Created
May 9, 2021 07:05
-
-
Save AmitGupta7580/461a4e8046f98c4e7ae1e983db811e3a to your computer and use it in GitHub Desktop.
Training dataset for NLP model (vulnerablecode)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
JavaScript in Internet Explorer 3.x and 4.x and Netscape 2.x 3.x and 4.x allows remote attackers to monitor a user's web activities, aka the Bell Labs vulnerability.@Internet#Explorer#[email protected]#4.x#2.x#3.x#4.x | |
MIME conversion buffer overflow in sendmail versions 8.8.3 and 8.8.4@[email protected]#8.8.4 | |
Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0 in IRIX@[email protected]#5.0 | |
TCP RST denial of service in FreeBSD@FreeBSD@ | |
Cisco IOS 12.0 and other versions can be crashed by malicious UDP packets to the syslog port.@Cisco#[email protected] | |
Apache httpd cookie buffer overflow for versions 1.1.1 and earlier.@Apache#[email protected] | |
Certain configurations of wu-ftp FTP server 2.4 use a _PATH_EXECPATH setting to a directory with dangerous commands, such as /bin, which allows remote authenticated users to gain root access via the 'site exec' command.@[email protected] | |
Remote access in AIX innd 1.5.1 using control messages@[email protected] | |
Buffer overflow in SLmail 3.x allows attackers to execute commands using a large FROM line.@[email protected] | |
Buffer overflow in Apache 1.2.5 and earlier allows a remote attacker to cause a denial of service with a large number of GET requests containing a large number of / characters.@[email protected] | |
Buffer overflow in ffbconfig in Solaris 2.5.1@[email protected] | |
Local users can execute commands as other users, and read other users' files, through the filter command in the Elm elm-2.4 mail package using a symlink attack.@[email protected] | |
Windows NT 4.0 beta allows users to read and delete shares.@Windows#[email protected] | |
Vulnerabilities in UMN gopher and gopher+ versions 1.12 and 2.0x allow an intruder to read any files that can be accessed by the gopher daemon.@gopher#[email protected]#2.0x | |
Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users.@[email protected] | |
vold in Solaris 2.x allows local users to gain root access.@[email protected] | |
The Java Applet Security Manager implementation in Netscape Navigator 2.0 and Java Developer's Kit 1.0 allows an applet to connect to arbitrary hosts.@Java#Netscape#[email protected]#1.0 | |
Kerberos 4 key servers allow a user to masquerade as another by breaking and generating session keys.@Kerberos@4 | |
IIS 2.0 and 3.0 allows remote attackers to read the source code for ASP pages by appending a . (dot) to the end of the URL.@[email protected]#3.0 | |
Attackers can crash a Cisco IOS router or device, provided they can get to an interactive prompt (such as a login). This applies to some IOS 9.x, 10.x, and 11.x releases.@Cisco#[email protected]#10.x#11.x | |
In Cisco IOS 10.3, with the tacacs-ds or tacacs keyword, an extended IP access control list could bypass filtering.@Cisco#[email protected] | |
websendmail in Webgais 1.0 allows a remote user to access arbitrary files and execute arbitrary code via the receiver parameter ($VAR_receiver variable).@[email protected] |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment