0
dict
1
dict
2
dict
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Absolute path traversal vulnerability on Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie FUEL devices with firmware before 3.4.1.105 allows remote attackers to read arbitrary files via a full pathname in a download request durin...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-22\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Format string vulnerability in the up.time client in Idera Uptime Infrastructure Monitor 6.0 and 7.2 allows remote attackers to cause a denial of service (application crash) via format string specifiers." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-134\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Buffer overflow in the up.time client in Idera Uptime Infrastructure Monitor 7.4 might allow remote attackers to execute arbitrary code via long command input." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The up.time client in Idera Uptime Infrastructure Monitor through 7.6 allows remote attackers to obtain potentially sensitive version, OS, process, and event-log information via a command." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The JSONP endpoint in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 does not properly restrict callback values, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a cr...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-352\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "server/network/protocol/http/OHttpSessionManager.java in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the java.util.Random class for generation of random Session ID values, which makes it easier for remote attackers ...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 does not properly restrict use of FRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The web management interface on Mediabridge Medialink MWN-WAPR300N devices with firmware 5.07.50 has a default password of admin for the admin account and a default password of password for the medialink account, which allows remote attackers to obtain administrative privileges by lever...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-255\", \"vectorString\": \"CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Mediabridge Medialink MWN-WAPR300N devices with firmware 5.07.50 and Tenda N3 Wireless N150 devices allow remote attackers to obtain administrative access via a certain admin substring in an HTTP Cookie header." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Cross-site request forgery (CSRF) vulnerability on Mediabridge Medialink MWN-WAPR300N devices with firmware 5.07.50 allows remote attackers to hijack the authentication of arbitrary users." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-352\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "ZyXEL P-660HW-T1 2 devices with ZyNOS firmware 3.40(AXH.0), PMG5318-B20A devices with firmware 1.00AANC0b5, and NBG-418N devices have a default password of 1234 for the admin account, which allows remote attackers to obtain administrative access via unspecified vectors." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-255\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Forms/rpAuth_1 on ZyXEL P-660HW-T1 2 devices with ZyNOS firmware 3.40(AXH.0) allow remote attackers to inject arbitrary web script or HTML via the (1) LoginPassword or (2) hiddenPassword parameter." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The diagnostic-ping implementation on ZyXEL PMG5318-B20A devices with firmware before 1.00(AANC.2)C0 allows remote attackers to execute arbitrary commands via the PingIPAddr parameter." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "ZyXEL PMG5318-B20A devices with firmware 1.00AANC0b5 allow remote authenticated users to obtain administrative privileges by leveraging access to the user account." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The web administration interface on Amped Wireless R10000 devices with firmware 2.5.2.11 has a default password of admin for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-255\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Cross-site request forgery (CSRF) vulnerability on Amped Wireless R10000 devices with firmware 2.5.2.11 allows remote attackers to hijack the authentication of arbitrary users." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-352\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The web administration interface on ReadyNet WRT300N-DD devices with firmware 1.0.26 has a default password of admin for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-255\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Cross-site request forgery (CSRF) vulnerability on ReadyNet WRT300N-DD devices with firmware 1.0.26 allows remote attackers to hijack the authentication of arbitrary users." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-352\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "ReadyNet WRT300N-DD devices with firmware 1.0.26 use the same source port number for every DNS query, which makes it easier for remote attackers to spoof responses by selecting that number for the destination port." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The web administration interface on ZyXEL NBG-418N devices with firmware 1.00(AADZ.3)C0 has a default password of 1234 for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-255\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Cross-site request forgery (CSRF) vulnerability on ZyXEL NBG-418N devices with firmware 1.00(AADZ.3)C0 allows remote attackers to hijack the authentication of arbitrary users." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-352\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "IBM WebSphere Portal 6.1.0 through 6.1.0.6 CF27, 6.1.5 through 6.1.5.3 CF27, 7.0.0 through 7.0.0.2 CF29, 8.0.0 before 8.0.0.1 CF20, and 8.5.0 before CF09 allows remote attackers to bypass intended Portal AccessControl REST API access restrictions and obtain sensitive information via uns...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The web management interface on Belkin F9K1102 2 devices with firmware 2.10.17 has a blank password, which allows remote attackers to obtain administrative privileges by leveraging a LAN session." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-255\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Belkin F9K1102 2 devices with firmware 2.10.17 rely on client-side JavaScript code for authorization, which allows remote attackers to obtain administrative privileges via certain changes to LockStatus and Login_Success values." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Cross-site request forgery (CSRF) vulnerability on Belkin F9K1102 2 devices with firmware 2.10.17 allows remote attackers to hijack the authentication of arbitrary users." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-352\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Remote Artifact Loader (RAL) in IBM WebSphere Process Server 7 and Business Process Manager Advanced 7.5 through 7.5.1.2, 8.0 through 8.0.1.3, 8.5.0 through 8.5.0.2, 8.5.5 through 8.5.5.0, and 8.5.6 through 8.5.6.2 does not properly use SSL for its HTTPS connection, which allows remote ...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-17\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "IBM SPSS Statistics 22.0.0.2 before IF10 and 23.0.0.2 before IF7 uses weak permissions (Everyone: Write) for Python scripts, which allows local users to gain privileges by modifying a script." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "IBM WebSphere MQ Light 1.x before 1.0.2 mishandles abbreviated TLS handshakes, which allows remote attackers to cause a denial of service (MQXR service crash) via unspecified vectors." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-17\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "IBM WebSphere MQ Light 1.x before 1.0.2 allows remote attackers to cause a denial of service (MQXR service crash) via a series of connect and disconnect actions, a different vulnerability than CVE-2015-4942." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-17\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "SQL injection vulnerability in the API in IBM OpenPages GRC Platform 7.0 before 7.0.0.4 IF3 and 7.1 before 7.1.0.1 IF6 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-89\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The Health Check tool in IBM Sterling B2B Integrator 5.2 does not properly use cookies in conjunction with HTTPS sessions, which allows man-in-the-middle attackers to obtain sensitive information or modify data via unspecified vectors." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-17\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Multiple cross-site scripting (XSS) vulnerabilities in IBM UrbanCode Deploy 6.0 before 6.0.1.12, 6.1 before 6.1.3.2, and 6.2 before 6.2.0.2 allow remote authenticated users to inject arbitrary web script or HTML via a crafted URL." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Unspecified vulnerability in GSKit on IBM MQ M2000 appliances before 8.0.0.4 allows remote attackers to obtain sensitive information via unknown vectors, a different vulnerability than CVE-2015-7421." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Unspecified vulnerability in GSKit on IBM MQ M2000 appliances before 8.0.0.4 allows remote attackers to obtain sensitive information via unknown vectors, a different vulnerability than CVE-2015-7420." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "IBM Multi-Enterprise Integration Gateway 1.0 through 1.0.0.1 and B2B Advanced Communications 1.x before 1.0.0.4, when guest access is configured, allow remote authenticated users to obtain sensitive information by reading error messages in responses." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Cross-site scripting (XSS) vulnerability in IBM Security QRadar SIEM 7.2.x before 7.2.6 allows remote authenticated users to inject arbitrary web script or HTML via an unspecified field." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "IBM Spectrum Scale 4.1.1 before 4.1.1.4, and 4.2.0.0, allows remote authenticated users to discover object-storage admin passwords via unspecified vectors." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The portal in IBM Tealeaf Customer Experience before 8.7.1.8814, 8.8 before 8.8.0.9026, 9.0.0, 9.0.0A, 9.0.1 before 9.0.1.1083, 9.0.1A before 9.0.1.5073, 9.0.2 before 9.0.2.1095, and 9.0.2A before 9.0.2.5144 allows remote attackers to read arbitrary charts by specifying an internal char...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The portal in IBM Tealeaf Customer Experience before 8.7.1.8818, 8.8 before 8.8.0.9026, 9.0.0, 9.0.0A, 9.0.1 before 9.0.1.1083, 9.0.1A before 9.0.1.5073, 9.0.2 before 9.0.2.1095, and 9.0.2A before 9.0.2.5144 allows local users to discover credentials by leveraging privileges during an u...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "IBM Rational ClearQuest 7.1.x and 8.0.0.x before 8.0.0.17 and 8.0.1.x before 8.0.1.10 allows local users to spoof database servers and discover credentials via unspecified vectors." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "IBM Security Access Manager for Web 7.0.0 before FP19 and 8.0 before 8.0.1.3 IF3, and Security Access Manager 9.0 before 9.0.0.0 IF1, allows remote authenticated users to execute arbitrary OS commands by leveraging Local Management Interface (LMI) access." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-78\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The Big SQL component in IBM InfoSphere BigInsights 3.0, 3.0.0.1, 3.0.0.2, and 4.0 allows remote authenticated users to bypass intended access restrictions and truncate arbitrary tables via unspecified vectors." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Cross-site scripting (XSS) vulnerability in IBM Curam Social Program Management 6.1 before 6.1.1.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The Data Protection extension in the VMware GUI in IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware (aka Spectrum Protect for Virtual Environments) 7.1 before 7.1.4 and Tivoli Storage FlashCopy Manager for VMware (aka Spectrum Protect Snapshot) 4.1 before ...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "consoleinst.sh in IBM Installation Manager before 1.7.4.4 and 1.8.x before 1.8.4 and Packaging Utility before 1.7.4.4 and 1.8.x before 1.8.4 allows local users to gain privileges via a Trojan horse program that is located in /tmp with a name based on a predicted PID value." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 7.5 before 7.5.0.9 IF2 and 7.6 before 7.6.0.3 FP3 and Maximo Asset Management 7.5 before 7.5.0.9 IF2, 7.5.1, and 7.6 before 7.6.0.3 FP3 for SmartCloud Control Desk allows remote authenticated users to inject arbitra...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Jazz Team Server in Jazz Foundation in IBM Rational Collaborative Lifecycle Management (CLM) 3.x and 4.x before 4.0.7 IF9, 5.x before 5.0.2 IF11, and 6.x before 6.0.0 IF4; Rational Quality Manager (RQM) 3.x before 3.0.1.6 IF7, 4.x before 4.0.7 IF9, 5.x before 5.0.2 IF11, and 6.0 before ...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Buffer overflow in IBM i Access 7.1 on Windows allows local users to gain privileges via unspecified vectors." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The Scheduler in IBM Maximo Asset Management 7.5 before 7.5.0.8 IF6 and 7.6 before 7.6.0.1 FP1 and Maximo Asset Management 7.5 before 7.5.0.8 IF6, 7.5.1, and 7.6 before 7.6.0.1 FP1 for SmartCloud Control Desk allows remote authenticated users to bypass intended access restrictions, and ...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The Lotus Mashups component in IBM Mashup Center 3.0.0.1 allows remote authenticated users to cause a denial of service (CPU consumption) via an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-399\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Cross-site request forgery (CSRF) vulnerability in Lotus Mashups in IBM Mashup Center 3.0.0.1 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-352\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "AFP Workbench Viewer in IBM i Access 7.1 on Windows allows remote attackers to cause a denial of service (viewer crash) via a crafted workbench file." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Buffer overflow in IBM i Access 7.1 on Windows allows local users to cause a denial of service (application crash) via unspecified vectors." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The Data Protection extension in the VMware GUI in IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware (aka Spectrum Protect for Virtual Environments) 7.1 before 7.1.3.0 and Tivoli Storage FlashCopy Manager for VMware (aka Spectrum Protect Snapshot) 4.1 befor...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-78\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The Hadoop connector 1.1.1, 2.4, 2.5, and 2.7.0-0 before 2.7.0-3 for IBM Spectrum Scale and General Parallel File System (GPFS) allows local users to read or write to arbitrary GPFS data via unspecified vectors." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Cross-site scripting (XSS) vulnerability in Queue Watcher in IBM Sterling B2B Integrator 5.2 allows remote attackers to inject arbitrary web script or HTML via a crafted URL." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "IBM Tivoli Common Reporting (TCR) 2.1 before IF14, 2.1.1 before IF22, 2.1.1.2 before IF9, 3.1.0.0 through 3.1.2 as used in Cognos Business Intelligence before 10.2 IF16, and 3.1.2.1 as used in Cognos Business Intelligence before 10.2.1.1 IF12 allows local users to bypass the Cognos Appl...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-254\", \"vectorString\": \"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "IBM Tivoli Common Reporting (TCR) 2.1 before IF14, 2.1.1 before IF22, 2.1.1.2 before IF9, 3.1.0.0 through 3.1.2 as used in Cognos Business Intelligence before 10.2 IF16, and 3.1.2.1 as used in Cognos Business Intelligence before 10.2.1.1 IF12 preserves user permissions across group-add ...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Queue Watcher in IBM Sterling B2B Integrator 5.2 allows local users to obtain sensitive information via unspecified vectors." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "IBM Sterling B2B Integrator 5.2 allows local users to obtain sensitive cleartext web-services information by leveraging database access." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "IBM Maximo Asset Management 7.5 before 7.5.0.9 FP9 and 7.6 before 7.6.0.3 FP3 and Maximo Asset Management 7.5 before 7.5.0.9 FP9, 7.5.1, and 7.6 before 7.6.0.3 FP3 for SmartCloud Control Desk allow remote authenticated users to obtain sensitive information via the REST API." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Node.js 0.12.x before 0.12.9, 4.x before 4.2.3, and 5.x before 5.1.1 does not ensure the availability of a parser for each HTTP socket, which allows remote attackers to cause a denial of service (uncaughtException and service outage) via a pipelined HTTP request." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-17\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The queue manager on IBM MQ M2000 appliances before 8.0.0.4 allows local users to bypass an intended password requirement and read private keys by leveraging the existence of a stash file." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-284\", \"vectorString\": \"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Directory traversal vulnerability in IBM Security QRadar SIEM 7.2.x before 7.2.5 Patch 6 allows remote authenticated users to read arbitrary files via a crafted URL." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-22\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Rational LifeCycle Project Administration in Jazz Team Server in IBM Rational Collaborative Lifecycle Management (CLM) 3.x and 4.x before 4.0.7 IF9, 5.x before 5.0.2 IF9, and 6.x before 6.0.1; Rational Quality Manager (RQM) 3.x before 3.0.1.6 IF7, 4.x before 4.0.7 IF9, 5.x before 5.0.2 ...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Jazz Team Server in Jazz Foundation in IBM Rational Collaborative Lifecycle Management (CLM) 3.x and 4.x before 4.0.7 IF9, 5.x before 5.0.2 IF9, and 6.x before 6.0.1; Rational Quality Manager (RQM) 3.x before 3.0.1.6 IF7, 4.x before 4.0.7 IF9, 5.x before 5.0.2 IF9, and 6.x before 6.0.1;...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The portal in IBM Tivoli Monitoring (ITM) 6.2.2 through FP9, 6.2.3 through FP5, and 6.3.0 before FP7 allows remote authenticated users to execute arbitrary commands by leveraging Take Action view authority and providing crafted input." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-77\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "IBM Maximo Asset Management 7.1 through 7.1.1.13, 7.5.0 before 7.5.0.8 IFIX005, and 7.6.0 before 7.6.0.2 IFIX002; Maximo Asset Management 7.5.0 before 7.5.0.8 IFIX005, 7.5.1, and 7.6.0 before 7.6.0.2 IFIX002 for SmartCloud Control Desk; and Maximo Asset Management 7.1 through 7.1.1.13 a...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-284\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "SQL injection vulnerability in IBM Curam Social Program Management 6.1 before 6.1.1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-89\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Cross-site scripting (XSS) vulnerability in IBM Connections 3.x before 3.0.1.1 CR3, 4.0 before CR4, 4.5 before CR5, and 5.0 before CR3 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL, a different vulnerability than CVE-2015-5036." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Cross-site scripting (XSS) vulnerability in IBM Connections 3.x before 3.0.1.1 CR3, 4.0 before CR4, 4.5 before CR5, and 5.0 before CR3 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL, a different vulnerability than CVE-2015-5035." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Cross-site request forgery (CSRF) vulnerability in IBM Connections 3.x before 3.0.1.1 CR3, 4.0 before CR4, 4.5 before CR5, and 5.0 before CR3 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-352\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "IBM Maximo Asset Management 7.5 before 7.5.0.8 IF6 and 7.6 before 7.6.0.2 IF1 and Maximo Asset Management 7.5 before 7.5.0.8 IF6, 7.5.1, and 7.6 before 7.6.0.2 IF1 for SmartCloud Control Desk allow remote authenticated users to bypass intended access restrictions on query results via un...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Cross-site scripting (XSS) vulnerability in showdependencygraph.cgi in Bugzilla 2.x, 3.x, and 4.x before 4.2.16, 4.3.x and 4.4.x before 4.4.11, and 4.5.x and 5.0.x before 5.0.2, when a local dot configuration is used, allows remote attackers to inject arbitrary web script or HTML via a ...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Template.pm in Bugzilla 2.x, 3.x, and 4.x before 4.2.16, 4.3.x and 4.4.x before 4.4.11, and 4.5.x and 5.0.x before 5.0.2 does not properly construct CSV files, which allows remote attackers to obtain sensitive information by leveraging a web browser that interprets CSV data as JavaScrip...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "epan/dissectors/packet-dec-dnart.c in the DECnet NSP/RT dissector in Wireshark 1.10.12 through 1.10.14 mishandles a certain strdup return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the \"Match MSG/RES packets for async NLM\" option is enabled, allows remote attackers to cause a denial of service (application crash) via a cra...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted p...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (st...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and applicat...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash)...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allo...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds re...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of servic...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of servi...
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }
{ "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Provide a brief justification for your choice. Ensure the last line of your response contains a dictionary with the mapped results." }
{ "from": "human", "value": "The dissect_nwp function in epan/dissectors/packet-nwp.c in the NWP dissector in Wireshark 2.0.x before 2.0.1 mishandles the packet type, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." }
{ "from": "gpt", "value": "{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}" }