Dataset Viewer
Auto-converted to Parquet Duplicate
cve_id
stringlengths
13
16
description
stringlengths
34
2.67k
published_date
stringdate
1999-03-01 00:00:00
2018-08-06 00:00:00
last_modified
stringdate
2024-11-21 00:00:00
2026-05-06 00:00:00
cwe_ids
stringclasses
347 values
affected_products
stringlengths
7
639
reference_urls
stringlengths
49
643
exploit_available
stringclasses
2 values
cvss_score
stringclasses
35 values
cvss_severity
stringclasses
4 values
attack_vector
stringclasses
3 values
attack_complexity
stringclasses
2 values
privileges_required
stringclasses
3 values
user_interaction
stringclasses
2 values
scope
stringclasses
2 values
confidentiality_impact
stringclasses
3 values
integrity_impact
stringclasses
3 values
availability_impact
stringclasses
3 values
exploitability_score
stringclasses
12 values
impact_score
stringclasses
15 values
attack_type
stringclasses
33 values
likely_mitre_tactic
stringclasses
7 values
risk_score
stringclasses
58 values
risk_level
stringclasses
4 values
primary_vendor_product
stringlengths
5
107
in_cisa_kev
stringclasses
2 values
ransomware_use
stringclasses
2 values
kev_required_action
stringclasses
7 values
CVE-1999-0426
The default permissions of /dev/kmem in Linux versions before 2.0.36 allows IP spoofing.
1999-03-01
2026-04-16
CWE-276
suse/suse_linux:6.0
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426|https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
suse/suse_linux
False
Unknown
nan
CVE-1999-1324
VAXstations running Open VMS 5.3 through 5.5-2 with VMS DECwindows or MOTIF do not properly disable access to user accounts that exceed the break-in limit threshold for failed login attempts, which makes it easier for attackers to conduct brute force password guessing.
1999-12-31
2026-04-16
CWE-307
hp/openvms_vax:*
http://ciac.llnl.gov/ciac/bulletins/d-06.shtml|https://exchange.xforce.ibmcloud.com/vulnerabilities/7225|http://ciac.llnl.gov/ciac/bulletins/d-06.shtml|https://exchange.xforce.ibmcloud.com/vulnerabilities/7225
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
hp/openvms_vax
False
Unknown
nan
CVE-2000-1218
The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which causes Windows to accept DNS updates from hosts that it did not query, which allows remote attackers to poison the DNS cache.
2000-04-14
2026-04-16
CWE-346
microsoft/windows_2000:-|microsoft/windows_98:-|microsoft/windows_98se:-|microsoft/windows_nt:4.0|microsoft/windows_xp:-
http://www.kb.cert.org/vuls/id/458659|https://exchange.xforce.ibmcloud.com/vulnerabilities/4280|http://www.kb.cert.org/vuls/id/458659|https://exchange.xforce.ibmcloud.com/vulnerabilities/4280
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
microsoft/windows_2000
False
Unknown
nan
CVE-2000-0944
CGI Script Center News Update 1.1 does not properly validate the original news administration password during a password change operation, which allows remote attackers to modify the password without knowing the original password.
2000-12-19
2026-04-16
CWE-522
cgi/script_center_news_update:1.1
http://archives.neohapsis.com/archives/bugtraq/2000-10/0402.html|http://www.securityfocus.com/bid/1881|https://exchange.xforce.ibmcloud.com/vulnerabilities/5433|http://archives.neohapsis.com/archives/bugtraq/2000-10/0402.html|http://www.securityfocus.com/bid/1881
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
cgi/script_center_news_update
False
Unknown
nan
CVE-2001-1339
Beck IPC GmbH IPC@CHIP telnet service does not delay or disconnect users from the service when bad passwords are entered, which makes it easier for remote attackers to conduct brute force password guessing attacks.
2001-05-24
2026-04-16
CWE-307
anybus/ipc\@chip_firmware:-
http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html|http://www.iss.net/security_center/static/6605.php|http://www.kb.cert.org/vuls/id/198979|http://www.securityfocus.com/archive/1/186418|http://www.securityfocus.com/bid/2771
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
anybus/ipc\@chip_firmware
False
Unknown
nan
CVE-2001-0248
Buffer overflow in FTP server in HPUX 11 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the STAT command, which uses glob to generate long strings.
2001-06-18
2026-04-16
CWE-131
hp/hp-ux:11.00|sgi/irix:6.5|sgi/irix:6.5.1|sgi/irix:6.5.2
http://www.cert.org/advisories/CA-2001-07.html|http://www.nai.com/research/covert/advisories/048.asp|http://www.securityfocus.com/bid/2552|https://exchange.xforce.ibmcloud.com/vulnerabilities/6332|http://www.cert.org/advisories/CA-2001-07.html
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
hp/hp-ux
False
Unknown
nan
CVE-2001-0249
Heap overflow in FTP daemon in Solaris 8 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the LIST command, which uses glob to generate long strings.
2001-06-18
2026-04-16
CWE-131
hp/hp-ux:11.00|oracle/solaris:8|sgi/irix:*
http://www.cert.org/advisories/CA-2001-07.html|http://www.nai.com/research/covert/advisories/048.asp|http://www.securityfocus.com/bid/2550|https://exchange.xforce.ibmcloud.com/vulnerabilities/6332|http://www.cert.org/advisories/CA-2001-07.html
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
hp/hp-ux
False
Unknown
nan
CVE-2001-0395
Lightwave ConsoleServer 3200 does not disconnect users after unsuccessful login attempts, which could allow remote attackers to conduct brute force password guessing.
2001-07-02
2026-04-16
CWE-307
lightwavemo/consoleserver_3200_firmware:-
http://archives.neohapsis.com/archives/bugtraq/2001-04/0170.html|http://www.securityfocus.com/bid/2578|http://archives.neohapsis.com/archives/bugtraq/2001-04/0170.html|http://www.securityfocus.com/bid/2578
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
lightwavemo/consoleserver_3200_firmware
False
Unknown
nan
CVE-2001-1291
The telnet server for 3Com hardware such as PS40 SuperStack II does not delay or disconnect remote attackers who provide an incorrect username or password, which makes it easier to break into the server via brute force password guessing.
2001-07-12
2026-04-16
CWE-307
3com/superstack_ii_ps_hub_40_firmware:-
http://www.securityfocus.com/archive/1/196957|http://www.securityfocus.com/bid/3034|https://exchange.xforce.ibmcloud.com/vulnerabilities/6855|http://www.securityfocus.com/archive/1/196957|http://www.securityfocus.com/bid/3034
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
3com/superstack_ii_ps_hub_40_firmware
False
Unknown
nan
CVE-2001-0609
Format string vulnerability in Infodrom cfingerd 1.4.3 and earlier allows a remote attacker to gain additional privileges via a malformed ident reply that is passed to the syslog function.
2001-08-02
2026-04-16
CWE-193
infodrom/cfingerd:*
http://archives.neohapsis.com/archives/bugtraq/2001-04/0202.html|http://www.securityfocus.com/bid/2576|https://exchange.xforce.ibmcloud.com/vulnerabilities/6364|http://archives.neohapsis.com/archives/bugtraq/2001-04/0202.html|http://www.securityfocus.com/bid/2576
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
infodrom/cfingerd
False
Unknown
nan
CVE-2001-1155
TCP Wrappers (tcp_wrappers) in FreeBSD 4.1.1 through 4.3 with the PARANOID ACL option enabled does not properly check the result of a reverse DNS lookup, which could allow remote attackers to bypass intended access restrictions via DNS spoofing.
2001-08-23
2026-04-16
CWE-863
freebsd/freebsd:*
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:56.tcp_wrappers.asc|http://www.osvdb.org/5454|ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:56.tcp_wrappers.asc|http://www.osvdb.org/5454
False
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Incorrect Authorization
Unknown
83.5
HIGH
freebsd/freebsd
False
Unknown
nan
CVE-2001-0967
Knox Arkeia server 4.2, and possibly other versions, uses a constant salt when encrypting passwords using the crypt() function, which makes it easier for an attacker to conduct brute force password guessing.
2001-08-31
2026-04-16
CWE-916
arkeia/arkeia:4.2|arkeia/arkeia:4.2.8-2
http://archives.neohapsis.com/archives/bugtraq/2001-08/0228.html|http://www.securityfocus.com/bid/3204|http://archives.neohapsis.com/archives/bugtraq/2001-08/0228.html|http://www.securityfocus.com/bid/3204
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
arkeia/arkeia
False
Unknown
nan
CVE-2001-1125
Symantec LiveUpdate before 1.6 does not use cryptography to ensure the integrity of download files, which allows remote attackers to execute arbitrary code via DNS spoofing of the update.symantec.com site.
2001-10-05
2026-04-16
CWE-494|CWE-494
symantec/liveupdate:*
http://www.sarc.com/avcenter/security/Content/2001.10.05.html|http://www.securityfocus.com/archive/1/218717|http://www.securityfocus.com/bid/3403|https://exchange.xforce.ibmcloud.com/vulnerabilities/7235|http://www.sarc.com/avcenter/security/Content/2001.10.05.html
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
symantec/liveupdate
False
Unknown
nan
CVE-2001-0766
Apache on MacOS X Client 10.0.3 with the HFS+ file system allows remote attackers to bypass access restrictions via a URL that contains some characters whose case is not matched by Apache's filters.
2001-10-18
2026-04-16
CWE-178
apache/http_server:1.3.14
http://archives.neohapsis.com/archives/bugtraq/2001-06/0090.html|http://www.securityfocus.com/bid/2852|http://archives.neohapsis.com/archives/bugtraq/2001-06/0090.html|http://www.securityfocus.com/bid/2852
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
apache/http_server
False
Unknown
nan
CVE-2001-1481
Xitami 2.4 through 2.5 b4 stores the Administrator password in plaintext in the default.aut file, whose default permissions are world-readable, which allows remote attackers to gain privileges.
2001-12-31
2026-04-16
CWE-312
xitami/xitami:*|xitami/xitami:2.5
http://archives.neohapsis.com/archives/win2ksecadvice/2000-q4/0109.html|http://www.securityfocus.com/archive/1/242375|http://www.securityfocus.com/bid/3582|https://exchange.xforce.ibmcloud.com/vulnerabilities/7600|http://archives.neohapsis.com/archives/win2ksecadvice/2000-q4/0109.html
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
xitami/xitami
False
Unknown
nan
CVE-2001-1496
Off-by-one buffer overflow in Basic Authentication in Acme Labs thttpd 1.95 through 2.20 allows remote attackers to cause a denial of service and possibly execute arbitrary code.
2001-12-31
2026-04-16
CWE-193
acme/thttpd:*
http://www.securityfocus.com/archive/1/241310|http://www.securityfocus.com/archive/1/241953|http://www.securityfocus.com/bid/3562|https://exchange.xforce.ibmcloud.com/vulnerabilities/7595|http://www.securityfocus.com/archive/1/241310
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
acme/thttpd
False
Unknown
nan
CVE-2002-0059
The decompression algorithm in zlib 1.1.3 and earlier, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a "double free"), which may allow local and remote attackers to execute arbitrary code via a block of malformed compression data.
2002-03-15
2026-04-16
CWE-415
zlib/zlib:*
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-015.1.txt|http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000469|http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:022|http://www.caldera.com/support/security/advisories/CSSA-2002-014.1.txt|http://www.cert.org/advisories/CA-2002-07.html
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
zlib/zlib
False
Unknown
nan
CVE-2002-0083
Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges.
2002-03-15
2026-04-16
CWE-193
immunix/immunix:7.0|mandrakesoft/mandrake_single_network_firewall:7.2|openbsd/openssh:*|openpkg/openpkg:1.0|conectiva/linux:5.0|conectiva/linux:5.1|conectiva/linux:6.0|conectiva/linux:7.0|conectiva/linux:ecommerce|conectiva/linux:graficas
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc|ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-004.txt.asc|ftp://stage.caldera.com/pub/security/openserver/CSSA-2002-SCO.10/CSSA-2002-SCO.10.txt|ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.11/CSSA-2002-SCO....
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
immunix/immunix
False
Unknown
nan
CVE-2002-0639
Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication.
2002-07-03
2026-04-16
CWE-190
openbsd/openssh:*
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt|http://archives.neohapsis.com/archives/bugtraq/2002-06/0335.html|http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502|http://marc.info/?l=bugtraq&m=102514371522793&w=2|http://marc.info/?l=bugtraq&m=102514631524575&w=2
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Integer Overflow
Unknown
98.5
CRITICAL
openbsd/openssh
False
Unknown
nan
CVE-2002-0671
Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 downloads phone applications from a web site but can not verify the integrity of the applications, which could allow remote attackers to install Trojan horse applications via DNS spoofing.
2002-07-23
2026-04-16
CWE-494
pingtel/xpressa_firmware:1.2.5|pingtel/xpressa_firmware:1.2.7.4
http://www.atstake.com/research/advisories/2002/a071202-1.txt|http://www.iss.net/security_center/static/9566.php|http://www.pingtel.com/PingtelAtStakeAdvisoryResponse.jsp|http://www.securityfocus.com/bid/5224|http://www.atstake.com/research/advisories/2002/a071202-1.txt
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
pingtel/xpressa_firmware
False
Unknown
nan
CVE-2002-0391
Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote attackers to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services such as rpc.cmsd and dmispd.
2002-08-12
2026-04-16
CWE-190|CWE-190
freebsd/freebsd:*|openbsd/openbsd:3.1|sun/solaris:2.6|sun/solaris:9.0|sun/sunos:5.5.1|sun/sunos:5.7|sun/sunos:5.8|microsoft/windows_2000:-|microsoft/windows_nt:4.0|microsoft/windows_xp:-
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-055.0.txt|ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-011.txt.asc|ftp://patches.sgi.com/support/free/security/advisories/20020801-01-A|ftp://patches.sgi.com/support/free/security/advisories/20020801-01-P|http://archives.neohapsis.com/archives/...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Integer Overflow
Unknown
98.5
CRITICAL
freebsd/freebsd
False
Unknown
nan
CVE-2002-1347
Multiple buffer overflows in Cyrus SASL library 2.1.9 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) long inputs during user name canonicalization, (2) characters that need to be escaped during LDAP authentication using saslauthd, or (3) an off-by-one error i...
2002-12-18
2026-04-16
CWE-131
cyrusimap/cyrus_sasl:*|apple/mac_os_x:*|apple/mac_os_x_server:*
http://archives.neohapsis.com/archives/linux/suse/2002-q4/1275.html|http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000557|http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html|http://marc.info/?l=bugtraq&m=103946297703402&w=2|http://www.debian.org/security/2002/dsa-215
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
cyrusimap/cyrus_sasl
False
Unknown
nan
CVE-2002-1798
MidiCart PHP, PHP Plus, and PHP Maxi allows remote attackers to (1) upload arbitrary php files via a direct request to admin/upload.php or (2) access sensitive information via a direct request to admin/credit_card_info.php.
2002-12-31
2026-04-16
CWE-425
midicart/midicart_php:-|midicart/midicart_php_maxi:-|midicart/midicart_php_plus:-
http://archives.neohapsis.com/archives/bugtraq/2002-10/0016.html|http://www.iss.net/security_center/static/10306.php|http://www.securityfocus.com/bid/5851|http://www.securityfocus.com/bid/5855|http://archives.neohapsis.com/archives/bugtraq/2002-10/0016.html
True
9.1
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
NONE
3.9
5.2
Other
Unknown
95.0
CRITICAL
midicart/midicart_php
False
Unknown
nan
CVE-2002-1816
Off-by-one buffer overflow in the sock_gets function in sockhelp.c for ATPhttpd 0.4b and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request.
2002-12-31
2026-04-16
CWE-193|CWE-193
redshift/atphttpd:*
http://archives.neohapsis.com/archives/bugtraq/2002-10/0187.html|http://secunia.com/advisories/7293|http://www.iss.net/security_center/static/10362.php|http://www.securityfocus.com/bid/5956|http://archives.neohapsis.com/archives/bugtraq/2002-10/0187.html
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
redshift/atphttpd
False
Unknown
nan
CVE-2002-1820
register.php in Ultimate PHP Board (UPB) 1.0 and 1.0b uses an administrative account Admin with a capital "A," but allows a remote attacker to impersonate the administrator by registering an account name of admin with a lower case "a."
2002-12-31
2026-04-16
CWE-178
ultimate_php_board_project/ultimate_php_board:1.0|ultimate_php_board_project/ultimate_php_board:1.0
http://www.iss.net/security_center/static/9972.php|http://www.securityfocus.com/archive/1/289417|http://www.securityfocus.com/bid/5580|http://www.iss.net/security_center/static/9972.php|http://www.securityfocus.com/archive/1/289417
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
ultimate_php_board_project/ultimate_php_board
False
Unknown
nan
CVE-2002-2119
Novell eDirectory 8.6.2 and 8.7 use case insensitive passwords, which makes it easier for remote attackers to conduct brute force password guessing.
2002-12-31
2026-04-16
CWE-178
novell/edirectory:8.6.2|novell/edirectory:8.7
http://archives.neohapsis.com/archives/bugtraq/2002-05/0273.html|http://www.iss.net/security_center/static/9229.php|http://www.securityfocus.com/bid/4893|http://archives.neohapsis.com/archives/bugtraq/2002-05/0273.html|http://www.iss.net/security_center/static/9229.php
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
novell/edirectory
False
Unknown
nan
CVE-2002-1484
DB4Web server, when configured to use verbose debug messages, allows remote attackers to use DB4Web as a proxy and attempt TCP connections to other systems (port scan) via a request for a URL that specifies the target IP address and port, which produces a connection status in the resulting error message.
2003-04-22
2026-04-16
CWE-918
siemens/db4web:3.4|siemens/db4web:3.6
http://archives.neohapsis.com/archives/bugtraq/2002-09/0201.html|http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0125.html|http://www.iss.net/security_center/static/10136.php|http://www.securityfocus.com/bid/5725|http://archives.neohapsis.com/archives/bugtraq/2002-09/0201.html
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Server-Side Request Forgery (SSRF)
Initial Access
98.5
CRITICAL
siemens/db4web
False
Unknown
nan
CVE-2003-0174
The LDAP name service (nsd) in IRIX 6.5.19 and earlier does not properly verify if the USERPASSWORD attribute has been provided by an LDAP server, which could allow attackers to log in without a password.
2003-05-12
2026-04-16
CWE-346
sgi/irix:*
ftp://patches.sgi.com/support/free/security/advisories/20030407-01-P|http://www.ciac.org/ciac/bulletins/n-084.shtml|http://www.securityfocus.com/bid/7442|https://exchange.xforce.ibmcloud.com/vulnerabilities/11860|ftp://patches.sgi.com/support/free/security/advisories/20030407-01-P
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
sgi/irix
False
Unknown
nan
CVE-2003-0356
Multiple off-by-one vulnerabilities in Ethereal 0.9.11 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) AIM, (2) GIOP Gryphon, (3) OSPF, (4) PPTP, (5) Quake, (6) Quake2, (7) Quake3, (8) Rsync, (9) SMB, (10) SMPP, and (11) TSP dissectors, which do not proper...
2003-06-09
2026-04-16
CWE-193
ethereal/ethereal:*
http://www.debian.org/security/2003/dsa-313|http://www.ethereal.com/appnotes/enpa-sa-00009.html|http://www.kb.cert.org/vuls/id/641013|http://www.mandriva.com/security/advisories?name=MDKSA-2003:067|http://www.redhat.com/support/errata/RHSA-2003-077.html
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
ethereal/ethereal
False
Unknown
nan
CVE-2003-0252
Off-by-one error in the xlog function of mountd in the Linux NFS utils package (nfs-utils) before 1.0.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via certain RPC requests to mountd that do not contain newlines.
2003-08-18
2026-04-16
CWE-193
linux-nfs/nfs-utils:*
http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0023.html|http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0024.html|http://isec.pl/vulnerabilities/isec-0010-linux-nfs-utils.txt|http://marc.info/?l=bugtraq&m=105820223707191&w=2|http://marc.info/?l=bugtraq&m=105830921519513&w=2
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
linux-nfs/nfs-utils
False
Unknown
nan
CVE-2003-0466
Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow attackers to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buffer overflow, including (1) STOR, (2) RETR, (3) APPE, (4) D...
2003-08-27
2026-04-16
CWE-193
redhat/wu_ftpd:2.6.1-16|wuftpd/wu-ftpd:*|apple/mac_os_x:10.2.6|apple/mac_os_x_server:10.2.6|freebsd/freebsd:*|netbsd/netbsd:*|openbsd/openbsd:*|sun/solaris:9.0
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-011.txt.asc|http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0065.html|http://download.immunix.org/ImmunixOS/7+/Updates/errata/IMNX-2003-7+-019-01|http://isec.pl/vulnerabilities/isec-0011-wu-ftpd.txt|http://marc.info/?l=bugtraq&m=105967301604815&...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
redhat/wu_ftpd
False
Unknown
nan
CVE-2003-0791
The Script.prototype.freeze/thaw functionality in Mozilla 1.4 and earlier allows attackers to execute native methods by modifying the string used as input to the script.thaw JavaScript function, which is then deserialized and executed.
2003-10-07
2026-04-16
CWE-502
mozilla/mozilla:*|sco/openserver:5.0.7
http://secunia.com/advisories/11103/|http://www.mandriva.com/security/advisories?name=MDKSA-2004:021|http://www.osvdb.org/8390|http://www.securityfocus.com/advisories/6979|http://www.securityfocus.com/bid/9322
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Deserialization Vulnerability
Execution
98.5
CRITICAL
mozilla/mozilla
False
Unknown
nan
CVE-2003-0899
Buffer overflow in defang in libhttpd.c for thttpd 2.21 to 2.23b1 allows remote attackers to execute arbitrary code via requests that contain '' characters, which trigger the overflow when the characters are expanded to "<" and ">" sequences.
2003-11-03
2026-04-16
CWE-131
acme/thttpd:*|acme/thttpd:2.23|acme/thttpd:2.23
http://marc.info/?l=bugtraq&m=106729188224252&w=2|http://secunia.com/advisories/10092|http://www.osvdb.org/2729|http://www.securityfocus.com/bid/8906|http://www.texonet.com/advisories/TEXONET-20030908.txt
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
acme/thttpd
False
Unknown
nan
CVE-2003-0545
Double free vulnerability in OpenSSL 0.9.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an SSL client certificate with a certain invalid ASN.1 encoding.
2003-11-17
2026-04-16
CWE-415
openssl/openssl:0.9.6|openssl/openssl:0.9.7
http://secunia.com/advisories/22249|http://www-1.ibm.com/support/docview.wss?uid=swg21247112|http://www.cert.org/advisories/CA-2003-26.html|http://www.debian.org/security/2003/dsa-394|http://www.kb.cert.org/vuls/id/935264
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
openssl/openssl
False
Unknown
nan
CVE-2003-1233
Pedestal Software Integrity Protection Driver (IPD) 1.3 and earlier allows privileged attackers, such as rootkits, to bypass file access restrictions to the Windows kernel by using the NtCreateSymbolicLinkObject function to create a symbolic link to (1) \Device\PhysicalMemory or (2) to a drive letter using the subst co...
2003-12-31
2026-04-16
CWE-59
pedestalsoftware/integrity_protection_driver:*
http://archives.neohapsis.com/archives/bugtraq/2003-01/0017.html|http://archives.neohapsis.com/archives/bugtraq/2003-01/0018.html|http://secunia.com/advisories/7816|http://www.phrack.org/show.php?p=59&a=16|http://www.securityfocus.com/bid/6511
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
pedestalsoftware/integrity_protection_driver
False
Unknown
nan
CVE-2004-0030
PHP remote file inclusion vulnerability in (1) functions.php, (2) authentication_index.php, and (3) config_gedcom.php for PHPGEDVIEW 2.61 allows remote attackers to execute arbitrary PHP code by modifying the PGV_BASE_DIRECTORY parameter to reference a URL on a remote web server that contains the code.
2004-01-20
2026-04-16
CWE-829
phpgedview/phpgedview:2.61
http://marc.info/?l=bugtraq&m=107340840209453&w=2|http://secunia.com/advisories/10565|http://www.osvdb.org/3343|http://www.securityfocus.com/bid/9368|http://www.securitytracker.com/id?1008632
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
phpgedview/phpgedview
False
Unknown
nan
CVE-2004-0005
Multiple buffer overflows in Gaim 0.75 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) octal encoding in yahoo_decode that causes a null byte to be written beyond the buffer, (2) octal encoding in yahoo_decode that causes a pointer to reference memory beyond the terminati...
2004-03-03
2026-04-16
CWE-193
gaim_project/gaim:0.75
http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0994.html|http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000813|http://marc.info/?l=bugtraq&m=107513690306318&w=2|http://security.e-matters.de/advisories/012004.html|http://www.debian.org/security/2004/dsa-434
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
gaim_project/gaim
False
Unknown
nan
CVE-2004-0434
k5admind (kadmind) for Heimdal allows remote attackers to execute arbitrary code via a Kerberos 4 compatibility administration request whose framing length is less than 2, which leads to a heap-based buffer overflow.
2004-07-07
2026-04-16
CWE-131
heimdal_project/heimdal:*|debian/debian_linux:3.0
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:09.kadmind.asc|http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020998.html|http://marc.info/?l=bugtraq&m=108386148126457&w=2|http://security.gentoo.org/glsa/glsa-200405-23.xml|http://www.debian.org/security/2004/dsa-504
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
heimdal_project/heimdal
False
Unknown
nan
CVE-2004-2061
RiSearch 1.0.01 and RiSearch Pro 3.2.06 allows remote attackers to use the show.pl script as an open proxy, or read arbitrary local files, by setting the url parameter to a (1) http://, (2) ftp://, or (3) file:// URL.
2004-07-27
2026-04-16
CWE-918
risearch/risearch:1.0.01|risearch/risearch_pro:3.2.6
http://marc.info/?l=bugtraq&m=109095196526490&w=2|http://secunia.com/advisories/12173|http://securitytracker.com/id?1010788|http://www.osvdb.org/8265|http://www.osvdb.org/8266
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Server-Side Request Forgery (SSRF)
Initial Access
98.5
CRITICAL
risearch/risearch
False
Unknown
nan
CVE-2004-1363
Buffer overflow in extproc in Oracle 10g allows remote attackers to execute arbitrary code via environment variables in the library name, which are expanded after the length check is performed.
2004-08-04
2026-04-16
CWE-131
oracle/application_server:*|oracle/application_server:9.0.2|oracle/application_server:9.0.2.0.0|oracle/application_server:9.0.2.0.1|oracle/application_server:9.0.2.1|oracle/application_server:9.0.2.2|oracle/application_server:9.0.2.3|oracle/application_server:9.0.3|oracle/application_server:9.0.3.1|oracle/application_s...
http://marc.info/?l=bugtraq&m=110382345829397&w=2|http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1|http://www.kb.cert.org/vuls/id/316206|http://www.ngssoftware.com/advisories/oracle23122004.txt|http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
oracle/application_server
False
Unknown
nan
CVE-2004-0772
Double free vulnerabilities in error handling code in krb524d for MIT Kerberos 5 (krb5) 1.2.8 and earlier may allow remote attackers to execute arbitrary code.
2004-10-20
2026-04-16
CWE-415
mit/kerberos_5:*|openpkg/openpkg:2.0|openpkg/openpkg:2.1|debian/debian_linux:3.0
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000860|http://marc.info/?l=bugtraq&m=109508872524753&w=2|http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-002-dblfree.txt|http://www.debian.org/security/2004/dsa-543|http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
mit/kerberos_5
False
Unknown
nan
CVE-2004-0847
The Microsoft .NET forms authentication capability for ASP.NET allows remote attackers to bypass authentication for .aspx files in restricted directories via a request containing a (1) "\" (backslash) or (2) "%5C" (encoded backslash), aka "Path Validation Vulnerability."
2004-11-03
2026-04-16
CWE-22
microsoft/asp.net:*|microsoft/asp.net:1.1
http://archives.neohapsis.com/archives/ntbugtraq/2004-q3/0221.html|http://sourceforge.net/mailarchive/forum.php?thread_id=5671607&forum_id=24754|http://www.kb.cert.org/vuls/id/283646|http://www.securityfocus.com/bid/11342|http://www.us-cert.gov/cas/techalerts/TA05-039A.html
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Path Traversal
Defense Evasion
98.5
CRITICAL
microsoft/asp.net
False
Unknown
nan
CVE-2004-0285
PHP remote file inclusion vulnerabilities in include/footer.inc.php in (1) AllMyVisitors, (2) AllMyLinks, and (3) AllMyGuests allow remote attackers to execute arbitrary PHP code via a URL in the _AMVconfig[cfg_serverpath] parameter.
2004-11-23
2026-04-16
CWE-829
allmyguests_project/allmyguests:0.1.2|allmyguests_project/allmyguests:0.3|allmyguests_project/allmyguests:0.4|allmyguests_project/allmyguests:0.4.1|allmylinks_project/allmylinks:0.3|allmylinks_project/allmylinks:0.4|allmylinks_project/allmylinks:0.4.1|allmylinks_project/allmylinks:0.4.3|allmylinks_project/allmylinks:0....
http://marc.info/?l=bugtraq&m=107696209514155&w=2|http://marc.info/?l=bugtraq&m=107696235424865&w=2|http://marc.info/?l=bugtraq&m=107696291728750&w=2|http://www.osvdb.org/6721|http://www.securityfocus.com/bid/9664
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
allmyguests_project/allmyguests
False
Unknown
nan
CVE-2004-2154
CUPS before 1.1.21rc1 treats a Location directive in cupsd.conf as case sensitive, which allows attackers to bypass intended ACLs via a printer name containing uppercase or lowercase letters that are different from what is specified in the directive.
2004-12-31
2026-04-16
CWE-178|CWE-178
apple/cups:*|apple/cups:1.1.21|canonical/ubuntu_linux:4.10
http://www.cups.org/str.php?L700|http://www.novell.com/linux/security/advisories/2005_18_sr.html|http://www.redhat.com/support/errata/RHSA-2005-571.html|http://www.ubuntu.com/usn/usn-185-1|https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162405
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
apple/cups
False
Unknown
nan
CVE-2004-2214
Mbedthis AppWeb HTTP server before 1.1.3 allows remote attackers to bypass access restrictions via a URI with mixed case characters.
2004-12-31
2026-04-16
CWE-178
mbedthis/appweb_http_server:*
http://secunia.com/advisories/12011|http://www.mbedthis.com/products/appWeb/doc/product/newFeatures.html|http://www.osvdb.org/7391|http://www.securityfocus.com/bid/10673|https://exchange.xforce.ibmcloud.com/vulnerabilities/16638
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
mbedthis/appweb_http_server
False
Unknown
nan
CVE-2005-0102
Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
2005-01-24
2026-04-16
CWE-190
gnome/evolution:*|debian/debian_linux:3.0
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000925|http://secunia.com/advisories/13830|http://security.gentoo.org/glsa/glsa-200501-35.xml|http://securitytracker.com/id?1012981|http://www.debian.org/security/2005/dsa-673
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Integer Overflow
Unknown
98.5
CRITICAL
gnome/evolution
False
Unknown
nan
CVE-2005-0408
CitrusDB 0.3.6 and earlier generates easily predictable MD5 hashes of the user name for the id_hash cookie, which allows remote attackers to bypass authentication and gain privileges by calculating the MD5 checksum of the user name combined with the "boogaadeeboo" string, which is hard-coded in the $hidden_hash variabl...
2005-02-14
2026-04-16
CWE-916
citrusdb/citrusdb:*
http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031707.html|http://www.redteam-pentesting.de/advisories/rt-sa-2005-002.txt|http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031707.html|http://www.redteam-pentesting.de/advisories/rt-sa-2005-002.txt
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
citrusdb/citrusdb
False
Unknown
nan
CVE-2005-0496
Arkeia Network Backup Client 5.x contains hard-coded credentials that effectively serve as a back door, which allows remote attackers to access the file system and possibly execute arbitrary commands.
2005-02-21
2026-04-16
CWE-798
arkeia/network_backup:5.0
http://marc.info/?l=bugtraq&m=110900879826004&w=2|http://metasploit.com/research/arkeia_agent/|http://securitytracker.com/id?1013256|https://exchange.xforce.ibmcloud.com/vulnerabilities/20667|http://marc.info/?l=bugtraq&m=110900879826004&w=2
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Hardcoded Credentials
Credential Access
98.5
CRITICAL
arkeia/network_backup
False
Unknown
nan
CVE-2005-1141
Integer overflow in the readpgm function in pnm.c for GOCR 0.40, when using the netpbm library, allows remote attackers to execute arbitrary code via a PNM file with large width and height values, which leads to a heap-based buffer overflow.
2005-04-15
2026-04-16
CWE-190
optical_character_recognition_project/optical_character_recognition:0.40
http://marc.info/?l=bugtraq&m=111358557823673&w=2|http://www.overflow.pl/adv/gocr.txt|http://marc.info/?l=bugtraq&m=111358557823673&w=2|http://www.overflow.pl/adv/gocr.txt
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Integer Overflow
Unknown
98.5
CRITICAL
optical_character_recognition_project/optical_character_recognition
False
Unknown
nan
CVE-2005-0199
Integer underflow in the Lists_MakeMask() function in lists.c in ngIRCd before 0.8.2 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long MODE line that causes an incorrect length calculation, which leads to a buffer overflow.
2005-05-02
2026-04-16
CWE-191
barton/ngircd:*
http://arthur.ath.cx/pipermail/ngircd-ml/2005-January/000228.html|http://bugs.gentoo.org/show_bug.cgi?id=79705|http://secunia.com/advisories/14056|http://secunia.com/advisories/14059|http://securitytracker.com/id?1013047
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
barton/ngircd
False
Unknown
nan
CVE-2005-0269
The file extension check in GNUBoard 3.40 and earlier only verifies extensions that contain all lowercase letters, which allows remote attackers to upload arbitrary files via file extensions that include uppercase letters.
2005-05-02
2026-04-16
CWE-178
sir/gnuboard:*
http://marc.info/?l=bugtraq&m=110477648219738&w=2|http://secunia.com/advisories/13711|http://www.securityfocus.com/bid/12149|https://exchange.xforce.ibmcloud.com/vulnerabilities/18729|http://marc.info/?l=bugtraq&m=110477648219738&w=2
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
sir/gnuboard
False
Unknown
nan
CVE-2005-1513
Integer overflow in the stralloc_readyplus function in qmail, when running on 64 bit platforms with a large amount of virtual memory, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large SMTP request.
2005-05-11
2026-04-16
CWE-190
qmail_project/qmail:-|canonical/ubuntu_linux:20.04|debian/debian_linux:8.0|debian/debian_linux:9.0|debian/debian_linux:10.0
http://archives.neohapsis.com/archives/fulldisclosure/2005-05/0101.html|http://packetstormsecurity.com/files/157805/Qualys-Security-Advisory-Qmail-Remote-Code-Execution.html|http://packetstormsecurity.com/files/158203/Qmail-Local-Privilege-Escalation-Remote-Code-Execution.html|http://packetstormsecurity.com/files/17280...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Integer Overflow
Unknown
98.5
CRITICAL
qmail_project/qmail
False
Unknown
nan
CVE-2005-1744
BEA WebLogic Server and WebLogic Express 7.0 through Service Pack 5 does not log out users when an application is redeployed, which allows those users to continue to access the application without having to log in again, which may be in violation of newly changed security constraints or role mappings.
2005-05-24
2026-04-16
CWE-459
bea/weblogic_server:*
http://dev2dev.bea.com/pub/advisory/127|http://secunia.com/advisories/15486|http://securitytracker.com/id?1014049|http://www.securityfocus.com/bid/13717|http://www.vupen.com/english/advisories/2005/0604
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
bea/weblogic_server
False
Unknown
nan
CVE-2005-1689
Double free vulnerability in the krb5_recvauth function in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to execute arbitrary code via certain error conditions.
2005-07-18
2026-04-16
CWE-415
mit/kerberos_5:*|apple/mac_os_x:*|apple/mac_os_x_server:*|debian/debian_linux:3.0|debian/debian_linux:3.1
ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc|http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000993|http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html|http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html|http://marc.info/?l=bugtraq&m=11211...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
mit/kerberos_5
False
Unknown
nan
CVE-2005-2103
Buffer overflow in the AIM and ICQ module in Gaim before 1.5.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an away message with a large number of AIM substitution strings, such as %t or %n.
2005-08-16
2026-04-16
CWE-131|CWE-131
gaim_project/gaim:*
http://gaim.sourceforge.net/security/?id=22|http://www.novell.com/linux/security/advisories/2005_19_sr.html|http://www.redhat.com/support/errata/RHSA-2005-589.html|http://www.redhat.com/support/errata/RHSA-2005-627.html|http://www.securityfocus.com/archive/1/426078/100/0/threaded
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
gaim_project/gaim
False
Unknown
nan
CVE-2005-2773
HP OpenView Network Node Manager 6.2 through 7.50 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) node parameter to connectedNodes.ovpl, (2) cdpView.ovpl, (3) freeIPaddrs.ovpl, and (4) ecscmg.ovpl.
2005-09-02
2026-04-16
CWE-77|CWE-77
hp/openview_network_node_manager:*
http://marc.info/?l=bugtraq&m=112499121725662&w=2|http://secunia.com/advisories/16555/|http://www.securityfocus.com/advisories/9150|http://www.securityfocus.com/bid/14662|https://exchange.xforce.ibmcloud.com/vulnerabilities/21999
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Command Injection
Execution
100.0
CRITICAL
hp/openview_network_node_manager
True
Unknown
Apply updates per vendor instructions.
CVE-2005-3120
Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and earlier allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters.
2005-10-17
2026-04-16
CWE-131
invisible-island/lynx:*|debian/debian_linux:3.0|debian/debian_linux:3.1
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.7/SCOSA-2006.7.txt|ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.47/SCOSA-2005.47.txt|http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038019.html|http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html|http://secunia.com/advisories...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
invisible-island/lynx
False
Unknown
nan
CVE-2005-3435
admin_news.php in Archilles Newsworld up to 1.3.0 allows attackers to bypass authentication by obtaining the password hash for another user, for example through another Newsworld vulnerability, and specifying the hash in the pwd argument.
2005-11-02
2026-04-16
CWE-522
archilles/newsworld:*
http://marc.info/?l=bugtraq&m=113018731120709&w=2|http://secunia.com/advisories/17310/|https://exchange.xforce.ibmcloud.com/vulnerabilities/22860|http://marc.info/?l=bugtraq&m=113018731120709&w=2|http://secunia.com/advisories/17310/
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
archilles/newsworld
False
Unknown
nan
CVE-2007-0681
profile.php in ExtCalendar 2 and earlier allows remote attackers to change the passwords of arbitrary users without providing the original password, and possibly perform other unauthorized actions, via modified values to register.php.
2007-02-03
2026-04-23
CWE-522
extcalendar_project/extcalendar:*
http://osvdb.org/38130|https://exchange.xforce.ibmcloud.com/vulnerabilities/32035|https://www.exploit-db.com/exploits/3239|http://osvdb.org/38130|https://exchange.xforce.ibmcloud.com/vulnerabilities/32035
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
extcalendar_project/extcalendar
False
Unknown
nan
CVE-2006-7079
Variable extraction vulnerability in include/common.php in exV2 2.0.4.3 and earlier allows remote attackers to overwrite arbitrary program variables and conduct directory traversal attacks to execute arbitrary code by modifying the $xoopsOption['pagetype'] variable.
2007-03-02
2026-04-23
CWE-22|CWE-913
exv2/content_management_system:*
http://www.securityfocus.com/bid/20161|https://exchange.xforce.ibmcloud.com/vulnerabilities/29116|https://www.exploit-db.com/exploits/2415|http://www.securityfocus.com/bid/20161|https://exchange.xforce.ibmcloud.com/vulnerabilities/29116
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Path Traversal
Defense Evasion
98.5
CRITICAL
exv2/content_management_system
False
Unknown
nan
CVE-2007-1399
Stack-based buffer overflow in the zip:// URL wrapper in PECL ZIP 1.8.3 and earlier, as bundled with PHP 5.2.0 and 5.2.1, allows remote attackers to execute arbitrary code via a long zip:// URL, as demonstrated by actively triggering URL access from a remote PHP interpreter via avatar upload or blog pingback.
2007-03-10
2025-12-11
UNKNOWN
php/php:5.2.0|php/php:5.2.1|pierrejoye/php_zip:*
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html|http://secunia.com/advisories/24471|http://secunia.com/advisories/24514|http://secunia.com/advisories/25938|http://www.debian.org/security/2007/dsa-1330
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Unknown
Unknown
98.5
CRITICAL
php/php
False
Unknown
nan
CVE-2007-3798
Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.
2007-07-16
2026-04-23
CWE-252|CWE-252
tcpdump/tcpdump:*|canonical/ubuntu_linux:6.06|canonical/ubuntu_linux:6.10|canonical/ubuntu_linux:7.04|debian/debian_linux:3.1|debian/debian_linux:4.0|slackware/slackware:9.0|slackware/slackware:9.1|slackware/slackware:10.0|slackware/slackware:10.1
http://bugs.gentoo.org/show_bug.cgi?id=184815|http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12|http://docs.info.apple.com/article.html?artnum=307179|http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html|http://secunia.com/advisories/26135
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
tcpdump/tcpdump
False
Unknown
nan
CVE-2007-3010
masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server R7.1 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the user parameter during a ping action.
2007-09-18
2026-04-21
CWE-77
al-enterprise/omnipcx_enterprise_communication_server:*
http://marc.info/?l=full-disclosure&m=119002152126755&w=2|http://osvdb.org/40521|http://secunia.com/advisories/26853|http://www.redteam-pentesting.de/advisories/rt-sa-2007-001.php|http://www.securityfocus.com/archive/1/479699/100/0/threaded
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Command Injection
Execution
100.0
CRITICAL
al-enterprise/omnipcx_enterprise_communication_server
True
Unknown
Apply updates per vendor instructions.
CVE-2007-6013
Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.
2007-11-19
2026-04-23
CWE-327
wordpress/wordpress:*|fedoraproject/fedora:7|fedoraproject/fedora:8
http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/058576.html|http://osvdb.org/40801|http://secunia.com/advisories/27714|http://secunia.com/advisories/28310|http://securityreason.com/securityalert/3375
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
wordpress/wordpress
False
Unknown
nan
CVE-2008-0081
Unspecified vulnerability in Microsoft Excel 2000 SP3 through 2003 SP2, Viewer 2003, and Office 2004 for Mac allows user-assisted remote attackers to execute arbitrary code via crafted macros, aka "Macro Validation Vulnerability," a different vulnerability than CVE-2007-3490.
2008-01-16
2026-04-23
CWE-908|CWE-908
microsoft/excel:2000|microsoft/excel:2002|microsoft/excel:2003|microsoft/excel_viewer:2003|microsoft/office:2004
http://marc.info/?l=bugtraq&m=120585858807305&w=2|http://secunia.com/advisories/28506|http://securitytracker.com/id?1019200|http://www.microsoft.com/technet/security/advisory/947563.mspx|http://www.securityfocus.com/bid/27305
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
microsoft/excel
False
Unknown
nan
CVE-2008-0174
GE Fanuc Proficy Real-Time Information Portal 2.6 and earlier uses HTTP Basic Authentication, which transmits usernames and passwords in base64-encoded cleartext and allows remote attackers to steal the passwords and gain privileges.
2008-01-29
2026-04-23
CWE-312
ge/proficy_real-time_information_portal:*
http://securityreason.com/securityalert/3590|http://securitytracker.com/id?1019273|http://support.gefanuc.com/support/index?page=kbchannel&id=KB12459|http://www.kb.cert.org/vuls/id/180876|http://www.securityfocus.com/archive/1/487075/100/0/threaded
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
ge/proficy_real-time_information_portal
False
Unknown
nan
CVE-2008-0062
KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free.
2008-03-19
2026-04-23
CWE-665
mit/kerberos_5:*|debian/debian_linux:3.1|debian/debian_linux:4.0|canonical/ubuntu_linux:6.06|canonical/ubuntu_linux:6.10|canonical/ubuntu_linux:7.04|canonical/ubuntu_linux:7.10|fedoraproject/fedora:7|fedoraproject/fedora:8
http://docs.info.apple.com/article.html?artnum=307562|http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html|http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html|http://marc.info/?l=bugtraq&m=130497213107107&w=2|http://secunia.com/advisories/29420
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
mit/kerberos_5
False
Unknown
nan
CVE-2008-1160
ZyXEL ZyWALL 1050 has a hard-coded password for the Quagga and Zebra processes that is not changed when it is set by a user, which allows remote attackers to gain privileges.
2008-03-25
2026-04-23
CWE-798
zyxel/zywall_1050_firmware:-
http://packetstormsecurity.org/0803-exploits/ZyWALL.pdf|http://secunia.com/advisories/29237|http://www.secumania.org/exploits/remote/zyxel-zywall-quagga_zebra-%28default-pass%29-remote-root-vulnerability-2008032143791/|http://www.securityfocus.com/bid/28184|http://www.vupen.com/english/advisories/2008/0990/references
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Hardcoded Credentials
Credential Access
98.5
CRITICAL
zyxel/zywall_1050_firmware
False
Unknown
nan
CVE-2008-0961
EMV DiskXtender 6.20.060 has a hard-coded login and password, which allows remote attackers to bypass authentication via the RPC interface.
2008-04-14
2026-04-23
CWE-798
emc/diskxtender:6.20.060
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=683|http://secunia.com/advisories/29778|http://www.osvdb.org/44419|http://www.securityfocus.com/bid/28727|http://www.securitytracker.com/id?1019827
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Hardcoded Credentials
Credential Access
98.5
CRITICAL
emc/diskxtender
False
Unknown
nan
CVE-2008-0599
The init_request_info function in sapi/cgi/cgi_main.c in PHP before 5.2.6 does not properly consider operator precedence when calculating the length of PATH_TRANSLATED, which might allow remote attackers to execute arbitrary code via a crafted URI.
2008-05-05
2026-04-23
CWE-131
php/php:*|fedoraproject/fedora:8|fedoraproject/fedora:9|canonical/ubuntu_linux:6.06|canonical/ubuntu_linux:7.04|canonical/ubuntu_linux:7.10|canonical/ubuntu_linux:8.04|apple/mac_os_x:*|apple/mac_os_x_server:*
http://cvs.php.net/viewvc.cgi/php-src/sapi/cgi/cgi_main.c?r1=1.267.2.15.2.50.2.12&r2=1.267.2.15.2.50.2.13&diff_format=u|http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01476437|http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html|http://marc.info/?l=bugtraq&m=124654546101607...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
php/php
False
Unknown
nan
CVE-2008-2108
The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 64-bit systems, performs a multiplication that generates a portion of zero bits during conversion due to insufficient precision, which produces 24 bits of entropy and simplifies brute force attacks against protection mechanisms that u...
2008-05-07
2026-04-23
CWE-331
php/php:*|php/php:*|fedoraproject/fedora:8|fedoraproject/fedora:9|canonical/ubuntu_linux:6.06|canonical/ubuntu_linux:7.04|canonical/ubuntu_linux:7.10|canonical/ubuntu_linux:8.04|debian/debian_linux:4.0
http://archives.neohapsis.com/archives/fulldisclosure/2008-05/0103.html|http://secunia.com/advisories/30757|http://secunia.com/advisories/30828|http://secunia.com/advisories/31119|http://secunia.com/advisories/31124
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
php/php
False
Unknown
nan
CVE-2008-3604
SQL injection vulnerability in bannerclick.php in ZeeBuddy 2.1 allows remote attackers to execute arbitrary SQL commands via the adid parameter.
2008-08-12
2026-04-23
CWE-89
zeescripts/zeebuddy:2.1
http://secunia.com/advisories/31413|http://securityreason.com/securityalert/4145|http://www.securityfocus.com/bid/30628|https://exchange.xforce.ibmcloud.com/vulnerabilities/44362|https://www.exploit-db.com/exploits/6230
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
SQL Injection
Initial Access
98.5
CRITICAL
zeescripts/zeebuddy
False
Unknown
nan
CVE-2008-2369
manzier.pxt in Red Hat Network Satellite Server before 5.1.1 has a hard-coded authentication key, which allows remote attackers to connect to the server and obtain sensitive information about user accounts and entitlements.
2008-08-14
2026-04-23
CWE-798
redhat/satellite:*
http://rhn.redhat.com/errata/RHSA-2008-0630.html|http://secunia.com/advisories/31493|http://securitytracker.com/id?1020694|http://www.securityfocus.com/bid/30679|https://exchange.xforce.ibmcloud.com/vulnerabilities/44452
True
9.1
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
NONE
3.9
5.2
Hardcoded Credentials
Credential Access
95.0
CRITICAL
redhat/satellite
False
Unknown
nan
CVE-2008-2433
The web management console in Trend Micro OfficeScan 7.0 through 8.0, Worry-Free Business Security 5.0, and Client/Server/Messaging Suite 3.5 and 3.6 creates a random session token based only on the login time, which makes it easier for remote attackers to hijack sessions via brute-force attacks. NOTE: this can be leve...
2008-08-27
2026-04-23
CWE-330
trendmicro/client_server_messaging_suite:3.5|trendmicro/client_server_messaging_suite:3.6|trendmicro/officescan:*|trendmicro/worry-free_business_security:5.0
http://secunia.com/advisories/31373|http://secunia.com/secunia_research/2008-31/advisory/|http://securityreason.com/securityalert/4191|http://www.securityfocus.com/archive/1/495670/100/0/threaded|http://www.securityfocus.com/bid/30792
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
trendmicro/client_server_messaging_suite
False
Unknown
nan
CVE-2008-3612
The Networking subsystem in Apple iPod touch 2.0 through 2.0.2, and iPhone 2.0 through 2.0.2, uses predictable TCP initial sequence numbers, which allows remote attackers to spoof or hijack a TCP connection.
2008-09-11
2026-04-23
CWE-330
apple/iphone_os:*
http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html|http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html|http://secunia.com/advisories/31823|http://secunia.com/advisories/31900|http://support.apple.com/kb/HT3026
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
apple/iphone_os
False
Unknown
nan
CVE-2008-5038
Use-after-free vulnerability in the NetWare Core Protocol (NCP) feature in Novell eDirectory 8.7.3 SP10 before 8.7.3 SP10 FTF1 and 8.8 SP2 for Windows allows remote attackers to cause a denial of service and possibly execute arbitrary code via a sequence of "Get NCP Extension Information By Name" requests that cause on...
2008-11-12
2026-04-23
CWE-416
novell/edirectory:*|novell/edirectory:8.7.3|novell/edirectory:8.7.3|novell/edirectory:8.7.3|novell/edirectory:8.7.3|novell/edirectory:8.7.3|novell/edirectory:8.7.3|novell/edirectory:8.7.3|novell/edirectory:8.7.3|novell/edirectory:8.7.3
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=748|http://osvdb.org/48206|http://secunia.com/advisories/32395|http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037180.html|http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5037181.html
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Use After Free
Execution
98.5
CRITICAL
novell/edirectory
False
Unknown
nan
CVE-2008-5784
V3 Chat - Profiles/Dating Script 3.0.2 allows remote attackers to bypass authentication and gain administrative access by setting the admin cookie to 1.
2008-12-31
2026-04-23
CWE-565
v3chat/v3_chat_profiles_dating_script:3.0.2
http://secunia.com/advisories/32603|http://www.securityfocus.com/bid/32216|http://www.vupen.com/english/advisories/2008/3071|https://exchange.xforce.ibmcloud.com/vulnerabilities/46479|https://www.exploit-db.com/exploits/7063
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
v3chat/v3_chat_profiles_dating_script
False
Unknown
nan
CVE-2009-1151
Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action.
2009-03-26
2026-04-22
CWE-94|CWE-94
phpmyadmin/phpmyadmin:*|phpmyadmin/phpmyadmin:*|debian/debian_linux:4.0|debian/debian_linux:5.0
http://labs.neohapsis.com/2009/04/06/about-cve-2009-1151/|http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html|http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/MAINT_2_11_9/phpMyAdmin/scripts/setup.php?r1=11514&r2=12301&pathrev=12301|http://secunia.com/advisories/34430|http://secun...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Code Injection
Execution
100.0
CRITICAL
phpmyadmin/phpmyadmin
True
Unknown
Apply updates per vendor instructions.
CVE-2009-1936
_functions.php in cpCommerce 1.2.x, possibly including 1.2.9, sends a redirect but does not exit when it is called directly, which allows remote attackers to bypass a protection mechanism to conduct remote file inclusion and directory traversal attacks, execute arbitrary PHP code, or read arbitrary files via the GLOBAL...
2009-06-05
2026-04-23
CWE-22|CWE-22
cpcommerce_project/cpcommerce:*
http://secunia.com/advisories/35245|http://www.securityfocus.com/bid/35103|https://www.exploit-db.com/exploits/8790|http://secunia.com/advisories/35245|http://www.securityfocus.com/bid/35103
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Path Traversal
Defense Evasion
98.5
CRITICAL
cpcommerce_project/cpcommerce
False
Unknown
nan
CVE-2009-2168
cpanel/login.php in EgyPlus 7ammel (aka 7ml) 1.0.1 and earlier sends a redirect to the web browser but does not exit when the supplied credentials are incorrect, which allows remote attackers to bypass authentication by providing arbitrary username and password parameters.
2009-06-22
2026-04-23
CWE-287
egyplus/7ammel:*
https://www.exploit-db.com/exploits/8865|https://www.exploit-db.com/exploits/8865
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Improper Authentication
Initial Access
98.5
CRITICAL
egyplus/7ammel
False
Unknown
nan
CVE-2009-2367
cgi-bin/makecgi-pro in Iomega StorCenter Pro generates predictable session IDs, which allows remote attackers to hijack active sessions and gain privileges via brute force guessing attacks on the session_id parameter.
2009-07-08
2026-04-23
CWE-338
iomega/storcenter_pro_firmware:-
http://osvdb.org/55586|http://secunia.com/advisories/35666|http://trac.metasploit.com/browser/framework3/trunk/modules/auxiliary/admin/http/iomega_storcenterpro_sessionid.rb?rev=6733|https://exchange.xforce.ibmcloud.com/vulnerabilities/51539|http://osvdb.org/55586
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
iomega/storcenter_pro_firmware
False
Unknown
nan
CVE-2009-2382
admin.php in phpMyBlockchecker 1.0.0055 allows remote attackers to bypass authentication and gain administrative access by setting the PHPMYBCAdmin cookie to LOGGEDIN.
2009-07-08
2026-04-23
CWE-287
jay-jayx0r/phpmyblockchecker:1.0.0055
http://osvdb.org/55505|http://secunia.com/advisories/35660|http://www.exploit-db.com/exploits/9053|https://exchange.xforce.ibmcloud.com/vulnerabilities/51445|http://osvdb.org/55505
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Improper Authentication
Initial Access
98.5
CRITICAL
jay-jayx0r/phpmyblockchecker
False
Unknown
nan
CVE-2009-2422
The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications...
2009-07-10
2026-04-23
CWE-287
rubyonrails/ruby_on_rails:*|apple/mac_os_x:*|apple/mac_os_x:10.5.8|apple/mac_os_x_server:*|apple/mac_os_x_server:10.5.8
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html|http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s|http://secunia.com/advisories/35702|http://support.apple.com/kb/HT4077|http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Improper Authentication
Initial Access
98.5
CRITICAL
rubyonrails/ruby_on_rails
False
Unknown
nan
CVE-2009-1048
The web interface on the snom VoIP phones snom 300, snom 320, snom 360, snom 370, and snom 820 with firmware 6.5 before 6.5.20, 7.1 before 7.1.39, and 7.3 before 7.3.14 allows remote attackers to bypass authentication, and reconfigure the phone or make arbitrary use of the phone, via a (1) http or (2) https request wit...
2009-08-14
2026-04-23
CWE-290
snom/snom_300_firmware:*|snom/snom_300_firmware:*|snom/snom_300_firmware:*|snom/snom_320_firmware:*|snom/snom_320_firmware:*|snom/snom_320_firmware:*|snom/snom_360_firmware:*|snom/snom_360_firmware:*|snom/snom_360_firmware:*|snom/snom_370_firmware:*
http://secunia.com/advisories/36293|http://www.csnc.ch/misc/files/advisories/cve-2009-1048.txt|http://www.securityfocus.com/archive/1/505723/100/0/threaded|https://exchange.xforce.ibmcloud.com/vulnerabilities/52424|http://secunia.com/advisories/36293
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
snom/snom_300_firmware
False
Unknown
nan
CVE-2008-7109
The Scanner File Utility (aka listener) in Kyocera Mita (KM) 3.3.0.1 allows remote attackers to bypass authorization and upload arbitrary files to the client system via a modified program that does not prompt the user for a password.
2009-08-28
2026-04-23
CWE-863|CWE-863
kyoceramita/scanner_file_utility:3.3.0.1
http://secunia.com/advisories/31631|http://www.informit.com/guides/content.aspx?g=security&seqNum=320|http://www.securityfocus.com/archive/1/495772/100/0/threaded|http://www.securityfocus.com/bid/30855|https://exchange.xforce.ibmcloud.com/vulnerabilities/44717
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Incorrect Authorization
Unknown
98.5
CRITICAL
kyoceramita/scanner_file_utility
False
Unknown
nan
CVE-2009-3421
login.php in Zenas PaoBacheca Guestbook 2.1, when register_globals is enabled, allows remote attackers to bypass authentication and gain administrative access by setting the login_ok parameter to 1.
2009-09-25
2026-04-23
CWE-287
zenas/pao-bacheca_guestbook:2.1
http://secunia.com/advisories/36023|http://www.exploit-db.com/exploits/9293|http://www.osvdb.org/56757|https://exchange.xforce.ibmcloud.com/vulnerabilities/52100|http://secunia.com/advisories/36023
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Improper Authentication
Initial Access
98.5
CRITICAL
zenas/pao-bacheca_guestbook
False
Unknown
nan
CVE-2009-3616
Multiple use-after-free vulnerabilities in vnc.c in the VNC server in QEMU 0.10.6 and earlier might allow guest OS users to execute arbitrary code on the host OS by establishing a connection from a VNC client and then (1) disconnecting during data transfer, (2) sending a message using incorrect integer data types, or (...
2009-10-23
2026-04-23
CWE-416
qemu/qemu:*|redhat/enterprise_linux_server:5.0|redhat/enterprise_linux_workstation:5.0
http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5|http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331|http://marc.info/?l=qemu-devel&m=124324043812915|http://rhn.redhat.com/errata/RHEA-2009-1272.html|http://www.openwall.com/lists/oss-security/2009/10/16/5
True
9.9
CRITICAL
NETWORK
LOW
LOW
NONE
CHANGED
HIGH
HIGH
HIGH
3.1
6.0
Use After Free
Execution
95.0
CRITICAL
qemu/qemu
False
Unknown
nan
CVE-2009-4581
Directory traversal vulnerability in modules/admincp.php in RoseOnlineCMS 3 B1 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the admin parameter.
2010-01-06
2026-04-23
CWE-22
roseonlinecms/roseonlinecms:*
http://packetstormsecurity.org/0912-exploits/roseonlinecms-lfi.txt|http://www.exploit-db.com/exploits/10793|http://www.securityfocus.com/bid/37529|https://exchange.xforce.ibmcloud.com/vulnerabilities/55207|http://packetstormsecurity.org/0912-exploits/roseonlinecms-lfi.txt
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Path Traversal
Defense Evasion
98.5
CRITICAL
roseonlinecms/roseonlinecms
False
Unknown
nan
CVE-2009-4013
Multiple directory traversal vulnerabilities in Lintian 1.23.x through 1.23.28, 1.24.x through 1.24.2.1, and 2.x before 2.3.2 allow remote attackers to overwrite arbitrary files or obtain sensitive information via vectors involving (1) control field names, (2) control field values, and (3) control files of patch system...
2010-02-02
2026-04-29
CWE-22
debian/lintian:*|debian/lintian:*|debian/lintian:*|debian/debian_linux:4.0|debian/debian_linux:5.0|canonical/ubuntu_linux:6.06|canonical/ubuntu_linux:8.04|canonical/ubuntu_linux:8.10|canonical/ubuntu_linux:9.04|canonical/ubuntu_linux:9.10
http://git.debian.org/?p=lintian/lintian.git%3Ba=commit%3Bh=c8d01f062b3e5137cf65196760b079a855c75e00|http://git.debian.org/?p=lintian/lintian.git%3Ba=commit%3Bh=fbe0c92b2ef7e360d13414bf40d6af5507d0c86d|http://packages.debian.org/changelogs/pool/main/l/lintian/lintian_2.3.2/changelog|http://packages.qa.debian.org/l/lint...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Path Traversal
Defense Evasion
98.5
CRITICAL
debian/lintian
False
Unknown
nan
CVE-2010-0840
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Or...
2010-04-01
2026-04-21
UNKNOWN
oracle/jre:1.4.2_25|oracle/jre:1.5.0|oracle/jre:1.6.0|opensuse/opensuse:11.0|opensuse/opensuse:11.1|opensuse/opensuse:11.2|canonical/ubuntu_linux:8.04|canonical/ubuntu_linux:8.10|canonical/ubuntu_linux:9.04|canonical/ubuntu_linux:9.10
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751|http://lists.apple.com/archives/security-announce/2010//May/msg00001.html|http://lists.apple.com/archives/security-announce/2010//May/msg00002.html|http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html|http://lists.opensuse.org/ope...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Unknown
Unknown
100.0
CRITICAL
oracle/jre
True
Unknown
Apply updates per vendor instructions.
CVE-2010-1866
The dechunk filter in PHP 5.3 through 5.3.2, when decoding an HTTP chunked encoding stream, allows context-dependent attackers to cause a denial of service (crash) and possibly trigger memory corruption via a negative chunk size, which bypasses a signed comparison, related to an integer overflow in the chunk size decod...
2010-05-07
2026-04-29
CWE-190
php/php:*|opensuse/opensuse:11.1|opensuse/opensuse:11.2|opensuse/opensuse:11.3|suse/linux_enterprise:10.0|suse/linux_enterprise:11.0|suse/linux_enterprise:11.0
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html|http://php-security.org/2010/05/02/mops-2010-003-php-dechunk-filter-signed-comparison-vulnerability/index.html|http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html|http://php-security.org/2010/05/02/mops-2010-003-php-dechun...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Integer Overflow
Unknown
98.5
CRITICAL
php/php
False
Unknown
nan
CVE-2010-1573
Linksys WAP54Gv3 firmware 3.04.03 and earlier uses a hard-coded username (Gemtek) and password (gemtekswd) for a debug interface for certain web pages, which allows remote attackers to execute arbitrary commands via the (1) data1, (2) data2, or (3) data3 parameters to (a) Debug_command_page.asp and (b) debug.cgi.
2010-06-10
2026-04-29
CWE-798
linksys/wap54g_firmware:*
http://secunia.com/advisories/40103|http://tools.cisco.com/security/center/viewAlert.x?alertId=20682|http://www.icysilence.org/?p=268|http://www.securityfocus.com/archive/1/511733/100/0/threaded|http://www.securityfocus.com/bid/40648
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Hardcoded Credentials
Credential Access
98.5
CRITICAL
linksys/wap54g_firmware
False
Unknown
nan
CVE-2010-1205
Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.
2010-06-30
2026-04-29
CWE-120
libpng/libpng:*|libpng/libpng:*|google/chrome:*|apple/itunes:*|apple/safari:*|apple/iphone_os:*|apple/mac_os_x:*|apple/mac_os_x_server:*|fedoraproject/fedora:12|fedoraproject/fedora:13
http://blackberry.com/btsc/KB27244|http://code.google.com/p/chromium/issues/detail?id=45983|http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html|http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=commitdiff%3Bh=188eb6b42602bf7d7ae708a21897923b6a83fe7c#patch18|http://lists.apple....
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Unknown
98.5
CRITICAL
libpng/libpng
False
Unknown
nan
CVE-2010-0211
The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequence...
2010-07-28
2026-04-29
CWE-252
openldap/openldap:2.4.22|vmware/esxi:4.0|vmware/esxi:4.1|opensuse/opensuse:11.0|apple/mac_os_x:*|apple/mac_os_x_server:*
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705|http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html|http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html|http://secunia.com/advisories/40639|http://secunia.com/advisories/40677
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
openldap/openldap
False
Unknown
nan
CVE-2010-2861
Multiple directory traversal vulnerabilities in the administrator console in Adobe ColdFusion 9.0.1 and earlier allow remote attackers to read arbitrary files via the locale parameter to (1) CFIDE/administrator/settings/mappings.cfm, (2) logging/settings.cfm, (3) datasources/index.cfm, (4) j2eepackaging/editarchive.cfm...
2010-08-11
2026-04-21
CWE-22|CWE-22
adobe/coldfusion:*
http://securityreason.com/securityalert/8137|http://securityreason.com/securityalert/8148|http://www.adobe.com/support/security/bulletins/apsb10-18.html|http://www.gnucitizen.org/blog/coldfusion-directory-traversal-faq-cve-2010-2861/|http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr10-07
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Path Traversal
Defense Evasion
100.0
CRITICAL
adobe/coldfusion
True
Known
Apply updates per vendor instructions.
CVE-2010-2076
Apache CXF 2.0.x before 2.0.13, 2.1.x before 2.1.10, and 2.2.x before 2.2.9, as used in Apache ServiceMix, Apache Camel, Apache Chemistry, Apache jUDDI, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intra...
2010-08-19
2026-04-29
CWE-829
apache/cxf:*|apache/cxf:*|apache/cxf:*
http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html|http://geronimo.apache.org/21x-security-report.html|http://geronimo.apache.org/22x-security-report.html|http://secunia.com/advisories/40969|http://secunia.com/advisories/41016
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Other
Unknown
98.5
CRITICAL
apache/cxf
False
Unknown
nan
CVE-2010-3416
Google Chrome before 6.0.472.59 on Linux does not properly implement the Khmer locale, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
2010-09-16
2026-04-29
CWE-119
google/chrome:*
http://code.google.com/p/chromium/issues/detail?id=53930|http://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_14.html|https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14307|http://code.google.com/p/chromium/issues/detail?id=53930|http://googlechromereleases....
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Buffer Overflow
Execution
98.5
CRITICAL
google/chrome
False
Unknown
nan
CVE-2010-3729
The SPDY protocol implementation in Google Chrome before 6.0.472.62 does not properly manage buffers, which might allow remote attackers to execute arbitrary code via unspecified vectors.
2010-10-05
2026-04-29
CWE-190
google/chrome:*
http://code.google.com/p/chromium/issues/detail?id=55119|http://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_17.html|https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7380|http://code.google.com/p/chromium/issues/detail?id=55119|http://googlechromereleases.b...
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Integer Overflow
Unknown
98.5
CRITICAL
google/chrome
False
Unknown
nan
CVE-2010-4039
Google Chrome before 7.0.517.41 on Linux does not properly set the PATH environment variable, which has unspecified impact and attack vectors.
2010-10-21
2026-04-29
UNKNOWN
google/chrome:*
http://code.google.com/p/chromium/issues/detail?id=54132|http://googlechromereleases.blogspot.com/2010/10/stable-channel-update.html|http://secunia.com/advisories/41888|http://www.securityfocus.com/bid/44241|http://www.vupen.com/english/advisories/2010/2731
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Unknown
Unknown
98.5
CRITICAL
google/chrome
False
Unknown
nan
CVE-2010-4041
The sandbox implementation in Google Chrome before 7.0.517.41 on Linux does not properly constrain worker processes, which might allow remote attackers to bypass intended access restrictions via unspecified vectors.
2010-10-21
2026-04-29
UNKNOWN
google/chrome:*
http://code.google.com/p/chromium/issues/detail?id=54794|http://googlechromereleases.blogspot.com/2010/10/stable-channel-update.html|http://secunia.com/advisories/41888|http://www.securityfocus.com/bid/44241|http://www.vupen.com/english/advisories/2010/2731
True
9.8
CRITICAL
NETWORK
LOW
NONE
NONE
UNCHANGED
HIGH
HIGH
HIGH
3.9
5.9
Unknown
Unknown
98.5
CRITICAL
google/chrome
False
Unknown
nan
End of preview. Expand in Data Studio

Cyber Threat Intelligence Dataset

A comprehensive cybersecurity dataset combining CVE vulnerability data, MITRE ATT&CK techniques, and CISA Known Exploited Vulnerabilities — structured for AI/ML training and security research.

Author: Soham Dahivalkar
License: MIT
Created: 2026


Dataset Description

This dataset provides structured cybersecurity intelligence data collected from three authoritative public sources:

  1. NVD (National Vulnerability Database) — CVE vulnerability records with CVSS scoring
  2. MITRE ATT&CK — Enterprise attack techniques, tactics, and detection methods
  3. CISA KEV — Known Exploited Vulnerabilities actively used in the wild

Each CVE record is enriched with:

  • CVSS v3.1 base scores and detailed metrics
  • Attack type classification (mapped from CWE)
  • MITRE ATT&CK tactic mapping
  • Custom risk scoring (0-100)
  • CISA KEV status (actively exploited or not)
  • Ransomware usage indicators

Additionally, the dataset includes instruction-tuning data for fine-tuning LLMs as cybersecurity analysts.


Dataset Structure

Configurations

Split Description Rows
cve_data CVE vulnerability records with CVSS, CWE, risk scores ~5000
mitre_attack MITRE ATT&CK enterprise techniques ~700
train Instruction-tuning training split ~15000
test Instruction-tuning evaluation split ~1500

CVE Data Schema

Column Type Description
cve_id string CVE identifier (e.g., CVE-2024-3400)
description string Vulnerability description
cvss_score float CVSS v3.1 base score (0-10)
cvss_severity string CRITICAL / HIGH / MEDIUM / LOW
attack_vector string NETWORK / ADJACENT / LOCAL / PHYSICAL
attack_complexity string LOW / HIGH
attack_type string Mapped from CWE (e.g., SQL Injection, Buffer Overflow)
cwe_ids string CWE weakness identifiers
risk_score float Custom composite risk score (0-100)
risk_level string CRITICAL / HIGH / MEDIUM / LOW / INFO
exploit_available bool Whether public exploits exist
in_cisa_kev bool Whether listed in CISA KEV catalog
ransomware_use string Known ransomware campaign usage
likely_mitre_tactic string Mapped MITRE ATT&CK tactic
affected_products string Vendor/product affected

Instruction Data Schema

Column Type Description
instruction string The task instruction
input string CVE or technique context
output string Detailed expert analysis

Instruction types include:

  • CVE vulnerability analysis
  • Remediation recommendations
  • Risk scoring assessments
  • MITRE ATT&CK mapping
  • Triage prioritization decisions
  • MITRE technique explanations

Usage

Load the Dataset

from datasets import load_dataset

# Load all splits
dataset = load_dataset("soham-dahivalkar/cyber-threat-intelligence")

# Access CVE data
cve_data = dataset["cve_data"]
print(f"Total CVEs: {len(cve_data)}")
print(cve_data[0])

# Access MITRE techniques
mitre = dataset["mitre_attack"]
print(f"Total techniques: {len(mitre)}")

# Access training data
train = dataset["train"]
print(f"Training samples: {len(train)}")
print(train[0]["instruction"])

Filter Critical Vulnerabilities

critical_cves = cve_data.filter(lambda x: x["risk_level"] == "CRITICAL")
print(f"Critical CVEs: {len(critical_cves)}")

Get Actively Exploited CVEs

exploited = cve_data.filter(lambda x: x["in_cisa_kev"] == "True")
print(f"Actively exploited CVEs: {len(exploited)}")

Use for Fine-Tuning

# Ready-to-use instruction format
for sample in dataset["train"]:
    instruction = sample["instruction"]
    input_text = sample["input"]
    output = sample["output"]
    # Format for your model and train!

Data Sources

Source URL License
NVD (National Vulnerability Database) https://nvd.nist.gov Public Domain
MITRE ATT&CK https://attack.mitre.org Apache 2.0
CISA KEV Catalog https://www.cisa.gov/known-exploited-vulnerabilities-catalog Public Domain

All data is collected from publicly available, free government and community sources.


Intended Uses

  • Fine-tuning LLMs for cybersecurity analysis tasks
  • Training classifiers for vulnerability severity prediction
  • Building RAG systems for security knowledge retrieval
  • Research on automated vulnerability assessment
  • Education on cybersecurity threat intelligence

Limitations

  • CVE descriptions are sourced from NVD and may not reflect the latest updates
  • Risk scores are computed using a custom formula and may differ from organizational assessments
  • MITRE ATT&CK mappings from CWE are approximate and based on common associations
  • The instruction-tuning data is synthetically generated from structured fields

About the Author

Soham Dahivalkar — Generative AI Engineer specializing in agentic AI systems, enterprise RAG, and cybersecurity intelligence.

  • Published Author: "Generative AI: High Stakes Cyber Security" (Amazon Kindle)
  • Research: "AI in Security: ML Approach for Vulnerability Management" (ResearchGate)
  • Open Source: ai-bridge-kit — Unified Python SDK for AI Providers (PyPI)
  • Experience: Alembic Pharmaceuticals, CyberNX Technologies, TalaKunchi Networks
  • LinkedIn: Soham Dahivalkar

Citation

@dataset{dahivalkar2026cyberthreat,
  author = {Dahivalkar, Soham},
  title = {Cyber Threat Intelligence Dataset},
  year = {2026},
  publisher = {HuggingFace},
  url = {https://huggingface.co/datasets/soham-dahivalkar/cyber-threat-intelligence}
}
Downloads last month
26