VLAI for Severity
Collection
A collection of papers, models, and datasets supporting the AI and NLP components of the Vulnerability-Lookup project. • 9 items • Updated • 1
id stringlengths 12 47 | title stringlengths 0 256 ⌀ | description stringlengths 3 189k | cpes listlengths 0 5.42k | cvss_v4_0 float64 0 10 ⌀ | cvss_v3_1 float64 0 10 ⌀ | cvss_v3_0 float64 0 10 ⌀ | cvss_v2_0 float64 0 10 ⌀ | patch_commit_url stringlengths 36 232 ⌀ | source stringclasses 6
values |
|---|---|---|---|---|---|---|---|---|---|
CVE-2023-39303 | QTS, QuTS hero, QuTScloud | An improper authentication vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to compromise the security of the system via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.3.2578 build 20231110 and lat... | [
"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qutscloud:*:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.0.2348:build_20230325:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.0.2399:build_20230515:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.0.2418:build_20230603:*:*:*:*:*:*",
... | null | 5.3 | null | null | null | cvelistv5 |
GHSA-hg2f-7x6w-x2hx | Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface i... | [] | null | null | null | null | null | github | |
GHSA-44fv-rwhc-x5f9 | Missing Authorization vulnerability in merkulove Countdowner for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Countdowner for Elementor: from n/a through 1.0.4. | [] | null | 5.4 | null | null | null | github | |
CVE-2026-29146 | Apache Tomcat: EncryptInterceptor vulnerable to padding oracle attack by default | Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109.
Users are recommended to upgrade to ve... | [] | null | 7.5 | null | null | null | cvelistv5 |
GHSA-mf7q-gw5f-q8jj | Cross-site Scripting in Apache Zeppelin | Cross Site Scripting vulnerability in markdown interpreter of Apache Zeppelin allows an attacker to inject malicious scripts. This issue affects Apache Zeppelin Apache Zeppelin versions prior to 0.9.0. | [] | null | 6.1 | null | null | null | github |
GHSA-4h52-q6mh-w82h | In the Linux kernel, the following vulnerability has been resolved:skmsg: pass gfp argument to alloc_sk_msg()syzbot found that alloc_sk_msg() could be called from a
non sleepable context. sk_psock_verdict_recv() uses
rcu_read_lock() protection.We need the callers to pass a gfp_t argument to avoid issues.syzbot report w... | [] | null | 5.5 | null | null | null | github | |
GHSA-79v7-wxc5-r58h | The WP Photo Album Plus plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'wppa-tab' parameter in all versions up to, and including, 8.8.05.003 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in p... | [] | null | 6.1 | null | null | null | github | |
GHSA-v3gv-gj4m-f92w | An Insecure Direct Object Reference (IDOR) vulnerability in OpenEMR 6.0.0 allows any authenticated attacker to access and modify unauthorized areas via a crafted POST request to /modules/zend_modules/public/Installer/register. | [] | null | 8.1 | null | null | null | github | |
CVE-2002-0165 | LogWatch 2.5 allows local users to gain root privileges via a symlink attack, a different vulnerability than CVE-2002-0162. | [
"cpe:2.3:a:logwatch:logwatch:2.5:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null | cvelistv5 | |
CVE-2011-3216 | The kernel in Apple Mac OS X before 10.7.2 does not properly implement the sticky bit for directories, which might allow local users to bypass intended permissions and delete files via an unlink system call. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:... | null | null | null | 2.1 | null | cvelistv5 | |
GHSA-fvg7-m8g3-2hjj | A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This impacts the function cgi_recovery/cgi_backup_now/cgi_se... | [] | 2.1 | 6.3 | null | null | null | github | |
GHSA-6289-2jjg-22cm | An issue was discovered in ADTRAN PMAA 1.6.2-1, 1.6.3, and 1.6.4. NETCONF Access Management (NACM) allows unprivileged users to create privileged users and execute arbitrary commands via the use of the diagnostic-profile over RESTCONF. | [] | null | null | 8.8 | null | null | github | |
CVE-2022-37373 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. Craf... | [
"cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*"
] | null | null | 3.3 | null | null | cvelistv5 | |
GHSA-g6jx-3h74-6fm8 | The replace_inline_img function in elogd in Electronic Logbook (ELOG) before 2.7.1 allows remote attackers to cause a denial of service (infinite loop) via crafted logbook entries. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null | null | github | |
GHSA-qgrq-7wwj-vr5c | Information disclosure and authentication bypass vulnerability exists in the Apache HTTP Server configuration bundled with ZoneMinder v1.30 and v1.29, which allows a remote unauthenticated attacker to browse all directories in the web root, e.g., a remote unauthenticated attacker can view all CCTV images on the server ... | [] | null | null | 7.5 | null | null | github | |
GHSA-hr57-5gv4-mvpw | PDF-XChange Editor PDF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. his vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or op... | [] | null | null | 7.8 | null | null | github | |
CVE-2016-6212 | The Views module 7.x-3.x before 7.x-3.14 in Drupal 7.x and the Views module in Drupal 8.x before 8.1.3 might allow remote authenticated users to bypass intended access restrictions and obtain sensitive Statistics information via unspecified vectors. | [
"cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*",
"cpe:2.3:... | null | null | 5.3 | 5 | null | cvelistv5 | |
GHSA-h93w-324f-xffx | Missing Authorization vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Nelio AB Testing: from n/a through <= 8.2.8. | [] | null | 5.3 | null | null | null | github | |
CVE-2017-17634 | Single Theater Booking Script 3.2.1 has SQL Injection via the findcity.php q parameter. | [
"cpe:2.3:a:single_theater_booking_script_project:single_theater_booking_script:3.2.1:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null | cvelistv5 | |
GHSA-7839-55w4-4gg2 | Improper validation of the length field of LLDP-MED TLV in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series, version 1.1, allows information disclosure to attackers due to controllable loop counter variable via a crafted lldp packet. | [] | null | null | null | null | null | github | |
CVE-2024-29876 | SQL injection vulnerability in Sentrifugo | SQL injection vulnerability in Sentrifugo 3.2, through /sentrifugo/index.php/reports/activitylogreport, 'sortby' parameter. The exploitation of this vulnerability could allow a remote user to send a specially crafted query to the server and extract all the data from it. | [
"cpe:2.3:a:sentrifugo:sentrifugo:3.2:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null | cvelistv5 |
GHSA-3rww-fm75-jc23 | The wp-file-download WordPress plugin before 6.2.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting | [] | null | 7.1 | null | null | null | github | |
GHSA-vrc8-xx22-hwgx | Internet Starter, one of SoftCOM iKSORIS system modules, is vulnerable to Reflected XSS (Cross-site Scripting) attacks. Using a functionality of creating new form fields one creates new parameters vulnerable to XSS attacks. A user tricked into filling such a form with a malicious script will run the code in their's co... | [] | 5.1 | 6.1 | null | null | null | github | |
GHSA-2q9m-8wj3-95xg | In International Color Consortium DemoIccMAX 79ecb74, there is a stack-based buffer overflow in the icFixXml function in IccXML/IccLibXML/IccUtilXml.cpp in libIccXML.a. | [] | null | 8.8 | null | null | null | github | |
CVE-2012-0885 | chan_sip.c in Asterisk Open Source 1.8.x before 1.8.8.2 and 10.x before 10.0.1, when the res_srtp module is used and media support is improperly configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted SDP message with a crypto attribute and a (1) video ... | [
"cpe:2.3:a:asterisk:open_source:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:... | null | null | null | 4.3 | null | cvelistv5 | |
CVE-2025-7660 | Map My Locations <= 1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting | The Map My Locations plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'map_my_locations' shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with ... | [] | null | 6.4 | null | null | null | cvelistv5 |
CVE-2022-25010 | The component /rootfs in RageFile of Stepmania v5.1b2 and below allows attackers access to the entire file system. | [
"cpe:2.3:a:stepmania:stepmania:*:*:*:*:*:*:*:*",
"cpe:2.3:a:stepmania:stepmania:5.1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:stepmania:stepmania:5.1.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:stepmania:stepmania:5.1.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:stepmania:stepmania:5.1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:stepmania:stepma... | null | 9.1 | null | 6.4 | null | cvelistv5 | |
RHSA-2024:10803 | Red Hat Security Advisory: bzip2 security update | bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail). | [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | 4.4 | null | null | null | csaf_redhat |
CVE-2024-2799 | Royal Elementor Addons and Templates <= 1.3.971 - Authenticated (Contributor+) Stored Cross-Site Scripting via HTML Tags | The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Grid & Advanced Text widget HTML tags in all versions up to, and including, 1.3.96 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for a... | [
"cpe:2.3:a:wordpress:royal-elementor-addons:1.3.971:*:*:*:*:*:*:*",
"cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null | null | cvelistv5 |
CVE-2024-30079 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11... | null | 7.8 | null | null | null | cvelistv5 |
GHSA-rwc4-5qx3-qg4w | A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as wel... | [] | null | 8.8 | null | null | null | github | |
CVE-2004-1554 | PHP remote file inclusion vulnerability in livre_include.php in @lex Guestbook allows remote attackers to execute arbitrary PHP code by modifying the chem_absolu parameter to reference a URL on a remote web server that contains the code. | [
"cpe:2.3:a:alexphpteam:alex_guestbook:3.12:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null | cvelistv5 | |
GHSA-wc46-2g2w-q2mc | Multiple heap-based buffer overflows in the (1) DCTStream::readProgressiveSOF and (2) DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, as used in products such as (a) Poppler, (b) teTeX, (c) KDE kpdf, (d) pdftohtml, (e) KOffice KWord, (f) CUPS, and (g) libextract... | [] | null | null | null | null | null | github | |
GHSA-vw6q-53hh-43gj | An exploitable command injection vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can allow for a user to inject arbitrary data in the "msmtprc" configuration file resulting in command execution. An attac... | [] | null | null | 8.8 | null | null | github | |
CVE-2022-20472 | In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12... | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null | cvelistv5 | |
GHSA-4qh3-jr4m-5c24 | Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2013-3806. | [] | null | null | null | null | null | github | |
CVE-2022-21823 | A insecure storage of sensitive information vulnerability exists in Ivanti Workspace Control <2021.2 (10.7.30.0) that could allow an attacker with locally authenticated low privileges to obtain key information due to an unspecified attack vector. | [
"cpe:2.3:a:ivanti:workspace_control:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null | cvelistv5 | |
CVE-2006-5109 | Devellion CubeCart 2.0.x allows remote attackers to obtain sensitive information via a direct request for (1) link_navi.php or (2) spotlight.php, which reveals the path in various error messages. NOTE: the information.php, language.php, list_docs.php, popular_prod.php, sale.php, check_sum.php, and cat_navi.php vectors... | [
"cpe:2.3:a:devellion:cubecart:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:devellion:cubecart:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:devellion:cubecart:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:devellion:cubecart:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:devellion:cubecart:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:devellion:cubecart:2.0.5:*:*:*:*:*:... | null | null | null | 5 | null | cvelistv5 | |
GHSA-2ghq-fx5m-357p | Insecure deserialization and improper certificate validation in Checkmk Exchange plugin check-mk-api prior to 5.8.1 | [] | 7.7 | 9.8 | null | null | null | github | |
CVE-2022-0929 | XSS on dynamic_text module in microweber/microweber | XSS on dynamic_text module in GitHub repository microweber/microweber prior to 1.2.11. | [
"cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*"
] | null | null | 6.8 | null | null | cvelistv5 |
GHSA-vm93-wwm4-9f63 | Buffer overflow in the server in IBM Tivoli Storage Manager FastBack 5.5.x and 6.x before 6.1.12.2 allows remote attackers to execute arbitrary code via a crafted command, a different vulnerability than CVE-2015-8520, CVE-2015-8521, and CVE-2015-8522. | [] | null | null | 9.8 | null | null | github | |
CVE-2018-9567 | On Pixel devices there is a bug causing verified boot to show the same certificate fingerprint despite using different signing keys. This may lead to local escalation of privilege if people are relying on those fingerprints to determine what version of the OS the device is running, with System execution privileges need... | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null | cvelistv5 | |
CVE-2026-35044 | BentoML has a Server-Side Template Injection via unsandboxed Jinja2 Environment in Dockerfile generation | BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the Dockerfile generation function generate_containerfile() in src/bentoml/_internal/container/generate.py uses an unsandboxed jinja2.Environment with the jinja2.ext.do extension to render user-pr... | [] | null | 8.8 | null | null | null | cvelistv5 |
CVE-2019-15789 | Microk8s Privilege Escalation Vulnerability | Privilege escalation vulnerability in MicroK8s allows a low privilege user with local access to obtain root access to the host by provisioning a privileged container. Fixed in MicroK8s 1.15.3. | [
"cpe:2.3:a:canonical:microk8s:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null | cvelistv5 |
GHSA-f593-hfhr-7rxr | Cross-site scripting (XSS) vulnerability in Invision Power Board (IPB) 2.1.6 and earlier allows remote attackers to inject arbitrary web script or HTML via a POST that contains hexadecimal-encoded HTML. | [] | null | null | null | null | null | github | |
GHSA-jvw4-hhr9-8575 | An issue was discovered in Appalti & Contratti 9.12.2. The target web applications LFS and DL229 expose a set of services provided by the Axis 1.4 instance, embedded directly into the applications, as hinted by the WEB-INF/web.xml file leaked through Local File Inclusion. Among the exposed services, there is the Axis A... | [] | null | 8.8 | null | null | null | github | |
CVE-2024-51211 | SQL injection vulnerability exists in OS4ED openSIS-Classic Version 9.1, specifically in the resetuserinfo.php file. The vulnerability is due to improper input validation of the $username_stn_id parameter, which can be manipulated by an attacker to inject arbitrary SQL commands. | [
"cpe:2.3:a:os4ed:opensis-classic:9.1:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null | cvelistv5 | |
CVE-2021-27502 | Texas Instruments TI-RTOS Integer Overflow or Wraparound | Texas Instruments TI-RTOS, when configured to use HeapMem heap(default),
malloc returns a valid pointer to a small buffer on extremely large
values, which can trigger an integer overflow vulnerability in
'HeapMem_allocUnprotected' and result in code execution. | [
"cpe:2.3:o:ti:real-time_operating_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ti:cc3200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ti:cc3220r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ti:cc3220s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ti:cc3220sf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ti:cc3230s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ti:cc3230sf:-:*:*:*:*:*:*:*",
"c... | null | 7.4 | null | null | null | cvelistv5 |
CVE-2022-21363 | Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vuln... | [
"cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*",
"cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*"
] | null | 6.6 | null | null | null | cvelistv5 | |
CVE-2020-25006 | Heybbs v1.2 has a SQL injection vulnerability in login.php file via the username parameter which may allow a remote attacker to execute arbitrary code. | [
"cpe:2.3:a:heybbs_project:heybbs:1.2:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null | cvelistv5 | |
CVE-2024-53878 | NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in the cuobjdump binary, where a user could cause a crash by passing a malformed ELF file to cuobjdump. A successful exploit of this vulnerability might lead to a partial denial of service. | [] | null | 2.8 | null | null | null | cvelistv5 | |
GHSA-cmm4-pc7p-g834 | Apache OpenOffice documents can contain links that call internal macros with arbitrary arguments. Several URI Schemes are defined for this purpose.Links can be activated by clicks, or by automatic document events.The execution of such links must be subject to user approval.In the affected versions of OpenOffice, approv... | [] | null | 8.8 | null | null | null | github | |
CVE-2023-36422 | Microsoft Windows Defender Elevation of Privilege Vulnerability | Microsoft Windows Defender Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:windows_defender:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null | cvelistv5 |
GHSA-9mx4-j2x9-7p7m | Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow attackers to execute arbitrary code by leveraging an unspecified "type con... | [] | null | null | null | null | null | github | |
GHSA-qgc5-2pjm-6x2m | Insufficient policy enforcement in DevTools in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low) | [] | null | 5.3 | null | null | null | github | |
CVE-2021-28841 | Null Pointer Dereference vulnerability in TRENDnet TEW-755AP 1.11B03, TEW-755AP2KAC 1.11B03, TEW-821DAP2KAC 1.11B03, and TEW-825DAP 1.11B03, which could let a remote malicious user cause a denial of service by sending a POST request to apply_cgi via an action ping_test without a ping_ipaddr key. | [
"cpe:2.3:o:trendnet:tew-755ap_firmware:1.11b03:*:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tew-755ap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:trendnet:tew-755ap2kac_firmware:1.11b03:*:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tew-755ap2kac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:trendnet:tew-821dap2kac_firmware:1.11b03:*:*:*:*:*:*:*",
"cpe:2.3... | null | 7.5 | null | 5 | null | cvelistv5 | |
CVE-2019-13633 | Blinger.io v.1.0.2519 is vulnerable to Blind/Persistent XSS. An attacker can send arbitrary JavaScript code via a built-in communication channel, such as Telegram, WhatsApp, Viber, Skype, Facebook, Vkontakte, or Odnoklassniki. This is mishandled within the administration panel for conversations/all, conversations/inbox... | [
"cpe:2.3:a:blinger:blinger:1.0.2519:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null | cvelistv5 | |
CVE-2020-18232 | Buffer Overflow vulnerability in function H5S_close in H5S.c in HDF5 1.10.4 allows remote attackers to run arbitrary code via creation of crafted file. | [
"cpe:2.3:a:hdfgroup:hdf5:1.10.4:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null | cvelistv5 | |
GHSA-pm2q-hpwc-7mr9 | Unspecified vulnerability in Camera Life before 2.6 allows remote attackers to download private photos via unspecified vectors associated with the names of the photos. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null | null | github | |
GHSA-xpj8-3q42-mc9j | A vulnerability was found in Tongda OA 2017. It has been rated as critical. Affected by this issue is some unknown functionality of the file general/hr/recruit/requirements/delete.php. The manipulation of the argument REQUIREMENTS_ID leads to sql injection. The exploit has been disclosed to the public and may be used. ... | [] | null | null | 5.5 | null | null | github | |
CVE-2019-7860 | A cryptographically weak pseudo-rando number generator is used in multiple security relevant contexts in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. | [
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*"
] | null | null | 7.5 | 5 | null | cvelistv5 | |
CVE-2024-0554 | Cross-site scripting (XSS) vulnerability on WIC1200 | A Cross-site scripting (XSS) vulnerability has been found on WIC1200, affecting version 1.1. An authenticated user could store a malicious javascript payload in the device model parameter via '/setup/diags_ir_learn.asp', allowing the attacker to retrieve the session details of another user. | [
"cpe:2.3:o:xantech:wic1200_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:xantech:wic1200:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null | cvelistv5 |
GHSA-qwf8-rhj3-8896 | NexusPHP 1.5.beta5.20120707 has SQL Injection in forummanage.php via the sort parameter in an editforum action, a different vulnerability than CVE-2017-12981. | [] | null | null | 9.8 | null | null | github | |
CVE-2020-10174 | init_tmp in TeeJee.FileSystem.vala in Timeshift before 20.03 unsafely reuses a preexisting temporary directory in the predictable location /tmp/timeshift. It follows symlinks in this location or uses directories owned by unprivileged users. Because Timeshift also executes scripts under this location, an attacker can at... | [
"cpe:2.3:a:timeshift_project:timeshift:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
] | null | 7 | null | 6.9 | null | cvelistv5 | |
GHSA-8w7m-78c5-5pmm | Heap-based buffer overflow in the JPEG2000 image tile decoder in OpenJPEG before 1.5.2 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file because of incorrect j2k_decode, j2k_read_eoc, and tcd_decode_tile interaction, a related issue to ... | [] | null | null | 8.8 | null | null | github | |
CVE-2025-60855 | Reolink Video Doorbell WiFi DB_566128M5MP_W performs insufficient validation of firmware update signatures. This allows attackers to load malicious firmware images, resulting in arbitrary code execution with root privileges. NOTE: this is disputed by the Supplier because the integrity of updates is instead assured via ... | [] | null | 5.1 | null | null | null | cvelistv5 | |
CVE-2023-0440 | Observable Discrepancy in healthchecks/healthchecks | Observable Discrepancy in GitHub repository healthchecks/healthchecks prior to v2.6. | [
"cpe:2.3:a:healthchecks:healthchecks:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | null | null | cvelistv5 |
CVE-2022-40718 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the anweb service, which listens on TCP ports 80 and 443 by default. The issue results from the lack of ... | [
"cpe:2.3:o:dlink:dir-2150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-2150:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null | cvelistv5 | |
CVE-2023-43578 | A buffer overflow was reported in the SmiFlash module in some Lenovo Desktop products that may allow a local attacker with elevated privileges to execute arbitrary code. | [
"cpe:2.3:a:lenovo:desktop_bios:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_c5-14imb05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_c5-14imb05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_3-07ada05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_3-07ada05:-:*:*:*:*:*:*:*",
"cpe:2.3:... | null | 6.7 | null | null | null | cvelistv5 | |
CVE-2013-5457 | Unspecified vulnerability in IBM Java SDK 7.0.0 before SR6, 6.0.1 before SR7, and 6.0.0 before SR15 allows remote attackers to execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null | cvelistv5 | |
CVE-2022-50811 | erofs: fix missing unmap if z_erofs_get_extent_compressedlen() fails | In the Linux kernel, the following vulnerability has been resolved:
erofs: fix missing unmap if z_erofs_get_extent_compressedlen() fails
Otherwise, meta buffers could be leaked. | [] | null | null | null | null | null | cvelistv5 |
CVE-2010-5157 | Race condition in Comodo Internet Security before 4.1.149672.916 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler e... | [
"cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*"
] | null | null | null | 6.2 | null | cvelistv5 | |
GHSA-m6r5-7j38-6246 | A SQL Injection vulnerability was discovered in the normal-bwdates-reports-details.php file of PHPGurukul Park Ticketing Management System v2.0. This vulnerability allows remote attackers to execute arbitrary SQL code via the fromdate parameter in a POST request. | [] | null | 5.4 | null | null | null | github | |
ICSA-23-248-01 | Fujitsu Limited Real-time Video Transmission Gear "IP series" | The credentials of Fujitsu Limited Real-time Video Transmission Gear "IP series" for factory testing may be obtained by reverse engineering and other methods. | [] | null | null | 5.9 | null | null | csaf_cisa |
GHSA-w4jv-rg29-ff2w | A vulnerability was determined in Tenda FH451 1.0.0.9. Affected is the function sub_3C434 of the file /goform/AdvSetWan. This manipulation of the argument wanmode/PPPOEPassword causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized... | [] | 7.4 | 8.8 | null | null | null | github | |
CVE-2020-14542 | Vulnerability in the Oracle Solaris product of Oracle Systems (component: libsuri). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulner... | [
"cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*"
] | null | 3.3 | null | null | null | cvelistv5 | |
CVE-2019-18460 | An issue was discovered in GitLab Community and Enterprise Edition 8.15 through 12.4 in the Comments Search feature provided by the Elasticsearch integration. It has Incorrect Access Control. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 7.5 | null | 5 | null | cvelistv5 | |
CVE-2024-12158 | Popup – MailChimp, GetResponse and ActiveCampaign Intergrations <= 3.2.6 - Missing Authorization to Unauthenticated DB Table Truncation | The Popup – MailChimp, GetResponse and ActiveCampaign Intergrations plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'upc_delete_db_data' AJAX action in all versions up to, and including, 3.2.6. This makes it possible for unauthenticated attackers to delete the DB... | [] | null | 5.3 | null | null | null | cvelistv5 |
RHSA-2019:4254 | Red Hat Security Advisory: freetype security update | freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to crash freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.3 | null | null | csaf_redhat |
CVE-2017-17721 | CWEBNET/WOSummary/List in ZUUSE BEIMS ContractorWeb .NET 5.18.0.0 allows SQL injection via the tradestatus, assetno, assignto, building, domain, jobtype, site, trade, woType, workorderno, or workorderstatus parameter. | [
"cpe:2.3:a:zuuse:beims_contractorweb_.net:5.18.0.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null | cvelistv5 | |
GHSA-86jx-wr74-xr74 | Improper escaping in Apache Zeppelin | Improper Encoding or Escaping of Output vulnerability in Apache Zeppelin.The attackers can execute shell scripts or malicious code by overriding configuration like ZEPPELIN_INTP_CLASSPATH_OVERRIDES.
This issue affects Apache Zeppelin: from 0.8.2 before 0.11.1.Users are recommended to upgrade to version 0.11.1, which fi... | [] | 9.3 | 9.8 | null | null | null | github |
CVE-2021-23285 | Security issues in Eaton Intelligent Power Manager Infrastructure | Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) version 1.5.0plus205 and all prior versions are vulnerable to reflected Cross-site Scripting vulnerability. This issue affects: Eaton Intelligent Power Manager Infrastructure (IPM Infrastructure) all version 1.5.0plus205 and prior versions. | [
"cpe:2.3:a:eaton:intelligent_power_manager:*:*:*:*:*:*:*:*"
] | null | 3.1 | null | null | null | cvelistv5 |
CVE-2023-0558 | ContentStudio <= 1.2.5 - Authorization Bypass | The ContentStudio plugin for WordPress is vulnerable to authorization bypass due to an unsecure token check that is susceptible to type juggling in versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to execute functions intended for use by users with proper API keys. | [
"cpe:2.3:a:contentstudio:contentstudio:*:*:*:*:*:wordpress:*:*"
] | null | 8.2 | null | null | null | cvelistv5 |
GHSA-86q3-37rj-v3xg | EMC Data Protection Advisor before 5.8.1 places cleartext account credentials in the DPA configuration file in unspecified circumstances, which might allow local users to obtain sensitive information by reading this file. | [] | null | null | null | null | null | github | |
GHSA-rxg6-f53c-h5x3 | In the Linux kernel, the following vulnerability has been resolved:usb: dwc2: gadget: don't reset gadget's driver->busUDC driver should not touch gadget's driver internals, especially it
should not reset driver->bus. This wasn't harmful so far, but since
commit fc274c1e9973 ("USB: gadget: Add a new bus for gadgets") ga... | [] | null | 5.5 | null | null | null | github | |
CVE-2023-53828 | Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() | In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor()
KSAN reports use-after-free in hci_add_adv_monitor().
While adding an adv monitor,
hci_add_adv_monitor() calls ->
msft_add_monitor_pattern() calls ->
msft_add_mon... | [] | null | null | null | null | null | cvelistv5 |
CVE-2023-38622 | Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocat... | [
"cpe:2.3:a:tonybybell:gtkwave:3.3.115:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null | cvelistv5 | |
CVE-2022-2417 | Insufficient validation in GitLab CE/EE affecting all versions from 12.10 prior to 15.0.5, 15.1 prior to 15.1.4, and 15.2 prior to 15.2.1 allows an authenticated and authorised user to import a project that includes branch names which are 40 hexadecimal characters, which could be abused in supply chain attacks where a ... | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:15.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:15.2:*:*:*:community:*:*:*"
] | null | 6.2 | null | null | null | cvelistv5 | |
CVE-2017-0313 | All versions of NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) implementation of the SubmitCommandVirtual DDI (DxgkDdiSubmitCommandVirtual) where untrusted input is used to reference memory outside of the intended boundary of the buffer leading to denial of service or ... | [
"cpe:2.3:a:nvidia:gpu_driver:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null | cvelistv5 | |
CVE-2026-24056 | pnpm has symlink traversal in file:/git dependencies | pnpm is a package manager. Prior to version 10.28.2, when pnpm installs a `file:` (directory) or `git:` dependency, it follows symlinks and reads their target contents without constraining them to the package root. A malicious package containing a symlink to an absolute path (e.g., `/etc/passwd`, `~/.ssh/id_rsa`) cause... | [] | 6.7 | null | null | null | null | cvelistv5 |
GHSA-jpcg-4wg4-crmr | Foxit PDF Reader template Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malici... | [] | null | null | 7.8 | null | null | github | |
RHSA-2019:2950 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP3 security update | HTTP/2: 0-length headers lead to denial of service HTTP/2: request for large response leads to denial of service | [
"cpe:/a:redhat:jboss_core_services:1"
] | null | null | 7.5 | null | null | csaf_redhat |
CVE-2022-34192 | Jenkins ontrack Jenkins Plugin 4.0.0 and earlier does not escape the name of Ontrack: Multi Parameter choice, Ontrack: Parameter choice, and Ontrack: SingleParameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure per... | [
"cpe:2.3:a:jenkins:ontrack:*:*:*:*:*:jenkins:*:*"
] | null | 5.4 | null | 3.5 | null | cvelistv5 | |
GHSA-7jqc-c63x-gf5w | The WebDorado Contact Form Builder plugin before 1.0.69 for WordPress allows CSRF via the wp-admin/admin-ajax.php action parameter, with resultant local file inclusion via directory traversal, because there can be a discrepancy between the $_POST['action'] value and the $_GET['action'] value, and the latter is unsaniti... | [] | null | 8.8 | null | null | null | github | |
CVE-2023-24349 | D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSetRoute. | [
"cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null | cvelistv5 | |
GHSA-4cxp-5897-g22f | SQL Injection vulnerability in TDuckCloud v.5.1 allows a remote attacker to execute arbitrary code via the Add a file upload module | [] | null | 9.8 | null | null | null | github | |
CVE-2025-32546 | WordPress All push notification for WP Plugin <= 1.5.3 - CSRF to Reflected Cross Site Scripting (XSS) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in gtlwpdev All push notification for WP all-push-notification allows Reflected XSS.This issue affects All push notification for WP: from n/a through <= 1.5.3. | [] | null | null | null | null | null | cvelistv5 |
CVE-2013-1418 | The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request. | [
"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null | cvelistv5 | |
CVE-2025-10136 | TweetThis Shortcode <= 1.8.0 - Authenticated (Contributor+) Stored Cross-Site Scripting | The TweetThis Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tweetthis' shortcode in all versions up to, and including, 1.8.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with co... | [] | null | 6.4 | null | null | null | cvelistv5 |
GHSA-g8wx-wwr2-j96m | The uploadFile function in upload/index.php in CosCMS before 1.822 allows remote administrators to execute arbitrary commands via shell metacharacters in the name of an uploaded file. | [] | null | null | null | null | null | github |
This dataset comprises 691,196 real-world vulnerabilities used to train and evaluate VLAI, a transformer-based model designed to predict software vulnerability severity levels directly from text descriptions, enabling faster and more consistent triage.
The dataset is presented in the paper VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification.
| Source | Label | Entries | Share |
|---|---|---|---|
cvelistv5 |
CVE Program (enriched with vulnrichment and Fraunhofer FKIE) | 327,554 | 47.4% |
github |
GitHub Security Advisories | 327,181 | 47.3% |
csaf_redhat |
CSAF Red Hat | 23,529 | 3.4% |
csaf_cisa |
CSAF CISA | 5,799 | 0.8% |
csaf_cisco |
CSAF Cisco | 3,903 | 0.6% |
pysec |
PySec advisories | 3,230 | 0.5% |
Extracted from the database of Vulnerability-Lookup with the VulnTrain project. Dumps of the data are available here.
| Split | Examples |
|---|---|
| train | 622,076 |
| test | 69,120 |
| Field | Type | Description |
|---|---|---|
id |
string | Vulnerability identifier (e.g., CVE-2024-1234, GHSA-xxxx, PYSEC-2024-xxx) |
title |
string | Vulnerability title |
description |
string | Vulnerability description in English |
cpes |
list[string] | Common Platform Enumeration identifiers |
cvss_v4_0 |
float | CVSS v4.0 score |
cvss_v3_1 |
float | CVSS v3.1 score |
cvss_v3_0 |
float | CVSS v3.0 score |
cvss_v2_0 |
float | CVSS v2.0 score |
patch_commit_url |
string | URL to the patch commit on GitHub, if available |
source |
string | Data source identifier |
import json
from datasets import load_dataset
dataset = load_dataset("CIRCL/vulnerability-scores")
vulnerabilities = ["CVE-2012-2339", "RHSA-2023:5964", "GHSA-7chm-34j8-4f22", "PYSEC-2024-225"]
filtered_entries = dataset.filter(lambda elem: elem["id"] in vulnerabilities)
for entry in filtered_entries["train"]:
print(json.dumps(entry, indent=4))