Datasets:
cve_id stringlengths 13 16 ⌀ | description stringlengths 34 2.67k ⌀ | published_date stringdate 1999-03-01 00:00:00 2018-08-06 00:00:00 ⌀ | last_modified stringdate 2024-11-21 00:00:00 2026-05-06 00:00:00 ⌀ | cwe_ids stringclasses 347
values | affected_products stringlengths 7 639 ⌀ | reference_urls stringlengths 49 643 ⌀ | exploit_available stringclasses 2
values | cvss_score stringclasses 35
values | cvss_severity stringclasses 4
values | attack_vector stringclasses 3
values | attack_complexity stringclasses 2
values | privileges_required stringclasses 3
values | user_interaction stringclasses 2
values | scope stringclasses 2
values | confidentiality_impact stringclasses 3
values | integrity_impact stringclasses 3
values | availability_impact stringclasses 3
values | exploitability_score stringclasses 12
values | impact_score stringclasses 15
values | attack_type stringclasses 33
values | likely_mitre_tactic stringclasses 7
values | risk_score stringclasses 58
values | risk_level stringclasses 4
values | primary_vendor_product stringlengths 5 107 ⌀ | in_cisa_kev stringclasses 2
values | ransomware_use stringclasses 2
values | kev_required_action stringclasses 7
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-1999-0426 | The default permissions of /dev/kmem in Linux versions before 2.0.36 allows IP spoofing. | 1999-03-01 | 2026-04-16 | CWE-276 | suse/suse_linux:6.0 | https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426|https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | suse/suse_linux | False | Unknown | nan |
CVE-1999-1324 | VAXstations running Open VMS 5.3 through 5.5-2 with VMS DECwindows or MOTIF do not properly disable access to user accounts that exceed the break-in limit threshold for failed login attempts, which makes it easier for attackers to conduct brute force password guessing. | 1999-12-31 | 2026-04-16 | CWE-307 | hp/openvms_vax:* | http://ciac.llnl.gov/ciac/bulletins/d-06.shtml|https://exchange.xforce.ibmcloud.com/vulnerabilities/7225|http://ciac.llnl.gov/ciac/bulletins/d-06.shtml|https://exchange.xforce.ibmcloud.com/vulnerabilities/7225 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | hp/openvms_vax | False | Unknown | nan |
CVE-2000-1218 | The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which causes Windows to accept DNS updates from hosts that it did not query, which allows remote attackers to poison the DNS cache. | 2000-04-14 | 2026-04-16 | CWE-346 | microsoft/windows_2000:-|microsoft/windows_98:-|microsoft/windows_98se:-|microsoft/windows_nt:4.0|microsoft/windows_xp:- | http://www.kb.cert.org/vuls/id/458659|https://exchange.xforce.ibmcloud.com/vulnerabilities/4280|http://www.kb.cert.org/vuls/id/458659|https://exchange.xforce.ibmcloud.com/vulnerabilities/4280 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | microsoft/windows_2000 | False | Unknown | nan |
CVE-2000-0944 | CGI Script Center News Update 1.1 does not properly validate the original news administration password during a password change operation, which allows remote attackers to modify the password without knowing the original password. | 2000-12-19 | 2026-04-16 | CWE-522 | cgi/script_center_news_update:1.1 | http://archives.neohapsis.com/archives/bugtraq/2000-10/0402.html|http://www.securityfocus.com/bid/1881|https://exchange.xforce.ibmcloud.com/vulnerabilities/5433|http://archives.neohapsis.com/archives/bugtraq/2000-10/0402.html|http://www.securityfocus.com/bid/1881 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | cgi/script_center_news_update | False | Unknown | nan |
CVE-2001-1339 | Beck IPC GmbH IPC@CHIP telnet service does not delay or disconnect users from the service when bad passwords are entered, which makes it easier for remote attackers to conduct brute force password guessing attacks. | 2001-05-24 | 2026-04-16 | CWE-307 | anybus/ipc\@chip_firmware:- | http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html|http://www.iss.net/security_center/static/6605.php|http://www.kb.cert.org/vuls/id/198979|http://www.securityfocus.com/archive/1/186418|http://www.securityfocus.com/bid/2771 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | anybus/ipc\@chip_firmware | False | Unknown | nan |
CVE-2001-0248 | Buffer overflow in FTP server in HPUX 11 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the STAT command, which uses glob to generate long strings. | 2001-06-18 | 2026-04-16 | CWE-131 | hp/hp-ux:11.00|sgi/irix:6.5|sgi/irix:6.5.1|sgi/irix:6.5.2 | http://www.cert.org/advisories/CA-2001-07.html|http://www.nai.com/research/covert/advisories/048.asp|http://www.securityfocus.com/bid/2552|https://exchange.xforce.ibmcloud.com/vulnerabilities/6332|http://www.cert.org/advisories/CA-2001-07.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | hp/hp-ux | False | Unknown | nan |
CVE-2001-0249 | Heap overflow in FTP daemon in Solaris 8 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the LIST command, which uses glob to generate long strings. | 2001-06-18 | 2026-04-16 | CWE-131 | hp/hp-ux:11.00|oracle/solaris:8|sgi/irix:* | http://www.cert.org/advisories/CA-2001-07.html|http://www.nai.com/research/covert/advisories/048.asp|http://www.securityfocus.com/bid/2550|https://exchange.xforce.ibmcloud.com/vulnerabilities/6332|http://www.cert.org/advisories/CA-2001-07.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | hp/hp-ux | False | Unknown | nan |
CVE-2001-0395 | Lightwave ConsoleServer 3200 does not disconnect users after unsuccessful login attempts, which could allow remote attackers to conduct brute force password guessing. | 2001-07-02 | 2026-04-16 | CWE-307 | lightwavemo/consoleserver_3200_firmware:- | http://archives.neohapsis.com/archives/bugtraq/2001-04/0170.html|http://www.securityfocus.com/bid/2578|http://archives.neohapsis.com/archives/bugtraq/2001-04/0170.html|http://www.securityfocus.com/bid/2578 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | lightwavemo/consoleserver_3200_firmware | False | Unknown | nan |
CVE-2001-1291 | The telnet server for 3Com hardware such as PS40 SuperStack II does not delay or disconnect remote attackers who provide an incorrect username or password, which makes it easier to break into the server via brute force password guessing. | 2001-07-12 | 2026-04-16 | CWE-307 | 3com/superstack_ii_ps_hub_40_firmware:- | http://www.securityfocus.com/archive/1/196957|http://www.securityfocus.com/bid/3034|https://exchange.xforce.ibmcloud.com/vulnerabilities/6855|http://www.securityfocus.com/archive/1/196957|http://www.securityfocus.com/bid/3034 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | 3com/superstack_ii_ps_hub_40_firmware | False | Unknown | nan |
CVE-2001-0609 | Format string vulnerability in Infodrom cfingerd 1.4.3 and earlier allows a remote attacker to gain additional privileges via a malformed ident reply that is passed to the syslog function. | 2001-08-02 | 2026-04-16 | CWE-193 | infodrom/cfingerd:* | http://archives.neohapsis.com/archives/bugtraq/2001-04/0202.html|http://www.securityfocus.com/bid/2576|https://exchange.xforce.ibmcloud.com/vulnerabilities/6364|http://archives.neohapsis.com/archives/bugtraq/2001-04/0202.html|http://www.securityfocus.com/bid/2576 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | infodrom/cfingerd | False | Unknown | nan |
CVE-2001-1155 | TCP Wrappers (tcp_wrappers) in FreeBSD 4.1.1 through 4.3 with the PARANOID ACL option enabled does not properly check the result of a reverse DNS lookup, which could allow remote attackers to bypass intended access restrictions via DNS spoofing. | 2001-08-23 | 2026-04-16 | CWE-863 | freebsd/freebsd:* | ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:56.tcp_wrappers.asc|http://www.osvdb.org/5454|ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:56.tcp_wrappers.asc|http://www.osvdb.org/5454 | False | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Incorrect Authorization | Unknown | 83.5 | HIGH | freebsd/freebsd | False | Unknown | nan |
CVE-2001-0967 | Knox Arkeia server 4.2, and possibly other versions, uses a constant salt when encrypting passwords using the crypt() function, which makes it easier for an attacker to conduct brute force password guessing. | 2001-08-31 | 2026-04-16 | CWE-916 | arkeia/arkeia:4.2|arkeia/arkeia:4.2.8-2 | http://archives.neohapsis.com/archives/bugtraq/2001-08/0228.html|http://www.securityfocus.com/bid/3204|http://archives.neohapsis.com/archives/bugtraq/2001-08/0228.html|http://www.securityfocus.com/bid/3204 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | arkeia/arkeia | False | Unknown | nan |
CVE-2001-1125 | Symantec LiveUpdate before 1.6 does not use cryptography to ensure the integrity of download files, which allows remote attackers to execute arbitrary code via DNS spoofing of the update.symantec.com site. | 2001-10-05 | 2026-04-16 | CWE-494|CWE-494 | symantec/liveupdate:* | http://www.sarc.com/avcenter/security/Content/2001.10.05.html|http://www.securityfocus.com/archive/1/218717|http://www.securityfocus.com/bid/3403|https://exchange.xforce.ibmcloud.com/vulnerabilities/7235|http://www.sarc.com/avcenter/security/Content/2001.10.05.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | symantec/liveupdate | False | Unknown | nan |
CVE-2001-0766 | Apache on MacOS X Client 10.0.3 with the HFS+ file system allows remote attackers to bypass access restrictions via a URL that contains some characters whose case is not matched by Apache's filters. | 2001-10-18 | 2026-04-16 | CWE-178 | apache/http_server:1.3.14 | http://archives.neohapsis.com/archives/bugtraq/2001-06/0090.html|http://www.securityfocus.com/bid/2852|http://archives.neohapsis.com/archives/bugtraq/2001-06/0090.html|http://www.securityfocus.com/bid/2852 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | apache/http_server | False | Unknown | nan |
CVE-2001-1481 | Xitami 2.4 through 2.5 b4 stores the Administrator password in plaintext in the default.aut file, whose default permissions are world-readable, which allows remote attackers to gain privileges. | 2001-12-31 | 2026-04-16 | CWE-312 | xitami/xitami:*|xitami/xitami:2.5 | http://archives.neohapsis.com/archives/win2ksecadvice/2000-q4/0109.html|http://www.securityfocus.com/archive/1/242375|http://www.securityfocus.com/bid/3582|https://exchange.xforce.ibmcloud.com/vulnerabilities/7600|http://archives.neohapsis.com/archives/win2ksecadvice/2000-q4/0109.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | xitami/xitami | False | Unknown | nan |
CVE-2001-1496 | Off-by-one buffer overflow in Basic Authentication in Acme Labs thttpd 1.95 through 2.20 allows remote attackers to cause a denial of service and possibly execute arbitrary code. | 2001-12-31 | 2026-04-16 | CWE-193 | acme/thttpd:* | http://www.securityfocus.com/archive/1/241310|http://www.securityfocus.com/archive/1/241953|http://www.securityfocus.com/bid/3562|https://exchange.xforce.ibmcloud.com/vulnerabilities/7595|http://www.securityfocus.com/archive/1/241310 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | acme/thttpd | False | Unknown | nan |
CVE-2002-0059 | The decompression algorithm in zlib 1.1.3 and earlier, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a "double free"), which may allow local and remote attackers to execute arbitrary code via a block of malformed compression data. | 2002-03-15 | 2026-04-16 | CWE-415 | zlib/zlib:* | ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-015.1.txt|http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000469|http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:022|http://www.caldera.com/support/security/advisories/CSSA-2002-014.1.txt|http://www.cert.org/advisories/CA-2002-07.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | zlib/zlib | False | Unknown | nan |
CVE-2002-0083 | Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges. | 2002-03-15 | 2026-04-16 | CWE-193 | immunix/immunix:7.0|mandrakesoft/mandrake_single_network_firewall:7.2|openbsd/openssh:*|openpkg/openpkg:1.0|conectiva/linux:5.0|conectiva/linux:5.1|conectiva/linux:6.0|conectiva/linux:7.0|conectiva/linux:ecommerce|conectiva/linux:graficas | ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc|ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-004.txt.asc|ftp://stage.caldera.com/pub/security/openserver/CSSA-2002-SCO.10/CSSA-2002-SCO.10.txt|ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.11/CSSA-2002-SCO.... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | immunix/immunix | False | Unknown | nan |
CVE-2002-0639 | Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication. | 2002-07-03 | 2026-04-16 | CWE-190 | openbsd/openssh:* | ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt|http://archives.neohapsis.com/archives/bugtraq/2002-06/0335.html|http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502|http://marc.info/?l=bugtraq&m=102514371522793&w=2|http://marc.info/?l=bugtraq&m=102514631524575&w=2 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Integer Overflow | Unknown | 98.5 | CRITICAL | openbsd/openssh | False | Unknown | nan |
CVE-2002-0671 | Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 downloads phone applications from a web site but can not verify the integrity of the applications, which could allow remote attackers to install Trojan horse applications via DNS spoofing. | 2002-07-23 | 2026-04-16 | CWE-494 | pingtel/xpressa_firmware:1.2.5|pingtel/xpressa_firmware:1.2.7.4 | http://www.atstake.com/research/advisories/2002/a071202-1.txt|http://www.iss.net/security_center/static/9566.php|http://www.pingtel.com/PingtelAtStakeAdvisoryResponse.jsp|http://www.securityfocus.com/bid/5224|http://www.atstake.com/research/advisories/2002/a071202-1.txt | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | pingtel/xpressa_firmware | False | Unknown | nan |
CVE-2002-0391 | Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote attackers to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services such as rpc.cmsd and dmispd. | 2002-08-12 | 2026-04-16 | CWE-190|CWE-190 | freebsd/freebsd:*|openbsd/openbsd:3.1|sun/solaris:2.6|sun/solaris:9.0|sun/sunos:5.5.1|sun/sunos:5.7|sun/sunos:5.8|microsoft/windows_2000:-|microsoft/windows_nt:4.0|microsoft/windows_xp:- | ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-055.0.txt|ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-011.txt.asc|ftp://patches.sgi.com/support/free/security/advisories/20020801-01-A|ftp://patches.sgi.com/support/free/security/advisories/20020801-01-P|http://archives.neohapsis.com/archives/... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Integer Overflow | Unknown | 98.5 | CRITICAL | freebsd/freebsd | False | Unknown | nan |
CVE-2002-1347 | Multiple buffer overflows in Cyrus SASL library 2.1.9 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) long inputs during user name canonicalization, (2) characters that need to be escaped during LDAP authentication using saslauthd, or (3) an off-by-one error i... | 2002-12-18 | 2026-04-16 | CWE-131 | cyrusimap/cyrus_sasl:*|apple/mac_os_x:*|apple/mac_os_x_server:* | http://archives.neohapsis.com/archives/linux/suse/2002-q4/1275.html|http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000557|http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html|http://marc.info/?l=bugtraq&m=103946297703402&w=2|http://www.debian.org/security/2002/dsa-215 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | cyrusimap/cyrus_sasl | False | Unknown | nan |
CVE-2002-1798 | MidiCart PHP, PHP Plus, and PHP Maxi allows remote attackers to (1) upload arbitrary php files via a direct request to admin/upload.php or (2) access sensitive information via a direct request to admin/credit_card_info.php. | 2002-12-31 | 2026-04-16 | CWE-425 | midicart/midicart_php:-|midicart/midicart_php_maxi:-|midicart/midicart_php_plus:- | http://archives.neohapsis.com/archives/bugtraq/2002-10/0016.html|http://www.iss.net/security_center/static/10306.php|http://www.securityfocus.com/bid/5851|http://www.securityfocus.com/bid/5855|http://archives.neohapsis.com/archives/bugtraq/2002-10/0016.html | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Other | Unknown | 95.0 | CRITICAL | midicart/midicart_php | False | Unknown | nan |
CVE-2002-1816 | Off-by-one buffer overflow in the sock_gets function in sockhelp.c for ATPhttpd 0.4b and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request. | 2002-12-31 | 2026-04-16 | CWE-193|CWE-193 | redshift/atphttpd:* | http://archives.neohapsis.com/archives/bugtraq/2002-10/0187.html|http://secunia.com/advisories/7293|http://www.iss.net/security_center/static/10362.php|http://www.securityfocus.com/bid/5956|http://archives.neohapsis.com/archives/bugtraq/2002-10/0187.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | redshift/atphttpd | False | Unknown | nan |
CVE-2002-1820 | register.php in Ultimate PHP Board (UPB) 1.0 and 1.0b uses an administrative account Admin with a capital "A," but allows a remote attacker to impersonate the administrator by registering an account name of admin with a lower case "a." | 2002-12-31 | 2026-04-16 | CWE-178 | ultimate_php_board_project/ultimate_php_board:1.0|ultimate_php_board_project/ultimate_php_board:1.0 | http://www.iss.net/security_center/static/9972.php|http://www.securityfocus.com/archive/1/289417|http://www.securityfocus.com/bid/5580|http://www.iss.net/security_center/static/9972.php|http://www.securityfocus.com/archive/1/289417 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | ultimate_php_board_project/ultimate_php_board | False | Unknown | nan |
CVE-2002-2119 | Novell eDirectory 8.6.2 and 8.7 use case insensitive passwords, which makes it easier for remote attackers to conduct brute force password guessing. | 2002-12-31 | 2026-04-16 | CWE-178 | novell/edirectory:8.6.2|novell/edirectory:8.7 | http://archives.neohapsis.com/archives/bugtraq/2002-05/0273.html|http://www.iss.net/security_center/static/9229.php|http://www.securityfocus.com/bid/4893|http://archives.neohapsis.com/archives/bugtraq/2002-05/0273.html|http://www.iss.net/security_center/static/9229.php | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | novell/edirectory | False | Unknown | nan |
CVE-2002-1484 | DB4Web server, when configured to use verbose debug messages, allows remote attackers to use DB4Web as a proxy and attempt TCP connections to other systems (port scan) via a request for a URL that specifies the target IP address and port, which produces a connection status in the resulting error message. | 2003-04-22 | 2026-04-16 | CWE-918 | siemens/db4web:3.4|siemens/db4web:3.6 | http://archives.neohapsis.com/archives/bugtraq/2002-09/0201.html|http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0125.html|http://www.iss.net/security_center/static/10136.php|http://www.securityfocus.com/bid/5725|http://archives.neohapsis.com/archives/bugtraq/2002-09/0201.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Server-Side Request Forgery (SSRF) | Initial Access | 98.5 | CRITICAL | siemens/db4web | False | Unknown | nan |
CVE-2003-0174 | The LDAP name service (nsd) in IRIX 6.5.19 and earlier does not properly verify if the USERPASSWORD attribute has been provided by an LDAP server, which could allow attackers to log in without a password. | 2003-05-12 | 2026-04-16 | CWE-346 | sgi/irix:* | ftp://patches.sgi.com/support/free/security/advisories/20030407-01-P|http://www.ciac.org/ciac/bulletins/n-084.shtml|http://www.securityfocus.com/bid/7442|https://exchange.xforce.ibmcloud.com/vulnerabilities/11860|ftp://patches.sgi.com/support/free/security/advisories/20030407-01-P | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | sgi/irix | False | Unknown | nan |
CVE-2003-0356 | Multiple off-by-one vulnerabilities in Ethereal 0.9.11 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) AIM, (2) GIOP Gryphon, (3) OSPF, (4) PPTP, (5) Quake, (6) Quake2, (7) Quake3, (8) Rsync, (9) SMB, (10) SMPP, and (11) TSP dissectors, which do not proper... | 2003-06-09 | 2026-04-16 | CWE-193 | ethereal/ethereal:* | http://www.debian.org/security/2003/dsa-313|http://www.ethereal.com/appnotes/enpa-sa-00009.html|http://www.kb.cert.org/vuls/id/641013|http://www.mandriva.com/security/advisories?name=MDKSA-2003:067|http://www.redhat.com/support/errata/RHSA-2003-077.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | ethereal/ethereal | False | Unknown | nan |
CVE-2003-0252 | Off-by-one error in the xlog function of mountd in the Linux NFS utils package (nfs-utils) before 1.0.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via certain RPC requests to mountd that do not contain newlines. | 2003-08-18 | 2026-04-16 | CWE-193 | linux-nfs/nfs-utils:* | http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0023.html|http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0024.html|http://isec.pl/vulnerabilities/isec-0010-linux-nfs-utils.txt|http://marc.info/?l=bugtraq&m=105820223707191&w=2|http://marc.info/?l=bugtraq&m=105830921519513&w=2 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | linux-nfs/nfs-utils | False | Unknown | nan |
CVE-2003-0466 | Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow attackers to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buffer overflow, including (1) STOR, (2) RETR, (3) APPE, (4) D... | 2003-08-27 | 2026-04-16 | CWE-193 | redhat/wu_ftpd:2.6.1-16|wuftpd/wu-ftpd:*|apple/mac_os_x:10.2.6|apple/mac_os_x_server:10.2.6|freebsd/freebsd:*|netbsd/netbsd:*|openbsd/openbsd:*|sun/solaris:9.0 | ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-011.txt.asc|http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0065.html|http://download.immunix.org/ImmunixOS/7+/Updates/errata/IMNX-2003-7+-019-01|http://isec.pl/vulnerabilities/isec-0011-wu-ftpd.txt|http://marc.info/?l=bugtraq&m=105967301604815&... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | redhat/wu_ftpd | False | Unknown | nan |
CVE-2003-0791 | The Script.prototype.freeze/thaw functionality in Mozilla 1.4 and earlier allows attackers to execute native methods by modifying the string used as input to the script.thaw JavaScript function, which is then deserialized and executed. | 2003-10-07 | 2026-04-16 | CWE-502 | mozilla/mozilla:*|sco/openserver:5.0.7 | http://secunia.com/advisories/11103/|http://www.mandriva.com/security/advisories?name=MDKSA-2004:021|http://www.osvdb.org/8390|http://www.securityfocus.com/advisories/6979|http://www.securityfocus.com/bid/9322 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Deserialization Vulnerability | Execution | 98.5 | CRITICAL | mozilla/mozilla | False | Unknown | nan |
CVE-2003-0899 | Buffer overflow in defang in libhttpd.c for thttpd 2.21 to 2.23b1 allows remote attackers to execute arbitrary code via requests that contain '' characters, which trigger the overflow when the characters are expanded to "<" and ">" sequences. | 2003-11-03 | 2026-04-16 | CWE-131 | acme/thttpd:*|acme/thttpd:2.23|acme/thttpd:2.23 | http://marc.info/?l=bugtraq&m=106729188224252&w=2|http://secunia.com/advisories/10092|http://www.osvdb.org/2729|http://www.securityfocus.com/bid/8906|http://www.texonet.com/advisories/TEXONET-20030908.txt | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | acme/thttpd | False | Unknown | nan |
CVE-2003-0545 | Double free vulnerability in OpenSSL 0.9.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an SSL client certificate with a certain invalid ASN.1 encoding. | 2003-11-17 | 2026-04-16 | CWE-415 | openssl/openssl:0.9.6|openssl/openssl:0.9.7 | http://secunia.com/advisories/22249|http://www-1.ibm.com/support/docview.wss?uid=swg21247112|http://www.cert.org/advisories/CA-2003-26.html|http://www.debian.org/security/2003/dsa-394|http://www.kb.cert.org/vuls/id/935264 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | openssl/openssl | False | Unknown | nan |
CVE-2003-1233 | Pedestal Software Integrity Protection Driver (IPD) 1.3 and earlier allows privileged attackers, such as rootkits, to bypass file access restrictions to the Windows kernel by using the NtCreateSymbolicLinkObject function to create a symbolic link to (1) \Device\PhysicalMemory or (2) to a drive letter using the subst co... | 2003-12-31 | 2026-04-16 | CWE-59 | pedestalsoftware/integrity_protection_driver:* | http://archives.neohapsis.com/archives/bugtraq/2003-01/0017.html|http://archives.neohapsis.com/archives/bugtraq/2003-01/0018.html|http://secunia.com/advisories/7816|http://www.phrack.org/show.php?p=59&a=16|http://www.securityfocus.com/bid/6511 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | pedestalsoftware/integrity_protection_driver | False | Unknown | nan |
CVE-2004-0030 | PHP remote file inclusion vulnerability in (1) functions.php, (2) authentication_index.php, and (3) config_gedcom.php for PHPGEDVIEW 2.61 allows remote attackers to execute arbitrary PHP code by modifying the PGV_BASE_DIRECTORY parameter to reference a URL on a remote web server that contains the code. | 2004-01-20 | 2026-04-16 | CWE-829 | phpgedview/phpgedview:2.61 | http://marc.info/?l=bugtraq&m=107340840209453&w=2|http://secunia.com/advisories/10565|http://www.osvdb.org/3343|http://www.securityfocus.com/bid/9368|http://www.securitytracker.com/id?1008632 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | phpgedview/phpgedview | False | Unknown | nan |
CVE-2004-0005 | Multiple buffer overflows in Gaim 0.75 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) octal encoding in yahoo_decode that causes a null byte to be written beyond the buffer, (2) octal encoding in yahoo_decode that causes a pointer to reference memory beyond the terminati... | 2004-03-03 | 2026-04-16 | CWE-193 | gaim_project/gaim:0.75 | http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0994.html|http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000813|http://marc.info/?l=bugtraq&m=107513690306318&w=2|http://security.e-matters.de/advisories/012004.html|http://www.debian.org/security/2004/dsa-434 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | gaim_project/gaim | False | Unknown | nan |
CVE-2004-0434 | k5admind (kadmind) for Heimdal allows remote attackers to execute arbitrary code via a Kerberos 4 compatibility administration request whose framing length is less than 2, which leads to a heap-based buffer overflow. | 2004-07-07 | 2026-04-16 | CWE-131 | heimdal_project/heimdal:*|debian/debian_linux:3.0 | ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:09.kadmind.asc|http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020998.html|http://marc.info/?l=bugtraq&m=108386148126457&w=2|http://security.gentoo.org/glsa/glsa-200405-23.xml|http://www.debian.org/security/2004/dsa-504 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | heimdal_project/heimdal | False | Unknown | nan |
CVE-2004-2061 | RiSearch 1.0.01 and RiSearch Pro 3.2.06 allows remote attackers to use the show.pl script as an open proxy, or read arbitrary local files, by setting the url parameter to a (1) http://, (2) ftp://, or (3) file:// URL. | 2004-07-27 | 2026-04-16 | CWE-918 | risearch/risearch:1.0.01|risearch/risearch_pro:3.2.6 | http://marc.info/?l=bugtraq&m=109095196526490&w=2|http://secunia.com/advisories/12173|http://securitytracker.com/id?1010788|http://www.osvdb.org/8265|http://www.osvdb.org/8266 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Server-Side Request Forgery (SSRF) | Initial Access | 98.5 | CRITICAL | risearch/risearch | False | Unknown | nan |
CVE-2004-1363 | Buffer overflow in extproc in Oracle 10g allows remote attackers to execute arbitrary code via environment variables in the library name, which are expanded after the length check is performed. | 2004-08-04 | 2026-04-16 | CWE-131 | oracle/application_server:*|oracle/application_server:9.0.2|oracle/application_server:9.0.2.0.0|oracle/application_server:9.0.2.0.1|oracle/application_server:9.0.2.1|oracle/application_server:9.0.2.2|oracle/application_server:9.0.2.3|oracle/application_server:9.0.3|oracle/application_server:9.0.3.1|oracle/application_s... | http://marc.info/?l=bugtraq&m=110382345829397&w=2|http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1|http://www.kb.cert.org/vuls/id/316206|http://www.ngssoftware.com/advisories/oracle23122004.txt|http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | oracle/application_server | False | Unknown | nan |
CVE-2004-0772 | Double free vulnerabilities in error handling code in krb524d for MIT Kerberos 5 (krb5) 1.2.8 and earlier may allow remote attackers to execute arbitrary code. | 2004-10-20 | 2026-04-16 | CWE-415 | mit/kerberos_5:*|openpkg/openpkg:2.0|openpkg/openpkg:2.1|debian/debian_linux:3.0 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000860|http://marc.info/?l=bugtraq&m=109508872524753&w=2|http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-002-dblfree.txt|http://www.debian.org/security/2004/dsa-543|http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | mit/kerberos_5 | False | Unknown | nan |
CVE-2004-0847 | The Microsoft .NET forms authentication capability for ASP.NET allows remote attackers to bypass authentication for .aspx files in restricted directories via a request containing a (1) "\" (backslash) or (2) "%5C" (encoded backslash), aka "Path Validation Vulnerability." | 2004-11-03 | 2026-04-16 | CWE-22 | microsoft/asp.net:*|microsoft/asp.net:1.1 | http://archives.neohapsis.com/archives/ntbugtraq/2004-q3/0221.html|http://sourceforge.net/mailarchive/forum.php?thread_id=5671607&forum_id=24754|http://www.kb.cert.org/vuls/id/283646|http://www.securityfocus.com/bid/11342|http://www.us-cert.gov/cas/techalerts/TA05-039A.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Path Traversal | Defense Evasion | 98.5 | CRITICAL | microsoft/asp.net | False | Unknown | nan |
CVE-2004-0285 | PHP remote file inclusion vulnerabilities in include/footer.inc.php in (1) AllMyVisitors, (2) AllMyLinks, and (3) AllMyGuests allow remote attackers to execute arbitrary PHP code via a URL in the _AMVconfig[cfg_serverpath] parameter. | 2004-11-23 | 2026-04-16 | CWE-829 | allmyguests_project/allmyguests:0.1.2|allmyguests_project/allmyguests:0.3|allmyguests_project/allmyguests:0.4|allmyguests_project/allmyguests:0.4.1|allmylinks_project/allmylinks:0.3|allmylinks_project/allmylinks:0.4|allmylinks_project/allmylinks:0.4.1|allmylinks_project/allmylinks:0.4.3|allmylinks_project/allmylinks:0.... | http://marc.info/?l=bugtraq&m=107696209514155&w=2|http://marc.info/?l=bugtraq&m=107696235424865&w=2|http://marc.info/?l=bugtraq&m=107696291728750&w=2|http://www.osvdb.org/6721|http://www.securityfocus.com/bid/9664 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | allmyguests_project/allmyguests | False | Unknown | nan |
CVE-2004-2154 | CUPS before 1.1.21rc1 treats a Location directive in cupsd.conf as case sensitive, which allows attackers to bypass intended ACLs via a printer name containing uppercase or lowercase letters that are different from what is specified in the directive. | 2004-12-31 | 2026-04-16 | CWE-178|CWE-178 | apple/cups:*|apple/cups:1.1.21|canonical/ubuntu_linux:4.10 | http://www.cups.org/str.php?L700|http://www.novell.com/linux/security/advisories/2005_18_sr.html|http://www.redhat.com/support/errata/RHSA-2005-571.html|http://www.ubuntu.com/usn/usn-185-1|https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162405 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | apple/cups | False | Unknown | nan |
CVE-2004-2214 | Mbedthis AppWeb HTTP server before 1.1.3 allows remote attackers to bypass access restrictions via a URI with mixed case characters. | 2004-12-31 | 2026-04-16 | CWE-178 | mbedthis/appweb_http_server:* | http://secunia.com/advisories/12011|http://www.mbedthis.com/products/appWeb/doc/product/newFeatures.html|http://www.osvdb.org/7391|http://www.securityfocus.com/bid/10673|https://exchange.xforce.ibmcloud.com/vulnerabilities/16638 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | mbedthis/appweb_http_server | False | Unknown | nan |
CVE-2005-0102 | Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow. | 2005-01-24 | 2026-04-16 | CWE-190 | gnome/evolution:*|debian/debian_linux:3.0 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000925|http://secunia.com/advisories/13830|http://security.gentoo.org/glsa/glsa-200501-35.xml|http://securitytracker.com/id?1012981|http://www.debian.org/security/2005/dsa-673 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Integer Overflow | Unknown | 98.5 | CRITICAL | gnome/evolution | False | Unknown | nan |
CVE-2005-0408 | CitrusDB 0.3.6 and earlier generates easily predictable MD5 hashes of the user name for the id_hash cookie, which allows remote attackers to bypass authentication and gain privileges by calculating the MD5 checksum of the user name combined with the "boogaadeeboo" string, which is hard-coded in the $hidden_hash variabl... | 2005-02-14 | 2026-04-16 | CWE-916 | citrusdb/citrusdb:* | http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031707.html|http://www.redteam-pentesting.de/advisories/rt-sa-2005-002.txt|http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031707.html|http://www.redteam-pentesting.de/advisories/rt-sa-2005-002.txt | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | citrusdb/citrusdb | False | Unknown | nan |
CVE-2005-0496 | Arkeia Network Backup Client 5.x contains hard-coded credentials that effectively serve as a back door, which allows remote attackers to access the file system and possibly execute arbitrary commands. | 2005-02-21 | 2026-04-16 | CWE-798 | arkeia/network_backup:5.0 | http://marc.info/?l=bugtraq&m=110900879826004&w=2|http://metasploit.com/research/arkeia_agent/|http://securitytracker.com/id?1013256|https://exchange.xforce.ibmcloud.com/vulnerabilities/20667|http://marc.info/?l=bugtraq&m=110900879826004&w=2 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Hardcoded Credentials | Credential Access | 98.5 | CRITICAL | arkeia/network_backup | False | Unknown | nan |
CVE-2005-1141 | Integer overflow in the readpgm function in pnm.c for GOCR 0.40, when using the netpbm library, allows remote attackers to execute arbitrary code via a PNM file with large width and height values, which leads to a heap-based buffer overflow. | 2005-04-15 | 2026-04-16 | CWE-190 | optical_character_recognition_project/optical_character_recognition:0.40 | http://marc.info/?l=bugtraq&m=111358557823673&w=2|http://www.overflow.pl/adv/gocr.txt|http://marc.info/?l=bugtraq&m=111358557823673&w=2|http://www.overflow.pl/adv/gocr.txt | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Integer Overflow | Unknown | 98.5 | CRITICAL | optical_character_recognition_project/optical_character_recognition | False | Unknown | nan |
CVE-2005-0199 | Integer underflow in the Lists_MakeMask() function in lists.c in ngIRCd before 0.8.2 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long MODE line that causes an incorrect length calculation, which leads to a buffer overflow. | 2005-05-02 | 2026-04-16 | CWE-191 | barton/ngircd:* | http://arthur.ath.cx/pipermail/ngircd-ml/2005-January/000228.html|http://bugs.gentoo.org/show_bug.cgi?id=79705|http://secunia.com/advisories/14056|http://secunia.com/advisories/14059|http://securitytracker.com/id?1013047 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | barton/ngircd | False | Unknown | nan |
CVE-2005-0269 | The file extension check in GNUBoard 3.40 and earlier only verifies extensions that contain all lowercase letters, which allows remote attackers to upload arbitrary files via file extensions that include uppercase letters. | 2005-05-02 | 2026-04-16 | CWE-178 | sir/gnuboard:* | http://marc.info/?l=bugtraq&m=110477648219738&w=2|http://secunia.com/advisories/13711|http://www.securityfocus.com/bid/12149|https://exchange.xforce.ibmcloud.com/vulnerabilities/18729|http://marc.info/?l=bugtraq&m=110477648219738&w=2 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | sir/gnuboard | False | Unknown | nan |
CVE-2005-1513 | Integer overflow in the stralloc_readyplus function in qmail, when running on 64 bit platforms with a large amount of virtual memory, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large SMTP request. | 2005-05-11 | 2026-04-16 | CWE-190 | qmail_project/qmail:-|canonical/ubuntu_linux:20.04|debian/debian_linux:8.0|debian/debian_linux:9.0|debian/debian_linux:10.0 | http://archives.neohapsis.com/archives/fulldisclosure/2005-05/0101.html|http://packetstormsecurity.com/files/157805/Qualys-Security-Advisory-Qmail-Remote-Code-Execution.html|http://packetstormsecurity.com/files/158203/Qmail-Local-Privilege-Escalation-Remote-Code-Execution.html|http://packetstormsecurity.com/files/17280... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Integer Overflow | Unknown | 98.5 | CRITICAL | qmail_project/qmail | False | Unknown | nan |
CVE-2005-1744 | BEA WebLogic Server and WebLogic Express 7.0 through Service Pack 5 does not log out users when an application is redeployed, which allows those users to continue to access the application without having to log in again, which may be in violation of newly changed security constraints or role mappings. | 2005-05-24 | 2026-04-16 | CWE-459 | bea/weblogic_server:* | http://dev2dev.bea.com/pub/advisory/127|http://secunia.com/advisories/15486|http://securitytracker.com/id?1014049|http://www.securityfocus.com/bid/13717|http://www.vupen.com/english/advisories/2005/0604 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | bea/weblogic_server | False | Unknown | nan |
CVE-2005-1689 | Double free vulnerability in the krb5_recvauth function in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to execute arbitrary code via certain error conditions. | 2005-07-18 | 2026-04-16 | CWE-415 | mit/kerberos_5:*|apple/mac_os_x:*|apple/mac_os_x_server:*|debian/debian_linux:3.0|debian/debian_linux:3.1 | ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc|http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000993|http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html|http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html|http://marc.info/?l=bugtraq&m=11211... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | mit/kerberos_5 | False | Unknown | nan |
CVE-2005-2103 | Buffer overflow in the AIM and ICQ module in Gaim before 1.5.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an away message with a large number of AIM substitution strings, such as %t or %n. | 2005-08-16 | 2026-04-16 | CWE-131|CWE-131 | gaim_project/gaim:* | http://gaim.sourceforge.net/security/?id=22|http://www.novell.com/linux/security/advisories/2005_19_sr.html|http://www.redhat.com/support/errata/RHSA-2005-589.html|http://www.redhat.com/support/errata/RHSA-2005-627.html|http://www.securityfocus.com/archive/1/426078/100/0/threaded | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | gaim_project/gaim | False | Unknown | nan |
CVE-2005-2773 | HP OpenView Network Node Manager 6.2 through 7.50 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) node parameter to connectedNodes.ovpl, (2) cdpView.ovpl, (3) freeIPaddrs.ovpl, and (4) ecscmg.ovpl. | 2005-09-02 | 2026-04-16 | CWE-77|CWE-77 | hp/openview_network_node_manager:* | http://marc.info/?l=bugtraq&m=112499121725662&w=2|http://secunia.com/advisories/16555/|http://www.securityfocus.com/advisories/9150|http://www.securityfocus.com/bid/14662|https://exchange.xforce.ibmcloud.com/vulnerabilities/21999 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Command Injection | Execution | 100.0 | CRITICAL | hp/openview_network_node_manager | True | Unknown | Apply updates per vendor instructions. |
CVE-2005-3120 | Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and earlier allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters. | 2005-10-17 | 2026-04-16 | CWE-131 | invisible-island/lynx:*|debian/debian_linux:3.0|debian/debian_linux:3.1 | ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.7/SCOSA-2006.7.txt|ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.47/SCOSA-2005.47.txt|http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038019.html|http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html|http://secunia.com/advisories... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | invisible-island/lynx | False | Unknown | nan |
CVE-2005-3435 | admin_news.php in Archilles Newsworld up to 1.3.0 allows attackers to bypass authentication by obtaining the password hash for another user, for example through another Newsworld vulnerability, and specifying the hash in the pwd argument. | 2005-11-02 | 2026-04-16 | CWE-522 | archilles/newsworld:* | http://marc.info/?l=bugtraq&m=113018731120709&w=2|http://secunia.com/advisories/17310/|https://exchange.xforce.ibmcloud.com/vulnerabilities/22860|http://marc.info/?l=bugtraq&m=113018731120709&w=2|http://secunia.com/advisories/17310/ | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | archilles/newsworld | False | Unknown | nan |
CVE-2007-0681 | profile.php in ExtCalendar 2 and earlier allows remote attackers to change the passwords of arbitrary users without providing the original password, and possibly perform other unauthorized actions, via modified values to register.php. | 2007-02-03 | 2026-04-23 | CWE-522 | extcalendar_project/extcalendar:* | http://osvdb.org/38130|https://exchange.xforce.ibmcloud.com/vulnerabilities/32035|https://www.exploit-db.com/exploits/3239|http://osvdb.org/38130|https://exchange.xforce.ibmcloud.com/vulnerabilities/32035 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | extcalendar_project/extcalendar | False | Unknown | nan |
CVE-2006-7079 | Variable extraction vulnerability in include/common.php in exV2 2.0.4.3 and earlier allows remote attackers to overwrite arbitrary program variables and conduct directory traversal attacks to execute arbitrary code by modifying the $xoopsOption['pagetype'] variable. | 2007-03-02 | 2026-04-23 | CWE-22|CWE-913 | exv2/content_management_system:* | http://www.securityfocus.com/bid/20161|https://exchange.xforce.ibmcloud.com/vulnerabilities/29116|https://www.exploit-db.com/exploits/2415|http://www.securityfocus.com/bid/20161|https://exchange.xforce.ibmcloud.com/vulnerabilities/29116 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Path Traversal | Defense Evasion | 98.5 | CRITICAL | exv2/content_management_system | False | Unknown | nan |
CVE-2007-1399 | Stack-based buffer overflow in the zip:// URL wrapper in PECL ZIP 1.8.3 and earlier, as bundled with PHP 5.2.0 and 5.2.1, allows remote attackers to execute arbitrary code via a long zip:// URL, as demonstrated by actively triggering URL access from a remote PHP interpreter via avatar upload or blog pingback. | 2007-03-10 | 2025-12-11 | UNKNOWN | php/php:5.2.0|php/php:5.2.1|pierrejoye/php_zip:* | http://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html|http://secunia.com/advisories/24471|http://secunia.com/advisories/24514|http://secunia.com/advisories/25938|http://www.debian.org/security/2007/dsa-1330 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2007-3798 | Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value. | 2007-07-16 | 2026-04-23 | CWE-252|CWE-252 | tcpdump/tcpdump:*|canonical/ubuntu_linux:6.06|canonical/ubuntu_linux:6.10|canonical/ubuntu_linux:7.04|debian/debian_linux:3.1|debian/debian_linux:4.0|slackware/slackware:9.0|slackware/slackware:9.1|slackware/slackware:10.0|slackware/slackware:10.1 | http://bugs.gentoo.org/show_bug.cgi?id=184815|http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12|http://docs.info.apple.com/article.html?artnum=307179|http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html|http://secunia.com/advisories/26135 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | tcpdump/tcpdump | False | Unknown | nan |
CVE-2007-3010 | masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server R7.1 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the user parameter during a ping action. | 2007-09-18 | 2026-04-21 | CWE-77 | al-enterprise/omnipcx_enterprise_communication_server:* | http://marc.info/?l=full-disclosure&m=119002152126755&w=2|http://osvdb.org/40521|http://secunia.com/advisories/26853|http://www.redteam-pentesting.de/advisories/rt-sa-2007-001.php|http://www.securityfocus.com/archive/1/479699/100/0/threaded | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Command Injection | Execution | 100.0 | CRITICAL | al-enterprise/omnipcx_enterprise_communication_server | True | Unknown | Apply updates per vendor instructions. |
CVE-2007-6013 | Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash. | 2007-11-19 | 2026-04-23 | CWE-327 | wordpress/wordpress:*|fedoraproject/fedora:7|fedoraproject/fedora:8 | http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/058576.html|http://osvdb.org/40801|http://secunia.com/advisories/27714|http://secunia.com/advisories/28310|http://securityreason.com/securityalert/3375 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | wordpress/wordpress | False | Unknown | nan |
CVE-2008-0081 | Unspecified vulnerability in Microsoft Excel 2000 SP3 through 2003 SP2, Viewer 2003, and Office 2004 for Mac allows user-assisted remote attackers to execute arbitrary code via crafted macros, aka "Macro Validation Vulnerability," a different vulnerability than CVE-2007-3490. | 2008-01-16 | 2026-04-23 | CWE-908|CWE-908 | microsoft/excel:2000|microsoft/excel:2002|microsoft/excel:2003|microsoft/excel_viewer:2003|microsoft/office:2004 | http://marc.info/?l=bugtraq&m=120585858807305&w=2|http://secunia.com/advisories/28506|http://securitytracker.com/id?1019200|http://www.microsoft.com/technet/security/advisory/947563.mspx|http://www.securityfocus.com/bid/27305 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | microsoft/excel | False | Unknown | nan |
CVE-2008-0174 | GE Fanuc Proficy Real-Time Information Portal 2.6 and earlier uses HTTP Basic Authentication, which transmits usernames and passwords in base64-encoded cleartext and allows remote attackers to steal the passwords and gain privileges. | 2008-01-29 | 2026-04-23 | CWE-312 | ge/proficy_real-time_information_portal:* | http://securityreason.com/securityalert/3590|http://securitytracker.com/id?1019273|http://support.gefanuc.com/support/index?page=kbchannel&id=KB12459|http://www.kb.cert.org/vuls/id/180876|http://www.securityfocus.com/archive/1/487075/100/0/threaded | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | ge/proficy_real-time_information_portal | False | Unknown | nan |
CVE-2008-0062 | KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free. | 2008-03-19 | 2026-04-23 | CWE-665 | mit/kerberos_5:*|debian/debian_linux:3.1|debian/debian_linux:4.0|canonical/ubuntu_linux:6.06|canonical/ubuntu_linux:6.10|canonical/ubuntu_linux:7.04|canonical/ubuntu_linux:7.10|fedoraproject/fedora:7|fedoraproject/fedora:8 | http://docs.info.apple.com/article.html?artnum=307562|http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html|http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html|http://marc.info/?l=bugtraq&m=130497213107107&w=2|http://secunia.com/advisories/29420 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | mit/kerberos_5 | False | Unknown | nan |
CVE-2008-1160 | ZyXEL ZyWALL 1050 has a hard-coded password for the Quagga and Zebra processes that is not changed when it is set by a user, which allows remote attackers to gain privileges. | 2008-03-25 | 2026-04-23 | CWE-798 | zyxel/zywall_1050_firmware:- | http://packetstormsecurity.org/0803-exploits/ZyWALL.pdf|http://secunia.com/advisories/29237|http://www.secumania.org/exploits/remote/zyxel-zywall-quagga_zebra-%28default-pass%29-remote-root-vulnerability-2008032143791/|http://www.securityfocus.com/bid/28184|http://www.vupen.com/english/advisories/2008/0990/references | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Hardcoded Credentials | Credential Access | 98.5 | CRITICAL | zyxel/zywall_1050_firmware | False | Unknown | nan |
CVE-2008-0961 | EMV DiskXtender 6.20.060 has a hard-coded login and password, which allows remote attackers to bypass authentication via the RPC interface. | 2008-04-14 | 2026-04-23 | CWE-798 | emc/diskxtender:6.20.060 | http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=683|http://secunia.com/advisories/29778|http://www.osvdb.org/44419|http://www.securityfocus.com/bid/28727|http://www.securitytracker.com/id?1019827 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Hardcoded Credentials | Credential Access | 98.5 | CRITICAL | emc/diskxtender | False | Unknown | nan |
CVE-2008-0599 | The init_request_info function in sapi/cgi/cgi_main.c in PHP before 5.2.6 does not properly consider operator precedence when calculating the length of PATH_TRANSLATED, which might allow remote attackers to execute arbitrary code via a crafted URI. | 2008-05-05 | 2026-04-23 | CWE-131 | php/php:*|fedoraproject/fedora:8|fedoraproject/fedora:9|canonical/ubuntu_linux:6.06|canonical/ubuntu_linux:7.04|canonical/ubuntu_linux:7.10|canonical/ubuntu_linux:8.04|apple/mac_os_x:*|apple/mac_os_x_server:* | http://cvs.php.net/viewvc.cgi/php-src/sapi/cgi/cgi_main.c?r1=1.267.2.15.2.50.2.12&r2=1.267.2.15.2.50.2.13&diff_format=u|http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01476437|http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html|http://marc.info/?l=bugtraq&m=124654546101607... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2008-2108 | The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 64-bit systems, performs a multiplication that generates a portion of zero bits during conversion due to insufficient precision, which produces 24 bits of entropy and simplifies brute force attacks against protection mechanisms that u... | 2008-05-07 | 2026-04-23 | CWE-331 | php/php:*|php/php:*|fedoraproject/fedora:8|fedoraproject/fedora:9|canonical/ubuntu_linux:6.06|canonical/ubuntu_linux:7.04|canonical/ubuntu_linux:7.10|canonical/ubuntu_linux:8.04|debian/debian_linux:4.0 | http://archives.neohapsis.com/archives/fulldisclosure/2008-05/0103.html|http://secunia.com/advisories/30757|http://secunia.com/advisories/30828|http://secunia.com/advisories/31119|http://secunia.com/advisories/31124 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2008-3604 | SQL injection vulnerability in bannerclick.php in ZeeBuddy 2.1 allows remote attackers to execute arbitrary SQL commands via the adid parameter. | 2008-08-12 | 2026-04-23 | CWE-89 | zeescripts/zeebuddy:2.1 | http://secunia.com/advisories/31413|http://securityreason.com/securityalert/4145|http://www.securityfocus.com/bid/30628|https://exchange.xforce.ibmcloud.com/vulnerabilities/44362|https://www.exploit-db.com/exploits/6230 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | SQL Injection | Initial Access | 98.5 | CRITICAL | zeescripts/zeebuddy | False | Unknown | nan |
CVE-2008-2369 | manzier.pxt in Red Hat Network Satellite Server before 5.1.1 has a hard-coded authentication key, which allows remote attackers to connect to the server and obtain sensitive information about user accounts and entitlements. | 2008-08-14 | 2026-04-23 | CWE-798 | redhat/satellite:* | http://rhn.redhat.com/errata/RHSA-2008-0630.html|http://secunia.com/advisories/31493|http://securitytracker.com/id?1020694|http://www.securityfocus.com/bid/30679|https://exchange.xforce.ibmcloud.com/vulnerabilities/44452 | True | 9.1 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | NONE | 3.9 | 5.2 | Hardcoded Credentials | Credential Access | 95.0 | CRITICAL | redhat/satellite | False | Unknown | nan |
CVE-2008-2433 | The web management console in Trend Micro OfficeScan 7.0 through 8.0, Worry-Free Business Security 5.0, and Client/Server/Messaging Suite 3.5 and 3.6 creates a random session token based only on the login time, which makes it easier for remote attackers to hijack sessions via brute-force attacks. NOTE: this can be leve... | 2008-08-27 | 2026-04-23 | CWE-330 | trendmicro/client_server_messaging_suite:3.5|trendmicro/client_server_messaging_suite:3.6|trendmicro/officescan:*|trendmicro/worry-free_business_security:5.0 | http://secunia.com/advisories/31373|http://secunia.com/secunia_research/2008-31/advisory/|http://securityreason.com/securityalert/4191|http://www.securityfocus.com/archive/1/495670/100/0/threaded|http://www.securityfocus.com/bid/30792 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | trendmicro/client_server_messaging_suite | False | Unknown | nan |
CVE-2008-3612 | The Networking subsystem in Apple iPod touch 2.0 through 2.0.2, and iPhone 2.0 through 2.0.2, uses predictable TCP initial sequence numbers, which allows remote attackers to spoof or hijack a TCP connection. | 2008-09-11 | 2026-04-23 | CWE-330 | apple/iphone_os:* | http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html|http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html|http://secunia.com/advisories/31823|http://secunia.com/advisories/31900|http://support.apple.com/kb/HT3026 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | apple/iphone_os | False | Unknown | nan |
CVE-2008-5038 | Use-after-free vulnerability in the NetWare Core Protocol (NCP) feature in Novell eDirectory 8.7.3 SP10 before 8.7.3 SP10 FTF1 and 8.8 SP2 for Windows allows remote attackers to cause a denial of service and possibly execute arbitrary code via a sequence of "Get NCP Extension Information By Name" requests that cause on... | 2008-11-12 | 2026-04-23 | CWE-416 | novell/edirectory:*|novell/edirectory:8.7.3|novell/edirectory:8.7.3|novell/edirectory:8.7.3|novell/edirectory:8.7.3|novell/edirectory:8.7.3|novell/edirectory:8.7.3|novell/edirectory:8.7.3|novell/edirectory:8.7.3|novell/edirectory:8.7.3 | http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=748|http://osvdb.org/48206|http://secunia.com/advisories/32395|http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html|http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Use After Free | Execution | 98.5 | CRITICAL | novell/edirectory | False | Unknown | nan |
CVE-2008-5784 | V3 Chat - Profiles/Dating Script 3.0.2 allows remote attackers to bypass authentication and gain administrative access by setting the admin cookie to 1. | 2008-12-31 | 2026-04-23 | CWE-565 | v3chat/v3_chat_profiles_dating_script:3.0.2 | http://secunia.com/advisories/32603|http://www.securityfocus.com/bid/32216|http://www.vupen.com/english/advisories/2008/3071|https://exchange.xforce.ibmcloud.com/vulnerabilities/46479|https://www.exploit-db.com/exploits/7063 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | v3chat/v3_chat_profiles_dating_script | False | Unknown | nan |
CVE-2009-1151 | Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action. | 2009-03-26 | 2026-04-22 | CWE-94|CWE-94 | phpmyadmin/phpmyadmin:*|phpmyadmin/phpmyadmin:*|debian/debian_linux:4.0|debian/debian_linux:5.0 | http://labs.neohapsis.com/2009/04/06/about-cve-2009-1151/|http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html|http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/MAINT_2_11_9/phpMyAdmin/scripts/setup.php?r1=11514&r2=12301&pathrev=12301|http://secunia.com/advisories/34430|http://secun... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Code Injection | Execution | 100.0 | CRITICAL | phpmyadmin/phpmyadmin | True | Unknown | Apply updates per vendor instructions. |
CVE-2009-1936 | _functions.php in cpCommerce 1.2.x, possibly including 1.2.9, sends a redirect but does not exit when it is called directly, which allows remote attackers to bypass a protection mechanism to conduct remote file inclusion and directory traversal attacks, execute arbitrary PHP code, or read arbitrary files via the GLOBAL... | 2009-06-05 | 2026-04-23 | CWE-22|CWE-22 | cpcommerce_project/cpcommerce:* | http://secunia.com/advisories/35245|http://www.securityfocus.com/bid/35103|https://www.exploit-db.com/exploits/8790|http://secunia.com/advisories/35245|http://www.securityfocus.com/bid/35103 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Path Traversal | Defense Evasion | 98.5 | CRITICAL | cpcommerce_project/cpcommerce | False | Unknown | nan |
CVE-2009-2168 | cpanel/login.php in EgyPlus 7ammel (aka 7ml) 1.0.1 and earlier sends a redirect to the web browser but does not exit when the supplied credentials are incorrect, which allows remote attackers to bypass authentication by providing arbitrary username and password parameters. | 2009-06-22 | 2026-04-23 | CWE-287 | egyplus/7ammel:* | https://www.exploit-db.com/exploits/8865|https://www.exploit-db.com/exploits/8865 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Authentication | Initial Access | 98.5 | CRITICAL | egyplus/7ammel | False | Unknown | nan |
CVE-2009-2367 | cgi-bin/makecgi-pro in Iomega StorCenter Pro generates predictable session IDs, which allows remote attackers to hijack active sessions and gain privileges via brute force guessing attacks on the session_id parameter. | 2009-07-08 | 2026-04-23 | CWE-338 | iomega/storcenter_pro_firmware:- | http://osvdb.org/55586|http://secunia.com/advisories/35666|http://trac.metasploit.com/browser/framework3/trunk/modules/auxiliary/admin/http/iomega_storcenterpro_sessionid.rb?rev=6733|https://exchange.xforce.ibmcloud.com/vulnerabilities/51539|http://osvdb.org/55586 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | iomega/storcenter_pro_firmware | False | Unknown | nan |
CVE-2009-2382 | admin.php in phpMyBlockchecker 1.0.0055 allows remote attackers to bypass authentication and gain administrative access by setting the PHPMYBCAdmin cookie to LOGGEDIN. | 2009-07-08 | 2026-04-23 | CWE-287 | jay-jayx0r/phpmyblockchecker:1.0.0055 | http://osvdb.org/55505|http://secunia.com/advisories/35660|http://www.exploit-db.com/exploits/9053|https://exchange.xforce.ibmcloud.com/vulnerabilities/51445|http://osvdb.org/55505 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Authentication | Initial Access | 98.5 | CRITICAL | jay-jayx0r/phpmyblockchecker | False | Unknown | nan |
CVE-2009-2422 | The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications... | 2009-07-10 | 2026-04-23 | CWE-287 | rubyonrails/ruby_on_rails:*|apple/mac_os_x:*|apple/mac_os_x:10.5.8|apple/mac_os_x_server:*|apple/mac_os_x_server:10.5.8 | http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html|http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s|http://secunia.com/advisories/35702|http://support.apple.com/kb/HT4077|http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Authentication | Initial Access | 98.5 | CRITICAL | rubyonrails/ruby_on_rails | False | Unknown | nan |
CVE-2009-1048 | The web interface on the snom VoIP phones snom 300, snom 320, snom 360, snom 370, and snom 820 with firmware 6.5 before 6.5.20, 7.1 before 7.1.39, and 7.3 before 7.3.14 allows remote attackers to bypass authentication, and reconfigure the phone or make arbitrary use of the phone, via a (1) http or (2) https request wit... | 2009-08-14 | 2026-04-23 | CWE-290 | snom/snom_300_firmware:*|snom/snom_300_firmware:*|snom/snom_300_firmware:*|snom/snom_320_firmware:*|snom/snom_320_firmware:*|snom/snom_320_firmware:*|snom/snom_360_firmware:*|snom/snom_360_firmware:*|snom/snom_360_firmware:*|snom/snom_370_firmware:* | http://secunia.com/advisories/36293|http://www.csnc.ch/misc/files/advisories/cve-2009-1048.txt|http://www.securityfocus.com/archive/1/505723/100/0/threaded|https://exchange.xforce.ibmcloud.com/vulnerabilities/52424|http://secunia.com/advisories/36293 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | snom/snom_300_firmware | False | Unknown | nan |
CVE-2008-7109 | The Scanner File Utility (aka listener) in Kyocera Mita (KM) 3.3.0.1 allows remote attackers to bypass authorization and upload arbitrary files to the client system via a modified program that does not prompt the user for a password. | 2009-08-28 | 2026-04-23 | CWE-863|CWE-863 | kyoceramita/scanner_file_utility:3.3.0.1 | http://secunia.com/advisories/31631|http://www.informit.com/guides/content.aspx?g=security&seqNum=320|http://www.securityfocus.com/archive/1/495772/100/0/threaded|http://www.securityfocus.com/bid/30855|https://exchange.xforce.ibmcloud.com/vulnerabilities/44717 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Incorrect Authorization | Unknown | 98.5 | CRITICAL | kyoceramita/scanner_file_utility | False | Unknown | nan |
CVE-2009-3421 | login.php in Zenas PaoBacheca Guestbook 2.1, when register_globals is enabled, allows remote attackers to bypass authentication and gain administrative access by setting the login_ok parameter to 1. | 2009-09-25 | 2026-04-23 | CWE-287 | zenas/pao-bacheca_guestbook:2.1 | http://secunia.com/advisories/36023|http://www.exploit-db.com/exploits/9293|http://www.osvdb.org/56757|https://exchange.xforce.ibmcloud.com/vulnerabilities/52100|http://secunia.com/advisories/36023 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Improper Authentication | Initial Access | 98.5 | CRITICAL | zenas/pao-bacheca_guestbook | False | Unknown | nan |
CVE-2009-3616 | Multiple use-after-free vulnerabilities in vnc.c in the VNC server in QEMU 0.10.6 and earlier might allow guest OS users to execute arbitrary code on the host OS by establishing a connection from a VNC client and then (1) disconnecting during data transfer, (2) sending a message using incorrect integer data types, or (... | 2009-10-23 | 2026-04-23 | CWE-416 | qemu/qemu:*|redhat/enterprise_linux_server:5.0|redhat/enterprise_linux_workstation:5.0 | http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5|http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331|http://marc.info/?l=qemu-devel&m=124324043812915|http://rhn.redhat.com/errata/RHEA-2009-1272.html|http://www.openwall.com/lists/oss-security/2009/10/16/5 | True | 9.9 | CRITICAL | NETWORK | LOW | LOW | NONE | CHANGED | HIGH | HIGH | HIGH | 3.1 | 6.0 | Use After Free | Execution | 95.0 | CRITICAL | qemu/qemu | False | Unknown | nan |
CVE-2009-4581 | Directory traversal vulnerability in modules/admincp.php in RoseOnlineCMS 3 B1 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the admin parameter. | 2010-01-06 | 2026-04-23 | CWE-22 | roseonlinecms/roseonlinecms:* | http://packetstormsecurity.org/0912-exploits/roseonlinecms-lfi.txt|http://www.exploit-db.com/exploits/10793|http://www.securityfocus.com/bid/37529|https://exchange.xforce.ibmcloud.com/vulnerabilities/55207|http://packetstormsecurity.org/0912-exploits/roseonlinecms-lfi.txt | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Path Traversal | Defense Evasion | 98.5 | CRITICAL | roseonlinecms/roseonlinecms | False | Unknown | nan |
CVE-2009-4013 | Multiple directory traversal vulnerabilities in Lintian 1.23.x through 1.23.28, 1.24.x through 1.24.2.1, and 2.x before 2.3.2 allow remote attackers to overwrite arbitrary files or obtain sensitive information via vectors involving (1) control field names, (2) control field values, and (3) control files of patch system... | 2010-02-02 | 2026-04-29 | CWE-22 | debian/lintian:*|debian/lintian:*|debian/lintian:*|debian/debian_linux:4.0|debian/debian_linux:5.0|canonical/ubuntu_linux:6.06|canonical/ubuntu_linux:8.04|canonical/ubuntu_linux:8.10|canonical/ubuntu_linux:9.04|canonical/ubuntu_linux:9.10 | http://git.debian.org/?p=lintian/lintian.git%3Ba=commit%3Bh=c8d01f062b3e5137cf65196760b079a855c75e00|http://git.debian.org/?p=lintian/lintian.git%3Ba=commit%3Bh=fbe0c92b2ef7e360d13414bf40d6af5507d0c86d|http://packages.debian.org/changelogs/pool/main/l/lintian/lintian_2.3.2/changelog|http://packages.qa.debian.org/l/lint... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Path Traversal | Defense Evasion | 98.5 | CRITICAL | debian/lintian | False | Unknown | nan |
CVE-2010-0840 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Or... | 2010-04-01 | 2026-04-21 | UNKNOWN | oracle/jre:1.4.2_25|oracle/jre:1.5.0|oracle/jre:1.6.0|opensuse/opensuse:11.0|opensuse/opensuse:11.1|opensuse/opensuse:11.2|canonical/ubuntu_linux:8.04|canonical/ubuntu_linux:8.10|canonical/ubuntu_linux:9.04|canonical/ubuntu_linux:9.10 | http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751|http://lists.apple.com/archives/security-announce/2010//May/msg00001.html|http://lists.apple.com/archives/security-announce/2010//May/msg00002.html|http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html|http://lists.opensuse.org/ope... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 100.0 | CRITICAL | oracle/jre | True | Unknown | Apply updates per vendor instructions. |
CVE-2010-1866 | The dechunk filter in PHP 5.3 through 5.3.2, when decoding an HTTP chunked encoding stream, allows context-dependent attackers to cause a denial of service (crash) and possibly trigger memory corruption via a negative chunk size, which bypasses a signed comparison, related to an integer overflow in the chunk size decod... | 2010-05-07 | 2026-04-29 | CWE-190 | php/php:*|opensuse/opensuse:11.1|opensuse/opensuse:11.2|opensuse/opensuse:11.3|suse/linux_enterprise:10.0|suse/linux_enterprise:11.0|suse/linux_enterprise:11.0 | http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html|http://php-security.org/2010/05/02/mops-2010-003-php-dechunk-filter-signed-comparison-vulnerability/index.html|http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html|http://php-security.org/2010/05/02/mops-2010-003-php-dechun... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Integer Overflow | Unknown | 98.5 | CRITICAL | php/php | False | Unknown | nan |
CVE-2010-1573 | Linksys WAP54Gv3 firmware 3.04.03 and earlier uses a hard-coded username (Gemtek) and password (gemtekswd) for a debug interface for certain web pages, which allows remote attackers to execute arbitrary commands via the (1) data1, (2) data2, or (3) data3 parameters to (a) Debug_command_page.asp and (b) debug.cgi. | 2010-06-10 | 2026-04-29 | CWE-798 | linksys/wap54g_firmware:* | http://secunia.com/advisories/40103|http://tools.cisco.com/security/center/viewAlert.x?alertId=20682|http://www.icysilence.org/?p=268|http://www.securityfocus.com/archive/1/511733/100/0/threaded|http://www.securityfocus.com/bid/40648 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Hardcoded Credentials | Credential Access | 98.5 | CRITICAL | linksys/wap54g_firmware | False | Unknown | nan |
CVE-2010-1205 | Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row. | 2010-06-30 | 2026-04-29 | CWE-120 | libpng/libpng:*|libpng/libpng:*|google/chrome:*|apple/itunes:*|apple/safari:*|apple/iphone_os:*|apple/mac_os_x:*|apple/mac_os_x_server:*|fedoraproject/fedora:12|fedoraproject/fedora:13 | http://blackberry.com/btsc/KB27244|http://code.google.com/p/chromium/issues/detail?id=45983|http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html|http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=commitdiff%3Bh=188eb6b42602bf7d7ae708a21897923b6a83fe7c#patch18|http://lists.apple.... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Unknown | 98.5 | CRITICAL | libpng/libpng | False | Unknown | nan |
CVE-2010-0211 | The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequence... | 2010-07-28 | 2026-04-29 | CWE-252 | openldap/openldap:2.4.22|vmware/esxi:4.0|vmware/esxi:4.1|opensuse/opensuse:11.0|apple/mac_os_x:*|apple/mac_os_x_server:* | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705|http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html|http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html|http://secunia.com/advisories/40639|http://secunia.com/advisories/40677 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | openldap/openldap | False | Unknown | nan |
CVE-2010-2861 | Multiple directory traversal vulnerabilities in the administrator console in Adobe ColdFusion 9.0.1 and earlier allow remote attackers to read arbitrary files via the locale parameter to (1) CFIDE/administrator/settings/mappings.cfm, (2) logging/settings.cfm, (3) datasources/index.cfm, (4) j2eepackaging/editarchive.cfm... | 2010-08-11 | 2026-04-21 | CWE-22|CWE-22 | adobe/coldfusion:* | http://securityreason.com/securityalert/8137|http://securityreason.com/securityalert/8148|http://www.adobe.com/support/security/bulletins/apsb10-18.html|http://www.gnucitizen.org/blog/coldfusion-directory-traversal-faq-cve-2010-2861/|http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr10-07 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Path Traversal | Defense Evasion | 100.0 | CRITICAL | adobe/coldfusion | True | Known | Apply updates per vendor instructions. |
CVE-2010-2076 | Apache CXF 2.0.x before 2.0.13, 2.1.x before 2.1.10, and 2.2.x before 2.2.9, as used in Apache ServiceMix, Apache Camel, Apache Chemistry, Apache jUDDI, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intra... | 2010-08-19 | 2026-04-29 | CWE-829 | apache/cxf:*|apache/cxf:*|apache/cxf:* | http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html|http://geronimo.apache.org/21x-security-report.html|http://geronimo.apache.org/22x-security-report.html|http://secunia.com/advisories/40969|http://secunia.com/advisories/41016 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Other | Unknown | 98.5 | CRITICAL | apache/cxf | False | Unknown | nan |
CVE-2010-3416 | Google Chrome before 6.0.472.59 on Linux does not properly implement the Khmer locale, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. | 2010-09-16 | 2026-04-29 | CWE-119 | google/chrome:* | http://code.google.com/p/chromium/issues/detail?id=53930|http://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_14.html|https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14307|http://code.google.com/p/chromium/issues/detail?id=53930|http://googlechromereleases.... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Buffer Overflow | Execution | 98.5 | CRITICAL | google/chrome | False | Unknown | nan |
CVE-2010-3729 | The SPDY protocol implementation in Google Chrome before 6.0.472.62 does not properly manage buffers, which might allow remote attackers to execute arbitrary code via unspecified vectors. | 2010-10-05 | 2026-04-29 | CWE-190 | google/chrome:* | http://code.google.com/p/chromium/issues/detail?id=55119|http://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_17.html|https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7380|http://code.google.com/p/chromium/issues/detail?id=55119|http://googlechromereleases.b... | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Integer Overflow | Unknown | 98.5 | CRITICAL | google/chrome | False | Unknown | nan |
CVE-2010-4039 | Google Chrome before 7.0.517.41 on Linux does not properly set the PATH environment variable, which has unspecified impact and attack vectors. | 2010-10-21 | 2026-04-29 | UNKNOWN | google/chrome:* | http://code.google.com/p/chromium/issues/detail?id=54132|http://googlechromereleases.blogspot.com/2010/10/stable-channel-update.html|http://secunia.com/advisories/41888|http://www.securityfocus.com/bid/44241|http://www.vupen.com/english/advisories/2010/2731 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | google/chrome | False | Unknown | nan |
CVE-2010-4041 | The sandbox implementation in Google Chrome before 7.0.517.41 on Linux does not properly constrain worker processes, which might allow remote attackers to bypass intended access restrictions via unspecified vectors. | 2010-10-21 | 2026-04-29 | UNKNOWN | google/chrome:* | http://code.google.com/p/chromium/issues/detail?id=54794|http://googlechromereleases.blogspot.com/2010/10/stable-channel-update.html|http://secunia.com/advisories/41888|http://www.securityfocus.com/bid/44241|http://www.vupen.com/english/advisories/2010/2731 | True | 9.8 | CRITICAL | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 3.9 | 5.9 | Unknown | Unknown | 98.5 | CRITICAL | google/chrome | False | Unknown | nan |
End of preview. Expand in Data Studio
Cyber Threat Intelligence Dataset
A comprehensive cybersecurity dataset combining CVE vulnerability data, MITRE ATT&CK techniques, and CISA Known Exploited Vulnerabilities — structured for AI/ML training and security research.
Author: Soham Dahivalkar
License: MIT
Created: 2026
Dataset Description
This dataset provides structured cybersecurity intelligence data collected from three authoritative public sources:
- NVD (National Vulnerability Database) — CVE vulnerability records with CVSS scoring
- MITRE ATT&CK — Enterprise attack techniques, tactics, and detection methods
- CISA KEV — Known Exploited Vulnerabilities actively used in the wild
Each CVE record is enriched with:
- CVSS v3.1 base scores and detailed metrics
- Attack type classification (mapped from CWE)
- MITRE ATT&CK tactic mapping
- Custom risk scoring (0-100)
- CISA KEV status (actively exploited or not)
- Ransomware usage indicators
Additionally, the dataset includes instruction-tuning data for fine-tuning LLMs as cybersecurity analysts.
Dataset Structure
Configurations
| Split | Description | Rows |
|---|---|---|
cve_data |
CVE vulnerability records with CVSS, CWE, risk scores | ~5000 |
mitre_attack |
MITRE ATT&CK enterprise techniques | ~700 |
train |
Instruction-tuning training split | ~15000 |
test |
Instruction-tuning evaluation split | ~1500 |
CVE Data Schema
| Column | Type | Description |
|---|---|---|
cve_id |
string | CVE identifier (e.g., CVE-2024-3400) |
description |
string | Vulnerability description |
cvss_score |
float | CVSS v3.1 base score (0-10) |
cvss_severity |
string | CRITICAL / HIGH / MEDIUM / LOW |
attack_vector |
string | NETWORK / ADJACENT / LOCAL / PHYSICAL |
attack_complexity |
string | LOW / HIGH |
attack_type |
string | Mapped from CWE (e.g., SQL Injection, Buffer Overflow) |
cwe_ids |
string | CWE weakness identifiers |
risk_score |
float | Custom composite risk score (0-100) |
risk_level |
string | CRITICAL / HIGH / MEDIUM / LOW / INFO |
exploit_available |
bool | Whether public exploits exist |
in_cisa_kev |
bool | Whether listed in CISA KEV catalog |
ransomware_use |
string | Known ransomware campaign usage |
likely_mitre_tactic |
string | Mapped MITRE ATT&CK tactic |
affected_products |
string | Vendor/product affected |
Instruction Data Schema
| Column | Type | Description |
|---|---|---|
instruction |
string | The task instruction |
input |
string | CVE or technique context |
output |
string | Detailed expert analysis |
Instruction types include:
- CVE vulnerability analysis
- Remediation recommendations
- Risk scoring assessments
- MITRE ATT&CK mapping
- Triage prioritization decisions
- MITRE technique explanations
Usage
Load the Dataset
from datasets import load_dataset
# Load all splits
dataset = load_dataset("soham-dahivalkar/cyber-threat-intelligence")
# Access CVE data
cve_data = dataset["cve_data"]
print(f"Total CVEs: {len(cve_data)}")
print(cve_data[0])
# Access MITRE techniques
mitre = dataset["mitre_attack"]
print(f"Total techniques: {len(mitre)}")
# Access training data
train = dataset["train"]
print(f"Training samples: {len(train)}")
print(train[0]["instruction"])
Filter Critical Vulnerabilities
critical_cves = cve_data.filter(lambda x: x["risk_level"] == "CRITICAL")
print(f"Critical CVEs: {len(critical_cves)}")
Get Actively Exploited CVEs
exploited = cve_data.filter(lambda x: x["in_cisa_kev"] == "True")
print(f"Actively exploited CVEs: {len(exploited)}")
Use for Fine-Tuning
# Ready-to-use instruction format
for sample in dataset["train"]:
instruction = sample["instruction"]
input_text = sample["input"]
output = sample["output"]
# Format for your model and train!
Data Sources
| Source | URL | License |
|---|---|---|
| NVD (National Vulnerability Database) | https://nvd.nist.gov | Public Domain |
| MITRE ATT&CK | https://attack.mitre.org | Apache 2.0 |
| CISA KEV Catalog | https://www.cisa.gov/known-exploited-vulnerabilities-catalog | Public Domain |
All data is collected from publicly available, free government and community sources.
Intended Uses
- Fine-tuning LLMs for cybersecurity analysis tasks
- Training classifiers for vulnerability severity prediction
- Building RAG systems for security knowledge retrieval
- Research on automated vulnerability assessment
- Education on cybersecurity threat intelligence
Limitations
- CVE descriptions are sourced from NVD and may not reflect the latest updates
- Risk scores are computed using a custom formula and may differ from organizational assessments
- MITRE ATT&CK mappings from CWE are approximate and based on common associations
- The instruction-tuning data is synthetically generated from structured fields
About the Author
Soham Dahivalkar — Generative AI Engineer specializing in agentic AI systems, enterprise RAG, and cybersecurity intelligence.
- Published Author: "Generative AI: High Stakes Cyber Security" (Amazon Kindle)
- Research: "AI in Security: ML Approach for Vulnerability Management" (ResearchGate)
- Open Source:
ai-bridge-kit— Unified Python SDK for AI Providers (PyPI) - Experience: Alembic Pharmaceuticals, CyberNX Technologies, TalaKunchi Networks
- LinkedIn: Soham Dahivalkar
Citation
@dataset{dahivalkar2026cyberthreat,
author = {Dahivalkar, Soham},
title = {Cyber Threat Intelligence Dataset},
year = {2026},
publisher = {HuggingFace},
url = {https://huggingface.co/datasets/soham-dahivalkar/cyber-threat-intelligence}
}
- Downloads last month
- 26