{"id": "12a7b722-597f-4c64-8dc1-98412641d611", "text": "A Cross-Site Scripting (XSS) vulnerability affects MySQL Server version 14.2. It is caused by malicious input payload and can lead to session hijacking. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 63, "label": "PRODUCT"}, {"start": 72, "end": 76, "label": "VERSION"}, {"start": 94, "end": 117, "label": "ATTACK_VECTOR"}, {"start": 134, "end": 151, "label": "IMPACT"}, {"start": 179, "end": 186, "label": "CWE"}, {"start": 200, "end": 206, "label": "SEVERITY"}, {"start": 228, "end": 231, "label": "CVSS"}]} {"id": "1a8378cb-67ef-450f-93cd-9a09deaad8de", "text": "A Buffer Overflow vulnerability affects WordPress version 2.3.1. It is caused by unsanitized user input and can lead to information disclosure. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 49, "label": "PRODUCT"}, {"start": 58, "end": 63, "label": "VERSION"}, {"start": 81, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 176, "label": "CWE"}, {"start": 190, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "c4f99761-feb1-46b3-ac8d-a3646e798421", "text": "A Remote Code Execution vulnerability affects OpenCart version 7.4.2. It is caused by crafted HTTP request and can lead to database manipulation. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "a78b9dc3-c428-4d2e-aeeb-6942a995874e", "text": "A Authentication Bypass vulnerability affects MySQL Server version 9.12. It is caused by injected SQL query and can lead to arbitrary code execution. This issue corresponds to CWE-79 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 71, "label": "VERSION"}, {"start": 89, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 148, "label": "IMPACT"}, {"start": 176, "end": 182, "label": "CWE"}, {"start": 196, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "c6d4393c-3b5c-4a3d-807f-cd9f39381c96", "text": "A Cross-Site Scripting (XSS) vulnerability affects Cisco ASA version 5.3.1. It is caused by injected SQL query and can lead to privilege escalation. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 60, "label": "PRODUCT"}, {"start": 69, "end": 74, "label": "VERSION"}, {"start": 92, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "6c1a31a6-1dbc-4476-b3c1-44afe96281b6", "text": "A Directory Traversal vulnerability affects PHPMyAdmin version 7.4.2. It is caused by malicious input payload and can lead to session hijacking. This issue corresponds to CWE-89 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "1ceaf0bd-c793-4cba-93a0-8ddbccd6bf61", "text": "A Cross-Site Scripting (XSS) vulnerability affects PHPMyAdmin version 14.2. It is caused by unsanitized user input and can lead to database manipulation. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 74, "label": "VERSION"}, {"start": 92, "end": 114, "label": "ATTACK_VECTOR"}, {"start": 131, "end": 152, "label": "IMPACT"}, {"start": 180, "end": 187, "label": "CWE"}, {"start": 201, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "44ac929a-82c5-44be-89fd-77f43d08e93d", "text": "A Cross-Site Scripting (XSS) vulnerability affects OpenCart version 3.0.3. It is caused by tampered API request and can lead to session hijacking. This issue corresponds to CWE-200 and is rated Critical with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 73, "label": "VERSION"}, {"start": 91, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 180, "label": "CWE"}, {"start": 194, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "9e855f48-c8b6-48aa-9bfb-731a2ee8f89b", "text": "A Cross-Site Scripting (XSS) vulnerability affects Docker Engine version 2.4.7. It is caused by crafted HTTP request and can lead to arbitrary code execution. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 64, "label": "PRODUCT"}, {"start": 73, "end": 78, "label": "VERSION"}, {"start": 96, "end": 116, "label": "ATTACK_VECTOR"}, {"start": 133, "end": 157, "label": "IMPACT"}, {"start": 185, "end": 191, "label": "CWE"}, {"start": 205, "end": 211, "label": "SEVERITY"}, {"start": 233, "end": 236, "label": "CVSS"}]} {"id": "9d55bc10-9e6e-4349-992a-814f705490c4", "text": "A Privilege Escalation vulnerability affects OpenCart version 4.18.0. It is caused by crafted HTTP request and can lead to service disruption. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 68, "label": "VERSION"}, {"start": 86, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 175, "label": "CWE"}, {"start": 189, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "1e0f4525-0be6-4950-9774-f827e46c36bc", "text": "A Privilege Escalation vulnerability affects PHPMyAdmin version 3.0.3. It is caused by malformed JSON object and can lead to information disclosure. This issue corresponds to CWE-122 and is rated Critical with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 182, "label": "CWE"}, {"start": 196, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "4df051e9-c0e2-4a3d-b399-58040e74ad01", "text": "A Privilege Escalation vulnerability affects WordPress version 4.18.0. It is caused by unsanitized user input and can lead to information disclosure. This issue corresponds to CWE-79 and is rated Medium with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 69, "label": "VERSION"}, {"start": 87, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 148, "label": "IMPACT"}, {"start": 176, "end": 182, "label": "CWE"}, {"start": 196, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "d9bc3a9b-43c7-4acc-8d6c-fd0a8cbc259b", "text": "A Buffer Overflow vulnerability affects MySQL Server version 4.18.0. It is caused by crafted HTTP request and can lead to privilege escalation. This issue corresponds to CWE-20 and is rated Critical with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 67, "label": "VERSION"}, {"start": 85, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 176, "label": "CWE"}, {"start": 190, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "4254652a-925e-4737-88c5-e480d07602ef", "text": "A Remote Code Execution vulnerability affects OpenSSL version 5.3.1. It is caused by crafted HTTP request and can lead to information disclosure. This issue corresponds to CWE-122 and is rated Critical with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "c61a827f-6010-4039-aa09-5dafd9f87953", "text": "A Authentication Bypass vulnerability affects OpenCart version 5.3.1. It is caused by injected SQL query and can lead to database manipulation. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 177, "label": "CWE"}, {"start": 191, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "ecf5a3d8-1fb6-457f-9aa4-d13e554fe9ad", "text": "A SQL Injection vulnerability affects Cisco ASA version 2.4.7. It is caused by injected SQL query and can lead to information disclosure. This issue corresponds to CWE-200 and is rated Critical with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 47, "label": "PRODUCT"}, {"start": 56, "end": 61, "label": "VERSION"}, {"start": 79, "end": 97, "label": "ATTACK_VECTOR"}, {"start": 114, "end": 136, "label": "IMPACT"}, {"start": 164, "end": 171, "label": "CWE"}, {"start": 185, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "83711cc2-ab4e-413d-9079-be2f2938e5f5", "text": "A Authentication Bypass vulnerability affects Cisco ASA version 91.0. It is caused by tampered API request and can lead to information disclosure. This issue corresponds to CWE-94 and is rated High with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 179, "label": "CWE"}, {"start": 193, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "5a2160e1-0d0a-4ee6-9b5e-7a768e15bae5", "text": "A Denial of Service vulnerability affects Mozilla Firefox version 9.12. It is caused by malicious input payload and can lead to service disruption. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 70, "label": "VERSION"}, {"start": 88, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 181, "label": "CWE"}, {"start": 195, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "f5aa0e0a-ba97-498a-b087-610b82c8dc81", "text": "A Directory Traversal vulnerability affects PHPMyAdmin version 9.12. It is caused by tampered API request and can lead to arbitrary code execution. This issue corresponds to CWE-94 and is rated Medium with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 67, "label": "VERSION"}, {"start": 85, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 180, "label": "CWE"}, {"start": 194, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "b9685b4e-5be2-4f52-82c1-98386f33744f", "text": "A SQL Injection vulnerability affects Kubernetes API Server version 7.4.2. It is caused by specially crafted packet and can lead to session hijacking. This issue corresponds to CWE-89 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 73, "label": "VERSION"}, {"start": 91, "end": 115, "label": "ATTACK_VECTOR"}, {"start": 132, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 183, "label": "CWE"}, {"start": 197, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "ea0f1e25-7884-4e42-ab4c-d91b6ae29d22", "text": "A Cross-Site Scripting (XSS) vulnerability affects OpenSSL version 7.4.2. It is caused by tampered API request and can lead to privilege escalation. This issue corresponds to CWE-94 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 72, "label": "VERSION"}, {"start": 90, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "edec55cc-53e2-4ea1-ae2f-ca87dc2e7a03", "text": "A Directory Traversal vulnerability affects Drupal version 91.0. It is caused by tampered API request and can lead to database manipulation. This issue corresponds to CWE-94 and is rated High with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 63, "label": "VERSION"}, {"start": 81, "end": 101, "label": "ATTACK_VECTOR"}, {"start": 118, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 173, "label": "CWE"}, {"start": 187, "end": 191, "label": "SEVERITY"}, {"start": 213, "end": 216, "label": "CVSS"}]} {"id": "6fb0bdaf-5305-4fd2-b6ce-3fdece39d77e", "text": "A Cross-Site Scripting (XSS) vulnerability affects Docker Engine version 1.2.3. It is caused by malicious input payload and can lead to database manipulation. This issue corresponds to CWE-89 and is rated High with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 64, "label": "PRODUCT"}, {"start": 73, "end": 78, "label": "VERSION"}, {"start": 96, "end": 119, "label": "ATTACK_VECTOR"}, {"start": 136, "end": 157, "label": "IMPACT"}, {"start": 185, "end": 191, "label": "CWE"}, {"start": 205, "end": 209, "label": "SEVERITY"}, {"start": 231, "end": 234, "label": "CVSS"}]} {"id": "adb02753-5d5e-424e-ae0e-b4844c287152", "text": "A Authentication Bypass vulnerability affects Cisco ASA version 6.0.1. It is caused by specially crafted packet and can lead to session hijacking. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 179, "label": "CWE"}, {"start": 193, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "9aeb81c9-0207-4a1c-8b5b-406e911f9995", "text": "A Cross-Site Scripting (XSS) vulnerability affects Docker Engine version 2.4.7. It is caused by injected SQL query and can lead to database manipulation. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 64, "label": "PRODUCT"}, {"start": 73, "end": 78, "label": "VERSION"}, {"start": 96, "end": 114, "label": "ATTACK_VECTOR"}, {"start": 131, "end": 152, "label": "IMPACT"}, {"start": 180, "end": 186, "label": "CWE"}, {"start": 200, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "a9ca246e-8a74-4c86-9037-f59fc64f4b66", "text": "A Directory Traversal vulnerability affects Nginx Web Server version 1.2.3. It is caused by malformed JSON object and can lead to privilege escalation. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 60, "label": "PRODUCT"}, {"start": 69, "end": 74, "label": "VERSION"}, {"start": 92, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 150, "label": "IMPACT"}, {"start": 178, "end": 185, "label": "CWE"}, {"start": 199, "end": 205, "label": "SEVERITY"}, {"start": 227, "end": 230, "label": "CVSS"}]} {"id": "2a39cdc2-e7f1-487b-af45-3c09e1d2a490", "text": "A Remote Code Execution vulnerability affects PHPMyAdmin version 9.12. It is caused by injected SQL query and can lead to service disruption. This issue corresponds to CWE-122 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 69, "label": "VERSION"}, {"start": 87, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 175, "label": "CWE"}, {"start": 189, "end": 193, "label": "SEVERITY"}, {"start": 65, "end": 68, "label": "CVSS"}]} {"id": "5b32b6c3-932a-4e66-8f84-fcf05d7eb8c6", "text": "A Privilege Escalation vulnerability affects PHPMyAdmin version 9.12. It is caused by malicious input payload and can lead to session hijacking. This issue corresponds to CWE-89 and is rated Critical with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "9bd446e8-8863-41b6-b5f5-085e2905aae7", "text": "A Denial of Service vulnerability affects Nginx Web Server version 10.5. It is caused by crafted HTTP request and can lead to database manipulation. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 71, "label": "VERSION"}, {"start": 89, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "bcf6973d-9a0b-4235-ba61-9e8c61557909", "text": "A Cross-Site Scripting (XSS) vulnerability affects Mozilla Firefox version 14.2. It is caused by crafted HTTP request and can lead to arbitrary code execution. This issue corresponds to CWE-400 and is rated Critical with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 66, "label": "PRODUCT"}, {"start": 75, "end": 79, "label": "VERSION"}, {"start": 97, "end": 117, "label": "ATTACK_VECTOR"}, {"start": 134, "end": 158, "label": "IMPACT"}, {"start": 186, "end": 193, "label": "CWE"}, {"start": 207, "end": 215, "label": "SEVERITY"}, {"start": 237, "end": 240, "label": "CVSS"}]} {"id": "1d38a0a6-494e-4848-9ee7-5907893e175c", "text": "A Denial of Service vulnerability affects OpenSSL version 9.12. It is caused by crafted HTTP request and can lead to privilege escalation. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 49, "label": "PRODUCT"}, {"start": 58, "end": 62, "label": "VERSION"}, {"start": 80, "end": 100, "label": "ATTACK_VECTOR"}, {"start": 117, "end": 137, "label": "IMPACT"}, {"start": 165, "end": 171, "label": "CWE"}, {"start": 185, "end": 188, "label": "SEVERITY"}, {"start": 210, "end": 213, "label": "CVSS"}]} {"id": "e667f488-4417-48f3-a90f-83e4fb588ff0", "text": "A Remote Code Execution vulnerability affects PHPMyAdmin version 91.0. It is caused by specially crafted packet and can lead to session hijacking. This issue corresponds to CWE-20 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 69, "label": "VERSION"}, {"start": 87, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 179, "label": "CWE"}, {"start": 193, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "87669a01-7844-448c-8102-8bc3e253c991", "text": "A Directory Traversal vulnerability affects OpenSSL version 14.2. It is caused by malformed JSON object and can lead to session hijacking. This issue corresponds to CWE-400 and is rated Critical with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 64, "label": "VERSION"}, {"start": 82, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 137, "label": "IMPACT"}, {"start": 165, "end": 172, "label": "CWE"}, {"start": 186, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "ff441345-8fae-4e8a-adad-ff71afbd3fb9", "text": "A SQL Injection vulnerability affects OpenSSL version 9.12. It is caused by unsanitized user input and can lead to arbitrary code execution. This issue corresponds to CWE-94 and is rated Medium with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 45, "label": "PRODUCT"}, {"start": 54, "end": 58, "label": "VERSION"}, {"start": 76, "end": 98, "label": "ATTACK_VECTOR"}, {"start": 115, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 173, "label": "CWE"}, {"start": 187, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "66275cf4-3422-44ea-aaa7-fb4926c6d568", "text": "A Remote Code Execution vulnerability affects MySQL Server version 14.2. It is caused by crafted HTTP request and can lead to database manipulation. This issue corresponds to CWE-400 and is rated Critical with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 71, "label": "VERSION"}, {"start": 89, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 182, "label": "CWE"}, {"start": 196, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "3a765e3a-4975-4de4-aa61-c698948ff0f0", "text": "A SQL Injection vulnerability affects Nginx Web Server version 91.0. It is caused by crafted HTTP request and can lead to arbitrary code execution. This issue corresponds to CWE-79 and is rated High with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 67, "label": "VERSION"}, {"start": 85, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 180, "label": "CWE"}, {"start": 194, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "0394e958-13ad-4580-8cd3-fd74304bdb4d", "text": "A Remote Code Execution vulnerability affects WordPress version 10.5. It is caused by injected SQL query and can lead to information disclosure. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 178, "label": "CWE"}, {"start": 192, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "415ebce8-eaf3-4785-85d2-e7353164c66b", "text": "A SQL Injection vulnerability affects PHPMyAdmin version 9.12. It is caused by crafted HTTP request and can lead to service disruption. This issue corresponds to CWE-94 and is rated Critical with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 48, "label": "PRODUCT"}, {"start": 57, "end": 61, "label": "VERSION"}, {"start": 79, "end": 99, "label": "ATTACK_VECTOR"}, {"start": 116, "end": 134, "label": "IMPACT"}, {"start": 162, "end": 168, "label": "CWE"}, {"start": 182, "end": 190, "label": "SEVERITY"}, {"start": 212, "end": 215, "label": "CVSS"}]} {"id": "2fbb5fd2-f01f-4cfe-a36d-75c474c770ac", "text": "A Directory Traversal vulnerability affects PHPMyAdmin version 91.0. It is caused by malformed JSON object and can lead to database manipulation. This issue corresponds to CWE-400 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 67, "label": "VERSION"}, {"start": 85, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "f946c107-b201-4e39-a6d9-7df780a07f2e", "text": "A Denial of Service vulnerability affects Kubernetes API Server version 2.3.1. It is caused by injected SQL query and can lead to arbitrary code execution. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 63, "label": "PRODUCT"}, {"start": 72, "end": 77, "label": "VERSION"}, {"start": 95, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 154, "label": "IMPACT"}, {"start": 182, "end": 189, "label": "CWE"}, {"start": 203, "end": 206, "label": "SEVERITY"}, {"start": 228, "end": 231, "label": "CVSS"}]} {"id": "3b43f840-f6ad-4e42-98f3-f71aae24d8ba", "text": "A Command Injection vulnerability affects Drupal version 4.18.0. It is caused by unsanitized user input and can lead to information disclosure. This issue corresponds to CWE-94 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 48, "label": "PRODUCT"}, {"start": 57, "end": 63, "label": "VERSION"}, {"start": 81, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 176, "label": "CWE"}, {"start": 190, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "666603f7-d196-4a54-bffd-23302168155f", "text": "A Authentication Bypass vulnerability affects Nginx Web Server version 4.18.0. It is caused by malicious input payload and can lead to arbitrary code execution. This issue corresponds to CWE-400 and is rated Critical with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 62, "label": "PRODUCT"}, {"start": 71, "end": 77, "label": "VERSION"}, {"start": 95, "end": 118, "label": "ATTACK_VECTOR"}, {"start": 135, "end": 159, "label": "IMPACT"}, {"start": 187, "end": 194, "label": "CWE"}, {"start": 208, "end": 216, "label": "SEVERITY"}, {"start": 238, "end": 241, "label": "CVSS"}]} {"id": "eefa432c-4674-411f-94ec-b7c19d4427cd", "text": "A Cross-Site Scripting (XSS) vulnerability affects OpenCart version 9.12. It is caused by malicious input payload and can lead to session hijacking. This issue corresponds to CWE-400 and is rated Critical with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 72, "label": "VERSION"}, {"start": 90, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 182, "label": "CWE"}, {"start": 196, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "b68eb8a3-ed8d-4c11-9b1f-48c1141d285e", "text": "A Privilege Escalation vulnerability affects PHPMyAdmin version 5.3.1. It is caused by unsanitized user input and can lead to database manipulation. This issue corresponds to CWE-94 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "79c811cf-b087-4efd-9454-729b3524eb3f", "text": "A Cross-Site Scripting (XSS) vulnerability affects OpenCart version 5.3.1. It is caused by tampered API request and can lead to privilege escalation. This issue corresponds to CWE-79 and is rated Critical with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 73, "label": "VERSION"}, {"start": 91, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 148, "label": "IMPACT"}, {"start": 176, "end": 182, "label": "CWE"}, {"start": 196, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "6498e99d-e416-49bf-9b70-87074fa4e6d4", "text": "A Authentication Bypass vulnerability affects MySQL Server version 91.0. It is caused by crafted HTTP request and can lead to session hijacking. This issue corresponds to CWE-20 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 71, "label": "VERSION"}, {"start": 89, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "e9284eb6-5ce8-4c1c-8504-26c6e092f907", "text": "A Buffer Overflow vulnerability affects Mozilla Firefox version 1.2.3. It is caused by malformed JSON object and can lead to information disclosure. This issue corresponds to CWE-400 and is rated Medium with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 182, "label": "CWE"}, {"start": 196, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "9d8d5cb6-7840-4cb8-9464-0dc39b40adc1", "text": "A Privilege Escalation vulnerability affects OpenCart version 3.0.3. It is caused by specially crafted packet and can lead to session hijacking. This issue corresponds to CWE-122 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 178, "label": "CWE"}, {"start": 192, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "5bd2b73a-d1c3-4716-b863-32096dbc0bf3", "text": "A Privilege Escalation vulnerability affects Kubernetes API Server version 10.5. It is caused by crafted HTTP request and can lead to information disclosure. This issue corresponds to CWE-122 and is rated Critical with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 66, "label": "PRODUCT"}, {"start": 75, "end": 79, "label": "VERSION"}, {"start": 97, "end": 117, "label": "ATTACK_VECTOR"}, {"start": 134, "end": 156, "label": "IMPACT"}, {"start": 184, "end": 191, "label": "CWE"}, {"start": 205, "end": 213, "label": "SEVERITY"}, {"start": 235, "end": 238, "label": "CVSS"}]} {"id": "ce3342a6-929a-4293-a2d7-81f36826f6d0", "text": "A Directory Traversal vulnerability affects MySQL Server version 2.4.7. It is caused by malformed JSON object and can lead to database manipulation. This issue corresponds to CWE-20 and is rated High with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 70, "label": "VERSION"}, {"start": 88, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "0738c243-514c-4d33-a9c8-b9ea62467940", "text": "A Denial of Service vulnerability affects Google Chrome version 5.3.1. It is caused by specially crafted packet and can lead to arbitrary code execution. This issue corresponds to CWE-400 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 152, "label": "IMPACT"}, {"start": 180, "end": 187, "label": "CWE"}, {"start": 201, "end": 207, "label": "SEVERITY"}, {"start": 229, "end": 232, "label": "CVSS"}]} {"id": "0b6fb8a4-6718-4ef4-a165-b7e4290ce41e", "text": "A Directory Traversal vulnerability affects Cisco ASA version 5.3.1. It is caused by crafted HTTP request and can lead to information disclosure. This issue corresponds to CWE-79 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "f511d7c4-e44b-4226-ac44-176303868d05", "text": "A Authentication Bypass vulnerability affects OpenSSL version 9.12. It is caused by unsanitized user input and can lead to information disclosure. This issue corresponds to CWE-400 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 66, "label": "VERSION"}, {"start": 84, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 180, "label": "CWE"}, {"start": 194, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "f3cf9272-8c3e-4b52-b04d-4651ac001099", "text": "A Authentication Bypass vulnerability affects Nginx Web Server version 9.12. It is caused by malicious input payload and can lead to service disruption. This issue corresponds to CWE-122 and is rated High with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 62, "label": "PRODUCT"}, {"start": 71, "end": 75, "label": "VERSION"}, {"start": 93, "end": 116, "label": "ATTACK_VECTOR"}, {"start": 133, "end": 151, "label": "IMPACT"}, {"start": 179, "end": 186, "label": "CWE"}, {"start": 200, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "ec62a30e-6716-48ba-aeff-f1686f58c976", "text": "A Denial of Service vulnerability affects OpenSSL version 7.4.2. It is caused by injected SQL query and can lead to privilege escalation. This issue corresponds to CWE-79 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 49, "label": "PRODUCT"}, {"start": 58, "end": 63, "label": "VERSION"}, {"start": 81, "end": 99, "label": "ATTACK_VECTOR"}, {"start": 116, "end": 136, "label": "IMPACT"}, {"start": 164, "end": 170, "label": "CWE"}, {"start": 184, "end": 188, "label": "SEVERITY"}, {"start": 210, "end": 213, "label": "CVSS"}]} {"id": "0131f4e1-6626-48b9-93e4-c402fb5709bc", "text": "A Remote Code Execution vulnerability affects Kubernetes API Server version 14.2. It is caused by specially crafted packet and can lead to session hijacking. This issue corresponds to CWE-122 and is rated High with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 67, "label": "PRODUCT"}, {"start": 76, "end": 80, "label": "VERSION"}, {"start": 98, "end": 122, "label": "ATTACK_VECTOR"}, {"start": 139, "end": 156, "label": "IMPACT"}, {"start": 184, "end": 191, "label": "CWE"}, {"start": 205, "end": 209, "label": "SEVERITY"}, {"start": 231, "end": 234, "label": "CVSS"}]} {"id": "e812e55a-6a65-41a3-aaa5-969809e6a405", "text": "A Denial of Service vulnerability affects WordPress version 4.18.0. It is caused by injected SQL query and can lead to service disruption. This issue corresponds to CWE-122 and is rated Low with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 66, "label": "VERSION"}, {"start": 84, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 137, "label": "IMPACT"}, {"start": 165, "end": 172, "label": "CWE"}, {"start": 186, "end": 189, "label": "SEVERITY"}, {"start": 211, "end": 214, "label": "CVSS"}]} {"id": "0c41c510-d49c-4319-9c9e-780d6909d180", "text": "A Cross-Site Scripting (XSS) vulnerability affects WordPress version 2.4.7. It is caused by injected SQL query and can lead to arbitrary code execution. This issue corresponds to CWE-89 and is rated Critical with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 60, "label": "PRODUCT"}, {"start": 69, "end": 74, "label": "VERSION"}, {"start": 92, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 151, "label": "IMPACT"}, {"start": 179, "end": 185, "label": "CWE"}, {"start": 199, "end": 207, "label": "SEVERITY"}, {"start": 229, "end": 232, "label": "CVSS"}]} {"id": "66510b04-8346-4047-9ee1-eb57fa426860", "text": "A Denial of Service vulnerability affects OpenSSL version 9.12. It is caused by injected SQL query and can lead to service disruption. This issue corresponds to CWE-89 and is rated Critical with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 49, "label": "PRODUCT"}, {"start": 58, "end": 62, "label": "VERSION"}, {"start": 80, "end": 98, "label": "ATTACK_VECTOR"}, {"start": 115, "end": 133, "label": "IMPACT"}, {"start": 161, "end": 167, "label": "CWE"}, {"start": 181, "end": 189, "label": "SEVERITY"}, {"start": 211, "end": 214, "label": "CVSS"}]} {"id": "c42f855c-dbd2-43d2-9cfe-2fc96b856b7d", "text": "A Cross-Site Scripting (XSS) vulnerability affects Cisco ASA version 2.3.1. It is caused by crafted HTTP request and can lead to information disclosure. This issue corresponds to CWE-94 and is rated Medium with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 60, "label": "PRODUCT"}, {"start": 69, "end": 74, "label": "VERSION"}, {"start": 92, "end": 112, "label": "ATTACK_VECTOR"}, {"start": 129, "end": 151, "label": "IMPACT"}, {"start": 179, "end": 185, "label": "CWE"}, {"start": 199, "end": 205, "label": "SEVERITY"}, {"start": 227, "end": 230, "label": "CVSS"}]} {"id": "c7ce877a-0ff2-4df2-9b2f-237dbf067bea", "text": "A SQL Injection vulnerability affects OpenSSL version 4.18.0. It is caused by crafted HTTP request and can lead to service disruption. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 45, "label": "PRODUCT"}, {"start": 54, "end": 60, "label": "VERSION"}, {"start": 78, "end": 98, "label": "ATTACK_VECTOR"}, {"start": 115, "end": 133, "label": "IMPACT"}, {"start": 161, "end": 167, "label": "CWE"}, {"start": 181, "end": 184, "label": "SEVERITY"}, {"start": 206, "end": 209, "label": "CVSS"}]} {"id": "8eaf41a4-d308-4f5c-a331-c735ba8eb6e8", "text": "A Buffer Overflow vulnerability affects OpenSSL version 2.3.1. It is caused by tampered API request and can lead to session hijacking. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 47, "label": "PRODUCT"}, {"start": 56, "end": 61, "label": "VERSION"}, {"start": 79, "end": 99, "label": "ATTACK_VECTOR"}, {"start": 116, "end": 133, "label": "IMPACT"}, {"start": 161, "end": 168, "label": "CWE"}, {"start": 182, "end": 188, "label": "SEVERITY"}, {"start": 210, "end": 213, "label": "CVSS"}]} {"id": "e383f1b9-78c0-47e8-a094-5861bed222be", "text": "A Privilege Escalation vulnerability affects OpenCart version 7.4.2. It is caused by unsanitized user input and can lead to database manipulation. This issue corresponds to CWE-200 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 180, "label": "CWE"}, {"start": 194, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "889e3522-6dfc-4772-9812-9ee0a480b9a7", "text": "A Buffer Overflow vulnerability affects OpenSSL version 3.0.3. It is caused by malicious input payload and can lead to privilege escalation. This issue corresponds to CWE-122 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 47, "label": "PRODUCT"}, {"start": 56, "end": 61, "label": "VERSION"}, {"start": 79, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 174, "label": "CWE"}, {"start": 188, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "5f4a13f1-e27e-451d-a93e-2f975c40d512", "text": "A Buffer Overflow vulnerability affects MySQL Server version 9.12. It is caused by unsanitized user input and can lead to information disclosure. This issue corresponds to CWE-400 and is rated High with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 65, "label": "VERSION"}, {"start": 83, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "bfdf9c5d-31b9-453a-b5ff-ce7de28a8fef", "text": "A Remote Code Execution vulnerability affects OpenSSL version 7.4.2. It is caused by unsanitized user input and can lead to session hijacking. This issue corresponds to CWE-400 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 176, "label": "CWE"}, {"start": 190, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "98b31878-0864-4ba9-a755-aa89a609989d", "text": "A Privilege Escalation vulnerability affects MySQL Server version 91.0. It is caused by injected SQL query and can lead to session hijacking. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 70, "label": "VERSION"}, {"start": 88, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 174, "label": "CWE"}, {"start": 188, "end": 191, "label": "SEVERITY"}, {"start": 213, "end": 216, "label": "CVSS"}]} {"id": "314039ba-7bd3-4bd3-a754-b0fad1445569", "text": "A Buffer Overflow vulnerability affects PHPMyAdmin version 6.0.1. It is caused by unsanitized user input and can lead to session hijacking. This issue corresponds to CWE-94 and is rated Critical with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 64, "label": "VERSION"}, {"start": 82, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 138, "label": "IMPACT"}, {"start": 166, "end": 172, "label": "CWE"}, {"start": 186, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "b6abe327-a7b6-4fb6-91d2-e1321031fa54", "text": "A Command Injection vulnerability affects Drupal version 1.2.3. It is caused by crafted HTTP request and can lead to privilege escalation. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 48, "label": "PRODUCT"}, {"start": 57, "end": 62, "label": "VERSION"}, {"start": 80, "end": 100, "label": "ATTACK_VECTOR"}, {"start": 117, "end": 137, "label": "IMPACT"}, {"start": 165, "end": 171, "label": "CWE"}, {"start": 185, "end": 188, "label": "SEVERITY"}, {"start": 210, "end": 213, "label": "CVSS"}]} {"id": "563faee4-66ea-4134-be21-829121d64a58", "text": "A Cross-Site Scripting (XSS) vulnerability affects Nginx Web Server version 14.2. It is caused by malicious input payload and can lead to information disclosure. This issue corresponds to CWE-94 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 67, "label": "PRODUCT"}, {"start": 76, "end": 80, "label": "VERSION"}, {"start": 98, "end": 121, "label": "ATTACK_VECTOR"}, {"start": 138, "end": 160, "label": "IMPACT"}, {"start": 188, "end": 194, "label": "CWE"}, {"start": 208, "end": 212, "label": "SEVERITY"}, {"start": 234, "end": 237, "label": "CVSS"}]} {"id": "8d1d243f-ee30-41b1-a620-df674fcf2e94", "text": "A Remote Code Execution vulnerability affects OpenSSL version 4.18.0. It is caused by unsanitized user input and can lead to information disclosure. This issue corresponds to CWE-200 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 68, "label": "VERSION"}, {"start": 86, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 182, "label": "CWE"}, {"start": 196, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "0fc2dac5-e4f9-4364-a4f7-ce2e385369fd", "text": "A Buffer Overflow vulnerability affects Kubernetes API Server version 6.0.1. It is caused by specially crafted packet and can lead to arbitrary code execution. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 75, "label": "VERSION"}, {"start": 93, "end": 117, "label": "ATTACK_VECTOR"}, {"start": 134, "end": 158, "label": "IMPACT"}, {"start": 186, "end": 192, "label": "CWE"}, {"start": 206, "end": 212, "label": "SEVERITY"}, {"start": 234, "end": 237, "label": "CVSS"}]} {"id": "2db18927-4427-4097-b096-a315c82907a3", "text": "A Command Injection vulnerability affects OpenCart version 6.0.1. It is caused by malformed JSON object and can lead to arbitrary code execution. This issue corresponds to CWE-122 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 64, "label": "VERSION"}, {"start": 82, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "86fc03cd-d1c8-443a-83ed-aaefe23876d4", "text": "A Command Injection vulnerability affects Mozilla Firefox version 3.0.3. It is caused by specially crafted packet and can lead to privilege escalation. This issue corresponds to CWE-400 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 71, "label": "VERSION"}, {"start": 89, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 150, "label": "IMPACT"}, {"start": 178, "end": 185, "label": "CWE"}, {"start": 199, "end": 205, "label": "SEVERITY"}, {"start": 227, "end": 230, "label": "CVSS"}]} {"id": "77bf2e3d-31b5-4f7c-b39e-aa2df5352f9f", "text": "A Command Injection vulnerability affects OpenCart version 5.3.1. It is caused by tampered API request and can lead to database manipulation. This issue corresponds to CWE-79 and is rated Critical with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 64, "label": "VERSION"}, {"start": 82, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 174, "label": "CWE"}, {"start": 188, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "7ee1440b-6f53-46b5-b5c9-d25ac89cf2ae", "text": "A Remote Code Execution vulnerability affects OpenCart version 7.4.2. It is caused by injected SQL query and can lead to privilege escalation. This issue corresponds to CWE-400 and is rated Medium with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 176, "label": "CWE"}, {"start": 190, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "392dcc81-fdb8-490f-9e58-09a25adf5794", "text": "A Directory Traversal vulnerability affects Google Chrome version 6.0.1. It is caused by malformed JSON object and can lead to session hijacking. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 71, "label": "VERSION"}, {"start": 89, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "5e6100e5-48ad-4974-81ed-887214d1308e", "text": "A Buffer Overflow vulnerability affects Mozilla Firefox version 7.4.2. It is caused by specially crafted packet and can lead to service disruption. This issue corresponds to CWE-400 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 181, "label": "CWE"}, {"start": 195, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "661b3045-9d54-4a12-9099-adc4e86042d6", "text": "A Privilege Escalation vulnerability affects Mozilla Firefox version 10.5. It is caused by malformed JSON object and can lead to privilege escalation. This issue corresponds to CWE-400 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 60, "label": "PRODUCT"}, {"start": 69, "end": 73, "label": "VERSION"}, {"start": 91, "end": 112, "label": "ATTACK_VECTOR"}, {"start": 129, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 184, "label": "CWE"}, {"start": 198, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "0355782d-711b-4ad4-9431-94cdb703a3c2", "text": "A Privilege Escalation vulnerability affects Nginx Web Server version 2.4.7. It is caused by tampered API request and can lead to database manipulation. This issue corresponds to CWE-122 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 75, "label": "VERSION"}, {"start": 93, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 151, "label": "IMPACT"}, {"start": 179, "end": 186, "label": "CWE"}, {"start": 200, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "c244bcb6-63f7-4b3c-b7d3-67a96aa3ffa1", "text": "A Denial of Service vulnerability affects Drupal version 6.0.1. It is caused by injected SQL query and can lead to service disruption. This issue corresponds to CWE-79 and is rated High with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 48, "label": "PRODUCT"}, {"start": 57, "end": 62, "label": "VERSION"}, {"start": 80, "end": 98, "label": "ATTACK_VECTOR"}, {"start": 115, "end": 133, "label": "IMPACT"}, {"start": 161, "end": 167, "label": "CWE"}, {"start": 181, "end": 185, "label": "SEVERITY"}, {"start": 207, "end": 210, "label": "CVSS"}]} {"id": "90ce6d20-f7ea-46c7-9828-26230ae7ce61", "text": "A Remote Code Execution vulnerability affects Mozilla Firefox version 14.2. It is caused by crafted HTTP request and can lead to privilege escalation. This issue corresponds to CWE-200 and is rated Critical with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 74, "label": "VERSION"}, {"start": 92, "end": 112, "label": "ATTACK_VECTOR"}, {"start": 129, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 184, "label": "CWE"}, {"start": 198, "end": 206, "label": "SEVERITY"}, {"start": 228, "end": 231, "label": "CVSS"}]} {"id": "e519041d-fa83-461f-b00b-d8ce1244697f", "text": "A Remote Code Execution vulnerability affects MySQL Server version 91.0. It is caused by crafted HTTP request and can lead to service disruption. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 71, "label": "VERSION"}, {"start": 89, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "d88196ce-92a2-42eb-afce-3ee905181349", "text": "A SQL Injection vulnerability affects OpenSSL version 1.2.3. It is caused by tampered API request and can lead to information disclosure. This issue corresponds to CWE-89 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 45, "label": "PRODUCT"}, {"start": 54, "end": 59, "label": "VERSION"}, {"start": 77, "end": 97, "label": "ATTACK_VECTOR"}, {"start": 114, "end": 136, "label": "IMPACT"}, {"start": 164, "end": 170, "label": "CWE"}, {"start": 184, "end": 190, "label": "SEVERITY"}, {"start": 212, "end": 215, "label": "CVSS"}]} {"id": "602c873a-32e6-454d-b6bd-4da1910393af", "text": "A Remote Code Execution vulnerability affects Mozilla Firefox version 14.2. It is caused by injected SQL query and can lead to database manipulation. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 74, "label": "VERSION"}, {"start": 92, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 148, "label": "IMPACT"}, {"start": 176, "end": 182, "label": "CWE"}, {"start": 196, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "c5d20fa4-cfc3-4757-b1ee-a52bc9ca0142", "text": "A Command Injection vulnerability affects PHPMyAdmin version 6.0.1. It is caused by specially crafted packet and can lead to arbitrary code execution. This issue corresponds to CWE-400 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 66, "label": "VERSION"}, {"start": 84, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 184, "label": "CWE"}, {"start": 198, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "0fc0f838-b0a8-42c5-a539-13580fb40cd4", "text": "A Directory Traversal vulnerability affects Apache Struts version 3.0.3. It is caused by specially crafted packet and can lead to session hijacking. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 71, "label": "VERSION"}, {"start": 89, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "db259789-c023-4ca2-9dd8-44c1e8f30d19", "text": "A Command Injection vulnerability affects PHPMyAdmin version 3.0.3. It is caused by injected SQL query and can lead to session hijacking. This issue corresponds to CWE-20 and is rated High with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 66, "label": "VERSION"}, {"start": 84, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 136, "label": "IMPACT"}, {"start": 164, "end": 170, "label": "CWE"}, {"start": 184, "end": 188, "label": "SEVERITY"}, {"start": 210, "end": 213, "label": "CVSS"}]} {"id": "68336938-ac1b-4170-8d5f-a6fca508b197", "text": "A Command Injection vulnerability affects Mozilla Firefox version 91.0. It is caused by tampered API request and can lead to privilege escalation. This issue corresponds to CWE-400 and is rated Critical with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 70, "label": "VERSION"}, {"start": 88, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 180, "label": "CWE"}, {"start": 194, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "a3569c2a-0541-402f-8ee2-8a36208e911c", "text": "A Authentication Bypass vulnerability affects Kubernetes API Server version 14.2. It is caused by malicious input payload and can lead to arbitrary code execution. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 67, "label": "PRODUCT"}, {"start": 76, "end": 80, "label": "VERSION"}, {"start": 98, "end": 121, "label": "ATTACK_VECTOR"}, {"start": 138, "end": 162, "label": "IMPACT"}, {"start": 190, "end": 196, "label": "CWE"}, {"start": 210, "end": 213, "label": "SEVERITY"}, {"start": 235, "end": 238, "label": "CVSS"}]} {"id": "9c15d3ad-3826-4ff1-a7f0-c4dfaaa76635", "text": "A Authentication Bypass vulnerability affects PHPMyAdmin version 4.18.0. It is caused by crafted HTTP request and can lead to privilege escalation. This issue corresponds to CWE-94 and is rated Medium with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 71, "label": "VERSION"}, {"start": 89, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 180, "label": "CWE"}, {"start": 194, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "508f22c2-b25c-4725-881a-0f42306936ff", "text": "A Privilege Escalation vulnerability affects PHPMyAdmin version 9.12. It is caused by malformed JSON object and can lead to service disruption. This issue corresponds to CWE-122 and is rated Low with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 177, "label": "CWE"}, {"start": 191, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "097faafb-d6ad-4ed6-9d6c-cea89973fc3f", "text": "A Buffer Overflow vulnerability affects PostgreSQL version 91.0. It is caused by crafted HTTP request and can lead to database manipulation. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 63, "label": "VERSION"}, {"start": 81, "end": 101, "label": "ATTACK_VECTOR"}, {"start": 118, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 174, "label": "CWE"}, {"start": 188, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "e9ab5f73-2bb8-4633-9802-87da9d700a31", "text": "A Privilege Escalation vulnerability affects Cisco ASA version 5.3.1. It is caused by crafted HTTP request and can lead to database manipulation. This issue corresponds to CWE-20 and is rated High with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "d3175981-4749-485b-8a6a-07980b0e2fd3", "text": "A Cross-Site Scripting (XSS) vulnerability affects Docker Engine version 2.3.1. It is caused by malformed JSON object and can lead to session hijacking. This issue corresponds to CWE-122 and is rated Critical with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 64, "label": "PRODUCT"}, {"start": 73, "end": 78, "label": "VERSION"}, {"start": 96, "end": 117, "label": "ATTACK_VECTOR"}, {"start": 134, "end": 151, "label": "IMPACT"}, {"start": 179, "end": 186, "label": "CWE"}, {"start": 200, "end": 208, "label": "SEVERITY"}, {"start": 230, "end": 233, "label": "CVSS"}]} {"id": "55a4e38a-3be1-433c-9cf3-f927acb1359a", "text": "A Cross-Site Scripting (XSS) vulnerability affects Kubernetes API Server version 91.0. It is caused by tampered API request and can lead to session hijacking. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 72, "label": "PRODUCT"}, {"start": 81, "end": 85, "label": "VERSION"}, {"start": 103, "end": 123, "label": "ATTACK_VECTOR"}, {"start": 140, "end": 157, "label": "IMPACT"}, {"start": 185, "end": 192, "label": "CWE"}, {"start": 206, "end": 209, "label": "SEVERITY"}, {"start": 231, "end": 234, "label": "CVSS"}]} {"id": "effd3db4-4ec1-4d7b-b539-68d6f9bf28be", "text": "A SQL Injection vulnerability affects OpenCart version 3.0.3. It is caused by malicious input payload and can lead to privilege escalation. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 46, "label": "PRODUCT"}, {"start": 55, "end": 60, "label": "VERSION"}, {"start": 78, "end": 101, "label": "ATTACK_VECTOR"}, {"start": 118, "end": 138, "label": "IMPACT"}, {"start": 166, "end": 172, "label": "CWE"}, {"start": 186, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "8ec37306-3ecb-421a-b6e1-4a61356caca5", "text": "A Cross-Site Scripting (XSS) vulnerability affects Nginx Web Server version 6.0.1. It is caused by specially crafted packet and can lead to privilege escalation. This issue corresponds to CWE-20 and is rated Critical with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 67, "label": "PRODUCT"}, {"start": 76, "end": 81, "label": "VERSION"}, {"start": 99, "end": 123, "label": "ATTACK_VECTOR"}, {"start": 140, "end": 160, "label": "IMPACT"}, {"start": 188, "end": 194, "label": "CWE"}, {"start": 208, "end": 216, "label": "SEVERITY"}, {"start": 238, "end": 241, "label": "CVSS"}]} {"id": "e6982f02-17be-4c00-85ae-347625302f79", "text": "A Privilege Escalation vulnerability affects PostgreSQL version 91.0. It is caused by crafted HTTP request and can lead to service disruption. This issue corresponds to CWE-400 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 176, "label": "CWE"}, {"start": 190, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "f5d23219-ff3a-4213-b811-551d5cb33af7", "text": "A Directory Traversal vulnerability affects MySQL Server version 3.0.3. It is caused by injected SQL query and can lead to arbitrary code execution. This issue corresponds to CWE-20 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 70, "label": "VERSION"}, {"start": 88, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "0aed88f0-4cf5-45c0-be89-81b012fe2654", "text": "A Denial of Service vulnerability affects Drupal version 7.4.2. It is caused by specially crafted packet and can lead to information disclosure. This issue corresponds to CWE-200 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 48, "label": "PRODUCT"}, {"start": 57, "end": 62, "label": "VERSION"}, {"start": 80, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 178, "label": "CWE"}, {"start": 192, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "04b602ce-8459-4c08-881f-351ab6168f10", "text": "A Privilege Escalation vulnerability affects PostgreSQL version 7.4.2. It is caused by tampered API request and can lead to database manipulation. This issue corresponds to CWE-122 and is rated Critical with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 180, "label": "CWE"}, {"start": 194, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "addcab15-c84f-4d57-82e3-121bab0cc019", "text": "A Authentication Bypass vulnerability affects Nginx Web Server version 4.18.0. It is caused by specially crafted packet and can lead to privilege escalation. This issue corresponds to CWE-200 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 62, "label": "PRODUCT"}, {"start": 71, "end": 77, "label": "VERSION"}, {"start": 95, "end": 119, "label": "ATTACK_VECTOR"}, {"start": 136, "end": 156, "label": "IMPACT"}, {"start": 184, "end": 191, "label": "CWE"}, {"start": 205, "end": 209, "label": "SEVERITY"}, {"start": 231, "end": 234, "label": "CVSS"}]} {"id": "1c3e2ab7-4628-41c2-bcc5-9f7f173e821f", "text": "A Directory Traversal vulnerability affects PHPMyAdmin version 4.18.0. It is caused by malformed JSON object and can lead to privilege escalation. This issue corresponds to CWE-400 and is rated Medium with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 69, "label": "VERSION"}, {"start": 87, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 180, "label": "CWE"}, {"start": 194, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "c92525e2-69de-42b3-87b9-a40d9206cd60", "text": "A Buffer Overflow vulnerability affects Mozilla Firefox version 1.2.3. It is caused by unsanitized user input and can lead to database manipulation. This issue corresponds to CWE-94 and is rated Critical with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "60159bf6-9733-4668-ad23-c232f4ed3eab", "text": "A SQL Injection vulnerability affects Docker Engine version 2.4.7. It is caused by crafted HTTP request and can lead to service disruption. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 138, "label": "IMPACT"}, {"start": 166, "end": 172, "label": "CWE"}, {"start": 186, "end": 189, "label": "SEVERITY"}, {"start": 211, "end": 214, "label": "CVSS"}]} {"id": "2cc3b7ad-9afc-48e5-a603-8aa6af63302d", "text": "A Denial of Service vulnerability affects WordPress version 4.18.0. It is caused by malicious input payload and can lead to session hijacking. This issue corresponds to CWE-94 and is rated Critical with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 66, "label": "VERSION"}, {"start": 84, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 175, "label": "CWE"}, {"start": 189, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "f487f9f1-4187-4ee7-89b6-676918676e6f", "text": "A Buffer Overflow vulnerability affects Jenkins version 2.3.1. It is caused by injected SQL query and can lead to database manipulation. This issue corresponds to CWE-122 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 47, "label": "PRODUCT"}, {"start": 56, "end": 61, "label": "VERSION"}, {"start": 79, "end": 97, "label": "ATTACK_VECTOR"}, {"start": 114, "end": 135, "label": "IMPACT"}, {"start": 163, "end": 170, "label": "CWE"}, {"start": 184, "end": 188, "label": "SEVERITY"}, {"start": 210, "end": 213, "label": "CVSS"}]} {"id": "190df8a4-a68d-4c9c-a279-5ec162079bdd", "text": "A Authentication Bypass vulnerability affects Cisco ASA version 4.18.0. It is caused by tampered API request and can lead to privilege escalation. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 70, "label": "VERSION"}, {"start": 88, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 179, "label": "CWE"}, {"start": 193, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "60c3923b-566d-4976-8549-fc606aee6ddf", "text": "A Denial of Service vulnerability affects Drupal version 7.4.2. It is caused by crafted HTTP request and can lead to database manipulation. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 48, "label": "PRODUCT"}, {"start": 57, "end": 62, "label": "VERSION"}, {"start": 80, "end": 100, "label": "ATTACK_VECTOR"}, {"start": 117, "end": 138, "label": "IMPACT"}, {"start": 166, "end": 172, "label": "CWE"}, {"start": 186, "end": 189, "label": "SEVERITY"}, {"start": 211, "end": 214, "label": "CVSS"}]} {"id": "21aa63d6-eec9-41af-bc8f-99ff58bdb9f3", "text": "A Privilege Escalation vulnerability affects OpenCart version 9.12. It is caused by malformed JSON object and can lead to session hijacking. This issue corresponds to CWE-20 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 66, "label": "VERSION"}, {"start": 84, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 173, "label": "CWE"}, {"start": 187, "end": 191, "label": "SEVERITY"}, {"start": 213, "end": 216, "label": "CVSS"}]} {"id": "fa69a2dd-d62e-4750-9cc9-fe0614b1540c", "text": "A Remote Code Execution vulnerability affects PostgreSQL version 91.0. It is caused by malicious input payload and can lead to service disruption. This issue corresponds to CWE-89 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 69, "label": "VERSION"}, {"start": 87, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 179, "label": "CWE"}, {"start": 193, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "bd625bed-4242-4043-9375-28141b0b76de", "text": "A Cross-Site Scripting (XSS) vulnerability affects Apache Struts version 5.3.1. It is caused by unsanitized user input and can lead to privilege escalation. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 64, "label": "PRODUCT"}, {"start": 73, "end": 78, "label": "VERSION"}, {"start": 96, "end": 118, "label": "ATTACK_VECTOR"}, {"start": 135, "end": 155, "label": "IMPACT"}, {"start": 183, "end": 189, "label": "CWE"}, {"start": 203, "end": 206, "label": "SEVERITY"}, {"start": 228, "end": 231, "label": "CVSS"}]} {"id": "a0765395-1d41-401c-b77c-d3729a71ffa2", "text": "A Denial of Service vulnerability affects Mozilla Firefox version 6.0.1. It is caused by malicious input payload and can lead to privilege escalation. This issue corresponds to CWE-89 and is rated Critical with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 71, "label": "VERSION"}, {"start": 89, "end": 112, "label": "ATTACK_VECTOR"}, {"start": 129, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 183, "label": "CWE"}, {"start": 197, "end": 205, "label": "SEVERITY"}, {"start": 227, "end": 230, "label": "CVSS"}]} {"id": "18582033-f77f-4c09-b383-feaef3a366e1", "text": "A SQL Injection vulnerability affects MySQL Server version 91.0. It is caused by malformed JSON object and can lead to service disruption. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 63, "label": "VERSION"}, {"start": 81, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 137, "label": "IMPACT"}, {"start": 165, "end": 171, "label": "CWE"}, {"start": 185, "end": 188, "label": "SEVERITY"}, {"start": 210, "end": 213, "label": "CVSS"}]} {"id": "488be8d7-4d28-41af-bdc7-5e402b6bc060", "text": "A Remote Code Execution vulnerability affects PHPMyAdmin version 9.12. It is caused by malformed JSON object and can lead to database manipulation. This issue corresponds to CWE-122 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 69, "label": "VERSION"}, {"start": 87, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 181, "label": "CWE"}, {"start": 195, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "8ab25ca3-6220-4b71-8afa-2f62dfa91160", "text": "A Directory Traversal vulnerability affects Docker Engine version 91.0. It is caused by injected SQL query and can lead to arbitrary code execution. This issue corresponds to CWE-89 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 70, "label": "VERSION"}, {"start": 88, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "03db59ee-76ce-4eec-b355-66d8e6ac9900", "text": "A SQL Injection vulnerability affects Docker Engine version 9.12. It is caused by malformed JSON object and can lead to service disruption. This issue corresponds to CWE-89 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 64, "label": "VERSION"}, {"start": 82, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 138, "label": "IMPACT"}, {"start": 166, "end": 172, "label": "CWE"}, {"start": 186, "end": 190, "label": "SEVERITY"}, {"start": 212, "end": 215, "label": "CVSS"}]} {"id": "1fb05e32-3e60-4a9a-8608-593d2b61b681", "text": "A Buffer Overflow vulnerability affects PostgreSQL version 2.3.1. It is caused by malicious input payload and can lead to privilege escalation. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 64, "label": "VERSION"}, {"start": 82, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 177, "label": "CWE"}, {"start": 191, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "4c0f3a4c-338a-4295-b41c-8c566a45d7ba", "text": "A Privilege Escalation vulnerability affects PostgreSQL version 1.2.3. It is caused by unsanitized user input and can lead to privilege escalation. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 181, "label": "CWE"}, {"start": 195, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "11c7d1d9-db58-460b-8cbd-9779516a76c0", "text": "A Privilege Escalation vulnerability affects Apache Struts version 1.2.3. It is caused by tampered API request and can lead to information disclosure. This issue corresponds to CWE-122 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 72, "label": "VERSION"}, {"start": 90, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 184, "label": "CWE"}, {"start": 198, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "a9640576-97ea-4d42-8b5b-9f69564b8d73", "text": "A Command Injection vulnerability affects PostgreSQL version 4.18.0. It is caused by malicious input payload and can lead to arbitrary code execution. This issue corresponds to CWE-79 and is rated Medium with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 67, "label": "VERSION"}, {"start": 85, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 183, "label": "CWE"}, {"start": 197, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "e3fef192-6f33-4bc9-8d01-81449f9e9beb", "text": "A Command Injection vulnerability affects Drupal version 3.0.3. It is caused by malformed JSON object and can lead to arbitrary code execution. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 48, "label": "PRODUCT"}, {"start": 57, "end": 62, "label": "VERSION"}, {"start": 80, "end": 101, "label": "ATTACK_VECTOR"}, {"start": 118, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 177, "label": "CWE"}, {"start": 191, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "3d6dea55-34d2-40b0-909c-6d2a0d123c59", "text": "A SQL Injection vulnerability affects Kubernetes API Server version 91.0. It is caused by specially crafted packet and can lead to session hijacking. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 72, "label": "VERSION"}, {"start": 90, "end": 114, "label": "ATTACK_VECTOR"}, {"start": 131, "end": 148, "label": "IMPACT"}, {"start": 176, "end": 182, "label": "CWE"}, {"start": 196, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "9d01754b-687b-46f7-a778-eb3bde973bca", "text": "A Privilege Escalation vulnerability affects Docker Engine version 6.0.1. It is caused by tampered API request and can lead to privilege escalation. This issue corresponds to CWE-79 and is rated Medium with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 72, "label": "VERSION"}, {"start": 90, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "39e81c69-c55e-4c24-9a35-380e03ec4b5b", "text": "A Command Injection vulnerability affects PostgreSQL version 4.18.0. It is caused by injected SQL query and can lead to arbitrary code execution. This issue corresponds to CWE-20 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 67, "label": "VERSION"}, {"start": 85, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "2acc3d01-ca80-4e7f-8a9e-f3e10d5552c3", "text": "A Buffer Overflow vulnerability affects Mozilla Firefox version 10.5. It is caused by tampered API request and can lead to privilege escalation. This issue corresponds to CWE-20 and is rated Critical with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "a2192835-6524-4426-a711-24201d5cd29d", "text": "A Remote Code Execution vulnerability affects PHPMyAdmin version 5.3.1. It is caused by unsanitized user input and can lead to service disruption. This issue corresponds to CWE-79 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 70, "label": "VERSION"}, {"start": 88, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 179, "label": "CWE"}, {"start": 193, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "6d6c5004-fe44-4320-a76c-f54edb2c1aae", "text": "A Authentication Bypass vulnerability affects Drupal version 5.3.1. It is caused by malicious input payload and can lead to information disclosure. This issue corresponds to CWE-89 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 66, "label": "VERSION"}, {"start": 84, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 180, "label": "CWE"}, {"start": 194, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "e4b170dd-914c-4c01-851a-6a7878aa0598", "text": "A Remote Code Execution vulnerability affects OpenSSL version 1.2.3. It is caused by unsanitized user input and can lead to session hijacking. This issue corresponds to CWE-200 and is rated Medium with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 176, "label": "CWE"}, {"start": 190, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "3e3f2338-5537-40d8-b27b-20869db6e1ad", "text": "A Directory Traversal vulnerability affects Docker Engine version 10.5. It is caused by malicious input payload and can lead to information disclosure. This issue corresponds to CWE-94 and is rated Critical with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 70, "label": "VERSION"}, {"start": 88, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 150, "label": "IMPACT"}, {"start": 178, "end": 184, "label": "CWE"}, {"start": 198, "end": 206, "label": "SEVERITY"}, {"start": 228, "end": 231, "label": "CVSS"}]} {"id": "0d963780-5e16-4bf2-8959-e9f56a39b9bd", "text": "A Authentication Bypass vulnerability affects Apache Struts version 2.4.7. It is caused by unsanitized user input and can lead to arbitrary code execution. This issue corresponds to CWE-94 and is rated Critical with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 73, "label": "VERSION"}, {"start": 91, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 154, "label": "IMPACT"}, {"start": 182, "end": 188, "label": "CWE"}, {"start": 202, "end": 210, "label": "SEVERITY"}, {"start": 232, "end": 235, "label": "CVSS"}]} {"id": "62265e77-7ce4-4df0-8de3-148f27c0b92f", "text": "A Denial of Service vulnerability affects PostgreSQL version 14.2. It is caused by malformed JSON object and can lead to session hijacking. This issue corresponds to CWE-400 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 65, "label": "VERSION"}, {"start": 83, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 138, "label": "IMPACT"}, {"start": 166, "end": 173, "label": "CWE"}, {"start": 187, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "889b7ab2-1fd9-4a2f-91b5-a4b44317f7ab", "text": "A Privilege Escalation vulnerability affects PostgreSQL version 2.3.1. It is caused by crafted HTTP request and can lead to session hijacking. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 175, "label": "CWE"}, {"start": 189, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "4ea7bbb5-6ec6-4f4b-81c5-10b25c54bd69", "text": "A Authentication Bypass vulnerability affects OpenSSL version 1.2.3. It is caused by injected SQL query and can lead to privilege escalation. This issue corresponds to CWE-122 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 175, "label": "CWE"}, {"start": 189, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "a49f6c52-1d62-4c72-9938-444fcc68f8e1", "text": "A Command Injection vulnerability affects Drupal version 4.18.0. It is caused by malformed JSON object and can lead to information disclosure. This issue corresponds to CWE-400 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 48, "label": "PRODUCT"}, {"start": 57, "end": 63, "label": "VERSION"}, {"start": 81, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 176, "label": "CWE"}, {"start": 190, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "5e3841d4-97ac-4bd4-a142-fb6f29317952", "text": "A Command Injection vulnerability affects Cisco ASA version 1.2.3. It is caused by tampered API request and can lead to database manipulation. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 175, "label": "CWE"}, {"start": 189, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "15b24750-6af5-46fd-b303-3c6a9603abe3", "text": "A Authentication Bypass vulnerability affects PostgreSQL version 2.4.7. It is caused by tampered API request and can lead to session hijacking. This issue corresponds to CWE-20 and is rated Low with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 70, "label": "VERSION"}, {"start": 88, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 176, "label": "CWE"}, {"start": 190, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "49153074-a672-4584-ba86-eb2c71d57dbb", "text": "A Authentication Bypass vulnerability affects Jenkins version 91.0. It is caused by injected SQL query and can lead to privilege escalation. This issue corresponds to CWE-122 and is rated Critical with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 66, "label": "VERSION"}, {"start": 84, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 174, "label": "CWE"}, {"start": 188, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "fc089dc4-30a9-4cdd-aa21-69faf8fa4c2c", "text": "A Cross-Site Scripting (XSS) vulnerability affects WordPress version 3.0.3. It is caused by malformed JSON object and can lead to information disclosure. This issue corresponds to CWE-79 and is rated High with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 60, "label": "PRODUCT"}, {"start": 69, "end": 74, "label": "VERSION"}, {"start": 92, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 152, "label": "IMPACT"}, {"start": 180, "end": 186, "label": "CWE"}, {"start": 200, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "10564eb1-720e-4bfa-85e2-49a3c39abf6c", "text": "A Remote Code Execution vulnerability affects Jenkins version 1.2.3. It is caused by specially crafted packet and can lead to privilege escalation. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 181, "label": "CWE"}, {"start": 195, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "7c07156f-77c3-4e3a-b956-f5ed301e8332", "text": "A Privilege Escalation vulnerability affects Drupal version 14.2. It is caused by malformed JSON object and can lead to information disclosure. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 64, "label": "VERSION"}, {"start": 82, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 176, "label": "CWE"}, {"start": 190, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "fa869c36-f0d5-404a-91f1-bc67a02a99c6", "text": "A Privilege Escalation vulnerability affects Nginx Web Server version 6.0.1. It is caused by crafted HTTP request and can lead to arbitrary code execution. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 75, "label": "VERSION"}, {"start": 93, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 154, "label": "IMPACT"}, {"start": 182, "end": 189, "label": "CWE"}, {"start": 203, "end": 209, "label": "SEVERITY"}, {"start": 231, "end": 234, "label": "CVSS"}]} {"id": "cb26f100-8439-4cd7-b772-7fcb10b36b6d", "text": "A SQL Injection vulnerability affects Nginx Web Server version 1.2.3. It is caused by injected SQL query and can lead to service disruption. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 173, "label": "CWE"}, {"start": 187, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "22c59ac9-aff4-412f-a0ab-82961603edaf", "text": "A SQL Injection vulnerability affects WordPress version 14.2. It is caused by malformed JSON object and can lead to service disruption. This issue corresponds to CWE-400 and is rated Critical with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 47, "label": "PRODUCT"}, {"start": 56, "end": 60, "label": "VERSION"}, {"start": 78, "end": 99, "label": "ATTACK_VECTOR"}, {"start": 116, "end": 134, "label": "IMPACT"}, {"start": 162, "end": 169, "label": "CWE"}, {"start": 183, "end": 191, "label": "SEVERITY"}, {"start": 213, "end": 216, "label": "CVSS"}]} {"id": "7a6204a3-b249-49de-995e-5c429ccbe5d6", "text": "A Privilege Escalation vulnerability affects Apache Struts version 2.3.1. It is caused by tampered API request and can lead to privilege escalation. This issue corresponds to CWE-89 and is rated High with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 72, "label": "VERSION"}, {"start": 90, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "07925df3-11da-4e81-9c9b-15a6264498eb", "text": "A Authentication Bypass vulnerability affects Mozilla Firefox version 14.2. It is caused by malformed JSON object and can lead to information disclosure. This issue corresponds to CWE-89 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 74, "label": "VERSION"}, {"start": 92, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 152, "label": "IMPACT"}, {"start": 180, "end": 186, "label": "CWE"}, {"start": 200, "end": 206, "label": "SEVERITY"}, {"start": 228, "end": 231, "label": "CVSS"}]} {"id": "fc9a0ba8-c8ef-484a-ada4-95cd54cbab76", "text": "A Remote Code Execution vulnerability affects Google Chrome version 2.4.7. It is caused by injected SQL query and can lead to service disruption. This issue corresponds to CWE-89 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 73, "label": "VERSION"}, {"start": 91, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "21fee0b0-d6e4-4359-afdf-ec877a80c518", "text": "A Buffer Overflow vulnerability affects Cisco ASA version 4.18.0. It is caused by tampered API request and can lead to session hijacking. This issue corresponds to CWE-94 and is rated Critical with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 49, "label": "PRODUCT"}, {"start": 58, "end": 64, "label": "VERSION"}, {"start": 82, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 136, "label": "IMPACT"}, {"start": 164, "end": 170, "label": "CWE"}, {"start": 184, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "20a7062d-fa14-43cb-9025-6e3ed0ec8f82", "text": "A Privilege Escalation vulnerability affects WordPress version 2.3.1. It is caused by unsanitized user input and can lead to arbitrary code execution. This issue corresponds to CWE-200 and is rated High with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 184, "label": "CWE"}, {"start": 198, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "4ac1d0da-2447-4cca-b9a0-52f35cc3f8fa", "text": "A Remote Code Execution vulnerability affects PostgreSQL version 7.4.2. It is caused by malformed JSON object and can lead to service disruption. This issue corresponds to CWE-400 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 70, "label": "VERSION"}, {"start": 88, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "db27b69e-7e8f-43e7-8e85-2ddf95b940bd", "text": "A Directory Traversal vulnerability affects Google Chrome version 4.18.0. It is caused by crafted HTTP request and can lead to arbitrary code execution. This issue corresponds to CWE-79 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 72, "label": "VERSION"}, {"start": 90, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 151, "label": "IMPACT"}, {"start": 179, "end": 185, "label": "CWE"}, {"start": 199, "end": 205, "label": "SEVERITY"}, {"start": 227, "end": 230, "label": "CVSS"}]} {"id": "d26ade8b-4f3b-4619-8eb6-547137ae4208", "text": "A Directory Traversal vulnerability affects WordPress version 6.0.1. It is caused by unsanitized user input and can lead to information disclosure. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 181, "label": "CWE"}, {"start": 195, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "8cf41f87-2b16-4fd7-ac00-a56c7b84f8bb", "text": "A Buffer Overflow vulnerability affects MySQL Server version 2.3.1. It is caused by injected SQL query and can lead to information disclosure. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 66, "label": "VERSION"}, {"start": 84, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 176, "label": "CWE"}, {"start": 190, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "0eea85e0-fb80-4854-bde6-cacc86c64032", "text": "A Directory Traversal vulnerability affects Apache Struts version 3.0.3. It is caused by injected SQL query and can lead to privilege escalation. This issue corresponds to CWE-94 and is rated High with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 71, "label": "VERSION"}, {"start": 89, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "2e65a80f-13d6-4c3d-98a8-bc52252920e2", "text": "A Command Injection vulnerability affects Google Chrome version 1.2.3. It is caused by unsanitized user input and can lead to session hijacking. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "15a13ce3-84d8-4ac4-96a4-e92eb0452384", "text": "A Cross-Site Scripting (XSS) vulnerability affects Kubernetes API Server version 4.18.0. It is caused by crafted HTTP request and can lead to arbitrary code execution. This issue corresponds to CWE-122 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 72, "label": "PRODUCT"}, {"start": 81, "end": 87, "label": "VERSION"}, {"start": 105, "end": 125, "label": "ATTACK_VECTOR"}, {"start": 142, "end": 166, "label": "IMPACT"}, {"start": 194, "end": 201, "label": "CWE"}, {"start": 215, "end": 218, "label": "SEVERITY"}, {"start": 240, "end": 243, "label": "CVSS"}]} {"id": "491ba428-09e5-4d09-9c9d-86f29b97b720", "text": "A Denial of Service vulnerability affects OpenCart version 4.18.0. It is caused by malicious input payload and can lead to session hijacking. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 65, "label": "VERSION"}, {"start": 83, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 175, "label": "CWE"}, {"start": 189, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "45403969-55f9-4e8e-ac71-8c5b2d74a084", "text": "A Cross-Site Scripting (XSS) vulnerability affects Google Chrome version 2.4.7. It is caused by specially crafted packet and can lead to information disclosure. This issue corresponds to CWE-89 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 64, "label": "PRODUCT"}, {"start": 73, "end": 78, "label": "VERSION"}, {"start": 96, "end": 120, "label": "ATTACK_VECTOR"}, {"start": 137, "end": 159, "label": "IMPACT"}, {"start": 187, "end": 193, "label": "CWE"}, {"start": 207, "end": 211, "label": "SEVERITY"}, {"start": 233, "end": 236, "label": "CVSS"}]} {"id": "12a27028-6968-4e7c-bcdc-09bc24fddfab", "text": "A Denial of Service vulnerability affects PHPMyAdmin version 2.3.1. It is caused by tampered API request and can lead to session hijacking. This issue corresponds to CWE-20 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 66, "label": "VERSION"}, {"start": 84, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 138, "label": "IMPACT"}, {"start": 166, "end": 172, "label": "CWE"}, {"start": 186, "end": 189, "label": "SEVERITY"}, {"start": 211, "end": 214, "label": "CVSS"}]} {"id": "2bce3aec-cef5-4350-adca-fb11940e7620", "text": "A Denial of Service vulnerability affects Mozilla Firefox version 6.0.1. It is caused by malformed JSON object and can lead to database manipulation. This issue corresponds to CWE-89 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 71, "label": "VERSION"}, {"start": 89, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 148, "label": "IMPACT"}, {"start": 176, "end": 182, "label": "CWE"}, {"start": 196, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "4c27d012-3dd2-4901-801b-e9af78eaa9f5", "text": "A Buffer Overflow vulnerability affects Apache Struts version 5.3.1. It is caused by injected SQL query and can lead to arbitrary code execution. This issue corresponds to CWE-200 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "d6db2146-f832-48bb-8411-3f77106fff41", "text": "A Command Injection vulnerability affects Nginx Web Server version 1.2.3. It is caused by injected SQL query and can lead to service disruption. This issue corresponds to CWE-200 and is rated Critical with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 72, "label": "VERSION"}, {"start": 90, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 178, "label": "CWE"}, {"start": 192, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "58391dcd-e95c-44f1-9af6-ba493a972aa2", "text": "A Remote Code Execution vulnerability affects Apache Struts version 9.12. It is caused by malformed JSON object and can lead to service disruption. This issue corresponds to CWE-20 and is rated Critical with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 72, "label": "VERSION"}, {"start": 90, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 180, "label": "CWE"}, {"start": 194, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "416c8266-75e2-4ddb-9753-e7f7445b4e5f", "text": "A Command Injection vulnerability affects Kubernetes API Server version 5.3.1. It is caused by specially crafted packet and can lead to information disclosure. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 63, "label": "PRODUCT"}, {"start": 72, "end": 77, "label": "VERSION"}, {"start": 95, "end": 119, "label": "ATTACK_VECTOR"}, {"start": 136, "end": 158, "label": "IMPACT"}, {"start": 186, "end": 192, "label": "CWE"}, {"start": 206, "end": 209, "label": "SEVERITY"}, {"start": 231, "end": 234, "label": "CVSS"}]} {"id": "ffa62593-669e-4b20-9fd5-02e053fd3eb8", "text": "A Privilege Escalation vulnerability affects Drupal version 14.2. It is caused by tampered API request and can lead to privilege escalation. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 64, "label": "VERSION"}, {"start": 82, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 173, "label": "CWE"}, {"start": 187, "end": 190, "label": "SEVERITY"}, {"start": 212, "end": 215, "label": "CVSS"}]} {"id": "0d1d60da-0579-4131-8015-cc9755395baf", "text": "A Command Injection vulnerability affects Drupal version 4.18.0. It is caused by malformed JSON object and can lead to arbitrary code execution. This issue corresponds to CWE-20 and is rated High with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 48, "label": "PRODUCT"}, {"start": 57, "end": 63, "label": "VERSION"}, {"start": 81, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "039216d7-2e89-4e57-8ef1-db3e4aad39eb", "text": "A Denial of Service vulnerability affects OpenCart version 6.0.1. It is caused by crafted HTTP request and can lead to database manipulation. This issue corresponds to CWE-89 and is rated High with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 64, "label": "VERSION"}, {"start": 82, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 174, "label": "CWE"}, {"start": 188, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "29a38070-641c-4923-ab34-7a2b097a0399", "text": "A Denial of Service vulnerability affects PostgreSQL version 10.5. It is caused by injected SQL query and can lead to information disclosure. This issue corresponds to CWE-94 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 65, "label": "VERSION"}, {"start": 83, "end": 101, "label": "ATTACK_VECTOR"}, {"start": 118, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 174, "label": "CWE"}, {"start": 188, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "398c6530-1ac1-4390-9f7f-3dc2ed85b326", "text": "A Remote Code Execution vulnerability affects PHPMyAdmin version 14.2. It is caused by malformed JSON object and can lead to information disclosure. This issue corresponds to CWE-400 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 69, "label": "VERSION"}, {"start": 87, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 182, "label": "CWE"}, {"start": 196, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "23a00e9c-bc3b-45a4-94b3-fddd59a01666", "text": "A Command Injection vulnerability affects Docker Engine version 14.2. It is caused by tampered API request and can lead to information disclosure. This issue corresponds to CWE-400 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 180, "label": "CWE"}, {"start": 194, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "8b6c5455-7960-4d4a-b193-491378564bed", "text": "A Authentication Bypass vulnerability affects Mozilla Firefox version 2.4.7. It is caused by malformed JSON object and can lead to privilege escalation. This issue corresponds to CWE-200 and is rated High with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 75, "label": "VERSION"}, {"start": 93, "end": 114, "label": "ATTACK_VECTOR"}, {"start": 131, "end": 151, "label": "IMPACT"}, {"start": 179, "end": 186, "label": "CWE"}, {"start": 200, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "65312df6-457b-4e65-859c-c5894f31c874", "text": "A Authentication Bypass vulnerability affects PostgreSQL version 10.5. It is caused by malicious input payload and can lead to service disruption. This issue corresponds to CWE-200 and is rated High with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 69, "label": "VERSION"}, {"start": 87, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 180, "label": "CWE"}, {"start": 194, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "b461fdee-7063-48db-83e4-b1ac3b7a6647", "text": "A Privilege Escalation vulnerability affects Cisco ASA version 2.4.7. It is caused by unsanitized user input and can lead to session hijacking. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 177, "label": "CWE"}, {"start": 191, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "eed70c57-bf53-424e-914e-216eff77cc4b", "text": "A Directory Traversal vulnerability affects PHPMyAdmin version 1.2.3. It is caused by crafted HTTP request and can lead to service disruption. This issue corresponds to CWE-89 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 175, "label": "CWE"}, {"start": 189, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "feb3f16a-23e7-47c7-adac-f723b046fc62", "text": "A Denial of Service vulnerability affects PHPMyAdmin version 9.12. It is caused by malformed JSON object and can lead to database manipulation. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 65, "label": "VERSION"}, {"start": 83, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 177, "label": "CWE"}, {"start": 191, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "a03a0c66-5d87-476c-ad3f-bcbc0154c0d8", "text": "A Cross-Site Scripting (XSS) vulnerability affects Nginx Web Server version 9.12. It is caused by unsanitized user input and can lead to session hijacking. This issue corresponds to CWE-122 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 67, "label": "PRODUCT"}, {"start": 76, "end": 80, "label": "VERSION"}, {"start": 98, "end": 120, "label": "ATTACK_VECTOR"}, {"start": 137, "end": 154, "label": "IMPACT"}, {"start": 182, "end": 189, "label": "CWE"}, {"start": 203, "end": 207, "label": "SEVERITY"}, {"start": 229, "end": 232, "label": "CVSS"}]} {"id": "e24c6cfe-0e54-4412-b142-b264f9988c27", "text": "A Cross-Site Scripting (XSS) vulnerability affects Jenkins version 14.2. It is caused by tampered API request and can lead to session hijacking. This issue corresponds to CWE-122 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 71, "label": "VERSION"}, {"start": 89, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 178, "label": "CWE"}, {"start": 192, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "8fe7dbff-3f35-4c4b-9793-2417d89d3612", "text": "A Denial of Service vulnerability affects WordPress version 10.5. It is caused by malicious input payload and can lead to information disclosure. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 64, "label": "VERSION"}, {"start": 82, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "d364ae5d-29bb-42c6-a2f8-eb5b1463be1f", "text": "A Remote Code Execution vulnerability affects Jenkins version 4.18.0. It is caused by malicious input payload and can lead to privilege escalation. This issue corresponds to CWE-20 and is rated High with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 68, "label": "VERSION"}, {"start": 86, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 180, "label": "CWE"}, {"start": 194, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "c3946838-3148-4368-ba23-15c14332368f", "text": "A SQL Injection vulnerability affects MySQL Server version 2.3.1. It is caused by crafted HTTP request and can lead to session hijacking. This issue corresponds to CWE-200 and is rated Medium with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 64, "label": "VERSION"}, {"start": 82, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 136, "label": "IMPACT"}, {"start": 164, "end": 171, "label": "CWE"}, {"start": 185, "end": 191, "label": "SEVERITY"}, {"start": 213, "end": 216, "label": "CVSS"}]} {"id": "0a79dce1-2c40-4f98-bd4a-af6494c4dc99", "text": "A Remote Code Execution vulnerability affects Drupal version 4.18.0. It is caused by malicious input payload and can lead to database manipulation. This issue corresponds to CWE-79 and is rated Medium with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 67, "label": "VERSION"}, {"start": 85, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 180, "label": "CWE"}, {"start": 194, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "11b0d255-df3b-4d48-abcb-9a44f9a5f13f", "text": "A Remote Code Execution vulnerability affects Jenkins version 10.5. It is caused by malformed JSON object and can lead to arbitrary code execution. This issue corresponds to CWE-200 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 66, "label": "VERSION"}, {"start": 84, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 181, "label": "CWE"}, {"start": 195, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "884ea532-e208-44d4-9fbb-7716fe331aea", "text": "A Cross-Site Scripting (XSS) vulnerability affects PHPMyAdmin version 7.4.2. It is caused by specially crafted packet and can lead to service disruption. This issue corresponds to CWE-400 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 75, "label": "VERSION"}, {"start": 93, "end": 117, "label": "ATTACK_VECTOR"}, {"start": 134, "end": 152, "label": "IMPACT"}, {"start": 180, "end": 187, "label": "CWE"}, {"start": 201, "end": 205, "label": "SEVERITY"}, {"start": 227, "end": 230, "label": "CVSS"}]} {"id": "598f7fa1-441f-431a-a0dd-791dca429355", "text": "A Remote Code Execution vulnerability affects Google Chrome version 91.0. It is caused by malformed JSON object and can lead to privilege escalation. This issue corresponds to CWE-200 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 72, "label": "VERSION"}, {"start": 90, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 148, "label": "IMPACT"}, {"start": 176, "end": 183, "label": "CWE"}, {"start": 197, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "0b369596-5a3d-4019-86a2-cf215f9c0850", "text": "A Buffer Overflow vulnerability affects Mozilla Firefox version 5.3.1. It is caused by tampered API request and can lead to database manipulation. This issue corresponds to CWE-200 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 180, "label": "CWE"}, {"start": 194, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "f1dbbe31-afa6-4d76-861b-bff6d65745c5", "text": "A Privilege Escalation vulnerability affects PHPMyAdmin version 1.2.3. It is caused by tampered API request and can lead to privilege escalation. This issue corresponds to CWE-400 and is rated Critical with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "bd0e07a6-3d2c-4f30-abf8-9b250dbfeee4", "text": "A SQL Injection vulnerability affects Apache Struts version 9.12. It is caused by injected SQL query and can lead to database manipulation. This issue corresponds to CWE-89 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 64, "label": "VERSION"}, {"start": 82, "end": 100, "label": "ATTACK_VECTOR"}, {"start": 117, "end": 138, "label": "IMPACT"}, {"start": 166, "end": 172, "label": "CWE"}, {"start": 186, "end": 190, "label": "SEVERITY"}, {"start": 212, "end": 215, "label": "CVSS"}]} {"id": "d35a9df7-4b50-4e33-b5ef-067b23d10728", "text": "A Remote Code Execution vulnerability affects Google Chrome version 14.2. It is caused by crafted HTTP request and can lead to arbitrary code execution. This issue corresponds to CWE-79 and is rated Critical with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 72, "label": "VERSION"}, {"start": 90, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 151, "label": "IMPACT"}, {"start": 179, "end": 185, "label": "CWE"}, {"start": 199, "end": 207, "label": "SEVERITY"}, {"start": 229, "end": 232, "label": "CVSS"}]} {"id": "72f8e4d1-054a-4fab-badc-dfe1fb83b477", "text": "A Command Injection vulnerability affects Docker Engine version 2.4.7. It is caused by injected SQL query and can lead to session hijacking. This issue corresponds to CWE-122 and is rated High with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 174, "label": "CWE"}, {"start": 188, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "005cbcda-2a68-4a9e-9dd9-c6edd92b16ca", "text": "A Remote Code Execution vulnerability affects Docker Engine version 10.5. It is caused by unsanitized user input and can lead to service disruption. This issue corresponds to CWE-20 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 72, "label": "VERSION"}, {"start": 90, "end": 112, "label": "ATTACK_VECTOR"}, {"start": 129, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "ff9f5130-ca59-4a98-bc43-bd4ddd70946a", "text": "A Directory Traversal vulnerability affects MySQL Server version 3.0.3. It is caused by injected SQL query and can lead to service disruption. This issue corresponds to CWE-200 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 70, "label": "VERSION"}, {"start": 88, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 176, "label": "CWE"}, {"start": 190, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "497b50f9-158e-499d-bbad-ca2af5dfd864", "text": "A Privilege Escalation vulnerability affects OpenSSL version 91.0. It is caused by specially crafted packet and can lead to information disclosure. This issue corresponds to CWE-79 and is rated Medium with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 65, "label": "VERSION"}, {"start": 83, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 180, "label": "CWE"}, {"start": 194, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "b0729065-dba4-4a29-9ee9-5f3cae70bb89", "text": "A Authentication Bypass vulnerability affects Jenkins version 10.5. It is caused by specially crafted packet and can lead to database manipulation. This issue corresponds to CWE-20 and is rated High with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 66, "label": "VERSION"}, {"start": 84, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 180, "label": "CWE"}, {"start": 194, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "e8562663-e5cb-44ee-b89f-5616f965926b", "text": "A Denial of Service vulnerability affects Docker Engine version 9.12. It is caused by specially crafted packet and can lead to service disruption. This issue corresponds to CWE-79 and is rated Critical with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 179, "label": "CWE"}, {"start": 193, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "e954a3db-0572-4a5f-9fe6-01674e7f43f0", "text": "A Buffer Overflow vulnerability affects Nginx Web Server version 14.2. It is caused by injected SQL query and can lead to information disclosure. This issue corresponds to CWE-94 and is rated High with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 69, "label": "VERSION"}, {"start": 87, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "690602f2-f865-49fd-84fe-a5d3b23e8e5d", "text": "A Command Injection vulnerability affects Kubernetes API Server version 3.0.3. It is caused by crafted HTTP request and can lead to arbitrary code execution. This issue corresponds to CWE-20 and is rated High with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 63, "label": "PRODUCT"}, {"start": 72, "end": 77, "label": "VERSION"}, {"start": 95, "end": 115, "label": "ATTACK_VECTOR"}, {"start": 132, "end": 156, "label": "IMPACT"}, {"start": 184, "end": 190, "label": "CWE"}, {"start": 204, "end": 208, "label": "SEVERITY"}, {"start": 230, "end": 233, "label": "CVSS"}]} {"id": "e991303b-297a-442d-b202-11107ca28bf8", "text": "A SQL Injection vulnerability affects MySQL Server version 91.0. It is caused by unsanitized user input and can lead to database manipulation. This issue corresponds to CWE-89 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 63, "label": "VERSION"}, {"start": 81, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 175, "label": "CWE"}, {"start": 189, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "a8f75c08-de8d-4553-a15b-2dee01069601", "text": "A Directory Traversal vulnerability affects Mozilla Firefox version 10.5. It is caused by specially crafted packet and can lead to privilege escalation. This issue corresponds to CWE-94 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 72, "label": "VERSION"}, {"start": 90, "end": 114, "label": "ATTACK_VECTOR"}, {"start": 131, "end": 151, "label": "IMPACT"}, {"start": 179, "end": 185, "label": "CWE"}, {"start": 199, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "711f604a-a953-4fd5-aaa9-186535429775", "text": "A SQL Injection vulnerability affects Mozilla Firefox version 10.5. It is caused by malicious input payload and can lead to information disclosure. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 66, "label": "VERSION"}, {"start": 84, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 180, "label": "CWE"}, {"start": 194, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "7e1272f2-28ef-4035-a31a-43750c647676", "text": "A Privilege Escalation vulnerability affects Cisco ASA version 6.0.1. It is caused by malformed JSON object and can lead to privilege escalation. This issue corresponds to CWE-400 and is rated Low with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "a04cd778-9a10-438b-8f7f-009163510214", "text": "A Denial of Service vulnerability affects Cisco ASA version 4.18.0. It is caused by malformed JSON object and can lead to privilege escalation. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 66, "label": "VERSION"}, {"start": 84, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 176, "label": "CWE"}, {"start": 190, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "a9a0c2a9-5286-40d6-9690-6c37e80120fe", "text": "A Denial of Service vulnerability affects Docker Engine version 2.4.7. It is caused by malformed JSON object and can lead to arbitrary code execution. This issue corresponds to CWE-122 and is rated High with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 184, "label": "CWE"}, {"start": 198, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "55be2ccc-50a7-4d80-a1c2-7c2b47d7a58f", "text": "A Directory Traversal vulnerability affects MySQL Server version 91.0. It is caused by injected SQL query and can lead to database manipulation. This issue corresponds to CWE-20 and is rated High with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 69, "label": "VERSION"}, {"start": 87, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "c2046b5f-7a7b-4dda-8a80-8f179af9f7ed", "text": "A Command Injection vulnerability affects MySQL Server version 1.2.3. It is caused by malicious input payload and can lead to service disruption. This issue corresponds to CWE-94 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "7ac93e16-c668-48c1-9316-0ab3e3386cf6", "text": "A SQL Injection vulnerability affects PHPMyAdmin version 10.5. It is caused by crafted HTTP request and can lead to information disclosure. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 48, "label": "PRODUCT"}, {"start": 57, "end": 61, "label": "VERSION"}, {"start": 79, "end": 99, "label": "ATTACK_VECTOR"}, {"start": 116, "end": 138, "label": "IMPACT"}, {"start": 166, "end": 172, "label": "CWE"}, {"start": 186, "end": 189, "label": "SEVERITY"}, {"start": 211, "end": 214, "label": "CVSS"}]} {"id": "b3692cec-0d4c-45d8-8181-a37fd7bc2b0f", "text": "A Authentication Bypass vulnerability affects PHPMyAdmin version 10.5. It is caused by unsanitized user input and can lead to privilege escalation. This issue corresponds to CWE-89 and is rated High with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 69, "label": "VERSION"}, {"start": 87, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 180, "label": "CWE"}, {"start": 194, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "695044df-a9e3-4f94-bb67-607024e581eb", "text": "A SQL Injection vulnerability affects MySQL Server version 5.3.1. It is caused by tampered API request and can lead to privilege escalation. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 64, "label": "VERSION"}, {"start": 82, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 173, "label": "CWE"}, {"start": 187, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "286f4fc2-189b-445c-9eb6-17ff94082847", "text": "A Command Injection vulnerability affects Google Chrome version 7.4.2. It is caused by tampered API request and can lead to arbitrary code execution. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 148, "label": "IMPACT"}, {"start": 176, "end": 183, "label": "CWE"}, {"start": 197, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "ff699e31-f394-4fb1-8fcf-90728f968f9a", "text": "A Cross-Site Scripting (XSS) vulnerability affects OpenCart version 4.18.0. It is caused by unsanitized user input and can lead to database manipulation. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 74, "label": "VERSION"}, {"start": 92, "end": 114, "label": "ATTACK_VECTOR"}, {"start": 131, "end": 152, "label": "IMPACT"}, {"start": 180, "end": 187, "label": "CWE"}, {"start": 201, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "ff1251fa-4a83-4020-b869-ec24b0e892a5", "text": "A Buffer Overflow vulnerability affects PHPMyAdmin version 4.18.0. It is caused by tampered API request and can lead to arbitrary code execution. This issue corresponds to CWE-79 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 65, "label": "VERSION"}, {"start": 83, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "08e7eeb8-7199-4bd9-99de-ad0dd6a2435f", "text": "A Buffer Overflow vulnerability affects Google Chrome version 14.2. It is caused by crafted HTTP request and can lead to database manipulation. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 66, "label": "VERSION"}, {"start": 84, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 176, "label": "CWE"}, {"start": 190, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "d605ba08-3e75-413c-9b83-2b6a62a29da7", "text": "A Privilege Escalation vulnerability affects WordPress version 4.18.0. It is caused by specially crafted packet and can lead to service disruption. This issue corresponds to CWE-122 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 69, "label": "VERSION"}, {"start": 87, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 181, "label": "CWE"}, {"start": 195, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "74abed73-bed1-4afc-aeef-4d7b9dc345fa", "text": "A Directory Traversal vulnerability affects Apache Struts version 7.4.2. It is caused by unsanitized user input and can lead to privilege escalation. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 71, "label": "VERSION"}, {"start": 89, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 148, "label": "IMPACT"}, {"start": 176, "end": 182, "label": "CWE"}, {"start": 196, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "e07bd6d7-1aad-40e7-8330-16e98b59134a", "text": "A SQL Injection vulnerability affects Drupal version 5.3.1. It is caused by tampered API request and can lead to service disruption. This issue corresponds to CWE-20 and is rated Critical with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 44, "label": "PRODUCT"}, {"start": 53, "end": 58, "label": "VERSION"}, {"start": 76, "end": 96, "label": "ATTACK_VECTOR"}, {"start": 113, "end": 131, "label": "IMPACT"}, {"start": 159, "end": 165, "label": "CWE"}, {"start": 179, "end": 187, "label": "SEVERITY"}, {"start": 209, "end": 212, "label": "CVSS"}]} {"id": "a5ad5f24-1a02-44c3-92c2-ad66e142bb3d", "text": "A SQL Injection vulnerability affects WordPress version 2.4.7. It is caused by tampered API request and can lead to database manipulation. This issue corresponds to CWE-122 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 47, "label": "PRODUCT"}, {"start": 56, "end": 61, "label": "VERSION"}, {"start": 79, "end": 99, "label": "ATTACK_VECTOR"}, {"start": 116, "end": 137, "label": "IMPACT"}, {"start": 165, "end": 172, "label": "CWE"}, {"start": 186, "end": 190, "label": "SEVERITY"}, {"start": 212, "end": 215, "label": "CVSS"}]} {"id": "f44eab1f-efe9-430b-a11c-1a0645263e49", "text": "A Command Injection vulnerability affects WordPress version 1.2.3. It is caused by specially crafted packet and can lead to privilege escalation. This issue corresponds to CWE-94 and is rated Medium with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "ff899e72-79da-42d1-9e5a-d22f98f934f8", "text": "A Authentication Bypass vulnerability affects Google Chrome version 91.0. It is caused by crafted HTTP request and can lead to privilege escalation. This issue corresponds to CWE-122 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 72, "label": "VERSION"}, {"start": 90, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 182, "label": "CWE"}, {"start": 196, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "4a50c1f0-be88-4081-8062-9153678b7870", "text": "A Denial of Service vulnerability affects PostgreSQL version 5.3.1. It is caused by tampered API request and can lead to database manipulation. This issue corresponds to CWE-20 and is rated High with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 66, "label": "VERSION"}, {"start": 84, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 176, "label": "CWE"}, {"start": 190, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "f36f18d8-d083-4b20-ace5-009ed1dbda4e", "text": "A Command Injection vulnerability affects Jenkins version 2.4.7. It is caused by specially crafted packet and can lead to service disruption. This issue corresponds to CWE-122 and is rated Low with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 49, "label": "PRODUCT"}, {"start": 58, "end": 63, "label": "VERSION"}, {"start": 81, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 175, "label": "CWE"}, {"start": 189, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "2898aa31-b203-4e46-988a-ce196a8bfe59", "text": "A Denial of Service vulnerability affects Drupal version 3.0.3. It is caused by malicious input payload and can lead to service disruption. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 48, "label": "PRODUCT"}, {"start": 57, "end": 62, "label": "VERSION"}, {"start": 80, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 138, "label": "IMPACT"}, {"start": 166, "end": 172, "label": "CWE"}, {"start": 186, "end": 189, "label": "SEVERITY"}, {"start": 211, "end": 214, "label": "CVSS"}]} {"id": "ac07e2ac-ce70-4856-b46b-1a887ccbe570", "text": "A Cross-Site Scripting (XSS) vulnerability affects WordPress version 6.0.1. It is caused by crafted HTTP request and can lead to arbitrary code execution. This issue corresponds to CWE-122 and is rated High with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 60, "label": "PRODUCT"}, {"start": 69, "end": 74, "label": "VERSION"}, {"start": 92, "end": 112, "label": "ATTACK_VECTOR"}, {"start": 129, "end": 153, "label": "IMPACT"}, {"start": 181, "end": 188, "label": "CWE"}, {"start": 202, "end": 206, "label": "SEVERITY"}, {"start": 228, "end": 231, "label": "CVSS"}]} {"id": "2ccbf241-1d67-4b3f-8ce1-03897367f5ac", "text": "A Privilege Escalation vulnerability affects Kubernetes API Server version 3.0.3. It is caused by tampered API request and can lead to service disruption. This issue corresponds to CWE-400 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 66, "label": "PRODUCT"}, {"start": 75, "end": 80, "label": "VERSION"}, {"start": 98, "end": 118, "label": "ATTACK_VECTOR"}, {"start": 135, "end": 153, "label": "IMPACT"}, {"start": 181, "end": 188, "label": "CWE"}, {"start": 202, "end": 205, "label": "SEVERITY"}, {"start": 227, "end": 230, "label": "CVSS"}]} {"id": "664091d7-004d-4499-adaf-bbc81952abe3", "text": "A Command Injection vulnerability affects OpenCart version 14.2. It is caused by unsanitized user input and can lead to service disruption. This issue corresponds to CWE-79 and is rated Medium with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 63, "label": "VERSION"}, {"start": 81, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 138, "label": "IMPACT"}, {"start": 166, "end": 172, "label": "CWE"}, {"start": 186, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "328030be-cb0f-451c-afe8-8a9e6e9f63c4", "text": "A Privilege Escalation vulnerability affects Cisco ASA version 9.12. It is caused by injected SQL query and can lead to arbitrary code execution. This issue corresponds to CWE-20 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 67, "label": "VERSION"}, {"start": 85, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 196, "label": "SEVERITY"}, {"start": 63, "end": 66, "label": "CVSS"}]} {"id": "7c2154a0-c94a-4730-b228-4cd692a3ad95", "text": "A Privilege Escalation vulnerability affects Drupal version 5.3.1. It is caused by crafted HTTP request and can lead to session hijacking. This issue corresponds to CWE-200 and is rated Medium with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 137, "label": "IMPACT"}, {"start": 165, "end": 172, "label": "CWE"}, {"start": 186, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "fc9d1b07-9598-4576-b500-c52278b6db21", "text": "A SQL Injection vulnerability affects Google Chrome version 7.4.2. It is caused by injected SQL query and can lead to service disruption. This issue corresponds to CWE-79 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 101, "label": "ATTACK_VECTOR"}, {"start": 118, "end": 136, "label": "IMPACT"}, {"start": 164, "end": 170, "label": "CWE"}, {"start": 184, "end": 190, "label": "SEVERITY"}, {"start": 212, "end": 215, "label": "CVSS"}]} {"id": "a62974ec-ef3a-4f66-a920-766c54424ff3", "text": "A Command Injection vulnerability affects WordPress version 5.3.1. It is caused by malformed JSON object and can lead to session hijacking. This issue corresponds to CWE-200 and is rated High with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 138, "label": "IMPACT"}, {"start": 166, "end": 173, "label": "CWE"}, {"start": 187, "end": 191, "label": "SEVERITY"}, {"start": 213, "end": 216, "label": "CVSS"}]} {"id": "99d80756-f5df-4c9b-bb16-af68daea0a02", "text": "A Denial of Service vulnerability affects Nginx Web Server version 14.2. It is caused by malformed JSON object and can lead to session hijacking. This issue corresponds to CWE-200 and is rated Medium with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 71, "label": "VERSION"}, {"start": 89, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "4a4584a4-59c9-4b3f-a67d-03adf3ad76b8", "text": "A Denial of Service vulnerability affects PostgreSQL version 3.0.3. It is caused by tampered API request and can lead to service disruption. This issue corresponds to CWE-200 and is rated Critical with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 66, "label": "VERSION"}, {"start": 84, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 174, "label": "CWE"}, {"start": 188, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "7fd19d68-731c-492f-b827-d57a2dbd1beb", "text": "A Privilege Escalation vulnerability affects Drupal version 14.2. It is caused by malicious input payload and can lead to information disclosure. This issue corresponds to CWE-94 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 64, "label": "VERSION"}, {"start": 82, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "f378f7f3-124c-4acc-af9b-63abd521bd2e", "text": "A Denial of Service vulnerability affects Docker Engine version 9.12. It is caused by crafted HTTP request and can lead to information disclosure. This issue corresponds to CWE-89 and is rated High with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 179, "label": "CWE"}, {"start": 193, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "41bbe094-2747-4af7-a108-dfbddc4d2cc0", "text": "A Denial of Service vulnerability affects PHPMyAdmin version 4.18.0. It is caused by tampered API request and can lead to service disruption. This issue corresponds to CWE-89 and is rated Critical with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 67, "label": "VERSION"}, {"start": 85, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 174, "label": "CWE"}, {"start": 188, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "72535aa1-4e67-44be-baad-b27f77dfa76c", "text": "A Remote Code Execution vulnerability affects OpenCart version 6.0.1. It is caused by malformed JSON object and can lead to database manipulation. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 179, "label": "CWE"}, {"start": 193, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "6f864d73-999a-4b64-bd55-30e541f90305", "text": "A Cross-Site Scripting (XSS) vulnerability affects Cisco ASA version 4.18.0. It is caused by injected SQL query and can lead to service disruption. This issue corresponds to CWE-400 and is rated Critical with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 60, "label": "PRODUCT"}, {"start": 69, "end": 75, "label": "VERSION"}, {"start": 93, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 181, "label": "CWE"}, {"start": 195, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "beb04abf-2556-44aa-8d5f-4877ab31d2ad", "text": "A SQL Injection vulnerability affects Cisco ASA version 10.5. It is caused by unsanitized user input and can lead to service disruption. This issue corresponds to CWE-94 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 47, "label": "PRODUCT"}, {"start": 56, "end": 60, "label": "VERSION"}, {"start": 78, "end": 100, "label": "ATTACK_VECTOR"}, {"start": 117, "end": 135, "label": "IMPACT"}, {"start": 163, "end": 169, "label": "CWE"}, {"start": 183, "end": 187, "label": "SEVERITY"}, {"start": 209, "end": 212, "label": "CVSS"}]} {"id": "88962839-8e48-4412-8ac0-1bf14f83ac66", "text": "A Remote Code Execution vulnerability affects OpenSSL version 9.12. It is caused by tampered API request and can lead to arbitrary code execution. This issue corresponds to CWE-200 and is rated Medium with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 66, "label": "VERSION"}, {"start": 84, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 180, "label": "CWE"}, {"start": 194, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "9c4f3a57-a911-496b-8e29-4ff61547620d", "text": "A Remote Code Execution vulnerability affects OpenCart version 2.3.1. It is caused by injected SQL query and can lead to information disclosure. This issue corresponds to CWE-94 and is rated Critical with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "e67e606d-cdc2-48fd-982d-61746cb7991c", "text": "A Remote Code Execution vulnerability affects Mozilla Firefox version 2.3.1. It is caused by malformed JSON object and can lead to arbitrary code execution. This issue corresponds to CWE-20 and is rated Low with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 75, "label": "VERSION"}, {"start": 93, "end": 114, "label": "ATTACK_VECTOR"}, {"start": 131, "end": 155, "label": "IMPACT"}, {"start": 183, "end": 189, "label": "CWE"}, {"start": 203, "end": 206, "label": "SEVERITY"}, {"start": 228, "end": 231, "label": "CVSS"}]} {"id": "3f86b0ff-8018-488c-8758-4016d5efacd1", "text": "A Authentication Bypass vulnerability affects Cisco ASA version 1.2.3. It is caused by tampered API request and can lead to database manipulation. This issue corresponds to CWE-89 and is rated Medium with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 179, "label": "CWE"}, {"start": 193, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "28a62d95-6fd9-4075-94b5-d93faaee041d", "text": "A Remote Code Execution vulnerability affects Mozilla Firefox version 2.3.1. It is caused by malformed JSON object and can lead to arbitrary code execution. This issue corresponds to CWE-94 and is rated Medium with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 75, "label": "VERSION"}, {"start": 93, "end": 114, "label": "ATTACK_VECTOR"}, {"start": 131, "end": 155, "label": "IMPACT"}, {"start": 183, "end": 189, "label": "CWE"}, {"start": 203, "end": 209, "label": "SEVERITY"}, {"start": 231, "end": 234, "label": "CVSS"}]} {"id": "52cf69da-f8cf-4966-a739-e4afd1cf2c1d", "text": "A Denial of Service vulnerability affects Docker Engine version 10.5. It is caused by malicious input payload and can lead to database manipulation. This issue corresponds to CWE-122 and is rated Critical with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 182, "label": "CWE"}, {"start": 196, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "b89c2512-7143-4f3e-bb2e-36a2cef9034a", "text": "A Remote Code Execution vulnerability affects Google Chrome version 7.4.2. It is caused by injected SQL query and can lead to information disclosure. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 73, "label": "VERSION"}, {"start": 91, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 148, "label": "IMPACT"}, {"start": 176, "end": 182, "label": "CWE"}, {"start": 196, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "f6bfca86-832e-4848-a199-4974473902d4", "text": "A Denial of Service vulnerability affects Nginx Web Server version 6.0.1. It is caused by tampered API request and can lead to information disclosure. This issue corresponds to CWE-200 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 72, "label": "VERSION"}, {"start": 90, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 184, "label": "CWE"}, {"start": 198, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "9b6b8411-4c75-4d9b-a631-a186e41aad92", "text": "A SQL Injection vulnerability affects OpenSSL version 1.2.3. It is caused by specially crafted packet and can lead to information disclosure. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 45, "label": "PRODUCT"}, {"start": 54, "end": 59, "label": "VERSION"}, {"start": 77, "end": 101, "label": "ATTACK_VECTOR"}, {"start": 118, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 174, "label": "CWE"}, {"start": 188, "end": 191, "label": "SEVERITY"}, {"start": 213, "end": 216, "label": "CVSS"}]} {"id": "3bdf7f59-4f52-4081-ba66-80e226e367fc", "text": "A Buffer Overflow vulnerability affects OpenSSL version 6.0.1. It is caused by specially crafted packet and can lead to session hijacking. This issue corresponds to CWE-89 and is rated Critical with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 47, "label": "PRODUCT"}, {"start": 56, "end": 61, "label": "VERSION"}, {"start": 79, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 137, "label": "IMPACT"}, {"start": 165, "end": 171, "label": "CWE"}, {"start": 185, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "011cd563-1e29-4fa6-812c-988a604d3974", "text": "A Denial of Service vulnerability affects MySQL Server version 14.2. It is caused by injected SQL query and can lead to service disruption. This issue corresponds to CWE-122 and is rated Low with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 67, "label": "VERSION"}, {"start": 85, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 138, "label": "IMPACT"}, {"start": 166, "end": 173, "label": "CWE"}, {"start": 187, "end": 190, "label": "SEVERITY"}, {"start": 212, "end": 215, "label": "CVSS"}]} {"id": "ee6c8abd-c91c-46ea-8151-7b961b544c15", "text": "A Command Injection vulnerability affects Nginx Web Server version 7.4.2. It is caused by injected SQL query and can lead to service disruption. This issue corresponds to CWE-122 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 72, "label": "VERSION"}, {"start": 90, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 178, "label": "CWE"}, {"start": 192, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "2875c011-f6ef-4ddd-983c-c6211b00e1d8", "text": "A Directory Traversal vulnerability affects Kubernetes API Server version 1.2.3. It is caused by crafted HTTP request and can lead to session hijacking. This issue corresponds to CWE-89 and is rated High with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 65, "label": "PRODUCT"}, {"start": 74, "end": 79, "label": "VERSION"}, {"start": 97, "end": 117, "label": "ATTACK_VECTOR"}, {"start": 134, "end": 151, "label": "IMPACT"}, {"start": 179, "end": 185, "label": "CWE"}, {"start": 199, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "34532b9c-23e1-4e82-841e-3b7f68da1e5d", "text": "A Denial of Service vulnerability affects Google Chrome version 2.4.7. It is caused by tampered API request and can lead to service disruption. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 176, "label": "CWE"}, {"start": 190, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "a3022d20-3bbd-4b7a-9aca-81382d7169f5", "text": "A SQL Injection vulnerability affects OpenSSL version 10.5. It is caused by malicious input payload and can lead to arbitrary code execution. This issue corresponds to CWE-89 and is rated High with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 45, "label": "PRODUCT"}, {"start": 54, "end": 58, "label": "VERSION"}, {"start": 76, "end": 99, "label": "ATTACK_VECTOR"}, {"start": 116, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 174, "label": "CWE"}, {"start": 188, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "305b2829-ec4c-47fc-81f6-224e9c68ec00", "text": "A SQL Injection vulnerability affects PHPMyAdmin version 3.0.3. It is caused by malicious input payload and can lead to privilege escalation. This issue corresponds to CWE-79 and is rated Medium with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 48, "label": "PRODUCT"}, {"start": 57, "end": 62, "label": "VERSION"}, {"start": 80, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 174, "label": "CWE"}, {"start": 188, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "daf445d8-bccf-46c9-ae20-502755d9c864", "text": "A Cross-Site Scripting (XSS) vulnerability affects MySQL Server version 6.0.1. It is caused by crafted HTTP request and can lead to session hijacking. This issue corresponds to CWE-89 and is rated Medium with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 63, "label": "PRODUCT"}, {"start": 72, "end": 77, "label": "VERSION"}, {"start": 95, "end": 115, "label": "ATTACK_VECTOR"}, {"start": 132, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 183, "label": "CWE"}, {"start": 197, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "e4cb6624-ce31-40ec-99f0-7907891142dd", "text": "A Denial of Service vulnerability affects Docker Engine version 14.2. It is caused by tampered API request and can lead to session hijacking. This issue corresponds to CWE-200 and is rated High with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 175, "label": "CWE"}, {"start": 189, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "39ff7775-ad4d-49b4-a27d-5c0181faf79d", "text": "A Authentication Bypass vulnerability affects PHPMyAdmin version 4.18.0. It is caused by unsanitized user input and can lead to service disruption. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 71, "label": "VERSION"}, {"start": 89, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 180, "label": "CWE"}, {"start": 194, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "7ed16543-2ac7-47cc-bed7-58844843e07f", "text": "A Buffer Overflow vulnerability affects Cisco ASA version 5.3.1. It is caused by injected SQL query and can lead to arbitrary code execution. This issue corresponds to CWE-20 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 49, "label": "PRODUCT"}, {"start": 58, "end": 63, "label": "VERSION"}, {"start": 81, "end": 99, "label": "ATTACK_VECTOR"}, {"start": 116, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 174, "label": "CWE"}, {"start": 188, "end": 191, "label": "SEVERITY"}, {"start": 213, "end": 216, "label": "CVSS"}]} {"id": "fc002a13-4b3d-45fd-96e2-8420aed046a1", "text": "A Directory Traversal vulnerability affects PostgreSQL version 7.4.2. It is caused by injected SQL query and can lead to service disruption. This issue corresponds to CWE-79 and is rated High with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 173, "label": "CWE"}, {"start": 187, "end": 191, "label": "SEVERITY"}, {"start": 213, "end": 216, "label": "CVSS"}]} {"id": "0fe0258c-45e5-4de4-84b4-3f2e4e92c418", "text": "A Command Injection vulnerability affects Drupal version 7.4.2. It is caused by unsanitized user input and can lead to arbitrary code execution. This issue corresponds to CWE-79 and is rated Medium with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 48, "label": "PRODUCT"}, {"start": 57, "end": 62, "label": "VERSION"}, {"start": 80, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "28639c95-b072-428d-a33f-b4983f15bc7d", "text": "A SQL Injection vulnerability affects Drupal version 6.0.1. It is caused by unsanitized user input and can lead to session hijacking. This issue corresponds to CWE-400 and is rated High with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 44, "label": "PRODUCT"}, {"start": 53, "end": 58, "label": "VERSION"}, {"start": 76, "end": 98, "label": "ATTACK_VECTOR"}, {"start": 115, "end": 132, "label": "IMPACT"}, {"start": 160, "end": 167, "label": "CWE"}, {"start": 181, "end": 185, "label": "SEVERITY"}, {"start": 207, "end": 210, "label": "CVSS"}]} {"id": "2070dc11-3ac6-460c-b107-c0b836a6fa35", "text": "A Directory Traversal vulnerability affects Jenkins version 9.12. It is caused by unsanitized user input and can lead to database manipulation. This issue corresponds to CWE-200 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 64, "label": "VERSION"}, {"start": 82, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 177, "label": "CWE"}, {"start": 191, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "da7b3aed-136c-4b55-8c2f-74786fd63f36", "text": "A Authentication Bypass vulnerability affects Jenkins version 9.12. It is caused by unsanitized user input and can lead to information disclosure. This issue corresponds to CWE-89 and is rated Critical with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 66, "label": "VERSION"}, {"start": 84, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 179, "label": "CWE"}, {"start": 193, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "1c4dcbee-a5f2-4419-9da0-750a0a0f256a", "text": "A Directory Traversal vulnerability affects Docker Engine version 7.4.2. It is caused by injected SQL query and can lead to database manipulation. This issue corresponds to CWE-122 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 71, "label": "VERSION"}, {"start": 89, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 180, "label": "CWE"}, {"start": 194, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "d7948419-178b-4d8b-939c-09ab67ed8f0e", "text": "A Cross-Site Scripting (XSS) vulnerability affects Drupal version 5.3.1. It is caused by malformed JSON object and can lead to service disruption. This issue corresponds to CWE-400 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 71, "label": "VERSION"}, {"start": 89, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 180, "label": "CWE"}, {"start": 194, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "e1359db5-4289-4e64-ba72-da8bdf58d346", "text": "A Denial of Service vulnerability affects OpenCart version 5.3.1. It is caused by malformed JSON object and can lead to privilege escalation. This issue corresponds to CWE-94 and is rated Critical with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 64, "label": "VERSION"}, {"start": 82, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 174, "label": "CWE"}, {"start": 188, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "a6ce4ce4-5fcc-4b2e-993c-b320996fe420", "text": "A Command Injection vulnerability affects Google Chrome version 2.3.1. It is caused by specially crafted packet and can lead to service disruption. This issue corresponds to CWE-79 and is rated Medium with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 180, "label": "CWE"}, {"start": 194, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "188c52a6-8a50-44b9-ae0b-36071a31f5e5", "text": "A Remote Code Execution vulnerability affects Jenkins version 5.3.1. It is caused by tampered API request and can lead to service disruption. This issue corresponds to CWE-400 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 175, "label": "CWE"}, {"start": 189, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "86c09835-e9d3-455f-90d0-53fcf6663d92", "text": "A Cross-Site Scripting (XSS) vulnerability affects PostgreSQL version 6.0.1. It is caused by injected SQL query and can lead to service disruption. This issue corresponds to CWE-400 and is rated Critical with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 75, "label": "VERSION"}, {"start": 93, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 181, "label": "CWE"}, {"start": 195, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "aed04b89-1e48-441d-aed9-7fa01dad64ca", "text": "A Buffer Overflow vulnerability affects PHPMyAdmin version 91.0. It is caused by malformed JSON object and can lead to service disruption. This issue corresponds to CWE-79 and is rated High with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 63, "label": "VERSION"}, {"start": 81, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 137, "label": "IMPACT"}, {"start": 165, "end": 171, "label": "CWE"}, {"start": 185, "end": 189, "label": "SEVERITY"}, {"start": 211, "end": 214, "label": "CVSS"}]} {"id": "0f18a648-2225-4dd4-90c4-770af806ca63", "text": "A Denial of Service vulnerability affects Kubernetes API Server version 5.3.1. It is caused by malformed JSON object and can lead to information disclosure. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 63, "label": "PRODUCT"}, {"start": 72, "end": 77, "label": "VERSION"}, {"start": 95, "end": 116, "label": "ATTACK_VECTOR"}, {"start": 133, "end": 155, "label": "IMPACT"}, {"start": 183, "end": 189, "label": "CWE"}, {"start": 203, "end": 206, "label": "SEVERITY"}, {"start": 228, "end": 231, "label": "CVSS"}]} {"id": "116e390c-ecf7-4618-a6ab-84987b12eb55", "text": "A SQL Injection vulnerability affects Jenkins version 5.3.1. It is caused by malicious input payload and can lead to database manipulation. This issue corresponds to CWE-122 and is rated Low with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 45, "label": "PRODUCT"}, {"start": 54, "end": 59, "label": "VERSION"}, {"start": 77, "end": 100, "label": "ATTACK_VECTOR"}, {"start": 117, "end": 138, "label": "IMPACT"}, {"start": 166, "end": 173, "label": "CWE"}, {"start": 187, "end": 190, "label": "SEVERITY"}, {"start": 212, "end": 215, "label": "CVSS"}]} {"id": "e72aa70f-d117-4652-921b-c4fdaad1a55d", "text": "A Directory Traversal vulnerability affects Mozilla Firefox version 2.4.7. It is caused by tampered API request and can lead to information disclosure. This issue corresponds to CWE-89 and is rated Critical with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 73, "label": "VERSION"}, {"start": 91, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 150, "label": "IMPACT"}, {"start": 178, "end": 184, "label": "CWE"}, {"start": 198, "end": 206, "label": "SEVERITY"}, {"start": 228, "end": 231, "label": "CVSS"}]} {"id": "ba2649d8-a948-4952-820a-cc0c33f8415b", "text": "A Cross-Site Scripting (XSS) vulnerability affects PostgreSQL version 10.5. It is caused by tampered API request and can lead to information disclosure. This issue corresponds to CWE-400 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 74, "label": "VERSION"}, {"start": 92, "end": 112, "label": "ATTACK_VECTOR"}, {"start": 129, "end": 151, "label": "IMPACT"}, {"start": 179, "end": 186, "label": "CWE"}, {"start": 200, "end": 206, "label": "SEVERITY"}, {"start": 228, "end": 231, "label": "CVSS"}]} {"id": "82145696-db96-4cdb-9685-6706f3b493c2", "text": "A Cross-Site Scripting (XSS) vulnerability affects Nginx Web Server version 6.0.1. It is caused by malicious input payload and can lead to information disclosure. This issue corresponds to CWE-122 and is rated High with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 67, "label": "PRODUCT"}, {"start": 76, "end": 81, "label": "VERSION"}, {"start": 99, "end": 122, "label": "ATTACK_VECTOR"}, {"start": 139, "end": 161, "label": "IMPACT"}, {"start": 189, "end": 196, "label": "CWE"}, {"start": 210, "end": 214, "label": "SEVERITY"}, {"start": 236, "end": 239, "label": "CVSS"}]} {"id": "70074031-1816-47dd-aa3d-b9655f72e3a3", "text": "A Authentication Bypass vulnerability affects OpenCart version 1.2.3. It is caused by unsanitized user input and can lead to service disruption. This issue corresponds to CWE-400 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 178, "label": "CWE"}, {"start": 192, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "74e66db2-df1b-4f24-bc82-f67c2daa2cfb", "text": "A Remote Code Execution vulnerability affects PostgreSQL version 10.5. It is caused by unsanitized user input and can lead to privilege escalation. This issue corresponds to CWE-89 and is rated Medium with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 69, "label": "VERSION"}, {"start": 87, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 180, "label": "CWE"}, {"start": 194, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "56e5bcf3-d9f7-4a5b-a6e2-2fb5322ae59a", "text": "A Remote Code Execution vulnerability affects Cisco ASA version 14.2. It is caused by malformed JSON object and can lead to privilege escalation. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "1a6b81be-e2fe-442c-873b-363cdef6f39e", "text": "A SQL Injection vulnerability affects Mozilla Firefox version 7.4.2. It is caused by tampered API request and can lead to privilege escalation. This issue corresponds to CWE-89 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 176, "label": "CWE"}, {"start": 190, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "d6667469-c212-4257-a90a-990df021dca5", "text": "A Directory Traversal vulnerability affects OpenSSL version 6.0.1. It is caused by malicious input payload and can lead to session hijacking. This issue corresponds to CWE-400 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 175, "label": "CWE"}, {"start": 189, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "9c177ea7-01e6-4f9b-9068-f207a357a56c", "text": "A Denial of Service vulnerability affects Google Chrome version 91.0. It is caused by malformed JSON object and can lead to service disruption. This issue corresponds to CWE-94 and is rated Medium with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 176, "label": "CWE"}, {"start": 190, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "516f51f5-2824-4070-b372-5ba7079231e0", "text": "A Authentication Bypass vulnerability affects Nginx Web Server version 5.3.1. It is caused by tampered API request and can lead to privilege escalation. This issue corresponds to CWE-400 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 62, "label": "PRODUCT"}, {"start": 71, "end": 76, "label": "VERSION"}, {"start": 94, "end": 114, "label": "ATTACK_VECTOR"}, {"start": 131, "end": 151, "label": "IMPACT"}, {"start": 179, "end": 186, "label": "CWE"}, {"start": 200, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "52a90e0a-894e-4cef-8557-3aabe2e32483", "text": "A Authentication Bypass vulnerability affects PHPMyAdmin version 91.0. It is caused by injected SQL query and can lead to information disclosure. This issue corresponds to CWE-200 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 69, "label": "VERSION"}, {"start": 87, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "90b7d9d8-7d62-40e3-b03d-12217d191ea9", "text": "A SQL Injection vulnerability affects Jenkins version 5.3.1. It is caused by malicious input payload and can lead to session hijacking. This issue corresponds to CWE-122 and is rated High with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 45, "label": "PRODUCT"}, {"start": 54, "end": 59, "label": "VERSION"}, {"start": 77, "end": 100, "label": "ATTACK_VECTOR"}, {"start": 117, "end": 134, "label": "IMPACT"}, {"start": 162, "end": 169, "label": "CWE"}, {"start": 183, "end": 187, "label": "SEVERITY"}, {"start": 209, "end": 212, "label": "CVSS"}]} {"id": "8ea4fff5-d33b-4851-95d2-6d09250b10c4", "text": "A Denial of Service vulnerability affects Cisco ASA version 1.2.3. It is caused by crafted HTTP request and can lead to service disruption. This issue corresponds to CWE-400 and is rated Critical with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 138, "label": "IMPACT"}, {"start": 166, "end": 173, "label": "CWE"}, {"start": 187, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "94316f69-b2b8-48ef-b74f-68983d049e00", "text": "A Buffer Overflow vulnerability affects Google Chrome version 9.12. It is caused by crafted HTTP request and can lead to database manipulation. This issue corresponds to CWE-400 and is rated Critical with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 66, "label": "VERSION"}, {"start": 84, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 177, "label": "CWE"}, {"start": 191, "end": 199, "label": "SEVERITY"}, {"start": 62, "end": 65, "label": "CVSS"}]} {"id": "c068fac9-acb9-4308-9a9c-ab736320eb27", "text": "A Command Injection vulnerability affects Nginx Web Server version 3.0.3. It is caused by tampered API request and can lead to privilege escalation. This issue corresponds to CWE-122 and is rated Critical with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 72, "label": "VERSION"}, {"start": 90, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 182, "label": "CWE"}, {"start": 196, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "a6ca49fe-0917-4f5a-aee1-be7c90123ad7", "text": "A Cross-Site Scripting (XSS) vulnerability affects MySQL Server version 4.18.0. It is caused by injected SQL query and can lead to database manipulation. This issue corresponds to CWE-20 and is rated High with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 63, "label": "PRODUCT"}, {"start": 72, "end": 78, "label": "VERSION"}, {"start": 96, "end": 114, "label": "ATTACK_VECTOR"}, {"start": 131, "end": 152, "label": "IMPACT"}, {"start": 180, "end": 186, "label": "CWE"}, {"start": 200, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "5bf72a3a-697a-4727-b36d-82e431e85a70", "text": "A Command Injection vulnerability affects Cisco ASA version 2.4.7. It is caused by malicious input payload and can lead to arbitrary code execution. This issue corresponds to CWE-20 and is rated Critical with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "5f54edd1-d2b7-4c24-82ef-c1a215b36f9a", "text": "A Buffer Overflow vulnerability affects Mozilla Firefox version 6.0.1. It is caused by crafted HTTP request and can lead to database manipulation. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 179, "label": "CWE"}, {"start": 193, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "621d79b3-9df9-467b-a612-77717792a214", "text": "A Directory Traversal vulnerability affects Docker Engine version 1.2.3. It is caused by specially crafted packet and can lead to session hijacking. This issue corresponds to CWE-94 and is rated Critical with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 71, "label": "VERSION"}, {"start": 89, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "3ec88757-aeb2-488a-98e2-3a751e8e2cd3", "text": "A Command Injection vulnerability affects Mozilla Firefox version 2.3.1. It is caused by tampered API request and can lead to privilege escalation. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 71, "label": "VERSION"}, {"start": 89, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 180, "label": "CWE"}, {"start": 194, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "2c70bb62-fdd1-419f-ab85-951da507530d", "text": "A Buffer Overflow vulnerability affects Docker Engine version 5.3.1. It is caused by specially crafted packet and can lead to arbitrary code execution. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 150, "label": "IMPACT"}, {"start": 178, "end": 184, "label": "CWE"}, {"start": 198, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "e0e222d1-8ff8-4a8f-bb04-78ca7f4c3b51", "text": "A SQL Injection vulnerability affects Google Chrome version 2.3.1. It is caused by specially crafted packet and can lead to session hijacking. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 175, "label": "CWE"}, {"start": 189, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "4acc7024-ee97-4e42-aa82-90de5aea0b61", "text": "A Cross-Site Scripting (XSS) vulnerability affects Nginx Web Server version 9.12. It is caused by crafted HTTP request and can lead to privilege escalation. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 67, "label": "PRODUCT"}, {"start": 76, "end": 80, "label": "VERSION"}, {"start": 98, "end": 118, "label": "ATTACK_VECTOR"}, {"start": 135, "end": 155, "label": "IMPACT"}, {"start": 183, "end": 190, "label": "CWE"}, {"start": 204, "end": 210, "label": "SEVERITY"}, {"start": 232, "end": 235, "label": "CVSS"}]} {"id": "2cd947e2-534a-438f-9d79-51766350fb89", "text": "A Buffer Overflow vulnerability affects Drupal version 14.2. It is caused by injected SQL query and can lead to information disclosure. This issue corresponds to CWE-400 and is rated Critical with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 46, "label": "PRODUCT"}, {"start": 55, "end": 59, "label": "VERSION"}, {"start": 77, "end": 95, "label": "ATTACK_VECTOR"}, {"start": 112, "end": 134, "label": "IMPACT"}, {"start": 162, "end": 169, "label": "CWE"}, {"start": 183, "end": 191, "label": "SEVERITY"}, {"start": 213, "end": 216, "label": "CVSS"}]} {"id": "839cd07a-6729-4ae1-82b1-9ae003c97c8d", "text": "A Denial of Service vulnerability affects Apache Struts version 14.2. It is caused by tampered API request and can lead to session hijacking. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 175, "label": "CWE"}, {"start": 189, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "ce3bb6a0-d701-4b36-822c-15475bcb2e1f", "text": "A Command Injection vulnerability affects Docker Engine version 6.0.1. It is caused by injected SQL query and can lead to information disclosure. This issue corresponds to CWE-122 and is rated Low with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "4e281ff5-a0de-4d44-8cdd-9b8cde068eb1", "text": "A Buffer Overflow vulnerability affects Mozilla Firefox version 2.3.1. It is caused by malformed JSON object and can lead to arbitrary code execution. This issue corresponds to CWE-94 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 183, "label": "CWE"}, {"start": 197, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "d68eb243-f995-4bf4-993f-7608e637d472", "text": "A Directory Traversal vulnerability affects WordPress version 2.4.7. It is caused by malicious input payload and can lead to arbitrary code execution. This issue corresponds to CWE-400 and is rated High with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 184, "label": "CWE"}, {"start": 198, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "13717520-f104-4584-8771-69b8f52821f7", "text": "A Cross-Site Scripting (XSS) vulnerability affects Apache Struts version 3.0.3. It is caused by unsanitized user input and can lead to service disruption. This issue corresponds to CWE-122 and is rated Critical with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 64, "label": "PRODUCT"}, {"start": 73, "end": 78, "label": "VERSION"}, {"start": 96, "end": 118, "label": "ATTACK_VECTOR"}, {"start": 135, "end": 153, "label": "IMPACT"}, {"start": 181, "end": 188, "label": "CWE"}, {"start": 202, "end": 210, "label": "SEVERITY"}, {"start": 232, "end": 235, "label": "CVSS"}]} {"id": "ef42c023-27d7-466d-ae60-c1dbdd63037e", "text": "A Cross-Site Scripting (XSS) vulnerability affects PHPMyAdmin version 2.4.7. It is caused by malformed JSON object and can lead to information disclosure. This issue corresponds to CWE-89 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 75, "label": "VERSION"}, {"start": 93, "end": 114, "label": "ATTACK_VECTOR"}, {"start": 131, "end": 153, "label": "IMPACT"}, {"start": 181, "end": 187, "label": "CWE"}, {"start": 201, "end": 207, "label": "SEVERITY"}, {"start": 229, "end": 232, "label": "CVSS"}]} {"id": "6b649e70-205e-479f-9530-8994f3d149d7", "text": "A Directory Traversal vulnerability affects Apache Struts version 3.0.3. It is caused by specially crafted packet and can lead to arbitrary code execution. This issue corresponds to CWE-400 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 71, "label": "VERSION"}, {"start": 89, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 154, "label": "IMPACT"}, {"start": 182, "end": 189, "label": "CWE"}, {"start": 203, "end": 206, "label": "SEVERITY"}, {"start": 228, "end": 231, "label": "CVSS"}]} {"id": "58dbdc59-af0b-449a-8787-2b83c4df322a", "text": "A SQL Injection vulnerability affects OpenCart version 4.18.0. It is caused by unsanitized user input and can lead to database manipulation. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 46, "label": "PRODUCT"}, {"start": 55, "end": 61, "label": "VERSION"}, {"start": 79, "end": 101, "label": "ATTACK_VECTOR"}, {"start": 118, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 173, "label": "CWE"}, {"start": 187, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "5d6ce060-4a91-43d5-bafd-6b28355716a6", "text": "A Cross-Site Scripting (XSS) vulnerability affects Drupal version 3.0.3. It is caused by injected SQL query and can lead to database manipulation. This issue corresponds to CWE-200 and is rated Critical with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 71, "label": "VERSION"}, {"start": 89, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 180, "label": "CWE"}, {"start": 194, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "820cf85a-8cbd-4ce8-933f-9373085f8ce1", "text": "A Cross-Site Scripting (XSS) vulnerability affects OpenSSL version 1.2.3. It is caused by malicious input payload and can lead to privilege escalation. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 72, "label": "VERSION"}, {"start": 90, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 150, "label": "IMPACT"}, {"start": 178, "end": 185, "label": "CWE"}, {"start": 199, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "b8b4bc88-9a39-43ec-860c-1e9a435be5bb", "text": "A Authentication Bypass vulnerability affects Cisco ASA version 14.2. It is caused by tampered API request and can lead to session hijacking. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 175, "label": "CWE"}, {"start": 189, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "3c886f84-b204-4a7c-adf0-da95610f31ab", "text": "A Denial of Service vulnerability affects PHPMyAdmin version 6.0.1. It is caused by malicious input payload and can lead to service disruption. This issue corresponds to CWE-400 and is rated Critical with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 66, "label": "VERSION"}, {"start": 84, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 177, "label": "CWE"}, {"start": 191, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "0e5165a5-67f5-40c9-9858-734e405e4b99", "text": "A Denial of Service vulnerability affects OpenSSL version 10.5. It is caused by tampered API request and can lead to information disclosure. This issue corresponds to CWE-400 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 49, "label": "PRODUCT"}, {"start": 58, "end": 62, "label": "VERSION"}, {"start": 80, "end": 100, "label": "ATTACK_VECTOR"}, {"start": 117, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 174, "label": "CWE"}, {"start": 188, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "7d3d616d-6115-4912-941f-64ecb9ff47e7", "text": "A Denial of Service vulnerability affects Mozilla Firefox version 10.5. It is caused by specially crafted packet and can lead to database manipulation. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 70, "label": "VERSION"}, {"start": 88, "end": 112, "label": "ATTACK_VECTOR"}, {"start": 129, "end": 150, "label": "IMPACT"}, {"start": 178, "end": 185, "label": "CWE"}, {"start": 199, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "9b51fb8d-27f9-419b-a1e0-b4e95ae2593f", "text": "A Remote Code Execution vulnerability affects Google Chrome version 7.4.2. It is caused by injected SQL query and can lead to privilege escalation. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 73, "label": "VERSION"}, {"start": 91, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 181, "label": "CWE"}, {"start": 195, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "a932f978-de18-4ed5-a1cb-2b4c75ec55f7", "text": "A Denial of Service vulnerability affects Google Chrome version 7.4.2. It is caused by unsanitized user input and can lead to privilege escalation. This issue corresponds to CWE-200 and is rated High with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 181, "label": "CWE"}, {"start": 195, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "b7d2b3b5-2587-4e32-8bee-af45307545d4", "text": "A Command Injection vulnerability affects Cisco ASA version 10.5. It is caused by tampered API request and can lead to privilege escalation. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 64, "label": "VERSION"}, {"start": 82, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 173, "label": "CWE"}, {"start": 187, "end": 190, "label": "SEVERITY"}, {"start": 212, "end": 215, "label": "CVSS"}]} {"id": "f20fd407-993f-4abe-81c1-22f50ac470e8", "text": "A Directory Traversal vulnerability affects PHPMyAdmin version 3.0.3. It is caused by injected SQL query and can lead to arbitrary code execution. This issue corresponds to CWE-20 and is rated Low with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 179, "label": "CWE"}, {"start": 193, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "c93e5cfa-eb08-4ed1-ae90-a794baefe15b", "text": "A Buffer Overflow vulnerability affects Nginx Web Server version 3.0.3. It is caused by crafted HTTP request and can lead to service disruption. This issue corresponds to CWE-94 and is rated High with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 70, "label": "VERSION"}, {"start": 88, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "43dac5f3-0446-4eb0-bd0a-7b0a002fd873", "text": "A Remote Code Execution vulnerability affects Google Chrome version 6.0.1. It is caused by injected SQL query and can lead to database manipulation. This issue corresponds to CWE-20 and is rated Low with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 73, "label": "VERSION"}, {"start": 91, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "320949c9-0010-4565-a4f2-3153b15167c7", "text": "A Command Injection vulnerability affects Mozilla Firefox version 91.0. It is caused by malicious input payload and can lead to session hijacking. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 70, "label": "VERSION"}, {"start": 88, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 180, "label": "CWE"}, {"start": 194, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "e5b201be-59bf-4462-9f9b-907460a8220f", "text": "A SQL Injection vulnerability affects Mozilla Firefox version 10.5. It is caused by crafted HTTP request and can lead to information disclosure. This issue corresponds to CWE-400 and is rated Medium with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 66, "label": "VERSION"}, {"start": 84, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 178, "label": "CWE"}, {"start": 192, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "4dcdc03e-1a6b-4431-92bc-8a9844bc41d6", "text": "A Privilege Escalation vulnerability affects PHPMyAdmin version 2.4.7. It is caused by malformed JSON object and can lead to service disruption. This issue corresponds to CWE-20 and is rated Low with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "e7aacaf7-d209-4999-a41f-792703acfaf2", "text": "A Authentication Bypass vulnerability affects Jenkins version 2.3.1. It is caused by malicious input payload and can lead to privilege escalation. This issue corresponds to CWE-20 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 179, "label": "CWE"}, {"start": 193, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "73e22298-c7b5-4a12-aa5c-2462e2ab942c", "text": "A Privilege Escalation vulnerability affects WordPress version 10.5. It is caused by tampered API request and can lead to arbitrary code execution. This issue corresponds to CWE-122 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 67, "label": "VERSION"}, {"start": 85, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 181, "label": "CWE"}, {"start": 195, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "4e7167f3-13e2-4403-85a9-692b84379bc8", "text": "A Cross-Site Scripting (XSS) vulnerability affects OpenCart version 1.2.3. It is caused by malformed JSON object and can lead to session hijacking. This issue corresponds to CWE-20 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 73, "label": "VERSION"}, {"start": 91, "end": 112, "label": "ATTACK_VECTOR"}, {"start": 129, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 180, "label": "CWE"}, {"start": 194, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "133a7395-d748-4f37-ab15-8f458a9fb7e0", "text": "A Directory Traversal vulnerability affects OpenCart version 9.12. It is caused by specially crafted packet and can lead to privilege escalation. This issue corresponds to CWE-200 and is rated Medium with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 65, "label": "VERSION"}, {"start": 83, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "6349a9d9-fb55-46af-9f4e-287f5109bead", "text": "A Authentication Bypass vulnerability affects Drupal version 10.5. It is caused by injected SQL query and can lead to service disruption. This issue corresponds to CWE-94 and is rated High with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 65, "label": "VERSION"}, {"start": 83, "end": 101, "label": "ATTACK_VECTOR"}, {"start": 118, "end": 136, "label": "IMPACT"}, {"start": 164, "end": 170, "label": "CWE"}, {"start": 184, "end": 188, "label": "SEVERITY"}, {"start": 210, "end": 213, "label": "CVSS"}]} {"id": "d51d1bd0-c50b-45d1-87fb-414b29cf7349", "text": "A Command Injection vulnerability affects Kubernetes API Server version 2.3.1. It is caused by specially crafted packet and can lead to service disruption. This issue corresponds to CWE-89 and is rated Medium with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 63, "label": "PRODUCT"}, {"start": 72, "end": 77, "label": "VERSION"}, {"start": 95, "end": 119, "label": "ATTACK_VECTOR"}, {"start": 136, "end": 154, "label": "IMPACT"}, {"start": 182, "end": 188, "label": "CWE"}, {"start": 202, "end": 208, "label": "SEVERITY"}, {"start": 230, "end": 233, "label": "CVSS"}]} {"id": "af294833-2f35-4073-954d-f91fb9ca073b", "text": "A Buffer Overflow vulnerability affects Kubernetes API Server version 6.0.1. It is caused by malicious input payload and can lead to database manipulation. This issue corresponds to CWE-89 and is rated Critical with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 75, "label": "VERSION"}, {"start": 93, "end": 116, "label": "ATTACK_VECTOR"}, {"start": 133, "end": 154, "label": "IMPACT"}, {"start": 182, "end": 188, "label": "CWE"}, {"start": 202, "end": 210, "label": "SEVERITY"}, {"start": 232, "end": 235, "label": "CVSS"}]} {"id": "f37b8fe3-74d7-4865-a0e5-5ef2f713ae4d", "text": "A Privilege Escalation vulnerability affects Docker Engine version 6.0.1. It is caused by malformed JSON object and can lead to database manipulation. This issue corresponds to CWE-79 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 72, "label": "VERSION"}, {"start": 90, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 183, "label": "CWE"}, {"start": 197, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "3694b95e-124f-42bb-8531-a6b300f0b4ab", "text": "A Command Injection vulnerability affects Cisco ASA version 6.0.1. It is caused by specially crafted packet and can lead to privilege escalation. This issue corresponds to CWE-122 and is rated Critical with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "314f5622-1734-4686-b35a-93e1cb560521", "text": "A Authentication Bypass vulnerability affects Jenkins version 1.2.3. It is caused by injected SQL query and can lead to session hijacking. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 137, "label": "IMPACT"}, {"start": 165, "end": 172, "label": "CWE"}, {"start": 186, "end": 189, "label": "SEVERITY"}, {"start": 211, "end": 214, "label": "CVSS"}]} {"id": "c4e8df37-81e5-4040-80b5-7a4466297f35", "text": "A SQL Injection vulnerability affects Docker Engine version 10.5. It is caused by malformed JSON object and can lead to privilege escalation. This issue corresponds to CWE-89 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 64, "label": "VERSION"}, {"start": 82, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 174, "label": "CWE"}, {"start": 188, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "6e0b961c-d8b0-4dc8-b3cb-36b65b325c59", "text": "A Denial of Service vulnerability affects PostgreSQL version 3.0.3. It is caused by unsanitized user input and can lead to arbitrary code execution. This issue corresponds to CWE-20 and is rated Low with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 66, "label": "VERSION"}, {"start": 84, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "051c6d43-2f30-4d27-aad2-d5f20441c65f", "text": "A Buffer Overflow vulnerability affects Docker Engine version 1.2.3. It is caused by malformed JSON object and can lead to session hijacking. This issue corresponds to CWE-94 and is rated High with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 174, "label": "CWE"}, {"start": 188, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "de4b886f-f407-47cc-ba62-7ba99cce1da1", "text": "A Buffer Overflow vulnerability affects Apache Struts version 1.2.3. It is caused by specially crafted packet and can lead to service disruption. This issue corresponds to CWE-200 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "71d465bc-e82c-41a8-b8dd-4e5100d8da7e", "text": "A Buffer Overflow vulnerability affects PostgreSQL version 7.4.2. It is caused by unsanitized user input and can lead to privilege escalation. This issue corresponds to CWE-122 and is rated Low with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 64, "label": "VERSION"}, {"start": 82, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 176, "label": "CWE"}, {"start": 190, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "272fdc3e-614c-4c75-b733-9d9770a21968", "text": "A Buffer Overflow vulnerability affects OpenSSL version 10.5. It is caused by malicious input payload and can lead to database manipulation. This issue corresponds to CWE-79 and is rated High with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 47, "label": "PRODUCT"}, {"start": 56, "end": 60, "label": "VERSION"}, {"start": 78, "end": 101, "label": "ATTACK_VECTOR"}, {"start": 118, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 173, "label": "CWE"}, {"start": 187, "end": 191, "label": "SEVERITY"}, {"start": 213, "end": 216, "label": "CVSS"}]} {"id": "4e0e1792-2659-4e7a-866d-b23821fe20a2", "text": "A SQL Injection vulnerability affects Apache Struts version 2.4.7. It is caused by unsanitized user input and can lead to information disclosure. This issue corresponds to CWE-79 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "78edd476-97d3-4eb4-89bf-d1c3d60262d7", "text": "A Directory Traversal vulnerability affects PHPMyAdmin version 9.12. It is caused by malicious input payload and can lead to arbitrary code execution. This issue corresponds to CWE-122 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 67, "label": "VERSION"}, {"start": 85, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 184, "label": "CWE"}, {"start": 198, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "821f4ea7-cef9-4a02-b63b-251573e3c80f", "text": "A Remote Code Execution vulnerability affects PostgreSQL version 10.5. It is caused by injected SQL query and can lead to privilege escalation. This issue corresponds to CWE-122 and is rated Critical with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 69, "label": "VERSION"}, {"start": 87, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 177, "label": "CWE"}, {"start": 191, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "94cd9b38-7498-4100-a7c2-88f309d814ec", "text": "A Directory Traversal vulnerability affects Nginx Web Server version 6.0.1. It is caused by unsanitized user input and can lead to service disruption. This issue corresponds to CWE-20 and is rated Critical with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 60, "label": "PRODUCT"}, {"start": 69, "end": 74, "label": "VERSION"}, {"start": 92, "end": 114, "label": "ATTACK_VECTOR"}, {"start": 131, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 183, "label": "CWE"}, {"start": 197, "end": 205, "label": "SEVERITY"}, {"start": 227, "end": 230, "label": "CVSS"}]} {"id": "369db718-7538-41ff-a3df-af85056427b5", "text": "A Cross-Site Scripting (XSS) vulnerability affects OpenCart version 9.12. It is caused by malformed JSON object and can lead to privilege escalation. This issue corresponds to CWE-89 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 72, "label": "VERSION"}, {"start": 90, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 148, "label": "IMPACT"}, {"start": 176, "end": 182, "label": "CWE"}, {"start": 196, "end": 200, "label": "SEVERITY"}, {"start": 68, "end": 71, "label": "CVSS"}]} {"id": "8e6a632e-4dc1-4793-89c6-8c0f91db4efb", "text": "A Directory Traversal vulnerability affects Cisco ASA version 9.12. It is caused by crafted HTTP request and can lead to information disclosure. This issue corresponds to CWE-200 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 66, "label": "VERSION"}, {"start": 84, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 178, "label": "CWE"}, {"start": 192, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "adf9d7b7-3503-49c0-8a1f-3a66254c4ee6", "text": "A Buffer Overflow vulnerability affects Nginx Web Server version 4.18.0. It is caused by specially crafted packet and can lead to session hijacking. This issue corresponds to CWE-122 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 71, "label": "VERSION"}, {"start": 89, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 182, "label": "CWE"}, {"start": 196, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "eaf85ce0-2e0e-40a6-a1cf-0582672c93f6", "text": "A Privilege Escalation vulnerability affects Mozilla Firefox version 14.2. It is caused by injected SQL query and can lead to arbitrary code execution. This issue corresponds to CWE-94 and is rated Medium with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 60, "label": "PRODUCT"}, {"start": 69, "end": 73, "label": "VERSION"}, {"start": 91, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 150, "label": "IMPACT"}, {"start": 178, "end": 184, "label": "CWE"}, {"start": 198, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "cd105df1-6599-47a5-9c38-5cdb013193a2", "text": "A Privilege Escalation vulnerability affects PHPMyAdmin version 9.12. It is caused by tampered API request and can lead to information disclosure. This issue corresponds to CWE-122 and is rated Critical with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 180, "label": "CWE"}, {"start": 194, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "d0dbefe8-c63b-40f5-b86d-3107544fcf1b", "text": "A Denial of Service vulnerability affects Drupal version 91.0. It is caused by unsanitized user input and can lead to arbitrary code execution. This issue corresponds to CWE-400 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 48, "label": "PRODUCT"}, {"start": 57, "end": 61, "label": "VERSION"}, {"start": 79, "end": 101, "label": "ATTACK_VECTOR"}, {"start": 118, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 177, "label": "CWE"}, {"start": 191, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "4f80624c-ff2e-45a6-8b78-abff6f95460a", "text": "A Privilege Escalation vulnerability affects PostgreSQL version 91.0. It is caused by unsanitized user input and can lead to arbitrary code execution. This issue corresponds to CWE-122 and is rated Low with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 184, "label": "CWE"}, {"start": 198, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "a81f2dfa-7ae3-483c-a023-cb1e1cabd7bb", "text": "A Cross-Site Scripting (XSS) vulnerability affects Kubernetes API Server version 91.0. It is caused by specially crafted packet and can lead to privilege escalation. This issue corresponds to CWE-122 and is rated High with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 72, "label": "PRODUCT"}, {"start": 81, "end": 85, "label": "VERSION"}, {"start": 103, "end": 127, "label": "ATTACK_VECTOR"}, {"start": 144, "end": 164, "label": "IMPACT"}, {"start": 192, "end": 199, "label": "CWE"}, {"start": 213, "end": 217, "label": "SEVERITY"}, {"start": 239, "end": 242, "label": "CVSS"}]} {"id": "dc3f7478-77ea-4e2b-9970-52058018d4de", "text": "A Privilege Escalation vulnerability affects Google Chrome version 1.2.3. It is caused by malformed JSON object and can lead to arbitrary code execution. This issue corresponds to CWE-20 and is rated Critical with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 72, "label": "VERSION"}, {"start": 90, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 152, "label": "IMPACT"}, {"start": 180, "end": 186, "label": "CWE"}, {"start": 200, "end": 208, "label": "SEVERITY"}, {"start": 230, "end": 233, "label": "CVSS"}]} {"id": "e42241e3-089c-4af4-ba4f-08f4e60a9c3d", "text": "A Authentication Bypass vulnerability affects WordPress version 10.5. It is caused by malicious input payload and can lead to session hijacking. This issue corresponds to CWE-20 and is rated High with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "f21157eb-b802-4464-94da-1ec4a120f96d", "text": "A Denial of Service vulnerability affects Kubernetes API Server version 1.2.3. It is caused by injected SQL query and can lead to service disruption. This issue corresponds to CWE-122 and is rated High with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 63, "label": "PRODUCT"}, {"start": 72, "end": 77, "label": "VERSION"}, {"start": 95, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 148, "label": "IMPACT"}, {"start": 176, "end": 183, "label": "CWE"}, {"start": 197, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "20f244a7-17b2-4f2c-a4e3-325316c4ac81", "text": "A Cross-Site Scripting (XSS) vulnerability affects Jenkins version 7.4.2. It is caused by specially crafted packet and can lead to session hijacking. This issue corresponds to CWE-89 and is rated Critical with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 72, "label": "VERSION"}, {"start": 90, "end": 114, "label": "ATTACK_VECTOR"}, {"start": 131, "end": 148, "label": "IMPACT"}, {"start": 176, "end": 182, "label": "CWE"}, {"start": 196, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "a77a103d-6655-47d0-9c01-dd5b82637ee0", "text": "A Privilege Escalation vulnerability affects Cisco ASA version 2.3.1. It is caused by crafted HTTP request and can lead to session hijacking. This issue corresponds to CWE-89 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 174, "label": "CWE"}, {"start": 188, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "ab12a59b-a13e-4803-843f-bd147167d3a3", "text": "A Command Injection vulnerability affects Drupal version 9.12. It is caused by specially crafted packet and can lead to arbitrary code execution. This issue corresponds to CWE-200 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 48, "label": "PRODUCT"}, {"start": 57, "end": 61, "label": "VERSION"}, {"start": 79, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 197, "label": "SEVERITY"}, {"start": 57, "end": 60, "label": "CVSS"}]} {"id": "f61a0006-2e0b-499d-bef8-e0c333c21250", "text": "A Privilege Escalation vulnerability affects Drupal version 2.3.1. It is caused by specially crafted packet and can lead to arbitrary code execution. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 148, "label": "IMPACT"}, {"start": 176, "end": 182, "label": "CWE"}, {"start": 196, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "e7d523f3-c774-4f32-82ba-66cd3ecbcd3f", "text": "A Denial of Service vulnerability affects Nginx Web Server version 5.3.1. It is caused by malicious input payload and can lead to information disclosure. This issue corresponds to CWE-94 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 72, "label": "VERSION"}, {"start": 90, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 152, "label": "IMPACT"}, {"start": 180, "end": 186, "label": "CWE"}, {"start": 200, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "94310448-e620-4215-b0c9-3c09e3bbc203", "text": "A SQL Injection vulnerability affects Apache Struts version 1.2.3. It is caused by unsanitized user input and can lead to information disclosure. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "9e71aee6-c82b-4cf8-bd27-974c8df239da", "text": "A Command Injection vulnerability affects Google Chrome version 5.3.1. It is caused by malformed JSON object and can lead to arbitrary code execution. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 183, "label": "CWE"}, {"start": 197, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "12b019e1-8f60-4a9d-8cb0-b2810558fba8", "text": "A SQL Injection vulnerability affects OpenSSL version 2.3.1. It is caused by malformed JSON object and can lead to arbitrary code execution. This issue corresponds to CWE-79 and is rated Medium with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 45, "label": "PRODUCT"}, {"start": 54, "end": 59, "label": "VERSION"}, {"start": 77, "end": 98, "label": "ATTACK_VECTOR"}, {"start": 115, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 173, "label": "CWE"}, {"start": 187, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "e5018755-f053-4cea-b5e3-ddeb19e2cb6d", "text": "A Buffer Overflow vulnerability affects Mozilla Firefox version 1.2.3. It is caused by unsanitized user input and can lead to privilege escalation. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 181, "label": "CWE"}, {"start": 195, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "25fcbbc4-49c3-4d51-bf0f-906037717b2a", "text": "A Denial of Service vulnerability affects Nginx Web Server version 10.5. It is caused by injected SQL query and can lead to session hijacking. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 71, "label": "VERSION"}, {"start": 89, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 175, "label": "CWE"}, {"start": 189, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "a3471793-2ba5-4a10-ab60-da94d5fd2640", "text": "A SQL Injection vulnerability affects WordPress version 91.0. It is caused by specially crafted packet and can lead to session hijacking. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 47, "label": "PRODUCT"}, {"start": 56, "end": 60, "label": "VERSION"}, {"start": 78, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 136, "label": "IMPACT"}, {"start": 164, "end": 170, "label": "CWE"}, {"start": 184, "end": 187, "label": "SEVERITY"}, {"start": 209, "end": 212, "label": "CVSS"}]} {"id": "3581ebaf-f8f1-4700-b434-0b8453e573e5", "text": "A Privilege Escalation vulnerability affects Kubernetes API Server version 4.18.0. It is caused by crafted HTTP request and can lead to service disruption. This issue corresponds to CWE-94 and is rated Critical with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 66, "label": "PRODUCT"}, {"start": 75, "end": 81, "label": "VERSION"}, {"start": 99, "end": 119, "label": "ATTACK_VECTOR"}, {"start": 136, "end": 154, "label": "IMPACT"}, {"start": 182, "end": 188, "label": "CWE"}, {"start": 202, "end": 210, "label": "SEVERITY"}, {"start": 232, "end": 235, "label": "CVSS"}]} {"id": "cf9c94b6-c161-45e2-944f-376164e61e2b", "text": "A Authentication Bypass vulnerability affects OpenCart version 2.3.1. It is caused by injected SQL query and can lead to information disclosure. This issue corresponds to CWE-20 and is rated Low with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "856f6ae0-9e9b-4dbc-a009-d1fe16d6d736", "text": "A Command Injection vulnerability affects PHPMyAdmin version 5.3.1. It is caused by injected SQL query and can lead to privilege escalation. This issue corresponds to CWE-20 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 66, "label": "VERSION"}, {"start": 84, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 173, "label": "CWE"}, {"start": 187, "end": 190, "label": "SEVERITY"}, {"start": 212, "end": 215, "label": "CVSS"}]} {"id": "9a17e4cc-1b0b-49c5-9288-2e6b9a6c1b68", "text": "A Command Injection vulnerability affects WordPress version 7.4.2. It is caused by injected SQL query and can lead to database manipulation. This issue corresponds to CWE-400 and is rated Critical with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 101, "label": "ATTACK_VECTOR"}, {"start": 118, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 174, "label": "CWE"}, {"start": 188, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "086f803f-5ca2-46ed-9fd0-5dd34aa623b4", "text": "A Buffer Overflow vulnerability affects Apache Struts version 3.0.3. It is caused by malformed JSON object and can lead to service disruption. This issue corresponds to CWE-400 and is rated Critical with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 176, "label": "CWE"}, {"start": 190, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "b66b190c-91a0-4c4f-ae54-c20d1601bb77", "text": "A Cross-Site Scripting (XSS) vulnerability affects Google Chrome version 1.2.3. It is caused by injected SQL query and can lead to arbitrary code execution. This issue corresponds to CWE-79 and is rated Critical with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 64, "label": "PRODUCT"}, {"start": 73, "end": 78, "label": "VERSION"}, {"start": 96, "end": 114, "label": "ATTACK_VECTOR"}, {"start": 131, "end": 155, "label": "IMPACT"}, {"start": 183, "end": 189, "label": "CWE"}, {"start": 203, "end": 211, "label": "SEVERITY"}, {"start": 233, "end": 236, "label": "CVSS"}]} {"id": "7a7076c9-2e54-45e1-a3d3-76256d385648", "text": "A SQL Injection vulnerability affects Nginx Web Server version 2.3.1. It is caused by tampered API request and can lead to arbitrary code execution. This issue corresponds to CWE-79 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "4355dfa5-8912-4e68-9b5d-6ccde3c4db5c", "text": "A Command Injection vulnerability affects PHPMyAdmin version 2.3.1. It is caused by malicious input payload and can lead to service disruption. This issue corresponds to CWE-89 and is rated Medium with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 66, "label": "VERSION"}, {"start": 84, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 176, "label": "CWE"}, {"start": 190, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "657c7683-d9f6-4b5a-b1f5-bc0053573b14", "text": "A Remote Code Execution vulnerability affects OpenSSL version 3.0.3. It is caused by malformed JSON object and can lead to session hijacking. This issue corresponds to CWE-20 and is rated Low with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 174, "label": "CWE"}, {"start": 188, "end": 191, "label": "SEVERITY"}, {"start": 213, "end": 216, "label": "CVSS"}]} {"id": "16a939c6-ce7f-4d8a-bc1c-0122724e20e6", "text": "A Directory Traversal vulnerability affects Google Chrome version 5.3.1. It is caused by unsanitized user input and can lead to session hijacking. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 71, "label": "VERSION"}, {"start": 89, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 180, "label": "CWE"}, {"start": 194, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "cdcce90d-be06-41c7-8b6b-a8bd08dadae9", "text": "A Command Injection vulnerability affects Nginx Web Server version 14.2. It is caused by unsanitized user input and can lead to information disclosure. This issue corresponds to CWE-122 and is rated High with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 71, "label": "VERSION"}, {"start": 89, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 150, "label": "IMPACT"}, {"start": 178, "end": 185, "label": "CWE"}, {"start": 199, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "45e55cb6-e26f-4093-9f33-8fdb27465e7b", "text": "A Cross-Site Scripting (XSS) vulnerability affects Docker Engine version 4.18.0. It is caused by malicious input payload and can lead to database manipulation. This issue corresponds to CWE-94 and is rated High with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 64, "label": "PRODUCT"}, {"start": 73, "end": 79, "label": "VERSION"}, {"start": 97, "end": 120, "label": "ATTACK_VECTOR"}, {"start": 137, "end": 158, "label": "IMPACT"}, {"start": 186, "end": 192, "label": "CWE"}, {"start": 206, "end": 210, "label": "SEVERITY"}, {"start": 232, "end": 235, "label": "CVSS"}]} {"id": "1f3a63da-caf9-4245-aaa6-ca126554f22e", "text": "A SQL Injection vulnerability affects Nginx Web Server version 6.0.1. It is caused by injected SQL query and can lead to arbitrary code execution. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 179, "label": "CWE"}, {"start": 193, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "0c8b851f-0871-4cd2-8ce7-67ced58aa2bd", "text": "A SQL Injection vulnerability affects Mozilla Firefox version 10.5. It is caused by injected SQL query and can lead to session hijacking. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 66, "label": "VERSION"}, {"start": 84, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 136, "label": "IMPACT"}, {"start": 164, "end": 170, "label": "CWE"}, {"start": 184, "end": 190, "label": "SEVERITY"}, {"start": 212, "end": 215, "label": "CVSS"}]} {"id": "b7c562b4-2f80-46cd-9c90-f584346698dc", "text": "A Command Injection vulnerability affects Apache Struts version 5.3.1. It is caused by malformed JSON object and can lead to service disruption. This issue corresponds to CWE-94 and is rated High with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "0bd44119-c075-4ddd-a7e4-4706c62749e5", "text": "A Command Injection vulnerability affects Apache Struts version 4.18.0. It is caused by unsanitized user input and can lead to session hijacking. This issue corresponds to CWE-200 and is rated Critical with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 70, "label": "VERSION"}, {"start": 88, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "cce823dd-7a1d-4f64-a901-27191021db0d", "text": "A Command Injection vulnerability affects Cisco ASA version 10.5. It is caused by malformed JSON object and can lead to arbitrary code execution. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 64, "label": "VERSION"}, {"start": 82, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "ccea6e3d-e5c3-46c0-ae6a-e1ce8100b18d", "text": "A Command Injection vulnerability affects OpenCart version 10.5. It is caused by crafted HTTP request and can lead to database manipulation. This issue corresponds to CWE-20 and is rated Critical with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 63, "label": "VERSION"}, {"start": 81, "end": 101, "label": "ATTACK_VECTOR"}, {"start": 118, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 173, "label": "CWE"}, {"start": 187, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "bcb3ea55-4857-432a-a35d-8c9247fa5ca4", "text": "A SQL Injection vulnerability affects Apache Struts version 6.0.1. It is caused by unsanitized user input and can lead to database manipulation. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "117ab486-db65-42d7-a9e7-41262125db14", "text": "A Command Injection vulnerability affects Jenkins version 14.2. It is caused by tampered API request and can lead to information disclosure. This issue corresponds to CWE-94 and is rated Critical with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 49, "label": "PRODUCT"}, {"start": 58, "end": 62, "label": "VERSION"}, {"start": 80, "end": 100, "label": "ATTACK_VECTOR"}, {"start": 117, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 173, "label": "CWE"}, {"start": 187, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "d4ed584b-2f3b-4497-856e-df89d00d5e49", "text": "A Privilege Escalation vulnerability affects MySQL Server version 2.3.1. It is caused by malicious input payload and can lead to arbitrary code execution. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 71, "label": "VERSION"}, {"start": 89, "end": 112, "label": "ATTACK_VECTOR"}, {"start": 129, "end": 153, "label": "IMPACT"}, {"start": 181, "end": 187, "label": "CWE"}, {"start": 201, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "f410b5d5-c3d3-4309-bfaa-4e541ccaf1c4", "text": "A SQL Injection vulnerability affects Apache Struts version 91.0. It is caused by specially crafted packet and can lead to information disclosure. This issue corresponds to CWE-200 and is rated Critical with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 64, "label": "VERSION"}, {"start": 82, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 180, "label": "CWE"}, {"start": 194, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "fbefaf0c-e1c3-421f-bff1-bb6c43499263", "text": "A Authentication Bypass vulnerability affects OpenSSL version 10.5. It is caused by tampered API request and can lead to service disruption. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 66, "label": "VERSION"}, {"start": 84, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 173, "label": "CWE"}, {"start": 187, "end": 190, "label": "SEVERITY"}, {"start": 212, "end": 215, "label": "CVSS"}]} {"id": "a4d7848f-53ec-488c-a797-4a6d19caef91", "text": "A Command Injection vulnerability affects Nginx Web Server version 3.0.3. It is caused by malicious input payload and can lead to arbitrary code execution. This issue corresponds to CWE-94 and is rated Medium with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 72, "label": "VERSION"}, {"start": 90, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 154, "label": "IMPACT"}, {"start": 182, "end": 188, "label": "CWE"}, {"start": 202, "end": 208, "label": "SEVERITY"}, {"start": 230, "end": 233, "label": "CVSS"}]} {"id": "d0e805a9-ffa3-4c91-b65c-17f1acfd88e7", "text": "A Privilege Escalation vulnerability affects Kubernetes API Server version 9.12. It is caused by injected SQL query and can lead to session hijacking. This issue corresponds to CWE-89 and is rated Medium with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 66, "label": "PRODUCT"}, {"start": 75, "end": 79, "label": "VERSION"}, {"start": 97, "end": 115, "label": "ATTACK_VECTOR"}, {"start": 132, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 183, "label": "CWE"}, {"start": 197, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "47961615-f20a-4019-b3d0-16488736c801", "text": "A Buffer Overflow vulnerability affects Jenkins version 4.18.0. It is caused by malicious input payload and can lead to database manipulation. This issue corresponds to CWE-200 and is rated Critical with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 47, "label": "PRODUCT"}, {"start": 56, "end": 62, "label": "VERSION"}, {"start": 80, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 176, "label": "CWE"}, {"start": 190, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "39976070-8aa3-4312-96e5-85f70045fe55", "text": "A Privilege Escalation vulnerability affects Drupal version 9.12. It is caused by tampered API request and can lead to service disruption. This issue corresponds to CWE-400 and is rated Low with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 64, "label": "VERSION"}, {"start": 82, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 137, "label": "IMPACT"}, {"start": 165, "end": 172, "label": "CWE"}, {"start": 186, "end": 189, "label": "SEVERITY"}, {"start": 211, "end": 214, "label": "CVSS"}]} {"id": "190b8cce-01e5-464f-8691-615843fe3b8b", "text": "A SQL Injection vulnerability affects OpenCart version 5.3.1. It is caused by malformed JSON object and can lead to privilege escalation. This issue corresponds to CWE-94 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 46, "label": "PRODUCT"}, {"start": 55, "end": 60, "label": "VERSION"}, {"start": 78, "end": 99, "label": "ATTACK_VECTOR"}, {"start": 116, "end": 136, "label": "IMPACT"}, {"start": 164, "end": 170, "label": "CWE"}, {"start": 184, "end": 188, "label": "SEVERITY"}, {"start": 210, "end": 213, "label": "CVSS"}]} {"id": "9e9baeca-b948-4c5b-b2e3-bd67ac1ae010", "text": "A Denial of Service vulnerability affects Nginx Web Server version 1.2.3. It is caused by specially crafted packet and can lead to service disruption. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 72, "label": "VERSION"}, {"start": 90, "end": 114, "label": "ATTACK_VECTOR"}, {"start": 131, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 183, "label": "CWE"}, {"start": 197, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "3a88fad8-804c-445d-93ab-8b090efbf99f", "text": "A Buffer Overflow vulnerability affects PHPMyAdmin version 91.0. It is caused by tampered API request and can lead to information disclosure. This issue corresponds to CWE-94 and is rated Medium with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 63, "label": "VERSION"}, {"start": 81, "end": 101, "label": "ATTACK_VECTOR"}, {"start": 118, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 174, "label": "CWE"}, {"start": 188, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "88bac797-55be-4756-802f-9e66bab449ca", "text": "A Authentication Bypass vulnerability affects PostgreSQL version 10.5. It is caused by unsanitized user input and can lead to database manipulation. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 69, "label": "VERSION"}, {"start": 87, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "a4d31d45-ecdf-4e45-b006-c46ac9da9e38", "text": "A Denial of Service vulnerability affects Jenkins version 7.4.2. It is caused by malformed JSON object and can lead to session hijacking. This issue corresponds to CWE-20 and is rated Critical with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 49, "label": "PRODUCT"}, {"start": 58, "end": 63, "label": "VERSION"}, {"start": 81, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 136, "label": "IMPACT"}, {"start": 164, "end": 170, "label": "CWE"}, {"start": 184, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "56e2fc86-1634-4c4b-a8fc-92683b0c0393", "text": "A Buffer Overflow vulnerability affects Docker Engine version 1.2.3. It is caused by malicious input payload and can lead to database manipulation. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 180, "label": "CWE"}, {"start": 194, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "59ae67e5-b074-438c-8a51-e4752b5c6e4e", "text": "A Authentication Bypass vulnerability affects WordPress version 3.0.3. It is caused by malformed JSON object and can lead to session hijacking. This issue corresponds to CWE-94 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 176, "label": "CWE"}, {"start": 190, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "8baf8b41-7a81-40fa-b8f6-effcd223552c", "text": "A Cross-Site Scripting (XSS) vulnerability affects PHPMyAdmin version 7.4.2. It is caused by crafted HTTP request and can lead to session hijacking. This issue corresponds to CWE-94 and is rated Critical with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 75, "label": "VERSION"}, {"start": 93, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "20912459-52ed-4b75-b555-1e34fd38be80", "text": "A Denial of Service vulnerability affects Jenkins version 2.4.7. It is caused by malformed JSON object and can lead to service disruption. This issue corresponds to CWE-400 and is rated Low with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 49, "label": "PRODUCT"}, {"start": 58, "end": 63, "label": "VERSION"}, {"start": 81, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 137, "label": "IMPACT"}, {"start": 165, "end": 172, "label": "CWE"}, {"start": 186, "end": 189, "label": "SEVERITY"}, {"start": 211, "end": 214, "label": "CVSS"}]} {"id": "854d39de-87ae-4e2f-824b-891227cc02cc", "text": "A Denial of Service vulnerability affects Kubernetes API Server version 91.0. It is caused by injected SQL query and can lead to session hijacking. This issue corresponds to CWE-20 and is rated Critical with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 63, "label": "PRODUCT"}, {"start": 72, "end": 76, "label": "VERSION"}, {"start": 94, "end": 112, "label": "ATTACK_VECTOR"}, {"start": 129, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 180, "label": "CWE"}, {"start": 194, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "205666ba-3229-4bdb-8657-6a9b3069bbde", "text": "A Directory Traversal vulnerability affects MySQL Server version 6.0.1. It is caused by malformed JSON object and can lead to arbitrary code execution. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 70, "label": "VERSION"}, {"start": 88, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 150, "label": "IMPACT"}, {"start": 178, "end": 184, "label": "CWE"}, {"start": 198, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "153fe8a8-be63-4762-bfe9-e6663be270cc", "text": "A Directory Traversal vulnerability affects WordPress version 3.0.3. It is caused by malformed JSON object and can lead to privilege escalation. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "842681d6-022d-47fe-9309-fa3727078466", "text": "A Directory Traversal vulnerability affects OpenCart version 4.18.0. It is caused by tampered API request and can lead to database manipulation. This issue corresponds to CWE-400 and is rated Medium with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 67, "label": "VERSION"}, {"start": 85, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 178, "label": "CWE"}, {"start": 192, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "ac4737c2-a04c-4450-8414-153c263f0119", "text": "A Command Injection vulnerability affects Kubernetes API Server version 2.4.7. It is caused by malicious input payload and can lead to session hijacking. This issue corresponds to CWE-89 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 63, "label": "PRODUCT"}, {"start": 72, "end": 77, "label": "VERSION"}, {"start": 95, "end": 118, "label": "ATTACK_VECTOR"}, {"start": 135, "end": 152, "label": "IMPACT"}, {"start": 180, "end": 186, "label": "CWE"}, {"start": 200, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "206ae288-3330-4f6b-9a5e-b648909d69f6", "text": "A Denial of Service vulnerability affects Mozilla Firefox version 9.12. It is caused by crafted HTTP request and can lead to session hijacking. This issue corresponds to CWE-400 and is rated Low with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 70, "label": "VERSION"}, {"start": 88, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 177, "label": "CWE"}, {"start": 191, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "768a1afd-811a-4fcf-be73-9528dc59eaae", "text": "A Command Injection vulnerability affects PostgreSQL version 2.3.1. It is caused by malicious input payload and can lead to service disruption. This issue corresponds to CWE-94 and is rated Medium with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 66, "label": "VERSION"}, {"start": 84, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 176, "label": "CWE"}, {"start": 190, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "0cf8a379-b021-4bbd-9415-bc494bbf94da", "text": "A Remote Code Execution vulnerability affects Docker Engine version 3.0.3. It is caused by tampered API request and can lead to arbitrary code execution. This issue corresponds to CWE-20 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 73, "label": "VERSION"}, {"start": 91, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 152, "label": "IMPACT"}, {"start": 180, "end": 186, "label": "CWE"}, {"start": 200, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "11b9d89e-c44a-4258-8ac6-90ca60813a91", "text": "A Command Injection vulnerability affects PostgreSQL version 1.2.3. It is caused by unsanitized user input and can lead to session hijacking. This issue corresponds to CWE-89 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 66, "label": "VERSION"}, {"start": 84, "end": 106, "label": "ATTACK_VECTOR"}, {"start": 123, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 174, "label": "CWE"}, {"start": 188, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "53e099e2-75de-4940-9433-19a4e4c88791", "text": "A Denial of Service vulnerability affects OpenSSL version 1.2.3. It is caused by tampered API request and can lead to privilege escalation. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 49, "label": "PRODUCT"}, {"start": 58, "end": 63, "label": "VERSION"}, {"start": 81, "end": 101, "label": "ATTACK_VECTOR"}, {"start": 118, "end": 138, "label": "IMPACT"}, {"start": 166, "end": 172, "label": "CWE"}, {"start": 186, "end": 189, "label": "SEVERITY"}, {"start": 211, "end": 214, "label": "CVSS"}]} {"id": "78be8586-56de-4b18-a797-26104863de81", "text": "A Denial of Service vulnerability affects WordPress version 91.0. It is caused by injected SQL query and can lead to information disclosure. This issue corresponds to CWE-94 and is rated Medium with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 64, "label": "VERSION"}, {"start": 82, "end": 100, "label": "ATTACK_VECTOR"}, {"start": 117, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 173, "label": "CWE"}, {"start": 187, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "f323462d-09d6-4cbd-92ed-01858302292b", "text": "A Cross-Site Scripting (XSS) vulnerability affects PostgreSQL version 9.12. It is caused by injected SQL query and can lead to session hijacking. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 74, "label": "VERSION"}, {"start": 92, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 195, "label": "SEVERITY"}, {"start": 70, "end": 73, "label": "CVSS"}]} {"id": "cf189c9e-09b6-422f-ab52-1ff750e300d3", "text": "A Buffer Overflow vulnerability affects WordPress version 2.3.1. It is caused by specially crafted packet and can lead to information disclosure. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 49, "label": "PRODUCT"}, {"start": 58, "end": 63, "label": "VERSION"}, {"start": 81, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "9e7689ad-e005-4ac7-9e3a-a6db346da2e1", "text": "A SQL Injection vulnerability affects Mozilla Firefox version 5.3.1. It is caused by specially crafted packet and can lead to arbitrary code execution. This issue corresponds to CWE-200 and is rated Medium with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 150, "label": "IMPACT"}, {"start": 178, "end": 185, "label": "CWE"}, {"start": 199, "end": 205, "label": "SEVERITY"}, {"start": 227, "end": 230, "label": "CVSS"}]} {"id": "f34a1b4c-06dd-4741-8437-e171ae92f115", "text": "A Directory Traversal vulnerability affects OpenCart version 6.0.1. It is caused by tampered API request and can lead to service disruption. This issue corresponds to CWE-122 and is rated High with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 66, "label": "VERSION"}, {"start": 84, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 174, "label": "CWE"}, {"start": 188, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "995ba1f2-318c-41b6-aabf-4513cb6c391a", "text": "A Denial of Service vulnerability affects Kubernetes API Server version 4.18.0. It is caused by unsanitized user input and can lead to service disruption. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 63, "label": "PRODUCT"}, {"start": 72, "end": 78, "label": "VERSION"}, {"start": 96, "end": 118, "label": "ATTACK_VECTOR"}, {"start": 135, "end": 153, "label": "IMPACT"}, {"start": 181, "end": 187, "label": "CWE"}, {"start": 201, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "843dd058-18d5-4c3f-8503-3346f77d83e2", "text": "A Denial of Service vulnerability affects Nginx Web Server version 91.0. It is caused by specially crafted packet and can lead to arbitrary code execution. This issue corresponds to CWE-20 and is rated Medium with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 71, "label": "VERSION"}, {"start": 89, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 154, "label": "IMPACT"}, {"start": 182, "end": 188, "label": "CWE"}, {"start": 202, "end": 208, "label": "SEVERITY"}, {"start": 230, "end": 233, "label": "CVSS"}]} {"id": "930fdad1-600b-4fae-ae9e-5ff2736dd97d", "text": "A Authentication Bypass vulnerability affects Apache Struts version 91.0. It is caused by tampered API request and can lead to service disruption. This issue corresponds to CWE-200 and is rated Medium with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 72, "label": "VERSION"}, {"start": 90, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 180, "label": "CWE"}, {"start": 194, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "5e78cc7d-10a6-4526-b706-347244de4bfe", "text": "A Directory Traversal vulnerability affects PHPMyAdmin version 91.0. It is caused by injected SQL query and can lead to service disruption. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 67, "label": "VERSION"}, {"start": 85, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 138, "label": "IMPACT"}, {"start": 166, "end": 172, "label": "CWE"}, {"start": 186, "end": 189, "label": "SEVERITY"}, {"start": 211, "end": 214, "label": "CVSS"}]} {"id": "5b305d60-1435-4985-af1e-acb6658b33b5", "text": "A Authentication Bypass vulnerability affects MySQL Server version 91.0. It is caused by malicious input payload and can lead to database manipulation. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 71, "label": "VERSION"}, {"start": 89, "end": 112, "label": "ATTACK_VECTOR"}, {"start": 129, "end": 150, "label": "IMPACT"}, {"start": 178, "end": 184, "label": "CWE"}, {"start": 198, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "06133163-4e94-4df0-857f-47829b0a4144", "text": "A Command Injection vulnerability affects PostgreSQL version 14.2. It is caused by unsanitized user input and can lead to information disclosure. This issue corresponds to CWE-89 and is rated High with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 65, "label": "VERSION"}, {"start": 83, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "bcda969f-3de1-4dfe-8276-d977babd8c34", "text": "A Remote Code Execution vulnerability affects Kubernetes API Server version 9.12. It is caused by injected SQL query and can lead to database manipulation. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 67, "label": "PRODUCT"}, {"start": 76, "end": 80, "label": "VERSION"}, {"start": 98, "end": 116, "label": "ATTACK_VECTOR"}, {"start": 133, "end": 154, "label": "IMPACT"}, {"start": 182, "end": 188, "label": "CWE"}, {"start": 202, "end": 205, "label": "SEVERITY"}, {"start": 76, "end": 79, "label": "CVSS"}]} {"id": "48a566ae-7492-41e4-bdbc-131d73e49937", "text": "A Cross-Site Scripting (XSS) vulnerability affects Apache Struts version 3.0.3. It is caused by malicious input payload and can lead to information disclosure. This issue corresponds to CWE-79 and is rated High with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 64, "label": "PRODUCT"}, {"start": 73, "end": 78, "label": "VERSION"}, {"start": 96, "end": 119, "label": "ATTACK_VECTOR"}, {"start": 136, "end": 158, "label": "IMPACT"}, {"start": 186, "end": 192, "label": "CWE"}, {"start": 206, "end": 210, "label": "SEVERITY"}, {"start": 232, "end": 235, "label": "CVSS"}]} {"id": "1847a830-3316-4a03-86e8-d62a1af328ec", "text": "A Buffer Overflow vulnerability affects OpenSSL version 7.4.2. It is caused by tampered API request and can lead to database manipulation. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 47, "label": "PRODUCT"}, {"start": 56, "end": 61, "label": "VERSION"}, {"start": 79, "end": 99, "label": "ATTACK_VECTOR"}, {"start": 116, "end": 137, "label": "IMPACT"}, {"start": 165, "end": 171, "label": "CWE"}, {"start": 185, "end": 188, "label": "SEVERITY"}, {"start": 210, "end": 213, "label": "CVSS"}]} {"id": "e8e155ba-7000-4821-8e22-18f14cb8bb0c", "text": "A Authentication Bypass vulnerability affects Kubernetes API Server version 10.5. It is caused by tampered API request and can lead to service disruption. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 67, "label": "PRODUCT"}, {"start": 76, "end": 80, "label": "VERSION"}, {"start": 98, "end": 118, "label": "ATTACK_VECTOR"}, {"start": 135, "end": 153, "label": "IMPACT"}, {"start": 181, "end": 187, "label": "CWE"}, {"start": 201, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "008581f2-32de-4fde-adb7-8d7d361f4781", "text": "A SQL Injection vulnerability affects Docker Engine version 3.0.3. It is caused by specially crafted packet and can lead to session hijacking. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 175, "label": "CWE"}, {"start": 189, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "87351bcc-9d69-4919-98ff-d07452393b73", "text": "A Authentication Bypass vulnerability affects OpenCart version 2.3.1. It is caused by malicious input payload and can lead to information disclosure. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 148, "label": "IMPACT"}, {"start": 176, "end": 183, "label": "CWE"}, {"start": 197, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "c1b21a60-2f56-4556-b0ed-6d113351a1f5", "text": "A Directory Traversal vulnerability affects MySQL Server version 7.4.2. It is caused by unsanitized user input and can lead to service disruption. This issue corresponds to CWE-20 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 70, "label": "VERSION"}, {"start": 88, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 179, "label": "CWE"}, {"start": 193, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "7c1e2500-61da-4b5b-9cea-4e1d6c7e58a5", "text": "A Denial of Service vulnerability affects Google Chrome version 1.2.3. It is caused by unsanitized user input and can lead to arbitrary code execution. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 150, "label": "IMPACT"}, {"start": 178, "end": 184, "label": "CWE"}, {"start": 198, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "b75376ef-4432-4409-9d73-a69a3fea32c1", "text": "A Buffer Overflow vulnerability affects Cisco ASA version 7.4.2. It is caused by crafted HTTP request and can lead to database manipulation. This issue corresponds to CWE-400 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 49, "label": "PRODUCT"}, {"start": 58, "end": 63, "label": "VERSION"}, {"start": 81, "end": 101, "label": "ATTACK_VECTOR"}, {"start": 118, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 174, "label": "CWE"}, {"start": 188, "end": 191, "label": "SEVERITY"}, {"start": 213, "end": 216, "label": "CVSS"}]} {"id": "3359f033-9915-42ee-bf86-9ab22e542b69", "text": "A Privilege Escalation vulnerability affects PostgreSQL version 1.2.3. It is caused by malicious input payload and can lead to session hijacking. This issue corresponds to CWE-79 and is rated High with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "df68540b-2271-4b36-bc6f-876e637a449f", "text": "A Buffer Overflow vulnerability affects Drupal version 6.0.1. It is caused by tampered API request and can lead to information disclosure. This issue corresponds to CWE-200 and is rated Low with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 46, "label": "PRODUCT"}, {"start": 55, "end": 60, "label": "VERSION"}, {"start": 78, "end": 98, "label": "ATTACK_VECTOR"}, {"start": 115, "end": 137, "label": "IMPACT"}, {"start": 165, "end": 172, "label": "CWE"}, {"start": 186, "end": 189, "label": "SEVERITY"}, {"start": 211, "end": 214, "label": "CVSS"}]} {"id": "30c0de85-7c0b-4462-b545-f1837a16f6af", "text": "A Directory Traversal vulnerability affects OpenCart version 2.4.7. It is caused by injected SQL query and can lead to information disclosure. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 66, "label": "VERSION"}, {"start": 84, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 176, "label": "CWE"}, {"start": 190, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "3978986f-879a-42b6-bf81-59849fa16819", "text": "A Cross-Site Scripting (XSS) vulnerability affects Kubernetes API Server version 14.2. It is caused by specially crafted packet and can lead to information disclosure. This issue corresponds to CWE-79 and is rated Medium with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 72, "label": "PRODUCT"}, {"start": 81, "end": 85, "label": "VERSION"}, {"start": 103, "end": 127, "label": "ATTACK_VECTOR"}, {"start": 144, "end": 166, "label": "IMPACT"}, {"start": 194, "end": 200, "label": "CWE"}, {"start": 214, "end": 220, "label": "SEVERITY"}, {"start": 242, "end": 245, "label": "CVSS"}]} {"id": "294d9cdf-275f-4b08-ba6a-6f986e4e27e6", "text": "A Remote Code Execution vulnerability affects Docker Engine version 5.3.1. It is caused by crafted HTTP request and can lead to session hijacking. This issue corresponds to CWE-89 and is rated Critical with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 73, "label": "VERSION"}, {"start": 91, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 179, "label": "CWE"}, {"start": 193, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "6673d06a-2e22-4c96-9be5-f092291c3733", "text": "A Denial of Service vulnerability affects Kubernetes API Server version 14.2. It is caused by malicious input payload and can lead to service disruption. This issue corresponds to CWE-122 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 63, "label": "PRODUCT"}, {"start": 72, "end": 76, "label": "VERSION"}, {"start": 94, "end": 117, "label": "ATTACK_VECTOR"}, {"start": 134, "end": 152, "label": "IMPACT"}, {"start": 180, "end": 187, "label": "CWE"}, {"start": 201, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "6070957e-51a9-4ba7-80b7-c5c46201b92e", "text": "A Cross-Site Scripting (XSS) vulnerability affects Apache Struts version 91.0. It is caused by malicious input payload and can lead to information disclosure. This issue corresponds to CWE-122 and is rated Critical with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 64, "label": "PRODUCT"}, {"start": 73, "end": 77, "label": "VERSION"}, {"start": 95, "end": 118, "label": "ATTACK_VECTOR"}, {"start": 135, "end": 157, "label": "IMPACT"}, {"start": 185, "end": 192, "label": "CWE"}, {"start": 206, "end": 214, "label": "SEVERITY"}, {"start": 236, "end": 239, "label": "CVSS"}]} {"id": "727daf94-490e-4491-be5b-6177e023bfa0", "text": "A Denial of Service vulnerability affects OpenSSL version 4.18.0. It is caused by malformed JSON object and can lead to database manipulation. This issue corresponds to CWE-79 and is rated High with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 49, "label": "PRODUCT"}, {"start": 58, "end": 64, "label": "VERSION"}, {"start": 82, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 175, "label": "CWE"}, {"start": 189, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "8e300ec6-58d0-47c1-b2b6-042359624f95", "text": "A SQL Injection vulnerability affects OpenCart version 6.0.1. It is caused by specially crafted packet and can lead to arbitrary code execution. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 46, "label": "PRODUCT"}, {"start": 55, "end": 60, "label": "VERSION"}, {"start": 78, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "a6f9e229-d524-4b42-97a6-9e7438ccc1b6", "text": "A SQL Injection vulnerability affects OpenSSL version 1.2.3. It is caused by malicious input payload and can lead to service disruption. This issue corresponds to CWE-400 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 45, "label": "PRODUCT"}, {"start": 54, "end": 59, "label": "VERSION"}, {"start": 77, "end": 100, "label": "ATTACK_VECTOR"}, {"start": 117, "end": 135, "label": "IMPACT"}, {"start": 163, "end": 170, "label": "CWE"}, {"start": 184, "end": 187, "label": "SEVERITY"}, {"start": 209, "end": 212, "label": "CVSS"}]} {"id": "13404b91-127c-404c-93d2-3f60f970129d", "text": "A Buffer Overflow vulnerability affects Kubernetes API Server version 2.3.1. It is caused by malicious input payload and can lead to information disclosure. This issue corresponds to CWE-400 and is rated Medium with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 75, "label": "VERSION"}, {"start": 93, "end": 116, "label": "ATTACK_VECTOR"}, {"start": 133, "end": 155, "label": "IMPACT"}, {"start": 183, "end": 190, "label": "CWE"}, {"start": 204, "end": 210, "label": "SEVERITY"}, {"start": 232, "end": 235, "label": "CVSS"}]} {"id": "ada47728-3175-4504-9c8d-ec7085bb0567", "text": "A Privilege Escalation vulnerability affects Mozilla Firefox version 6.0.1. It is caused by tampered API request and can lead to database manipulation. This issue corresponds to CWE-122 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 60, "label": "PRODUCT"}, {"start": 69, "end": 74, "label": "VERSION"}, {"start": 92, "end": 112, "label": "ATTACK_VECTOR"}, {"start": 129, "end": 150, "label": "IMPACT"}, {"start": 178, "end": 185, "label": "CWE"}, {"start": 199, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "f6a6fb49-f3f0-4334-b3f9-13b449c10520", "text": "A Directory Traversal vulnerability affects MySQL Server version 5.3.1. It is caused by unsanitized user input and can lead to privilege escalation. This issue corresponds to CWE-94 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 70, "label": "VERSION"}, {"start": 88, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "6cacc99f-e8d6-427b-a0df-d8b779803714", "text": "A SQL Injection vulnerability affects Jenkins version 2.4.7. It is caused by unsanitized user input and can lead to arbitrary code execution. This issue corresponds to CWE-400 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 45, "label": "PRODUCT"}, {"start": 54, "end": 59, "label": "VERSION"}, {"start": 77, "end": 99, "label": "ATTACK_VECTOR"}, {"start": 116, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 175, "label": "CWE"}, {"start": 189, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "d435b33c-e85a-4de3-b1af-c03bd3bade8f", "text": "A Denial of Service vulnerability affects OpenCart version 91.0. It is caused by malformed JSON object and can lead to information disclosure. This issue corresponds to CWE-200 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 63, "label": "VERSION"}, {"start": 81, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 176, "label": "CWE"}, {"start": 190, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "15c8895e-774a-4eb8-93c3-eea8a39862d1", "text": "A Command Injection vulnerability affects Nginx Web Server version 5.3.1. It is caused by malformed JSON object and can lead to information disclosure. This issue corresponds to CWE-89 and is rated High with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 72, "label": "VERSION"}, {"start": 90, "end": 111, "label": "ATTACK_VECTOR"}, {"start": 128, "end": 150, "label": "IMPACT"}, {"start": 178, "end": 184, "label": "CWE"}, {"start": 198, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "179cb358-b4b6-4383-90cf-6655bf9212b4", "text": "A Authentication Bypass vulnerability affects Jenkins version 10.5. It is caused by injected SQL query and can lead to database manipulation. This issue corresponds to CWE-200 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 66, "label": "VERSION"}, {"start": 84, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 175, "label": "CWE"}, {"start": 189, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "36b8dd09-1915-4c36-a0b7-48b7b7466582", "text": "A SQL Injection vulnerability affects Nginx Web Server version 3.0.3. It is caused by malicious input payload and can lead to arbitrary code execution. This issue corresponds to CWE-94 and is rated Medium with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 150, "label": "IMPACT"}, {"start": 178, "end": 184, "label": "CWE"}, {"start": 198, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "ad106a70-e43a-48e7-8315-93e21f1d4e78", "text": "A Command Injection vulnerability affects MySQL Server version 91.0. It is caused by crafted HTTP request and can lead to session hijacking. This issue corresponds to CWE-200 and is rated Critical with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 67, "label": "VERSION"}, {"start": 85, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 174, "label": "CWE"}, {"start": 188, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "4f47b0b1-c842-4ff3-9b3f-b5819581fd9b", "text": "A Authentication Bypass vulnerability affects Jenkins version 10.5. It is caused by malformed JSON object and can lead to information disclosure. This issue corresponds to CWE-122 and is rated Critical with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 66, "label": "VERSION"}, {"start": 84, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "ff140854-6348-4f8b-842a-8c18dc119116", "text": "A Authentication Bypass vulnerability affects MySQL Server version 91.0. It is caused by injected SQL query and can lead to information disclosure. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 71, "label": "VERSION"}, {"start": 89, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 180, "label": "CWE"}, {"start": 194, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "6881179d-f29e-42fe-af49-c8a9b2f1edcd", "text": "A Command Injection vulnerability affects PHPMyAdmin version 2.4.7. It is caused by tampered API request and can lead to privilege escalation. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 66, "label": "VERSION"}, {"start": 84, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 175, "label": "CWE"}, {"start": 189, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "b8ea07a6-374c-4c37-985b-bb3835a39f5b", "text": "A Directory Traversal vulnerability affects MySQL Server version 6.0.1. It is caused by crafted HTTP request and can lead to information disclosure. This issue corresponds to CWE-79 and is rated Critical with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 70, "label": "VERSION"}, {"start": 88, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "e4b55f13-9d62-424a-9900-14f4a257c5b7", "text": "A Directory Traversal vulnerability affects PHPMyAdmin version 4.18.0. It is caused by injected SQL query and can lead to privilege escalation. This issue corresponds to CWE-94 and is rated Critical with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 69, "label": "VERSION"}, {"start": 87, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 176, "label": "CWE"}, {"start": 190, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "2cef4b38-19af-4be0-8f64-de1649d9e755", "text": "A Buffer Overflow vulnerability affects Google Chrome version 5.3.1. It is caused by crafted HTTP request and can lead to database manipulation. This issue corresponds to CWE-94 and is rated Critical with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "e85f46b8-b462-49e1-ab16-13327b67a8d4", "text": "A Remote Code Execution vulnerability affects Jenkins version 5.3.1. It is caused by tampered API request and can lead to information disclosure. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 178, "label": "CWE"}, {"start": 192, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "c50f5646-5d14-4331-9a9d-c97d8f74e99f", "text": "A Cross-Site Scripting (XSS) vulnerability affects MySQL Server version 1.2.3. It is caused by tampered API request and can lead to arbitrary code execution. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 63, "label": "PRODUCT"}, {"start": 72, "end": 77, "label": "VERSION"}, {"start": 95, "end": 115, "label": "ATTACK_VECTOR"}, {"start": 132, "end": 156, "label": "IMPACT"}, {"start": 184, "end": 191, "label": "CWE"}, {"start": 205, "end": 211, "label": "SEVERITY"}, {"start": 233, "end": 236, "label": "CVSS"}]} {"id": "e774bf89-875a-4608-bb36-6233773399f7", "text": "A Authentication Bypass vulnerability affects Mozilla Firefox version 5.3.1. It is caused by tampered API request and can lead to service disruption. This issue corresponds to CWE-89 and is rated Critical with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 75, "label": "VERSION"}, {"start": 93, "end": 113, "label": "ATTACK_VECTOR"}, {"start": 130, "end": 148, "label": "IMPACT"}, {"start": 176, "end": 182, "label": "CWE"}, {"start": 196, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "e9719fc7-bb15-46b3-a0f5-9b13cbdaaa44", "text": "A Command Injection vulnerability affects PHPMyAdmin version 91.0. It is caused by specially crafted packet and can lead to service disruption. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 65, "label": "VERSION"}, {"start": 83, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 177, "label": "CWE"}, {"start": 191, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "e8005764-66ed-4178-8701-7b10b2ad273e", "text": "A Denial of Service vulnerability affects Mozilla Firefox version 4.18.0. It is caused by injected SQL query and can lead to information disclosure. This issue corresponds to CWE-20 and is rated Low with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 72, "label": "VERSION"}, {"start": 90, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 198, "label": "SEVERITY"}, {"start": 220, "end": 223, "label": "CVSS"}]} {"id": "9a7b0de3-b1a5-4097-bd54-67e07b40c40b", "text": "A Cross-Site Scripting (XSS) vulnerability affects Mozilla Firefox version 5.3.1. It is caused by tampered API request and can lead to service disruption. This issue corresponds to CWE-200 and is rated Medium with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 66, "label": "PRODUCT"}, {"start": 75, "end": 80, "label": "VERSION"}, {"start": 98, "end": 118, "label": "ATTACK_VECTOR"}, {"start": 135, "end": 153, "label": "IMPACT"}, {"start": 181, "end": 188, "label": "CWE"}, {"start": 202, "end": 208, "label": "SEVERITY"}, {"start": 230, "end": 233, "label": "CVSS"}]} {"id": "70297614-0e89-4fea-80ed-5e2d10587f88", "text": "A Authentication Bypass vulnerability affects OpenSSL version 91.0. It is caused by malformed JSON object and can lead to database manipulation. This issue corresponds to CWE-20 and is rated Low with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 66, "label": "VERSION"}, {"start": 84, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "2bf253e0-33d6-4117-acf8-22aadd00035d", "text": "A Privilege Escalation vulnerability affects Docker Engine version 6.0.1. It is caused by unsanitized user input and can lead to privilege escalation. This issue corresponds to CWE-94 and is rated Critical with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 72, "label": "VERSION"}, {"start": 90, "end": 112, "label": "ATTACK_VECTOR"}, {"start": 129, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 183, "label": "CWE"}, {"start": 197, "end": 205, "label": "SEVERITY"}, {"start": 227, "end": 230, "label": "CVSS"}]} {"id": "6dc17d02-7020-4b70-bab5-cafab8e4970d", "text": "A Command Injection vulnerability affects MySQL Server version 6.0.1. It is caused by unsanitized user input and can lead to privilege escalation. This issue corresponds to CWE-20 and is rated High with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 179, "label": "CWE"}, {"start": 193, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "6ceb6824-ff78-4fc6-aee3-fc18dc3cca9d", "text": "A Command Injection vulnerability affects Docker Engine version 1.2.3. It is caused by malicious input payload and can lead to privilege escalation. This issue corresponds to CWE-89 and is rated Medium with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 181, "label": "CWE"}, {"start": 195, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "96b64951-1aac-4614-8b5b-9ac2246fe33d", "text": "A Privilege Escalation vulnerability affects OpenCart version 6.0.1. It is caused by injected SQL query and can lead to privilege escalation. This issue corresponds to CWE-20 and is rated Critical with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 174, "label": "CWE"}, {"start": 188, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "95ad509a-b6d7-40c6-bbde-87e4516da211", "text": "A Authentication Bypass vulnerability affects OpenCart version 6.0.1. It is caused by malicious input payload and can lead to session hijacking. This issue corresponds to CWE-200 and is rated Critical with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 68, "label": "VERSION"}, {"start": 86, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 178, "label": "CWE"}, {"start": 192, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "d8d7b12e-1af9-4f4d-a553-a8f734609ee5", "text": "A Authentication Bypass vulnerability affects Cisco ASA version 1.2.3. It is caused by malformed JSON object and can lead to session hijacking. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 176, "label": "CWE"}, {"start": 190, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "2c18ef77-807c-4c76-815f-1cd6de3d23fe", "text": "A Cross-Site Scripting (XSS) vulnerability affects Nginx Web Server version 6.0.1. It is caused by specially crafted packet and can lead to privilege escalation. This issue corresponds to CWE-400 and is rated High with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 67, "label": "PRODUCT"}, {"start": 76, "end": 81, "label": "VERSION"}, {"start": 99, "end": 123, "label": "ATTACK_VECTOR"}, {"start": 140, "end": 160, "label": "IMPACT"}, {"start": 188, "end": 195, "label": "CWE"}, {"start": 209, "end": 213, "label": "SEVERITY"}, {"start": 235, "end": 238, "label": "CVSS"}]} {"id": "f1ccc929-4ade-4627-b10d-42910b6b7c8e", "text": "A SQL Injection vulnerability affects Apache Struts version 5.3.1. It is caused by specially crafted packet and can lead to arbitrary code execution. This issue corresponds to CWE-400 and is rated Low with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 148, "label": "IMPACT"}, {"start": 176, "end": 183, "label": "CWE"}, {"start": 197, "end": 200, "label": "SEVERITY"}, {"start": 222, "end": 225, "label": "CVSS"}]} {"id": "5d0ee04b-ba35-4961-8b9d-6a2b65ab262d", "text": "A SQL Injection vulnerability affects Kubernetes API Server version 2.3.1. It is caused by malicious input payload and can lead to information disclosure. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 59, "label": "PRODUCT"}, {"start": 68, "end": 73, "label": "VERSION"}, {"start": 91, "end": 114, "label": "ATTACK_VECTOR"}, {"start": 131, "end": 153, "label": "IMPACT"}, {"start": 181, "end": 187, "label": "CWE"}, {"start": 201, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "06edd215-4b20-4e15-874b-04620b331608", "text": "A Denial of Service vulnerability affects OpenCart version 10.5. It is caused by crafted HTTP request and can lead to arbitrary code execution. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 63, "label": "VERSION"}, {"start": 81, "end": 101, "label": "ATTACK_VECTOR"}, {"start": 118, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 176, "label": "CWE"}, {"start": 190, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "a487e0fa-3995-42d0-bba6-503f18ad151c", "text": "A Denial of Service vulnerability affects Nginx Web Server version 1.2.3. It is caused by injected SQL query and can lead to arbitrary code execution. This issue corresponds to CWE-200 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 72, "label": "VERSION"}, {"start": 90, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 149, "label": "IMPACT"}, {"start": 177, "end": 184, "label": "CWE"}, {"start": 198, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "2cea6a40-2f29-4e3c-ad3c-e6f672c403ff", "text": "A Command Injection vulnerability affects WordPress version 2.4.7. It is caused by tampered API request and can lead to privilege escalation. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 140, "label": "IMPACT"}, {"start": 168, "end": 174, "label": "CWE"}, {"start": 188, "end": 191, "label": "SEVERITY"}, {"start": 213, "end": 216, "label": "CVSS"}]} {"id": "4aec4709-69e6-4d2e-bd1a-6c7920c7c5dc", "text": "A Directory Traversal vulnerability affects Cisco ASA version 2.4.7. It is caused by specially crafted packet and can lead to arbitrary code execution. This issue corresponds to CWE-79 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 150, "label": "IMPACT"}, {"start": 178, "end": 184, "label": "CWE"}, {"start": 198, "end": 202, "label": "SEVERITY"}, {"start": 224, "end": 227, "label": "CVSS"}]} {"id": "e6cb03c5-2a45-4349-8365-37062ebdfb1c", "text": "A Directory Traversal vulnerability affects Google Chrome version 5.3.1. It is caused by crafted HTTP request and can lead to privilege escalation. This issue corresponds to CWE-122 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 57, "label": "PRODUCT"}, {"start": 66, "end": 71, "label": "VERSION"}, {"start": 89, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 181, "label": "CWE"}, {"start": 195, "end": 199, "label": "SEVERITY"}, {"start": 221, "end": 224, "label": "CVSS"}]} {"id": "f32ccacb-2f93-4dc6-adf6-1e2a4e002e7b", "text": "A Cross-Site Scripting (XSS) vulnerability affects Google Chrome version 2.3.1. It is caused by crafted HTTP request and can lead to information disclosure. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 64, "label": "PRODUCT"}, {"start": 73, "end": 78, "label": "VERSION"}, {"start": 96, "end": 116, "label": "ATTACK_VECTOR"}, {"start": 133, "end": 155, "label": "IMPACT"}, {"start": 183, "end": 189, "label": "CWE"}, {"start": 203, "end": 206, "label": "SEVERITY"}, {"start": 228, "end": 231, "label": "CVSS"}]} {"id": "014601d7-f1ee-47f5-acdc-ae09111be512", "text": "A SQL Injection vulnerability affects Cisco ASA version 7.4.2. It is caused by malformed JSON object and can lead to information disclosure. This issue corresponds to CWE-94 and is rated Medium with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 47, "label": "PRODUCT"}, {"start": 56, "end": 61, "label": "VERSION"}, {"start": 79, "end": 100, "label": "ATTACK_VECTOR"}, {"start": 117, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 173, "label": "CWE"}, {"start": 187, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "759822f9-b871-4d72-924f-ac8cbc1a817a", "text": "A Remote Code Execution vulnerability affects Cisco ASA version 10.5. It is caused by specially crafted packet and can lead to privilege escalation. This issue corresponds to CWE-400 and is rated Critical with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 182, "label": "CWE"}, {"start": 196, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "d531ba69-ec21-48f6-a6ae-fd00715ec5da", "text": "A Privilege Escalation vulnerability affects PHPMyAdmin version 3.0.3. It is caused by malicious input payload and can lead to database manipulation. This issue corresponds to CWE-400 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 148, "label": "IMPACT"}, {"start": 176, "end": 183, "label": "CWE"}, {"start": 197, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "baf92be7-6482-47a9-9392-9d13656c4b80", "text": "A Remote Code Execution vulnerability affects Kubernetes API Server version 2.4.7. It is caused by malformed JSON object and can lead to information disclosure. This issue corresponds to CWE-200 and is rated High with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 67, "label": "PRODUCT"}, {"start": 76, "end": 81, "label": "VERSION"}, {"start": 99, "end": 120, "label": "ATTACK_VECTOR"}, {"start": 137, "end": 159, "label": "IMPACT"}, {"start": 187, "end": 194, "label": "CWE"}, {"start": 208, "end": 212, "label": "SEVERITY"}, {"start": 234, "end": 237, "label": "CVSS"}]} {"id": "6a378c17-e0b3-491b-8cdb-ec5b7e080ce6", "text": "A SQL Injection vulnerability affects PostgreSQL version 3.0.3. It is caused by unsanitized user input and can lead to session hijacking. This issue corresponds to CWE-200 and is rated Critical with a CVSS score of 9.8.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 48, "label": "PRODUCT"}, {"start": 57, "end": 62, "label": "VERSION"}, {"start": 80, "end": 102, "label": "ATTACK_VECTOR"}, {"start": 119, "end": 136, "label": "IMPACT"}, {"start": 164, "end": 171, "label": "CWE"}, {"start": 185, "end": 193, "label": "SEVERITY"}, {"start": 215, "end": 218, "label": "CVSS"}]} {"id": "fc654728-c3a7-48c8-b259-c963bc49b8ed", "text": "A Authentication Bypass vulnerability affects Jenkins version 1.2.3. It is caused by tampered API request and can lead to session hijacking. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 5.6.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 174, "label": "CWE"}, {"start": 188, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "3d4673c3-5189-44b3-94af-9bd4a10b19f8", "text": "A SQL Injection vulnerability affects MySQL Server version 2.4.7. It is caused by injected SQL query and can lead to session hijacking. This issue corresponds to CWE-122 and is rated Critical with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 64, "label": "VERSION"}, {"start": 82, "end": 100, "label": "ATTACK_VECTOR"}, {"start": 117, "end": 134, "label": "IMPACT"}, {"start": 162, "end": 169, "label": "CWE"}, {"start": 183, "end": 191, "label": "SEVERITY"}, {"start": 213, "end": 216, "label": "CVSS"}]} {"id": "9179dc9b-64ce-4da8-bdfc-ce97a072cc9e", "text": "A Remote Code Execution vulnerability affects OpenSSL version 2.4.7. It is caused by tampered API request and can lead to session hijacking. This issue corresponds to CWE-79 and is rated Critical with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 53, "label": "PRODUCT"}, {"start": 62, "end": 67, "label": "VERSION"}, {"start": 85, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 139, "label": "IMPACT"}, {"start": 167, "end": 173, "label": "CWE"}, {"start": 187, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "eaa9336c-faf4-41f4-8267-d9c434a8ba8a", "text": "A Privilege Escalation vulnerability affects Google Chrome version 7.4.2. It is caused by specially crafted packet and can lead to arbitrary code execution. This issue corresponds to CWE-79 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 58, "label": "PRODUCT"}, {"start": 67, "end": 72, "label": "VERSION"}, {"start": 90, "end": 114, "label": "ATTACK_VECTOR"}, {"start": 131, "end": 155, "label": "IMPACT"}, {"start": 183, "end": 189, "label": "CWE"}, {"start": 203, "end": 207, "label": "SEVERITY"}, {"start": 229, "end": 232, "label": "CVSS"}]} {"id": "a7a31ab7-b8f8-42ae-ac51-319e04bf1692", "text": "A Denial of Service vulnerability affects Google Chrome version 1.2.3. It is caused by malicious input payload and can lead to arbitrary code execution. This issue corresponds to CWE-89 and is rated Medium with a CVSS score of 4.3.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 151, "label": "IMPACT"}, {"start": 179, "end": 185, "label": "CWE"}, {"start": 199, "end": 205, "label": "SEVERITY"}, {"start": 227, "end": 230, "label": "CVSS"}]} {"id": "af5210ac-9c78-495c-bf71-24a7cbc5ada1", "text": "A SQL Injection vulnerability affects Docker Engine version 10.5. It is caused by unsanitized user input and can lead to privilege escalation. This issue corresponds to CWE-89 and is rated Low with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 64, "label": "VERSION"}, {"start": 82, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 141, "label": "IMPACT"}, {"start": 169, "end": 175, "label": "CWE"}, {"start": 189, "end": 192, "label": "SEVERITY"}, {"start": 214, "end": 217, "label": "CVSS"}]} {"id": "34269131-4b0d-4b0b-8562-2cecaaf37706", "text": "A Authentication Bypass vulnerability affects Cisco ASA version 14.2. It is caused by specially crafted packet and can lead to session hijacking. This issue corresponds to CWE-200 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 110, "label": "ATTACK_VECTOR"}, {"start": 127, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "22ae2c25-d264-47cc-9364-c196927eff4f", "text": "A Privilege Escalation vulnerability affects Drupal version 6.0.1. It is caused by malformed JSON object and can lead to information disclosure. This issue corresponds to CWE-79 and is rated High with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 51, "label": "PRODUCT"}, {"start": 60, "end": 65, "label": "VERSION"}, {"start": 83, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 143, "label": "IMPACT"}, {"start": 171, "end": 177, "label": "CWE"}, {"start": 191, "end": 195, "label": "SEVERITY"}, {"start": 217, "end": 220, "label": "CVSS"}]} {"id": "e05629e5-2d6f-4acd-b7bf-d3a18615384d", "text": "A Authentication Bypass vulnerability affects PostgreSQL version 7.4.2. It is caused by specially crafted packet and can lead to arbitrary code execution. This issue corresponds to CWE-79 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 70, "label": "VERSION"}, {"start": 88, "end": 112, "label": "ATTACK_VECTOR"}, {"start": 129, "end": 153, "label": "IMPACT"}, {"start": 181, "end": 187, "label": "CWE"}, {"start": 201, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "86f66e9d-8dbb-495b-8cad-624bfa655393", "text": "A Denial of Service vulnerability affects Kubernetes API Server version 6.0.1. It is caused by malicious input payload and can lead to database manipulation. This issue corresponds to CWE-94 and is rated Low with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 63, "label": "PRODUCT"}, {"start": 72, "end": 77, "label": "VERSION"}, {"start": 95, "end": 118, "label": "ATTACK_VECTOR"}, {"start": 135, "end": 156, "label": "IMPACT"}, {"start": 184, "end": 190, "label": "CWE"}, {"start": 204, "end": 207, "label": "SEVERITY"}, {"start": 229, "end": 232, "label": "CVSS"}]} {"id": "3eb5e075-d31e-4d20-813d-0c3c6dd590db", "text": "A Remote Code Execution vulnerability affects WordPress version 1.2.3. It is caused by tampered API request and can lead to arbitrary code execution. This issue corresponds to CWE-200 and is rated Medium with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 69, "label": "VERSION"}, {"start": 87, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 148, "label": "IMPACT"}, {"start": 176, "end": 183, "label": "CWE"}, {"start": 197, "end": 203, "label": "SEVERITY"}, {"start": 225, "end": 228, "label": "CVSS"}]} {"id": "4a68a0e7-1710-4560-bff0-337bbbe4bdc8", "text": "A Cross-Site Scripting (XSS) vulnerability affects MySQL Server version 2.4.7. It is caused by specially crafted packet and can lead to privilege escalation. This issue corresponds to CWE-89 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 63, "label": "PRODUCT"}, {"start": 72, "end": 77, "label": "VERSION"}, {"start": 95, "end": 119, "label": "ATTACK_VECTOR"}, {"start": 136, "end": 156, "label": "IMPACT"}, {"start": 184, "end": 190, "label": "CWE"}, {"start": 204, "end": 208, "label": "SEVERITY"}, {"start": 230, "end": 233, "label": "CVSS"}]} {"id": "3cdff7cd-2deb-4f00-b429-a1368a0d4329", "text": "A Buffer Overflow vulnerability affects Nginx Web Server version 14.2. It is caused by unsanitized user input and can lead to database manipulation. This issue corresponds to CWE-400 and is rated Critical with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 56, "label": "PRODUCT"}, {"start": 65, "end": 69, "label": "VERSION"}, {"start": 87, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 147, "label": "IMPACT"}, {"start": 175, "end": 182, "label": "CWE"}, {"start": 196, "end": 204, "label": "SEVERITY"}, {"start": 226, "end": 229, "label": "CVSS"}]} {"id": "ad276f58-ec0f-4b40-ba48-65e04486ffe1", "text": "A Remote Code Execution vulnerability affects Drupal version 1.2.3. It is caused by specially crafted packet and can lead to privilege escalation. This issue corresponds to CWE-79 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 23, "label": "VULN_TYPE"}, {"start": 46, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 66, "label": "VERSION"}, {"start": 84, "end": 108, "label": "ATTACK_VECTOR"}, {"start": 125, "end": 145, "label": "IMPACT"}, {"start": 173, "end": 179, "label": "CWE"}, {"start": 193, "end": 197, "label": "SEVERITY"}, {"start": 219, "end": 222, "label": "CVSS"}]} {"id": "dcacbff4-5f40-493a-92f5-7824a4b2b1d5", "text": "A SQL Injection vulnerability affects PHPMyAdmin version 7.4.2. It is caused by specially crafted packet and can lead to database manipulation. This issue corresponds to CWE-89 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 15, "label": "VULN_TYPE"}, {"start": 38, "end": 48, "label": "PRODUCT"}, {"start": 57, "end": 62, "label": "VERSION"}, {"start": 80, "end": 104, "label": "ATTACK_VECTOR"}, {"start": 121, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 176, "label": "CWE"}, {"start": 190, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "ee5a06ba-3d67-4114-815b-65af6d92d4d4", "text": "A Directory Traversal vulnerability affects PostgreSQL version 9.12. It is caused by specially crafted packet and can lead to privilege escalation. This issue corresponds to CWE-122 and is rated Medium with a CVSS score of 6.8.", "entities": [{"start": 2, "end": 21, "label": "VULN_TYPE"}, {"start": 44, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 67, "label": "VERSION"}, {"start": 85, "end": 109, "label": "ATTACK_VECTOR"}, {"start": 126, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 181, "label": "CWE"}, {"start": 195, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "d63fc077-89f1-4d35-8be1-b1858fe21760", "text": "A Privilege Escalation vulnerability affects WordPress version 14.2. It is caused by crafted HTTP request and can lead to information disclosure. This issue corresponds to CWE-400 and is rated Low with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 22, "label": "VULN_TYPE"}, {"start": 45, "end": 54, "label": "PRODUCT"}, {"start": 63, "end": 67, "label": "VERSION"}, {"start": 85, "end": 105, "label": "ATTACK_VECTOR"}, {"start": 122, "end": 144, "label": "IMPACT"}, {"start": 172, "end": 179, "label": "CWE"}, {"start": 193, "end": 196, "label": "SEVERITY"}, {"start": 218, "end": 221, "label": "CVSS"}]} {"id": "153ead5d-b874-4d44-9cbc-e23e77235e2a", "text": "A Buffer Overflow vulnerability affects PostgreSQL version 7.4.2. It is caused by malformed JSON object and can lead to information disclosure. This issue corresponds to CWE-122 and is rated Low with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 17, "label": "VULN_TYPE"}, {"start": 40, "end": 50, "label": "PRODUCT"}, {"start": 59, "end": 64, "label": "VERSION"}, {"start": 82, "end": 103, "label": "ATTACK_VECTOR"}, {"start": 120, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 177, "label": "CWE"}, {"start": 191, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "c351be3d-6aa3-4099-b3ff-cbc6fd1cf327", "text": "A Cross-Site Scripting (XSS) vulnerability affects Nginx Web Server version 14.2. It is caused by unsanitized user input and can lead to session hijacking. This issue corresponds to CWE-20 and is rated High with a CVSS score of 7.5.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 67, "label": "PRODUCT"}, {"start": 76, "end": 80, "label": "VERSION"}, {"start": 98, "end": 120, "label": "ATTACK_VECTOR"}, {"start": 137, "end": 154, "label": "IMPACT"}, {"start": 182, "end": 188, "label": "CWE"}, {"start": 202, "end": 206, "label": "SEVERITY"}, {"start": 228, "end": 231, "label": "CVSS"}]} {"id": "e4303af5-da38-49ae-9087-0f2f21ba12c2", "text": "A Cross-Site Scripting (XSS) vulnerability affects PostgreSQL version 14.2. It is caused by specially crafted packet and can lead to information disclosure. This issue corresponds to CWE-89 and is rated Critical with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 61, "label": "PRODUCT"}, {"start": 70, "end": 74, "label": "VERSION"}, {"start": 92, "end": 116, "label": "ATTACK_VECTOR"}, {"start": 133, "end": 155, "label": "IMPACT"}, {"start": 183, "end": 189, "label": "CWE"}, {"start": 203, "end": 211, "label": "SEVERITY"}, {"start": 233, "end": 236, "label": "CVSS"}]} {"id": "1a48f4c9-68c6-493f-93a1-3ca8cd6f8956", "text": "A Denial of Service vulnerability affects PHPMyAdmin version 10.5. It is caused by specially crafted packet and can lead to service disruption. This issue corresponds to CWE-94 and is rated High with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 52, "label": "PRODUCT"}, {"start": 61, "end": 65, "label": "VERSION"}, {"start": 83, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 142, "label": "IMPACT"}, {"start": 170, "end": 176, "label": "CWE"}, {"start": 190, "end": 194, "label": "SEVERITY"}, {"start": 216, "end": 219, "label": "CVSS"}]} {"id": "1d6f3c0c-66f3-4bc3-bac6-c5a4ce8b271d", "text": "A Command Injection vulnerability affects Google Chrome version 14.2. It is caused by malformed JSON object and can lead to information disclosure. This issue corresponds to CWE-400 and is rated Medium with a CVSS score of 8.2.", "entities": [{"start": 2, "end": 19, "label": "VULN_TYPE"}, {"start": 42, "end": 55, "label": "PRODUCT"}, {"start": 64, "end": 68, "label": "VERSION"}, {"start": 86, "end": 107, "label": "ATTACK_VECTOR"}, {"start": 124, "end": 146, "label": "IMPACT"}, {"start": 174, "end": 181, "label": "CWE"}, {"start": 195, "end": 201, "label": "SEVERITY"}, {"start": 223, "end": 226, "label": "CVSS"}]} {"id": "293a0bfb-1150-479a-994a-6ce60b8bbc55", "text": "A Cross-Site Scripting (XSS) vulnerability affects Mozilla Firefox version 2.4.7. It is caused by malformed JSON object and can lead to database manipulation. This issue corresponds to CWE-200 and is rated Critical with a CVSS score of 9.1.", "entities": [{"start": 2, "end": 28, "label": "VULN_TYPE"}, {"start": 51, "end": 66, "label": "PRODUCT"}, {"start": 75, "end": 80, "label": "VERSION"}, {"start": 98, "end": 119, "label": "ATTACK_VECTOR"}, {"start": 136, "end": 157, "label": "IMPACT"}, {"start": 185, "end": 192, "label": "CWE"}, {"start": 206, "end": 214, "label": "SEVERITY"}, {"start": 236, "end": 239, "label": "CVSS"}]}