Dataset Viewer
Auto-converted to Parquet
instruction
stringlengths
55
56
inputs
stringclasses
1 value
outputs
stringlengths
86
4.06k
Please provide detailed information about CVE-2020-13909
CVE:CVE-2020-13909 Description:The Ignition component before 2.0.5 for Laravel mishandles globals, _get, _post, _cookie, and _env. NOTE: in the 1.x series, versions 1.16.15 and later are unaffected as a consequence of the CVE-2021-43996 fix. published:2020-06-07T20:15:10.140
Please provide detailed information about CVE-2021-3002
CVE:CVE-2021-3002 Description:Seo Panel 4.8.0 allows reflected XSS via the seo/seopanel/login.php?sec=forgot email parameter. published:2021-01-01T19:15:11.077
Please provide detailed information about CVE-2021-3004
CVE:CVE-2021-3004 Description:The _deposit function in the smart contract implementation for Stable Yield Credit (yCREDIT), an Ethereum token, has certain incorrect calculations. An attacker can obtain more yCREDIT tokens than they should. published:2021-01-03T04:15:12.263
Please provide detailed information about CVE-2021-3005
CVE:CVE-2021-3005 Description:MK-AUTH through 19.01 K4.9 allows remote attackers to obtain sensitive information (e.g., a CPF number) via a modified titulo (aka invoice number) value to the central/recibo.php URI. published:2021-01-03T04:15:12.310
Please provide detailed information about CVE-2021-3006
CVE:CVE-2021-3006 Description:The breed function in the smart contract implementation for Farm in Seal Finance (Seal), an Ethereum token, lacks access control and thus allows price manipulation, as exploited in the wild in December 2020 and January 2021. published:2021-01-03T06:15:12.067
Please provide detailed information about CVE-2021-21494
CVE:CVE-2021-21494 Description:MK-AUTH through 19.01 K4.9 allows XSS via the admin/logs_ajax.php tipo parameter. An attacker can leverage this to read the centralmka2 (session token) cookie, which is not set to HTTPOnly. published:2021-01-04T03:15:13.387
Please provide detailed information about CVE-2021-21495
CVE:CVE-2021-21495 Description:MK-AUTH through 19.01 K4.9 allows CSRF for password changes via the central/executar_central.php?acao=altsenha_princ URI. published:2021-01-04T03:15:13.480
Please provide detailed information about CVE-2021-3007
CVE:CVE-2021-3007 Description:Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized published:2021-01-04T03:15:13.527
Please provide detailed information about CVE-2021-3014
CVE:CVE-2021-3014 Description:In MikroTik RouterOS through 2021-01-04, the hotspot login page is vulnerable to reflected XSS via the target parameter. published:2021-01-04T19:15:15.390
Please provide detailed information about CVE-2021-3018
CVE:CVE-2021-3018 Description:ipeak Infosystems ibexwebCMS (aka IPeakCMS) 3.5 is vulnerable to an unauthenticated Boolean-based SQL injection via the id parameter on the /cms/print.php page. published:2021-01-05T05:15:10.813
Please provide detailed information about CVE-2021-3019
CVE:CVE-2021-3019 Description:ffay lanproxy 0.1 allows Directory Traversal to read /../conf/config.properties to obtain credentials for a connection to the intranet. published:2021-01-05T05:15:10.907
Please provide detailed information about CVE-2021-3021
CVE:CVE-2021-3021 Description:ISPConfig before 3.2.2 allows SQL injection. published:2021-01-05T16:15:15.937
Please provide detailed information about CVE-2021-21234
CVE:CVE-2021-21234 Description:spring-boot-actuator-logview in a library that adds a simple logfile viewer as spring boot actuator endpoint. It is maven package "eu.hinsch:spring-boot-actuator-logview". In spring-boot-actuator-logview before version 0.2.13 there is a directory traversal vulnerability. The nature of this library is to expose a log file directory via admin (spring boot actuator) HTTP endpoints. Both the filename to view and a base folder (relative to the logging folder root) can be specified via request parameters. While the filename parameter was checked to prevent directory traversal exploits (so that `filename=../somefile` would not work), the base folder parameter was not sufficiently checked, so that `filename=somefile&base=../` could access a file outside the logging base directory). The vulnerability has been patched in release 0.2.13. Any users of 0.2.12 should be able to update without any issues as there are no other changes in that release. There is no workaround to fix the vulnerability other than updating or removing the dependency. However, removing read access of the user the application is run with to any directory not required for running the application can limit the impact. Additionally, access to the logview endpoint can be limited by deploying the application behind a reverse proxy. published:2021-01-05T18:15:16.443
Please provide detailed information about CVE-2021-22492
CVE:CVE-2021-22492 Description:An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) (Broadcom Bluetooth chipsets) software. The Bluetooth UART driver has a buffer overflow. The Samsung ID is SVE-2020-18731 (January 2021). published:2021-01-05T18:15:18.740
Please provide detailed information about CVE-2021-22493
CVE:CVE-2021-22493 Description:Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-25346. Reason: This candidate is a duplicate of CVE-2021-25346. Notes: All CVE users should reference CVE-2021-25346 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage published:2021-01-05T18:15:18.803
Please provide detailed information about CVE-2021-22494
CVE:CVE-2021-22494 Description:An issue was discovered in the fingerprint scanner on Samsung Note20 mobile devices with Q(10.0) software. When a screen protector is used, the required image compensation is not present. Consequently, inversion can occur during fingerprint enrollment, and a high False Recognition Rate (FRR) can occur. The Samsung ID is SVE-2020-19216 (January 2021). published:2021-01-05T18:15:18.850
Please provide detailed information about CVE-2021-22495
CVE:CVE-2021-22495 Description:An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), Q(10.0), and R(11.0) (Exynos chipsets) software. The Mali GPU driver allows out-of-bounds access and a device reset. The Samsung ID is SVE-2020-19174 (January 2021). published:2021-01-05T18:15:18.897
Please provide detailed information about CVE-2021-3022
CVE:CVE-2021-3022 Description:An issue was discovered on LG mobile devices with Android OS 10 software. There was no write protection for the MTK protect2 partition. The LG ID is LVE-SMP-200028 (January 2021). published:2021-01-05T18:15:19.020
Please provide detailed information about CVE-2021-3026
CVE:CVE-2021-3026 Description:Invision Community IPS Community Suite before 4.5.4.2 allows XSS during the quoting of a post or comment. published:2021-01-05T23:15:15.703
Please provide detailed information about CVE-2021-21235
CVE:CVE-2021-21235 Description:kamadak-exif is an exif parsing library written in pure Rust. In kamadak-exif version 0.5.2, there is an infinite loop in parsing crafted PNG files. Specifically, reader::read_from_container can cause an infinite loop when a crafted PNG file is given. This is fixed in version 0.5.3. No workaround is available. Applications that do not pass files with the PNG signature to Reader::read_from_container are not affected. published:2021-01-06T02:15:12.967
Please provide detailed information about CVE-2021-21236
CVE:CVE-2021-21236 Description:CairoSVG is a Python (pypi) package. CairoSVG is an SVG converter based on Cairo. In CairoSVG before version 2.5.1, there is a regular expression denial of service (REDoS) vulnerability. When processing SVG files, the python package CairoSVG uses two regular expressions which are vulnerable to Regular Expression Denial of Service (REDoS). If an attacker provides a malicious SVG, it can make cairosvg get stuck processing the file for a very long time. This is fixed in version 2.5.1. See Referenced GitHub advisory for more information. published:2021-01-06T17:15:23.733
Please provide detailed information about CVE-2021-3029
CVE:CVE-2021-3029 Description:EVOLUCARE ECSIMAGING (aka ECS Imaging) through 6.21.5 has an OS Command Injection vulnerability via shell metacharacters and an IFS manipulation. The parameter "file" on the webpage /showfile.php can be exploited to gain root access. NOTE: This vulnerability only affects products that are no longer supported by the maintainer published:2021-01-07T14:15:12.720
Please provide detailed information about CVE-2021-3011
CVE:CVE-2021-3011 Description:An electromagnetic-wave side-channel issue was discovered on NXP SmartMX / P5x security microcontrollers and A7x secure authentication microcontrollers, with CryptoLib through v2.9. It allows attackers to extract the ECDSA private key after extensive physical access (and consequently produce a clone). This was demonstrated on the Google Titan Security Key, based on an NXP A7005a chip. Other FIDO U2F security keys are also impacted (Yubico YubiKey Neo and Feitian K9, K13, K21, and K40) as well as several NXP JavaCard smartcards (J3A081, J2A081, J3A041, J3D145_M59, J2D145_M59, J3D120_M60, J3D082_M60, J2D120_M60, J2D082_M60, J3D081_M59, J2D081_M59, J3D081_M61, J2D081_M61, J3D081_M59_DF, J3D081_M61_DF, J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64, J3E145_M64, J3E120_M65, J3E082_M65, J2E145_M64, J2E120_M65, J2E082_M65, J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF, J3E016_M66_DF, J3E041_M64_DF, and J3E016_M64_DF). published:2021-01-07T16:15:12.120
Please provide detailed information about CVE-2021-23241
CVE:CVE-2021-23241 Description:MERCUSYS Mercury X18G 1.0.5 devices allow Directory Traversal via ../ in conjunction with a loginLess or login.htm URI (for authentication bypass) to the web server, as demonstrated by the /loginLess/../../etc/passwd URI. published:2021-01-07T21:15:14.040
Please provide detailed information about CVE-2021-23242
CVE:CVE-2021-23242 Description:MERCUSYS Mercury X18G 1.0.5 devices allow Directory Traversal via ../ to the UPnP server, as demonstrated by the /../../conf/template/uhttpd.json URI. published:2021-01-07T21:15:14.370
Please provide detailed information about CVE-2021-1051
CVE:CVE-2021-1051 Description:NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which a local user can get elevated privileges to modify display configuration data, which may result in denial of service of the display. published:2021-01-08T01:15:14.307
Please provide detailed information about CVE-2021-1052
CVE:CVE-2021-1052 Description:NVIDIA GPU Display Driver for Windows and Linux, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape or IOCTL in which user-mode clients can access legacy privileged APIs, which may lead to denial of service, escalation of privileges, and information disclosure. published:2021-01-08T01:15:14.400
Please provide detailed information about CVE-2021-1053
CVE:CVE-2021-1053 Description:NVIDIA GPU Display Driver for Windows and Linux, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape or IOCTL in which improper validation of a user pointer may lead to denial of service. published:2021-01-08T01:15:14.463
Please provide detailed information about CVE-2021-1054
CVE:CVE-2021-1054 Description:NVIDIA GPU Display Driver for Windows, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which the software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action, which may lead to denial of service. published:2021-01-08T01:15:14.510
Please provide detailed information about CVE-2021-1055
CVE:CVE-2021-1055 Description:NVIDIA GPU Display Driver for Windows, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which improper access control may lead to denial of service and information disclosure. published:2021-01-08T01:15:14.573
Please provide detailed information about CVE-2021-1056
CVE:CVE-2021-1056 Description:NVIDIA GPU Display Driver for Linux, all versions, contains a vulnerability in the kernel mode layer (nvidia.ko) in which it does not completely honor operating system file system permissions to provide GPU device-level isolation, which may lead to denial of service or information disclosure. published:2021-01-08T01:15:14.620
Please provide detailed information about CVE-2021-3025
CVE:CVE-2021-3025 Description:Invision Community IPS Community Suite before 4.5.4.2 allows SQL Injection via the Downloads REST API (the sortDir parameter in a sortBy=popular action to the GETindex() method in applications/downloads/api/files.php). published:2021-01-08T07:15:11.920
Please provide detailed information about CVE-2021-1057
CVE:CVE-2021-1057 Description:NVIDIA Virtual GPU Manager NVIDIA vGPU manager contains a vulnerability in the vGPU plugin in which it allows guests to allocate some resources for which the guest is not authorized, which may lead to integrity and confidentiality loss, denial of service, or information disclosure. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3). published:2021-01-08T15:15:12.000
Please provide detailed information about CVE-2021-1058
CVE:CVE-2021-1058 Description:NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and vGPU plugin, in which an input data size is not validated, which may lead to tampering of data or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3). published:2021-01-08T15:15:12.063
Please provide detailed information about CVE-2021-1059
CVE:CVE-2021-1059 Description:NVIDIA vGPU manager contains a vulnerability in the vGPU plugin, in which an input index is not validated, which may lead to integer overflow, which in turn may cause tampering of data, information disclosure, or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3). published:2021-01-08T15:15:12.157
Please provide detailed information about CVE-2021-1060
CVE:CVE-2021-1060 Description:NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and vGPU plugin, in which an input index is not validated, which may lead to tampering of data or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3). published:2021-01-08T15:15:12.203
Please provide detailed information about CVE-2021-1061
CVE:CVE-2021-1061 Description:NVIDIA vGPU manager contains a vulnerability in the vGPU plugin, in which a race condition may cause the vGPU plugin to continue using a previously validated resource that has since changed, which may lead to denial of service or information disclosure. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3). published:2021-01-08T15:15:12.280
Please provide detailed information about CVE-2021-1062
CVE:CVE-2021-1062 Description:NVIDIA vGPU manager contains a vulnerability in the vGPU plugin, in which an input data length is not validated, which may lead to tampering of data or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3). published:2021-01-08T15:15:12.343
Please provide detailed information about CVE-2021-1063
CVE:CVE-2021-1063 Description:NVIDIA vGPU manager contains a vulnerability in the vGPU plugin, in which an input offset is not validated, which may lead to a buffer overread, which in turn may cause tampering of data, information disclosure, or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3). published:2021-01-08T15:15:12.407
Please provide detailed information about CVE-2021-1064
CVE:CVE-2021-1064 Description:NVIDIA vGPU manager contains a vulnerability in the vGPU plugin, in which it obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer, which may lead to information disclosure or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3). published:2021-01-08T15:15:12.453
Please provide detailed information about CVE-2021-1065
CVE:CVE-2021-1065 Description:NVIDIA vGPU manager contains a vulnerability in the vGPU plugin, in which input data is not validated, which may lead to tampering of data or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3). published:2021-01-08T15:15:12.563
Please provide detailed information about CVE-2021-1066
CVE:CVE-2021-1066 Description:NVIDIA vGPU manager contains a vulnerability in the vGPU plugin, in which input data is not validated, which may lead to unexpected consumption of resources, which in turn may lead to denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3). published:2021-01-08T15:15:12.750
Please provide detailed information about CVE-2021-3111
CVE:CVE-2021-3111 Description:The Express Entries Dashboard in Concrete5 8.5.4 allows stored XSS via the name field of a new data object at an index.php/dashboard/express/entries/view/ URI. published:2021-01-08T15:15:12.953
Please provide detailed information about CVE-2021-21106
CVE:CVE-2021-21106 Description:Use after free in autofill in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. published:2021-01-08T19:15:14.880
Please provide detailed information about CVE-2021-21107
CVE:CVE-2021-21107 Description:Use after free in drag and drop in Google Chrome on Linux prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. published:2021-01-08T19:15:14.927
Please provide detailed information about CVE-2021-21108
CVE:CVE-2021-21108 Description:Use after free in media in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. published:2021-01-08T19:15:14.990
Please provide detailed information about CVE-2021-21109
CVE:CVE-2021-21109 Description:Use after free in payments in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. published:2021-01-08T19:15:15.037
Please provide detailed information about CVE-2021-21110
CVE:CVE-2021-21110 Description:Use after free in safe browsing in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. published:2021-01-08T19:15:15.100
Please provide detailed information about CVE-2021-21111
CVE:CVE-2021-21111 Description:Insufficient policy enforcement in WebUI in Google Chrome prior to 87.0.4280.141 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension. published:2021-01-08T19:15:15.163
Please provide detailed information about CVE-2021-21112
CVE:CVE-2021-21112 Description:Use after free in Blink in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. published:2021-01-08T19:15:15.210
Please provide detailed information about CVE-2021-21113
CVE:CVE-2021-21113 Description:Heap buffer overflow in Skia in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. published:2021-01-08T19:15:15.273
Please provide detailed information about CVE-2021-21114
CVE:CVE-2021-21114 Description:Use after free in audio in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. published:2021-01-08T19:15:15.333
Please provide detailed information about CVE-2021-21115
CVE:CVE-2021-21115 Description:User after free in safe browsing in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. published:2021-01-08T19:15:15.397
Please provide detailed information about CVE-2021-21116
CVE:CVE-2021-21116 Description:Heap buffer overflow in audio in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. published:2021-01-08T19:15:15.443
Please provide detailed information about CVE-2021-3116
CVE:CVE-2021-3116 Description:before_upstream_connection in AuthPlugin in http/proxy/auth.py in proxy.py before 2.3.1 accepts incorrect Proxy-Authorization header data because of a boolean confusion (and versus or). published:2021-01-11T05:15:10.987
Please provide detailed information about CVE-2021-3118
CVE:CVE-2021-3118 Description:EVOLUCARE ECSIMAGING (aka ECS Imaging) through 6.21.5 has multiple SQL Injection issues in the login form and the password-forgotten form (such as /req_password_user.php?email=). This allows an attacker to steal data in the database and obtain access to the application. (The database component runs as root.) NOTE: This vulnerability only affects products that are no longer supported by the maintainer published:2021-01-11T06:15:13.320
Please provide detailed information about CVE-2021-3121
CVE:CVE-2021-3121 Description:An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue. published:2021-01-11T06:15:13.460
Please provide detailed information about CVE-2021-23253
CVE:CVE-2021-23253 Description:Opera Mini for Android below 53.1 displays URL left-aligned in the address field. This allows a malicious attacker to craft a URL with a long domain name, e.g. www.safe.opera.com.attacker.com. With the URL being left-aligned, the user will only see the front part (e.g. www.safe.opera.com…) The exact amount depends on the phone screen size but the attacker can craft a number of different domains and target different phones. Starting with version 53.1 Opera Mini displays long URLs with the top-level domain label aligned to the right of the address field which mitigates the issue. published:2021-01-11T16:15:15.663
Please provide detailed information about CVE-2021-0342
CVE:CVE-2021-0342 Description:In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. User interaction is not required for exploitation. Product: Android; Versions: Android kernel; Android ID: A-146554327. published:2021-01-11T21:15:13.313
Please provide detailed information about CVE-2021-21241
CVE:CVE-2021-21241 Description:The Python "Flask-Security-Too" package is used for adding security features to your Flask application. It is an is a independently maintained version of Flask-Security based on the 3.0.0 version of Flask-Security. In Flask-Security-Too from version 3.3.0 and before version 3.4.5, the /login and /change endpoints can return the authenticated user's authentication token in response to a GET request. Since GET requests aren't protected with a CSRF token, this could lead to a malicious 3rd party site acquiring the authentication token. Version 3.4.5 and version 4.0.0 are patched. As a workaround, if you aren't using authentication tokens - you can set the SECURITY_TOKEN_MAX_AGE to "0" (seconds) which should make the token unusable. published:2021-01-11T21:15:13.377
Please provide detailed information about CVE-2021-0301
CVE:CVE-2021-0301 Description:In ged, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android SoC; Android ID: A-172514667. published:2021-01-11T22:15:12.893
Please provide detailed information about CVE-2021-0303
CVE:CVE-2021-0303 Description:In dispatchGraphTerminationMessage() of packages/services/Car/computepipe/runner/graph/StreamSetObserver.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Android ID: A-170407229. published:2021-01-11T22:15:12.987
Please provide detailed information about CVE-2021-0304
CVE:CVE-2021-0304 Description:In several functions of GlobalScreenshot.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure of the user's contacts with User execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-8.0, Android-8.1, Android-9; Android ID: A-162738636. published:2021-01-11T22:15:13.033
Please provide detailed information about CVE-2021-0306
CVE:CVE-2021-0306 Description:In addAllPermissions of PermissionManagerService.java, there is a possible permissions bypass when upgrading major Android versions which allows an app to gain the android.permission.ACTIVITY_RECOGNITION permission without user confirmation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11, Android-8.0, Android-8.1, Android-9, Android-10; Android ID: A-154505240. published:2021-01-11T22:15:13.080
Please provide detailed information about CVE-2021-0307
CVE:CVE-2021-0307 Description:In updatePermissionSourcePackage of PermissionManagerService.java, there is a possible automatic runtime permission grant due to a confused deputy. This could lead to local escalation of privilege allowing a malicious app to silently gain access to a dangerous permission with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Android ID: A-155648771. published:2021-01-11T22:15:13.127
Please provide detailed information about CVE-2021-0308
CVE:CVE-2021-0308 Description:In ReadLogicalParts of basicmbr.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-8.1, Android-9, Android-10, Android-11, Android-8.0; Android ID: A-158063095. published:2021-01-11T22:15:13.173
Please provide detailed information about CVE-2021-0309
CVE:CVE-2021-0309 Description:In onCreate of grantCredentialsPermissionActivity, there is a confused deputy. This could lead to local information disclosure and account access with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-8.1, Android-9, Android-10, Android-11, Android-8.0; Android ID: A-158480899. published:2021-01-11T22:15:13.220
Please provide detailed information about CVE-2021-0310
CVE:CVE-2021-0310 Description:In LazyServiceRegistrar of LazyServiceRegistrar.cpp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Android ID: A-170212632. published:2021-01-11T22:15:13.267
Please provide detailed information about CVE-2021-0311
CVE:CVE-2021-0311 Description:In ElementaryStreamQueue::dequeueAccessUnitH264() of ESQueue.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-9, Android-10, Android-11, Android-8.0, Android-8.1; Android ID: A-170240631. published:2021-01-11T22:15:13.313
Please provide detailed information about CVE-2021-0312
CVE:CVE-2021-0312 Description:In WAVSource::read of WAVExtractor.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-8.1, Android-9, Android-10, Android-11, Android-8.0; Android ID: A-170583712. published:2021-01-11T22:15:13.360
Please provide detailed information about CVE-2021-0313
CVE:CVE-2021-0313 Description:In isWordBreakAfter of LayoutUtils.cpp, there is a possible way to slow or crash a TextView due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-9, Android-10, Android-11, Android-8.0, Android-8.1; Android ID: A-170968514. published:2021-01-11T22:15:13.407
Please provide detailed information about CVE-2021-0315
CVE:CVE-2021-0315 Description:In onCreate of GrantCredentialsPermissionActivity.java, there is a possible way to convince the user to grant an app access to an account due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-8.1, Android-9, Android-10, Android-11, Android-8.0; Android ID: A-169763814. published:2021-01-11T22:15:13.457
Please provide detailed information about CVE-2021-0316
CVE:CVE-2021-0316 Description:In avrc_pars_vendor_cmd of avrc_pars_tg.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11, Android-8.0, Android-8.1, Android-9, Android-10; Android ID: A-168802990. published:2021-01-11T22:15:13.503
Please provide detailed information about CVE-2021-0317
CVE:CVE-2021-0317 Description:In createOrUpdate of Permission.java and related code, there is possible permission escalation due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-10, Android-11, Android-8.0, Android-8.1, Android-9; Android ID: A-168319670. published:2021-01-11T22:15:13.550
Please provide detailed information about CVE-2021-0318
CVE:CVE-2021-0318 Description:In appendEventsToCacheLocked of SensorEventConnection.cpp, there is a possible out of bounds write due to a use-after-free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-9, Android-8.1, Android-10, Android-11; Android ID: A-168211968. published:2021-01-11T22:15:13.597
Please provide detailed information about CVE-2021-0319
CVE:CVE-2021-0319 Description:In checkCallerIsSystemOr of CompanionDeviceManagerService.java, there is a possible way to get a nearby Bluetooth device's MAC address without appropriate permissions due to a permissions bypass. This could lead to local escalation of privilege that grants access to nearby MAC addresses, with User execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-8.0, Android-8.1, Android-9, Android-10, Android-11; Android ID: A-167244818. published:2021-01-11T22:15:13.643
Please provide detailed information about CVE-2021-0320
CVE:CVE-2021-0320 Description:In is_device_locked and set_device_locked of keystore_keymaster_enforcement.h, there is a possible bypass of lockscreen requirements for keyguard bound keys due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Android ID: A-169933423. published:2021-01-11T22:15:13.690
Please provide detailed information about CVE-2021-0321
CVE:CVE-2021-0321 Description:In enforceDumpPermissionForPackage of ActivityManagerService.java, there is a possible way to determine if a package is installed due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Android ID: A-166667403. published:2021-01-11T22:15:13.737
Please provide detailed information about CVE-2021-0322
CVE:CVE-2021-0322 Description:In onCreate of SlicePermissionActivity.java, there is a possible misleading string displayed due to improper input validation. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.Product: Android; Versions: Android-10, Android-11, Android-9; Android ID: A-159145361. published:2021-01-11T22:15:13.783
Please provide detailed information about CVE-2021-23239
CVE:CVE-2021-23239 Description:The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path. published:2021-01-12T09:15:14.043
Please provide detailed information about CVE-2021-23240
CVE:CVE-2021-23240 Description:selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable. published:2021-01-12T09:15:14.107
Please provide detailed information about CVE-2021-21445
CVE:CVE-2021-21445 Description:SAP Commerce Cloud, versions - 1808, 1811, 1905, 2005, 2011, allows an authenticated attacker to include invalidated data in the HTTP response Content Type header, due to improper input validation, and sent to a Web user. A successful exploitation of this vulnerability may lead to advanced attacks, including cross-site scripting and page hijacking. published:2021-01-12T15:15:14.360
Please provide detailed information about CVE-2021-21446
CVE:CVE-2021-21446 Description:SAP NetWeaver AS ABAP, versions 740, 750, 751, 752, 753, 754, 755, allows an unauthenticated attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service, this has a high impact on the availability of the service. published:2021-01-12T15:15:14.470
Please provide detailed information about CVE-2021-21447
CVE:CVE-2021-21447 Description:SAP BusinessObjects Business Intelligence platform, versions 410, 420, allows an authenticated attacker to inject malicious JavaScript payload into the custom value input field of an Input Control, which can be executed by User who views the relevant application content, which leads to Stored Cross-Site Scripting. published:2021-01-12T15:15:14.547
Please provide detailed information about CVE-2021-21448
CVE:CVE-2021-21448 Description:SAP GUI for Windows, version - 7.60, allows an attacker to spoof logon credentials for Application Server ABAP backend systems in the client PCs memory. Under certain conditions the attacker can access information which would otherwise be restricted. The exploit can only be executed locally on the client PC and not via Network and the attacker needs at least user authorization of the Operating System user of the victim. published:2021-01-12T15:15:14.610
Please provide detailed information about CVE-2021-21449
CVE:CVE-2021-21449 Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. published:2021-01-12T15:15:14.703
Please provide detailed information about CVE-2021-21450
CVE:CVE-2021-21450 Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PSD file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. published:2021-01-12T15:15:14.813
Please provide detailed information about CVE-2021-21451
CVE:CVE-2021-21451 Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated SGI file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. published:2021-01-12T15:15:14.907
Please provide detailed information about CVE-2021-21452
CVE:CVE-2021-21452 Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated GIF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. published:2021-01-12T15:15:14.987
Please provide detailed information about CVE-2021-21453
CVE:CVE-2021-21453 Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated RLE file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. published:2021-01-12T15:15:15.047
Please provide detailed information about CVE-2021-21454
CVE:CVE-2021-21454 Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated RLE file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. published:2021-01-12T15:15:15.110
Please provide detailed information about CVE-2021-21455
CVE:CVE-2021-21455 Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated DIB file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. published:2021-01-12T15:15:15.190
Please provide detailed information about CVE-2021-21456
CVE:CVE-2021-21456 Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated DIB file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. published:2021-01-12T15:15:15.250
Please provide detailed information about CVE-2021-21457
CVE:CVE-2021-21457 Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. published:2021-01-12T15:15:15.313
Please provide detailed information about CVE-2021-21458
CVE:CVE-2021-21458 Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. published:2021-01-12T15:15:15.390
Please provide detailed information about CVE-2021-21459
CVE:CVE-2021-21459 Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. published:2021-01-12T15:15:15.437
Please provide detailed information about CVE-2021-21460
CVE:CVE-2021-21460 Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated DIB file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. published:2021-01-12T15:15:15.517
Please provide detailed information about CVE-2021-21461
CVE:CVE-2021-21461 Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated BMP file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. published:2021-01-12T15:15:15.593
Please provide detailed information about CVE-2021-21462
CVE:CVE-2021-21462 Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PCX file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. published:2021-01-12T15:15:15.657
Please provide detailed information about CVE-2021-21463
CVE:CVE-2021-21463 Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PCX file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. published:2021-01-12T15:15:15.720
End of preview. Expand in Data Studio

Cybersecurity-LLM-CVE Dataset Introduction πŸš€

Overview πŸ›‘οΈ

An open-source cybersecurity vulnerability dataset designed for training/evaluating Large Language Models (LLMs) in security domains. Covers all public CVE IDs from January 1, 2021 to April 9, 2025, with structured data including vulnerability details (affected products) and disclosure dates.

Key Highlights ✨

Comprehensive 🌍: 5-year global vulnerability records (software/hardware/protocols)

Authoritative Integration πŸ”: Data sourced from NVD, CVE lists, and community contributions, double-verified

Usage Declaration πŸ’‘

If using this dataset, please cite via:

[Hugging Face Datasets Library] πŸ“šβœ¨

Typical Use Cases πŸ› οΈ

🧠 LLM-powered vulnerability patch generation

πŸ€– Automated threat intelligence analysis

πŸ”§ Penetration testing toolkit enhancement

Final Notes 🌟

πŸ’¬ Feel free to leave suggestions in the community forum! I'll keep optimizing based on your feedback~ πŸ₯°

Downloads last month
221