Datasets:
cve_id stringlengths 13 16 | input_text stringlengths 158 4.12k | sector stringclasses 19
values | cross_border bool 2
classes | cvss_score float64 1.6 10 | base_severity stringclasses 4
values | contextual_severity stringclasses 4
values | label int64 0 3 | deployment_scale stringclasses 4
values | entity_type stringclasses 8
values |
|---|---|---|---|---|---|---|---|---|---|
CVE-2017-16320 | Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_sonos, at 0x9d01ddd4, the value for the `s_sonos_cmd` key is copied using `strcpy` to the buffer at `$sp+0x290`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow. [SEP] sector: waste_management cross_border: true score: 8.5 deployment_scale: small_business entity_type: cloud_provider | waste_management | true | 8.5 | High | High | 2 | small_business | cloud_provider |
CVE-2021-38957 | IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 could disclose sensitive information due to hazardous input validation during QR code generation. IBM X-Force ID: 212040. [SEP] sector: digital_providers cross_border: false score: 3.1 deployment_scale: enterprise entity_type: utility | digital_providers | false | 3.1 | Low | Low | 0 | enterprise | utility |
CVE-2024-26519 | An issue in Casa Systems NTC-221 version 2.0.99.0 and before allows a remote attacker to execute arbitrary code via a crafted payload to the /www/cgi-bin/nas.cgi component. [SEP] sector: ict_service_management cross_border: true score: 9.0 deployment_scale: critical_operator entity_type: bank | ict_service_management | true | 9 | Critical | Critical | 3 | critical_operator | bank |
CVE-2017-20097 | A vulnerability was found in WP-Filebase Download Manager Plugin 3.4.4. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting. The attack may be launched remotely. [SEP] sector: space cross_border: true score: 3.5 deployment_scale: individual entity_type: individual | space | true | 3.5 | Low | Low | 0 | individual | individual |
CVE-2024-20899 | Use of implicit intent for sensitive communication in RCS function in IMS service prior to SMR Jul-2024 Release 1 allows local attackers to get sensitive information. [SEP] sector: postal cross_border: false score: 4.0 deployment_scale: critical_operator entity_type: cloud_provider | postal | false | 4 | Medium | Medium | 1 | critical_operator | cloud_provider |
CVE-2022-49517 | In the Linux kernel, the following vulnerability has been resolved:
ASoC: mediatek: Fix missing of_node_put in mt2701_wm8960_machine_probe
This node pointer is returned by of_parse_phandle() with
refcount incremented in this function.
Calling of_node_put() to avoid the refcount leak. [SEP] sector: non_nis2 cross_border: false score: 5.5 deployment_scale: critical_operator entity_type: utility | non_nis2 | false | 5.5 | Medium | Medium | 1 | critical_operator | utility |
CVE-2020-1675 | When Security Assertion Markup Language (SAML) authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly process invalid authentication certificates which could allow a malicious network-based user to access unauthorized data. This issue affects all Juniper Networks Mist Cloud UI versions prior to September 2 2020. [SEP] sector: non_nis2 cross_border: true score: 8.3 deployment_scale: small_business entity_type: bank | non_nis2 | true | 8.3 | High | Critical | 3 | small_business | bank |
CVE-2026-1444 | A vulnerability has been found in iJason-Liu Books_Manager up to 298ba736387ca37810466349af13a0fdf828e99c. This affects an unknown part of the file controllers/books_center/add_book_check.php. Such manipulation of the argument mark leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. [SEP] sector: non_nis2 cross_border: false score: 2.4 deployment_scale: enterprise entity_type: utility | non_nis2 | false | 2.4 | Low | Low | 0 | enterprise | utility |
CVE-2023-31307 | Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service. [SEP] sector: public_administration cross_border: false score: 2.3 deployment_scale: critical_operator entity_type: cloud_provider | public_administration | false | 2.3 | Low | Medium | 1 | critical_operator | cloud_provider |
CVE-2024-44139 | The issue was addressed with improved checks. This issue is fixed in iOS 18 and iPadOS 18. An attacker with physical access may be able to access contacts from the lock screen. [SEP] sector: waste_management cross_border: true score: 2.4 deployment_scale: individual entity_type: sme | waste_management | true | 2.4 | Low | Low | 0 | individual | sme |
CVE-2024-21130 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). [SEP] sector: digital_infrastructure cross_border: true score: 4.9 deployment_scale: enterprise entity_type: sme | digital_infrastructure | true | 4.9 | Medium | Critical | 3 | enterprise | sme |
CVE-2022-44393 | Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/?page=services/view_service&id=. [SEP] sector: manufacturing cross_border: false score: 7.2 deployment_scale: critical_operator entity_type: msp | manufacturing | false | 7.2 | High | High | 2 | critical_operator | msp |
CVE-2023-32165 | D-Link D-View TftpReceiveFileHandler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of D-Link D-View. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the TftpReceiveFileHandler class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-19497. [SEP] sector: digital_providers cross_border: false score: 9.8 deployment_scale: individual entity_type: individual | digital_providers | false | 9.8 | Critical | Critical | 3 | individual | individual |
CVE-2025-1207 | A vulnerability was found in phjounin TFTPD64 4.64. It has been declared as problematic. This vulnerability affects unknown code of the component DNS Handler. The manipulation leads to denial of service. The attack needs to be done within the local network. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. [SEP] sector: space cross_border: false score: 3.1 deployment_scale: enterprise entity_type: sme | space | false | 3.1 | Low | Medium | 1 | enterprise | sme |
CVE-2023-49799 | `nuxt-api-party` is an open source module to proxy API requests. nuxt-api-party attempts to check if the user has passed an absolute URL to prevent the aforementioned attack. This has been recently changed to use the regular expression `^https?://`, however this regular expression can be bypassed by an absolute URL with leading whitespace. For example `\nhttps://whatever.com` which has a leading newline. According to the fetch specification, before a fetch is made the URL is normalized. "To normalize a byte sequence potentialValue, remove any leading and trailing HTTP whitespace bytes from potentialValue.". This means the final request will be normalized to `https://whatever.com` bypassing the check and nuxt-api-party will send a request outside of the whitelist. This could allow us to leak credentials or perform Server-Side Request Forgery (SSRF). This vulnerability has been addressed in version 0.22.1. Users are advised to upgrade. Users unable to upgrade should revert to the previous method of detecting absolute URLs. [SEP] sector: digital_infrastructure cross_border: true score: 7.5 deployment_scale: critical_operator entity_type: utility | digital_infrastructure | true | 7.5 | High | Critical | 3 | critical_operator | utility |
CVE-2024-1722 | A flaw was found in Keycloak. In certain conditions, this issue may allow a remote unauthenticated attacker to block other accounts from logging in. [SEP] sector: non_nis2 cross_border: true score: 3.7 deployment_scale: individual entity_type: utility | non_nis2 | true | 3.7 | Low | Medium | 1 | individual | utility |
CVE-2022-21443 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L). [SEP] sector: food cross_border: true score: 3.7 deployment_scale: critical_operator entity_type: cloud_provider | food | true | 3.7 | Low | Low | 0 | critical_operator | cloud_provider |
CVE-2025-32415 | In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used. [SEP] sector: non_nis2 cross_border: false score: 2.9 deployment_scale: small_business entity_type: bank | non_nis2 | false | 2.9 | Low | Low | 0 | small_business | bank |
CVE-2022-42412 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18324. [SEP] sector: digital_providers cross_border: false score: 3.3 deployment_scale: small_business entity_type: government | digital_providers | false | 3.3 | Low | Low | 0 | small_business | government |
CVE-2020-35787 | Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, D6200 before 1.1.00.36, D7000 before 1.0.1.70, EX6200v2 before 1.0.1.78, EX7000 before 1.0.1.78, EX8000 before 1.0.1.186, JR6150 before 1.0.1.18, PR2000 before 1.0.0.28, R6020 before 1.0.0.42, R6050 before 1.0.1.18, R6080 before 1.0.0.42, R6120 before 1.0.0.46, R6220 before 1.1.0.80, R6260 before 1.1.0.64, R6300v2 before 1.0.4.34, R6700 before 1.0.2.6, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R6900v2 before 1.2.0.36, R7000 before 1.0.9.42, R7000P before 1.3.1.64, R7800 before 1.0.2.60, R8900 before 1.0.4.12, R9000 before 1.0.4.12, and XR500 before 2.3.2.40. [SEP] sector: research cross_border: false score: 8.0 deployment_scale: enterprise entity_type: sme | research | false | 8 | High | High | 2 | enterprise | sme |
CVE-2021-25516 | An improper check or handling of exceptional conditions in Exynos baseband prior to SMR Dec-2021 Release 1 allows attackers to track locations. [SEP] sector: non_nis2 cross_border: true score: 6.4 deployment_scale: critical_operator entity_type: cloud_provider | non_nis2 | true | 6.4 | Medium | Medium | 1 | critical_operator | cloud_provider |
CVE-2026-25211 | Llama Stack (aka llama-stack) before 0.4.0rc3 does not censor the pgvector password in the initialization log. [SEP] sector: non_nis2 cross_border: false score: 3.2 deployment_scale: small_business entity_type: utility | non_nis2 | false | 3.2 | Low | Low | 0 | small_business | utility |
CVE-2020-1595 | <p>A remote code execution vulnerability exists in Microsoft SharePoint where APIs aren't properly protected from unsafe data input. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.</p>
<p>Exploitation of this vulnerability requires that a user access a susceptible API on an affected version of SharePoint with specially-formatted input.</p>
<p>The security update addresses the vulnerability by correcting how SharePoint handles deserialization of untrusted data.</p> [SEP] sector: manufacturing cross_border: true score: 9.9 deployment_scale: enterprise entity_type: msp | manufacturing | true | 9.9 | Critical | Critical | 3 | enterprise | msp |
CVE-2024-42012 | GRAU DATA Blocky before 3.1 stores passwords encrypted rather than hashed. At the login screen, the user's password is compared to the user's decrypted cleartext password. An attacker with Windows admin or debugging rights can therefore steal the user's Blocky password and from there impersonate that local user. [SEP] sector: non_nis2 cross_border: true score: 5.7 deployment_scale: critical_operator entity_type: cloud_provider | non_nis2 | true | 5.7 | Medium | Medium | 1 | critical_operator | cloud_provider |
CVE-2019-3801 | Cloud Foundry cf-deployment, versions prior to 7.9.0, contain java components that are using an insecure protocol to fetch dependencies when building. A remote unauthenticated malicious attacker could hijack the DNS entry for the dependency, and inject malicious code into the component. [SEP] sector: financial_market cross_border: true score: 8.7 deployment_scale: individual entity_type: sme | financial_market | true | 8.7 | High | High | 2 | individual | sme |
CVE-2023-52771 | In the Linux kernel, the following vulnerability has been resolved:
cxl/port: Fix delete_endpoint() vs parent unregistration race
The CXL subsystem, at cxl_mem ->probe() time, establishes a lineage of
ports (struct cxl_port objects) between an endpoint and the root of a
CXL topology. Each port including the endpoint port is attached to the
cxl_port driver.
Given that setup, it follows that when either any port in that lineage
goes through a cxl_port ->remove() event, or the memdev goes through a
cxl_mem ->remove() event. The hierarchy below the removed port, or the
entire hierarchy if the memdev is removed needs to come down.
The delete_endpoint() callback is careful to check whether it is being
called to tear down the hierarchy, or if it is only being called to
teardown the memdev because an ancestor port is going through
->remove().
That care needs to take the device_lock() of the endpoint's parent.
Which requires 2 bugs to be fixed:
1/ A reference on the parent is needed to prevent use-after-free
scenarios like this signature:
BUG: spinlock bad magic on CPU#0, kworker/u56:0/11
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS edk2-20230524-3.fc38 05/24/2023
Workqueue: cxl_port detach_memdev [cxl_core]
RIP: 0010:spin_bug+0x65/0xa0
Call Trace:
do_raw_spin_lock+0x69/0xa0
__mutex_lock+0x695/0xb80
delete_endpoint+0xad/0x150 [cxl_core]
devres_release_all+0xb8/0x110
device_unbind_cleanup+0xe/0x70
device_release_driver_internal+0x1d2/0x210
detach_memdev+0x15/0x20 [cxl_core]
process_one_work+0x1e3/0x4c0
worker_thread+0x1dd/0x3d0
2/ In the case of RCH topologies, the parent device that needs to be
locked is not always @port->dev as returned by cxl_mem_find_port(), use
endpoint->dev.parent instead. [SEP] sector: non_nis2 cross_border: true score: 4.4 deployment_scale: small_business entity_type: sme | non_nis2 | true | 4.4 | Medium | Medium | 1 | small_business | sme |
CVE-2020-15707 | Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions. [SEP] sector: ict_service_management cross_border: true score: 5.7 deployment_scale: enterprise entity_type: individual | ict_service_management | true | 5.7 | Medium | High | 2 | enterprise | individual |
CVE-2025-64244 | Missing Authorization vulnerability in Codexpert, Inc Restrict Elementor Widgets, Columns and Sections restrict-elementor-widgets allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Restrict Elementor Widgets, Columns and Sections: from n/a through <= 1.12. [SEP] sector: postal cross_border: true score: 4.3 deployment_scale: critical_operator entity_type: msp | postal | true | 4.3 | Medium | Medium | 1 | critical_operator | msp |
CVE-2023-26009 | Improper Privilege Management vulnerability in Favethemes Houzez Login Register allows Privilege Escalation.This issue affects Houzez Login Register: from n/a through 2.6.3. [SEP] sector: chemicals cross_border: true score: 9.8 deployment_scale: individual entity_type: bank | chemicals | true | 9.8 | Critical | Critical | 3 | individual | bank |
CVE-2021-23362 | The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity. [SEP] sector: public_administration cross_border: true score: 5.3 deployment_scale: critical_operator entity_type: bank | public_administration | true | 5.3 | Medium | High | 2 | critical_operator | bank |
CVE-2023-31939 | SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the costomer_id parameter at customer_edit.php. [SEP] sector: ict_service_management cross_border: true score: 7.2 deployment_scale: critical_operator entity_type: government | ict_service_management | true | 7.2 | High | Critical | 3 | critical_operator | government |
CVE-2022-41659 | Improper access control for some Intel Unison software may allow a privileged user to potentially enable denial of service via local access. [SEP] sector: waste_management cross_border: true score: 1.9 deployment_scale: individual entity_type: individual | waste_management | true | 1.9 | Low | Medium | 1 | individual | individual |
CVE-2022-21210 | An SQL injection vulnerability exists in the AssetActions.aspx functionality of Lansweeper lansweeper 9.1.20.2. A specially-crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. [SEP] sector: postal cross_border: true score: 6.6 deployment_scale: critical_operator entity_type: sme | postal | true | 6.6 | Medium | Medium | 1 | critical_operator | sme |
CVE-2018-6686 | Authentication Bypass vulnerability in TPM autoboot in McAfee Drive Encryption (MDE) 7.1.0 and above allows physically proximate attackers to bypass local security protection via specific set of circumstances. [SEP] sector: non_nis2 cross_border: true score: 7.0 deployment_scale: small_business entity_type: hospital | non_nis2 | true | 7 | High | Critical | 3 | small_business | hospital |
CVE-2025-1215 | A vulnerability classified as problematic was found in vim up to 9.1.1096. This vulnerability affects unknown code of the file src/main.c. The manipulation of the argument --log leads to memory corruption. It is possible to launch the attack on the local host. Upgrading to version 9.1.1097 is able to address this issue. The patch is identified as c5654b84480822817bb7b69ebc97c174c91185e9. It is recommended to upgrade the affected component. [SEP] sector: non_nis2 cross_border: false score: 2.8 deployment_scale: critical_operator entity_type: hospital | non_nis2 | false | 2.8 | Low | Low | 0 | critical_operator | hospital |
CVE-2017-18790 | Certain NETGEAR devices are affected by disclosure of sensitive information. This affects R6700 before 1.0.1.26, R7000 before 1.0.9.10, R7100LG before 1.0.0.32, R7900 before 1.0.1.18, R8000 before 1.0.3.54, and R8500 before 1.0.2.100. [SEP] sector: research cross_border: true score: 6.2 deployment_scale: small_business entity_type: hospital | research | true | 6.2 | Medium | High | 2 | small_business | hospital |
CVE-2024-27242 | Cross site scripting in Zoom Desktop Client for Linux before version 5.17.10 may allow an authenticated user to conduct a denial of service via network access. [SEP] sector: banking cross_border: false score: 4.1 deployment_scale: critical_operator entity_type: bank | banking | false | 4.1 | Medium | High | 2 | critical_operator | bank |
CVE-2021-21915 | An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at ‘company_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. [SEP] sector: chemicals cross_border: true score: 7.7 deployment_scale: critical_operator entity_type: cloud_provider | chemicals | true | 7.7 | High | Critical | 3 | critical_operator | cloud_provider |
CVE-2024-12983 | A vulnerability classified as problematic has been found in code-projects Hospital Management System 1.0. This affects an unknown part of the file /hospital/hms/admin/manage-doctors.php of the component Edit Doctor Details Page. The manipulation of the argument Doctor Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. [SEP] sector: drinking_water cross_border: true score: 2.4 deployment_scale: critical_operator entity_type: bank | drinking_water | true | 2.4 | Low | Medium | 1 | critical_operator | bank |
CVE-2024-26049 | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. [SEP] sector: non_nis2 cross_border: false score: 4.8 deployment_scale: individual entity_type: utility | non_nis2 | false | 4.8 | Medium | Medium | 1 | individual | utility |
CVE-2023-35901 | IBM Robotic Process Automation 21.0.0 through 21.0.7.6 and 23.0.0 through 23.0.6 is vulnerable to client side validation bypass which could allow invalid changes or values in some fields. IBM X-Force ID: 259380. [SEP] sector: chemicals cross_border: true score: 2.7 deployment_scale: individual entity_type: sme | chemicals | true | 2.7 | Low | Low | 0 | individual | sme |
CVE-2024-11053 | When asked to both use a `.netrc` file for credentials and to follow HTTP
redirects, curl could leak the password used for the first host to the
followed-to host under certain circumstances.
This flaw only manifests itself if the netrc file has an entry that matches
the redirect target hostname but the entry either omits just the password or
omits both login and password. [SEP] sector: non_nis2 cross_border: true score: 3.4 deployment_scale: critical_operator entity_type: msp | non_nis2 | true | 3.4 | Low | Low | 0 | critical_operator | msp |
CVE-2025-25595 | A lack of rate limiting in the login page of Safe App version a3.0.9 allows attackers to bypass authentication via a brute force attack. [SEP] sector: food cross_border: true score: 9.8 deployment_scale: enterprise entity_type: government | food | true | 9.8 | Critical | Critical | 3 | enterprise | government |
CVE-2022-1720 | Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution. [SEP] sector: digital_infrastructure cross_border: false score: 6.6 deployment_scale: small_business entity_type: sme | digital_infrastructure | false | 6.6 | Medium | High | 2 | small_business | sme |
CVE-2025-9720 | A vulnerability was detected in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /module/TabelaArredondamento/edit of the component Cadastrar tabela de arredondamento Page. The manipulation of the argument Nome results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. [SEP] sector: non_nis2 cross_border: true score: 3.5 deployment_scale: critical_operator entity_type: government | non_nis2 | true | 3.5 | Low | Medium | 1 | critical_operator | government |
CVE-2025-50103 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 9.0.0-9.3.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). [SEP] sector: chemicals cross_border: false score: 4.4 deployment_scale: individual entity_type: utility | chemicals | false | 4.4 | Medium | Medium | 1 | individual | utility |
CVE-2021-22260 | A stored Cross-Site Scripting vulnerability in the DataDog integration in all versions of GitLab CE/EE starting from 13.7 before 14.0.9, all versions starting from 14.1 before 14.1.4, and all versions starting from 14.2 before 14.2.2 allows an attacker to execute arbitrary JavaScript code on the victim's behalf [SEP] sector: waste_water cross_border: true score: 7.7 deployment_scale: critical_operator entity_type: sme | waste_water | true | 7.7 | High | High | 2 | critical_operator | sme |
CVE-2022-26308 | Pandora FMS v7.0NG.760 and below allows an improper access control in Configuration (Credential store) where a user with the role of Operator (Write) could create, delete, view existing keys which are outside the intended role. [SEP] sector: non_nis2 cross_border: false score: 3.7 deployment_scale: critical_operator entity_type: bank | non_nis2 | false | 3.7 | Low | Low | 0 | critical_operator | bank |
CVE-2025-55708 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ExpressTech Systems Quiz And Survey Master allows SQL Injection. This issue affects Quiz And Survey Master: from n/a through 10.2.4. [SEP] sector: waste_management cross_border: false score: 8.5 deployment_scale: critical_operator entity_type: hospital | waste_management | false | 8.5 | High | High | 2 | critical_operator | hospital |
CVE-2022-31810 | A vulnerability has been identified in SiPass integrated (All versions < V2.90.3.8). Affected server applications improperly check the size of data packets received for the configuration client login, causing a stack-based buffer overflow.
This could allow an unauthenticated remote attacker to crash the server application, creating a denial of service condition. [SEP] sector: health cross_border: false score: 7.5 deployment_scale: individual entity_type: utility | health | false | 7.5 | High | Critical | 3 | individual | utility |
CVE-2022-49591 | In the Linux kernel, the following vulnerability has been resolved:
net: dsa: microchip: ksz_common: Fix refcount leak bug
In ksz_switch_register(), we should call of_node_put() for the
reference returned by of_get_child_by_name() which has increased
the refcount. [SEP] sector: non_nis2 cross_border: true score: 5.5 deployment_scale: critical_operator entity_type: individual | non_nis2 | true | 5.5 | Medium | Medium | 1 | critical_operator | individual |
CVE-2023-2360 | Sensitive information disclosure due to CORS misconfiguration. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.2.0-135. [SEP] sector: energy cross_border: true score: 3.1 deployment_scale: critical_operator entity_type: hospital | energy | true | 3.1 | Low | Low | 0 | critical_operator | hospital |
CVE-2025-6601 | GitLab has remediated an issue in GitLab EE affecting all versions from 18.4 before 18.4.3, and 18.5 before 18.5.1 that under certain conditions could have allowed authenticated users to gain unauthorized project access by exploiting the access request approval workflow. [SEP] sector: financial_market cross_border: false score: 2.7 deployment_scale: small_business entity_type: utility | financial_market | false | 2.7 | Low | Low | 0 | small_business | utility |
CVE-2024-8911 | The LatePoint plugin for WordPress is vulnerable to Arbitrary User Password Change via SQL Injection in versions up to, and including, 5.0.11. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts. Note that changing a WordPress user's password is only possible if the "Use WordPress users as customers" setting is enabled, which is disabled by default. Without this setting enabled, only the passwords of plugin customers, which are stored and managed in a separate database table, can be modified. [SEP] sector: postal cross_border: false score: 9.8 deployment_scale: enterprise entity_type: individual | postal | false | 9.8 | Critical | Critical | 3 | enterprise | individual |
CVE-2023-40500 | LG Simple Editor copyContent Exposed Dangerous Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the implementation of the copyContent command. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.
. Was ZDI-CAN-19944. [SEP] sector: energy cross_border: true score: 9.8 deployment_scale: small_business entity_type: cloud_provider | energy | true | 9.8 | Critical | Critical | 3 | small_business | cloud_provider |
CVE-2026-3170 | A vulnerability was detected in SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0. Affected is an unknown function of the file /patient-search.php. The manipulation of the argument First Name/Last Name results in cross site scripting. The attack can be executed remotely. The exploit is now public and may be used. [SEP] sector: drinking_water cross_border: true score: 2.4 deployment_scale: small_business entity_type: msp | drinking_water | true | 2.4 | Low | Low | 0 | small_business | msp |
CVE-2019-4103 | IBM Tivoli Netcool/Impact 7.1.0 allows for remote execution of command by low privileged User. Remote code execution allow to execute arbitrary code on system which lead to take control over the system. IBM X-Force ID: 158094. [SEP] sector: drinking_water cross_border: false score: 8.0 deployment_scale: enterprise entity_type: utility | drinking_water | false | 8 | High | High | 2 | enterprise | utility |
CVE-2021-3757 | immer is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') [SEP] sector: space cross_border: false score: 7.5 deployment_scale: critical_operator entity_type: government | space | false | 7.5 | High | Critical | 3 | critical_operator | government |
CVE-2021-43052 | The Realm Server component of TIBCO Software Inc.'s TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, and TIBCO FTL - Enterprise Edition contains an easily exploitable vulnerability that allows authentication bypass due to a hard coded secret used in the default realm server of the affected system. Affected releases are TIBCO Software Inc.'s TIBCO FTL - Community Edition: versions 6.7.2 and below, TIBCO FTL - Developer Edition: versions 6.7.2 and below, and TIBCO FTL - Enterprise Edition: versions 6.7.2 and below. [SEP] sector: energy cross_border: true score: 9.3 deployment_scale: enterprise entity_type: hospital | energy | true | 9.3 | Critical | Critical | 3 | enterprise | hospital |
CVE-2019-18276 | An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected. [SEP] sector: non_nis2 cross_border: true score: 7.8 deployment_scale: critical_operator entity_type: government | non_nis2 | true | 7.8 | High | High | 2 | critical_operator | government |
CVE-2020-24435 | Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a heap-based buffer overflow vulnerability in the submitForm function, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .pdf file in Acrobat Reader. [SEP] sector: non_nis2 cross_border: false score: 7.8 deployment_scale: enterprise entity_type: hospital | non_nis2 | false | 7.8 | High | High | 2 | enterprise | hospital |
CVE-2022-30728 | Information exposure vulnerability in ScanPool prior to SMR Jun-2022 Release 1 allows local attackers to get MAC address information. [SEP] sector: research cross_border: false score: 1.9 deployment_scale: critical_operator entity_type: government | research | false | 1.9 | Low | Low | 0 | critical_operator | government |
CVE-2022-46676 | Wyse Management Suite 3.8 and below contain an improper access control vulnerability. A malicious admin user can disable or delete users under administration and unassigned admins for which the group admin is not authorized. [SEP] sector: non_nis2 cross_border: false score: 4.9 deployment_scale: small_business entity_type: cloud_provider | non_nis2 | false | 4.9 | Medium | Medium | 1 | small_business | cloud_provider |
CVE-2020-10902 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.1.29511. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-10462. [SEP] sector: health cross_border: true score: 7.8 deployment_scale: critical_operator entity_type: individual | health | true | 7.8 | High | Critical | 3 | critical_operator | individual |
CVE-2024-4648 | A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /view/student_exam_mark_update_form.php. The manipulation of the argument std_index leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263492. [SEP] sector: digital_providers cross_border: false score: 3.5 deployment_scale: enterprise entity_type: hospital | digital_providers | false | 3.5 | Low | Low | 0 | enterprise | hospital |
CVE-2025-3795 | A vulnerability was found in DaiCuo 1.3.13. It has been rated as problematic. Affected by this issue is some unknown functionality of the component SEO Optimization Settings Section. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. [SEP] sector: non_nis2 cross_border: false score: 2.4 deployment_scale: individual entity_type: sme | non_nis2 | false | 2.4 | Low | Low | 0 | individual | sme |
CVE-2022-20595 | In getWpcAuthChallengeResponse of WirelessCharger.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239700137References: N/A [SEP] sector: non_nis2 cross_border: true score: 4.4 deployment_scale: critical_operator entity_type: cloud_provider | non_nis2 | true | 4.4 | Medium | High | 2 | critical_operator | cloud_provider |
CVE-2023-43526 | Memory corruption while querying module parameters from Listen Sound model client in kernel from user space. [SEP] sector: space cross_border: false score: 6.7 deployment_scale: small_business entity_type: individual | space | false | 6.7 | Medium | High | 2 | small_business | individual |
CVE-2021-4428 | A vulnerability has been found in what3words Autosuggest Plugin up to 4.0.0 on WordPress and classified as problematic. Affected by this vulnerability is the function enqueue_scripts of the file w3w-autosuggest/public/class-w3w-autosuggest-public.php of the component Setting Handler. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 4.0.1 is able to address this issue. The patch is named dd59cbac5f86057d6a73b87007c08b8bfa0c32ac. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-234247. [SEP] sector: energy cross_border: false score: 2.7 deployment_scale: small_business entity_type: msp | energy | false | 2.7 | Low | Low | 0 | small_business | msp |
CVE-2026-1326 | A weakness has been identified in Totolink NR1800X 9.1.0u.6279_B20210910. This vulnerability affects the function setWanCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. This manipulation of the argument Hostname causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. [SEP] sector: digital_infrastructure cross_border: true score: 6.3 deployment_scale: small_business entity_type: utility | digital_infrastructure | true | 6.3 | Medium | Medium | 1 | small_business | utility |
CVE-2020-36248 | The ownCloud application before 2.15 for Android allows attackers to use adb to include a PIN preferences value in a backup archive, and consequently bypass the PIN lock feature by restoring from this archive. [SEP] sector: non_nis2 cross_border: false score: 3.9 deployment_scale: critical_operator entity_type: cloud_provider | non_nis2 | false | 3.9 | Low | Low | 0 | critical_operator | cloud_provider |
CVE-2022-48426 | In JetBrains TeamCity before 2022.10.3 stored XSS in Perforce connection settings was possible [SEP] sector: public_administration cross_border: false score: 4.6 deployment_scale: small_business entity_type: sme | public_administration | false | 4.6 | Medium | Medium | 1 | small_business | sme |
CVE-2019-12591 | NETGEAR Insight Cloud with firmware before Insight 5.6 allows remote authenticated users to achieve command injection. [SEP] sector: non_nis2 cross_border: false score: 6.8 deployment_scale: enterprise entity_type: individual | non_nis2 | false | 6.8 | Medium | Medium | 1 | enterprise | individual |
CVE-2024-38734 | Unrestricted Upload of File with Dangerous Type vulnerability in SpreadsheetConverter Import Spreadsheets from Microsoft Excel allows Code Injection.This issue affects Import Spreadsheets from Microsoft Excel: from n/a through 10.1.4. [SEP] sector: non_nis2 cross_border: true score: 9.1 deployment_scale: enterprise entity_type: individual | non_nis2 | true | 9.1 | Critical | Critical | 3 | enterprise | individual |
CVE-2023-22601 | InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-330: Use of Insufficiently Random Values. They do not properly randomize MQTT ClientID parameters. An unauthorized user could calculate this parameter and use it to gather additional information about other InHand devices managed on the same cloud platform. [SEP] sector: digital_infrastructure cross_border: true score: 10.0 deployment_scale: individual entity_type: hospital | digital_infrastructure | true | 10 | Critical | Critical | 3 | individual | hospital |
CVE-2024-8590 | A maliciously crafted 3DM file when parsed in atf_api.dll through Autodesk AutoCAD can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process. [SEP] sector: drinking_water cross_border: false score: 7.8 deployment_scale: critical_operator entity_type: individual | drinking_water | false | 7.8 | High | Critical | 3 | critical_operator | individual |
CVE-2023-29086 | An issue was discovered in Samsung Exynos Mobile Processor, Automotive Processor and Modem for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, Exynos 9110, and Exynos Auto T5123. Memory corruption can occur due to insufficient parameter validation while decoding an SIP Min-SE header. [SEP] sector: space cross_border: false score: 6.8 deployment_scale: critical_operator entity_type: utility | space | false | 6.8 | Medium | High | 2 | critical_operator | utility |
CVE-2023-27162 | openapi-generator up to v6.4.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/gen/clients/{language}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request. [SEP] sector: research cross_border: false score: 9.1 deployment_scale: individual entity_type: msp | research | false | 9.1 | Critical | Critical | 3 | individual | msp |
CVE-2025-25813 | SeaCMS v13.3 was discovered to contain a remote code execution (RCE) vulnerability via the component admin_files.php. [SEP] sector: non_nis2 cross_border: false score: 5.1 deployment_scale: critical_operator entity_type: government | non_nis2 | false | 5.1 | Medium | Medium | 1 | critical_operator | government |
CVE-2024-24780 | Remote Code Execution with untrusted URI of UDF vulnerability in Apache IoTDB. The attacker who has privilege to create UDF can register malicious function from untrusted URI.
This issue affects Apache IoTDB: from 1.0.0 before 1.3.4.
Users are recommended to upgrade to version 1.3.4, which fixes the issue. [SEP] sector: ict_service_management cross_border: true score: 9.8 deployment_scale: individual entity_type: msp | ict_service_management | true | 9.8 | Critical | Critical | 3 | individual | msp |
CVE-2026-2831 | The MailArchiver plugin for WordPress is vulnerable to SQL Injection via the ‘logid’ parameter in all versions up to, and including, 4.5.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. [SEP] sector: digital_providers cross_border: true score: 4.9 deployment_scale: small_business entity_type: msp | digital_providers | true | 4.9 | Medium | High | 2 | small_business | msp |
CVE-2019-25514 | Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows attackers to inject malicious SQL commands through the kelime parameter in POST requests. Attackers can manipulate the kelime parameter with UNION-based SQL injection payloads to extract sensitive data from the database or bypass authentication controls. [SEP] sector: health cross_border: true score: 8.2 deployment_scale: individual entity_type: bank | health | true | 8.2 | High | Critical | 3 | individual | bank |
CVE-2023-43043 | IBM Maximo Application Suite - Maximo Mobile for EAM 8.10 and 8.11 could disclose sensitive information to a local user. IBM X-Force ID: 266875. [SEP] sector: financial_market cross_border: true score: 5.1 deployment_scale: individual entity_type: msp | financial_market | true | 5.1 | Medium | High | 2 | individual | msp |
CVE-2023-2527 | The Integration for Contact Form 7 and Zoho CRM, Bigin WordPress plugin before 1.2.4 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin [SEP] sector: non_nis2 cross_border: false score: 4.8 deployment_scale: individual entity_type: utility | non_nis2 | false | 4.8 | Medium | Medium | 1 | individual | utility |
CVE-2023-0972 | Description: A vulnerability in SiLabs Z/IP Gateway 7.18.01 and earlier allows an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution. [SEP] sector: postal cross_border: true score: 9.6 deployment_scale: small_business entity_type: bank | postal | true | 9.6 | Critical | Critical | 3 | small_business | bank |
CVE-2024-56250 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in GregRoss Just Writing Statistics allows SQL Injection.This issue affects Just Writing Statistics: from n/a through 4.7. [SEP] sector: digital_providers cross_border: false score: 7.6 deployment_scale: enterprise entity_type: utility | digital_providers | false | 7.6 | High | High | 2 | enterprise | utility |
CVE-2024-42333 | The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c [SEP] sector: non_nis2 cross_border: false score: 2.7 deployment_scale: individual entity_type: government | non_nis2 | false | 2.7 | Low | Low | 0 | individual | government |
CVE-2026-22688 | WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.5, there is a command injection vulnerability that allows authenticated users to inject stdio_config.command/args into MCP stdio settings, causing the server to execute subprocesses using these injected values. This issue has been patched in version 0.2.5. [SEP] sector: space cross_border: true score: 10.0 deployment_scale: small_business entity_type: government | space | true | 10 | Critical | Critical | 3 | small_business | government |
CVE-2025-14651 | A vulnerability has been found in MartialBE one-hub up to 0.14.27. This vulnerability affects unknown code of the file docker-compose.yml. The manipulation of the argument SESSION_SECRET leads to use of hard-coded cryptographic key
. The attack may be initiated remotely. The complexity of an attack is rather high. It is stated that the exploitability is difficult. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. The code maintainer recommends (translated from Chinese): "The default docker-compose example file is not recommended for production use. If you intend to use it in production, please carefully check and modify every configuration and environment variable yourself!" [SEP] sector: research cross_border: false score: 3.7 deployment_scale: small_business entity_type: cloud_provider | research | false | 3.7 | Low | Low | 0 | small_business | cloud_provider |
CVE-2025-20234 | A vulnerability in Universal Disk Format (UDF) processing of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to a memory overread during UDF file scanning. An attacker could exploit this vulnerability by submitting a crafted file containing UDF content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software.
For a description of this vulnerability, see the . [SEP] sector: non_nis2 cross_border: false score: 5.3 deployment_scale: enterprise entity_type: sme | non_nis2 | false | 5.3 | Medium | Medium | 1 | enterprise | sme |
CVE-2021-30661 | A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.1, iOS 12.5.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. [SEP] sector: health cross_border: false score: 8.8 deployment_scale: enterprise entity_type: msp | health | false | 8.8 | High | Critical | 3 | enterprise | msp |
CVE-2024-2317 | A vulnerability was found in Bdtask Hospital AutoManager up to 20240227 and classified as problematic. This issue affects some unknown processing of the file /prescription/prescription/delete/ of the component Prescription Page. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256271. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. [SEP] sector: digital_infrastructure cross_border: false score: 3.8 deployment_scale: critical_operator entity_type: sme | digital_infrastructure | false | 3.8 | Low | Low | 0 | critical_operator | sme |
CVE-2025-23118 | An Improper Certificate Validation vulnerability could allow an authenticated malicious actor with access to UniFi Protect Cameras adjacent network to make unsupported changes to the camera system. [SEP] sector: public_administration cross_border: true score: 6.4 deployment_scale: individual entity_type: individual | public_administration | true | 6.4 | Medium | High | 2 | individual | individual |
CVE-2023-38521 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Exifography plugin <= 1.3.1 versions. [SEP] sector: non_nis2 cross_border: false score: 5.9 deployment_scale: small_business entity_type: individual | non_nis2 | false | 5.9 | Medium | Medium | 1 | small_business | individual |
CVE-2024-7916 | A vulnerability classified as problematic was found in nafisulbari/itsourcecode Insurance Management System 1.0. Affected by this vulnerability is an unknown functionality of the file addNominee.php of the component Add Nominee Page. The manipulation of the argument Nominee-Client ID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. [SEP] sector: non_nis2 cross_border: false score: 3.5 deployment_scale: individual entity_type: sme | non_nis2 | false | 3.5 | Low | Low | 0 | individual | sme |
CVE-2023-31756 | A command injection vulnerability exists in the administrative web portal in TP-Link Archer VR1600V devices running firmware Versions <= 0.1.0. 0.9.1 v5006.0 Build 220518 Rel.32480n which allows remote attackers, authenticated to the administrative web portal as an administrator user to open an operating system level shell via the 'X_TP_IfName' parameter. [SEP] sector: postal cross_border: false score: 6.7 deployment_scale: individual entity_type: sme | postal | false | 6.7 | Medium | Medium | 1 | individual | sme |
CVE-2022-44455 | The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash. [SEP] sector: public_administration cross_border: false score: 6.8 deployment_scale: individual entity_type: sme | public_administration | false | 6.8 | Medium | High | 2 | individual | sme |
CVE-2025-9422 | A vulnerability was found in oitcode samarium up to 0.9.6. This impacts an unknown function of the file /dashboard/team of the component Team Image Handler. The manipulation results in cross site scripting. The attack may be launched remotely. The exploit has been made public and could be used. [SEP] sector: non_nis2 cross_border: false score: 2.4 deployment_scale: individual entity_type: cloud_provider | non_nis2 | false | 2.4 | Low | Low | 0 | individual | cloud_provider |
CVE-2018-25146 | Microhard Systems IPn4G 1.1.0 contains an undocumented vulnerability that allows authenticated attackers to list and manipulate running system processes. Attackers can send arbitrary signals to kill background processes and system services through a hidden feature, potentially causing service disruption and requiring device restart. [SEP] sector: health cross_border: true score: 8.1 deployment_scale: critical_operator entity_type: individual | health | true | 8.1 | High | Critical | 3 | critical_operator | individual |
CVE-2013-10021 | A vulnerability was found in dd32 Debug Bar Plugin up to 0.8 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function render of the file panels/class-debug-bar-queries.php. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.8.1 is able to address this issue. The patch is named 0842af8f8a556bc3e39b9ef758173b0a8a9ccbfc. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222739. [SEP] sector: non_nis2 cross_border: false score: 3.5 deployment_scale: critical_operator entity_type: government | non_nis2 | false | 3.5 | Low | Low | 0 | critical_operator | government |
End of preview. Expand in Data Studio
CyberScale Contextual Severity Training Data
Training dataset for the CyberScale contextual severity classifier (Phase 2). Contains 32,000 scenarios combining CVE descriptions with NIS2 sector deployment contexts and cross-border exposure.
Schema
| Column | Type | Description |
|---|---|---|
input_text |
string | Formatted input: <description> [SEP] sector: <id> cross_border: <bool> score: <float> |
label |
int | Severity class (0-3) |
sector |
string | NIS2 sector identifier |
cross_border |
bool | Cross-border exposure |
cvss_score |
float | CVSS v3.x base score |
base_severity |
string | CVSS-derived severity |
contextual_severity |
string | Context-adjusted severity |
Class Distribution
| Label | Name | Count |
|---|---|---|
| 0 | Low | 8,000 |
| 1 | Medium | 8,000 |
| 2 | High | 8,000 |
| 3 | Critical | 8,000 |
Citation
Part of the CyberScale project — multi-phase cyber severity assessment MCP server.
- Downloads last month
- 16
Source:
Parametrically generated from CVEs x 19 NIS2 sectors x cross-border conditions
Generation:
data/reference/sector_severity_rules.json
Labels:
4-class (Low=0, Medium=1, High=2, Critical=3)
Size of downloaded dataset files:
18.5 MB
Size of the auto-converted Parquet files:
7.95 MB
Number of rows:
32,000