severity
stringclasses 5
values | parsed_description
stringlengths 3
930
| __index_level_0__
int64 0
49.2k
|
---|---|---|
Moderate
|
denial of service, malicious, vulnerability
| 254 |
Low
|
buffer overflow, format string, overflow, rce
| 256 |
Moderate
|
attack, cve-2024-46954, manipulate
| 257 |
Moderate
|
corrupt, memory corruption, vulnerability
| 258 |
Low
|
vulnerability
| 260 |
Important
|
corrupt, malicious, memory corruption, vulnerability
| 261 |
Moderate
|
credential
| 262 |
Important
|
bypass
| 263 |
Moderate
|
execute, vulnerability
| 264 |
Moderate
|
attack, attacks, compromise, dos, exploit, privilege, unauthorized, vulnerability
| 265 |
Moderate
|
attack, corrupt, exploit, malicious, memory corruption, overflow, vulnerability
| 266 |
Moderate
|
vulnerability
| 269 |
Moderate
|
null pointer dereference, vulnerability
| 270 |
Moderate
|
vulnerability
| 271 |
Moderate
|
null pointer dereference, rce, vulnerability
| 273 |
Moderate
|
leak, vulnerability
| 274 |
Important
|
malicious
| 275 |
Important
|
credential, expose, kubernetes secrets, privilege, privilege escalation, secret, unauthorized, user, vulnerability
| 278 |
Low
|
null pointer dereference, root, vulnerability
| 279 |
Moderate
|
vulnerability
| 280 |
Moderate
|
attack, buffer overflow, overflow
| 281 |
Low
|
denial of service, maliciously
| 283 |
Moderate
|
corrupt, memory corruption, vulnerability
| 284 |
Moderate
|
attack, denial of service, malicious, rce
| 285 |
Moderate
|
use after free, vulnerability
| 286 |
Low
|
corrupt, vulnerability
| 287 |
Moderate
|
command injection, execute, exploit, exploited, inject, injection, maliciously, permission, rce, user, vulnerability
| 288 |
Moderate
|
account, bypass, rce, vulnerability
| 289 |
Moderate
|
buffer overflow, corrupt, memory corruption, overflow, vulnerability
| 290 |
Moderate
|
attack, denial of service, vulnerability
| 292 |
Moderate
|
bypass, null pointer dereference, vulnerability
| 293 |
Moderate
|
bypass, expose, vulnerability
| 295 |
Important
|
expose, intercept, rce, unauthorized, vulnerability
| 296 |
Moderate
|
vulnerability
| 297 |
Moderate
|
null pointer dereference, vulnerability
| 298 |
Low
|
attack, attacks, compromise, denial of service, dos, exploit, privilege, unauthorized, vulnerability
| 300 |
Low
|
denial of service, dos, vulnerability
| 301 |
Low
|
kmemleak, leak, vulnerability
| 303 |
Low
|
user, vulnerability
| 306 |
Moderate
|
vulnerability
| 307 |
Moderate
|
vulnerability
| 309 |
Moderate
|
vulnerability
| 310 |
Moderate
|
attack, bypass, cross-site scripting, execute, inject, privilege, vulnerability
| 311 |
Moderate
|
permission, user, vulnerability
| 312 |
Moderate
|
user, vulnerability
| 313 |
Low
|
vulnerability
| 316 |
Moderate
|
vulnerability
| 317 |
Moderate
|
vulnerability
| 318 |
Low
|
rce, vulnerability
| 319 |
Moderate
|
vulnerability
| 321 |
Moderate
|
buffer overflow, corrupt, memory corruption, overflow, vulnerability
| 322 |
Moderate
|
attack, corrupt, exploit, memory corruption, vulnerability
| 323 |
Moderate
|
vulnerability
| 325 |
Moderate
|
null pointer dereference, vulnerability
| 327 |
Low
|
vulnerability
| 329 |
Moderate
|
null pointer dereference, rce, vulnerability
| 330 |
Moderate
|
attack, attacks, compromise, dos, exploit, privilege, unauthorized, vulnerability
| 331 |
Important
|
denial of service, dos, vulnerability
| 333 |
Moderate
|
steal, vulnerability
| 334 |
Low
|
null pointer dereference, vulnerability
| 335 |
Moderate
|
vulnerability
| 337 |
Moderate
|
corrupt, memory corruption, vulnerability
| 338 |
Important
|
malicious, user
| 339 |
Moderate
|
leak, vulnerability
| 340 |
Moderate
|
attack, attacks, compromise, dos, exploit, privilege, unauthorized, vulnerability
| 341 |
Low
|
key
| 345 |
Moderate
|
admin, overflow, vulnerability
| 347 |
Moderate
|
permission, vulnerability
| 349 |
Moderate
|
vulnerability
| 350 |
Low
|
vulnerability
| 352 |
Moderate
|
corrupt, execute, null pointer dereference, vulnerability
| 353 |
Moderate
|
rce
| 354 |
Moderate
|
attack, authentication, compromising, corrupt, key, rce
| 355 |
Low
|
corrupt, memory corruption, vulnerability
| 357 |
Moderate
|
expose, vulnerability
| 358 |
Moderate
|
null pointer dereference
| 359 |
Moderate
|
vulnerability
| 360 |
Moderate
|
vulnerability
| 361 |
Moderate
|
overflow, root, user, vulnerability
| 362 |
Moderate
|
bypass, user
| 363 |
Moderate
|
attack, attacks, certificate, intercept, malicious, rce, unauthorized, vulnerability
| 365 |
Moderate
|
firewall, rce
| 366 |
Important
|
malicious, sandbox, unauthorized
| 368 |
Moderate
|
overflow, user, vulnerability
| 369 |
Moderate
|
attack, escalate, execute, malicious, privilege
| 370 |
Moderate
|
privilege, vulnerability
| 371 |
Important
|
attack, compromise, execute, exploit, exploited, inject, unauthorized, user, vulnerability
| 372 |
Moderate
|
attack, inject, injection, user, vulnerability
| 373 |
Moderate
|
vulnerability
| 374 |
Moderate
|
account, attack, denial of service, privilege, privilege escalation, user, vulnerability
| 375 |
None
|
double free, key, rce, vulnerability
| 376 |
Moderate
|
user, vulnerability
| 377 |
Moderate
|
vulnerability
| 378 |
Moderate
|
vulnerability
| 379 |
Moderate
|
vulnerability
| 382 |
Moderate
|
user, vulnerability
| 383 |
Low
|
vulnerability
| 384 |
Important
|
vulnerability
| 385 |
Important
|
password, vulnerability
| 386 |
Moderate
|
vulnerability
| 387 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.