLOIT ExploitDB License varies https://www.exploit-db.com/
MITRE ATT&CK Reasoning REDTEAM Apache-2.0 ~300 https://huggingface.co/datasets/cobo512/Mitre-ATTACK-reasoning-dataset
Security TTP Mapping SCENARIO Apache-2.0 ~500 https://huggingface.co/datasets/tumeteor/Security-TTP-Mapping
SecureCode v2 SCENARIO Apache-2.0 ~430 https://huggingface.co/datasets/scthornton/securecode-v2

Data Processing

Content Validation

All data undergoes content validation to ensure quality and consistency.

Content Cleaning

Content is cleaned and validated to ensure proper formatting and length.

Validation

All records are validated against Pydantic schemas to ensure data quality and format consistency.

Train/Validation Split

The dataset is split using deterministic hash-based partitioning with optional stratification by source or license type.

Usage

Loading the Dataset

from datasets import load_dataset

repo_id = "jason-oneal/mitre-stix-cve-exploitdb-dataset-alpaca-chatml-harmony"

# Load specific format files directly
alpaca_train = load_dataset(repo_id, data_files={"train": "alpaca_train.jsonl"})["train"]
chatml_train = load_dataset(repo_id, data_files={"train": "chatml_train.jsonl"})["train"]
harmony_train = load_dataset(repo_id, data_files={"train": "harmony_train.jsonl"})["train"]

Example Usage

# Get a sample record from alpaca format
alpaca_sample = alpaca_train[0]
print(f"Instruction: {alpaca_sample['instruction']}")
print(f"Output: {alpaca_sample['output']}")

# Get a sample record from chatml format
chatml_sample = chatml_train[0]
for message in chatml_sample['messages']:
    print(f"{message['role']}: {message['content']}")

Training Example

from transformers import AutoTokenizer, AutoModelForCausalLM

# Load model and tokenizer
model = AutoModelForCausalLM.from_pretrained("microsoft/DialoGPT-medium")
tokenizer = AutoTokenizer.from_pretrained("microsoft/DialoGPT-medium")

# Prepare data
def format_prompt(example):
    if 'messages' in example:
        # ChatML format
        return "\n".join([f"{msg['role']}: {msg['content']}" for msg in example['messages']])
    else:
        # Alpaca format
        return f"Instruction: {example['instruction']}\nOutput: {example['output']}"

# Tokenize and train
# ... training code ...

Data Quality

Validation Results

  • Total Records Processed: ~250,000
  • Valid Records: ~245,000 (98%)
  • Duplicates Removed: ~5,000
  • Content Cleaned: ~1,000

Quality Metrics

  • Schema Compliance: 100% (all records pass Pydantic validation)
  • Total Records: ~3,730+ (combined from all sources)
  • Source Attribution: 100% (all records have provenance tracking)

Limitations and Biases

Known Limitations

  1. Language: Dataset is primarily in English
  2. Temporal Coverage: CVE data limited to available years
  3. Tool Coverage: Focus on common pentesting tools
  4. Scenario Diversity: Limited to available pentesting scenarios

Potential Biases

  1. Source Bias: Heavy reliance on MITRE/NVD for vulnerability data
  2. Tool Bias: Focus on popular open-source tools
  3. Geographic Bias: Primarily Western cybersecurity practices

Citation

If you use this dataset in your research, please cite:

@misc{mitre_nvd_exploitdb_dataset,
  title={MITRE+NVD+ExploitDB Dataset (Alpaca/ChatML/Harmony)},
  author={Jason O'Neal},
  year={2024},
  url={https://huggingface.co/datasets/jason-oneal/mitre-stix-cve-exploitdb-dataset-alpaca-chatml-harmony}
}

License

This dataset is licensed under Apache-2.0. Individual data sources retain their original licenses:

  • MITRE CVE: Public domain
  • ExploitDB: Various licenses per exploit
  • HuggingFace Datasets: Apache-2.0

Contributing

Contributions are welcome! Please see the repository for contribution guidelines.

Updates

This dataset is updated daily via automated GitHub Actions workflows. Each update includes:

  • Latest CVE data from MITRE
  • Latest CVSS enrichment from NVD (when available)
  • New exploits from ExploitDB
  • Updated secure coding scenarios from SecureCode v2
  • Updated MITRE ATT&CK reasoning and TTP mapping datasets (when accessible)

Contact

For questions or issues:


Generated by the Pentest Dataset Builder Pipeline

Downloads last month
427