conversations
listlengths 3
3
|
|---|
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The Operation and Maintenance Unit (OMU) in Huawei VCN500 with software before V100R002C00SPC200 allows remote authenticated users to change the IP address of the media server via crafted packets."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: LOW\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Huawei VCN500 with software before V100R002C00SPC201 logs passwords in cleartext, which allows remote authenticated users to obtain sensitive information by triggering log generation and then reading the log."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site scripting (XSS) vulnerability in OpenCart before 2.1.0.2 allows remote attackers to inject arbitrary web script or HTML via the zone_id parameter to index.php."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Absolute path traversal vulnerability in mysqldump_download.php in the WordPress Rename plugin 1.0 for WordPress allows remote attackers to read arbitrary files via a full pathname in the dumpfname parameter."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-22\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-22\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Absolute path traversal vulnerability in include/user/download.php in the Swim Team plugin 1.44.10777 for WordPress allows remote attackers to read arbitrary files via a full pathname in the file parameter."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-22\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-22\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site scripting (XSS) vulnerability in the Push-Service-Mails feature in AVM FRITZ!OS before 6.30 allows remote attackers to inject arbitrary web script or HTML via the display name in the FROM field of an SIP INVITE message."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "OpenStack Compute (Nova) before 2015.1.3 (kilo) and 12.0.x before 12.0.1 (liberty), when using libvirt to spawn instances and use_cow_images is set to false, allow remote authenticated users to read arbitrary files by overwriting an instance disk with a crafted image and requesting a snapshot."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Heap-based buffer overflow in the HIFI driver in Huawei Mate 7 phones with software MT7-UL00 before MT7-UL00C17B354, MT7-TL10 before MT7-TL10C00B354, MT7-TL00 before MT7-TL00C01B354, and MT7-CL00 before MT7-CL00C92B354 and P8 phones with software GRA-TL00 before GRA-TL00C01B220SP01, GRA-CL00 before GRA-CL00C92B220, GRA-CL10 before GRA-CL10C92B220, GRA-UL00 before GRA-UL00C00B220, and GRA-UL10 before GRA-UL10C00B220 allows attackers to cause a denial of service (reboot) or execute arbitrary code via a crafted application."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "F5 BIG-IP APM 11.4.1 before 11.4.1 HF9, 11.5.x before 11.5.3, and 11.6.0 before 11.6.0 HF4 allow remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors related to processing a Citrix Remote Desktop connection through a virtual server configured with a remote desktop profile, aka an \"Out-of-bounds memory vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Buffer overflow in the HIFI driver in Huawei P8 phones with software GRA-TL00 before GRA-TL00C01B230, GRA-CL00 before GRA-CL00C92B230, GRA-CL10 before GRA-CL10C92B230, GRA-UL00 before GRA-UL00C00B230, and GRA-UL10 before GRA-UL10C00B230 allows attackers to cause a denial of service (system crash) or execute arbitrary code via an unspecified parameter."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The HTTPS fallback implementation in Shell In A Box (aka shellinabox) before 2.19 makes it easier for remote attackers to conduct DNS rebinding attacks via the \"/plain\" URL."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-254\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: HIGH\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-254\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site scripting (XSS) vulnerability in Serendipity before 2.0.3 allows remote attackers to inject arbitrary web script or HTML via the serendipity[entry_id] parameter in an \"edit\" admin action to serendipity_admin.php."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The idle stream handling in nghttp2 before 1.6.0 allows attackers to have unspecified impact via unknown vectors, aka a heap-use-after-free bug."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: CHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, Link Controller, and PEM 12.0.0 before HF1, when the TCP profile for a virtual server is configured with Congestion Metrics Cache enabled, allow remote attackers to cause a denial of service (Traffic Management Microkernel (TMM) restart) via crafted ICMP packets, related to Path MTU (PMTU) discovery."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Integer overflow in the ImageRegionReader::ReadIntoBuffer function in MediaStorageAndFileFormat/gdcmImageRegionReader.cxx in Grassroots DICOM (aka GDCM) before 2.6.2 allows attackers to execute arbitrary code via crafted header dimensions in a DICOM image file, which triggers a buffer overflow."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-189\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: CHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-189\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, and PEM 12.0.0 before HF1 on the 2000, 4000, 5000, 7000, and 10000 platforms do not properly sync passwords with the Always-On Management (AOM) subsystem, which might allow remote attackers to obtain login access to AOM via an (1) expired or (2) default password."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-255\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-255\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The presentation transmission permission management mechanism in Huawei TE30, TE40, TE50, and TE60 multimedia video conferencing endpoints with software before V100R001C10SPC100 allows remote attackers to cause a denial of service (wired presentation outage) via unspecified vectors involving a wireless presentation."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-19\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-19\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Huawei TE30, TE40, TE50, and TE60 multimedia video conferencing endpoints with software before V100R001C10SPC100 do not require entry of the old password when changing the password for the Debug account, which allows physically proximate attackers to change the password by leveraging an unattended workstation."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-255\nVector string: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: PHYSICAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-255\", \"vectorString\": \"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "SQL injection vulnerability in Joomla! 3.x before 3.4.7 allows attackers to execute arbitrary SQL commands via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-89\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-89\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Directory traversal vulnerability in the HTTP file-serving module (mod_http_files) in Prosody 0.9.x before 0.9.9 allows remote attackers to read arbitrary files via a .. (dot dot) in an unspecified path."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-22\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-22\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The swin.sys kernel driver in McAfee Application Control (MAC) 6.1.0 before build 706, 6.1.1 before build 404, 6.1.2 before build 449, 6.1.3 before build 441, and 6.2.0 before build 505 on 32-bit Windows platforms allows local users to cause a denial of service (memory corruption and system crash) or gain privileges via a 768 syscall, which triggers a zero to be written to an arbitrary kernel memory location."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-189\nVector string: CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: HIGH\nPrivileges Required: LOW\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-189\", \"vectorString\": \"CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft SharePoint Server 2013 SP1 and SharePoint Foundation 2013 SP1 allow remote authenticated users to bypass intended Access Control Policy restrictions and conduct cross-site scripting (XSS) attacks by modifying a webpart, aka \"Microsoft SharePoint Security Feature Bypass,\" a different vulnerability than CVE-2016-0011."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to execute arbitrary code via a crafted web site, aka \"Scripting Engine Memory Corruption Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Edge allows remote attackers to execute arbitrary code via unspecified vectors, aka \"Microsoft Edge Memory Corruption Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, aka \"Internet Explorer Elevation of Privilege Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The sandbox implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles reparse points, which allows local users to gain privileges via a crafted application, aka \"Windows Mount Point Elevation of Privilege Vulnerability,\" a different vulnerability than CVE-2016-0007."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The sandbox implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles reparse points, which allows local users to gain privileges via a crafted application, aka \"Windows Mount Point Elevation of Privilege Vulnerability,\" a different vulnerability than CVE-2016-0006."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The graphics device interface in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka \"Windows GDI32.dll ASLR Bypass Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Windows 10 Gold and 1511 allow remote attackers to execute arbitrary code via unspecified vectors, aka \"Win32k Remote Code Execution Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Office 2007 SP3, Office 2010 SP2, Office 2013 SP1, Office 2013 RT SP1, Office 2016, Excel for Mac 2011, PowerPoint for Mac 2011, Word for Mac 2011, Excel 2016 for Mac, PowerPoint 2016 for Mac, Word 2016 for Mac, and Word Viewer allow remote attackers to execute arbitrary code via a crafted Office document, aka \"Microsoft Office Memory Corruption Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft SharePoint Server 2013 SP1 and SharePoint Foundation 2013 SP1 allow remote authenticated users to bypass intended Access Control Policy restrictions and conduct cross-site scripting (XSS) attacks by modifying a webpart, aka \"Microsoft SharePoint Security Feature Bypass,\" a different vulnerability than CVE-2015-6117."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Office 2007 SP3, Excel 2007 SP3, PowerPoint 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Office 2013 SP1, Excel 2013 SP1, PowerPoint 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Office 2016, Excel 2016, PowerPoint 2016, Visio 2016, Word 2016, and Visual Basic 6.0 Runtime allow remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka \"Microsoft Office ASLR Bypass.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka \"DLL Loading Elevation of Privilege Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-426\nVector string: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-426\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "DirectShow in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted file, aka \"DirectShow Heap Corruption Remote Code Execution Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka \"DLL Loading Remote Code Execution Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-426\nVector string: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-426\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 R2, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka \"DLL Loading Remote Code Execution Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-426\nVector string: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-426\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The Remote Desktop Protocol (RDP) service implementation in Microsoft Windows 10 Gold and 1511 allows remote attackers to bypass intended access restrictions and establish sessions for blank-password accounts via a modified RDP client, aka \"Windows Remote Desktop Protocol Security Bypass Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-254\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-254\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code via unspecified vectors, aka \"Scripting Engine Memory Corruption Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Excel for Mac 2011, Excel 2016 for Mac, Office Compatibility Pack SP3, and Excel Viewer allow remote attackers to execute arbitrary code via a crafted Office document, aka \"Microsoft Office Memory Corruption Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Swift3 before 1.9 allows remote attackers to conduct replay attacks via an Authorization request that lacks a Date header."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The verify function in the RSA package for Python (Python-RSA) before 3.3 allows attackers to spoof signatures with a small public exponent via crafted signature padding, aka a BERserk attack."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "FireBird 2.5.5 allows remote authenticated users to cause a denial of service (daemon crash) by using service manager to invoke the gbak utility with an invalid parameter."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted FileAttachment annotation, a different vulnerability than CVE-2016-0933, CVE-2016-0936, CVE-2016-0938, CVE-2016-0939, CVE-2016-0942, CVE-2016-0944, CVE-2016-0945, and CVE-2016-0946."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0931, CVE-2016-0936, CVE-2016-0938, CVE-2016-0939, CVE-2016-0942, CVE-2016-0944, CVE-2016-0945, and CVE-2016-0946."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JPEG 2000 data, a different vulnerability than CVE-2016-0931, CVE-2016-0933, CVE-2016-0938, CVE-2016-0939, CVE-2016-0942, CVE-2016-0944, CVE-2016-0945, and CVE-2016-0946."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The AcroForm plugin in Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0931, CVE-2016-0933, CVE-2016-0936, CVE-2016-0939, CVE-2016-0942, CVE-2016-0944, CVE-2016-0945, and CVE-2016-0946."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (uninitialized pointer dereference and memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0931, CVE-2016-0933, CVE-2016-0936, CVE-2016-0938, CVE-2016-0942, CVE-2016-0944, CVE-2016-0945, and CVE-2016-0946."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0931, CVE-2016-0933, CVE-2016-0936, CVE-2016-0938, CVE-2016-0939, CVE-2016-0944, CVE-2016-0945, and CVE-2016-0946."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X mishandle the Global object, which allows attackers to bypass JavaScript API execution restrictions via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0931, CVE-2016-0933, CVE-2016-0936, CVE-2016-0938, CVE-2016-0939, CVE-2016-0942, CVE-2016-0945, and CVE-2016-0946."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0931, CVE-2016-0933, CVE-2016-0936, CVE-2016-0938, CVE-2016-0939, CVE-2016-0942, CVE-2016-0944, and CVE-2016-0946."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0931, CVE-2016-0933, CVE-2016-0936, CVE-2016-0938, CVE-2016-0939, CVE-2016-0942, CVE-2016-0944, and CVE-2016-0945."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "ISC DHCP 4.x before 4.1-ESV-R12-P1, 4.2.x, and 4.3.x before 4.3.3-P1 allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: ADJACENT_NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Advantech WebAccess before 8.1 allows remote attackers to read sensitive cleartext information about e-mail project accounts via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site request forgery (CSRF) vulnerability in Advantech WebAccess before 8.1 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-352\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-352\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "SQL injection vulnerability in Advantech WebAccess before 8.1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-89\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-89\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site scripting (XSS) vulnerability in Advantech WebAccess before 8.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site request forgery (CSRF) vulnerability in IBM WebSphere Commerce 6.0 through 6.0.0.11, 7.0 through 7.0.0.9, and 7.0 Feature Pack 8 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-352\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-352\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cisco Wireless LAN Controller (WLC) devices with software 7.6.x, 8.0 before 8.0.121.0, and 8.1 before 8.1.131.0 allow remote attackers to change configuration settings via unspecified vectors, aka Bug ID CSCuw06153."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-287\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-287\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The IP ingress packet handler on Cisco Aironet 1800 devices with software 8.1(112.3) and 8.1(112.4) allows remote attackers to cause a denial of service via a crafted header in an IP packet, aka Bug ID CSCuv63138."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-399\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-399\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cisco Aironet 1800 devices with software 7.2, 7.3, 7.4, 8.1(112.3), 8.1(112.4), and 8.1(15.14) have a default account, which makes it easier for remote attackers to obtain access via unspecified vectors, aka Bug ID CSCuw58062."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-255\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-255\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The DCERPC Inspection implementation in Cisco Adaptive Security Appliance (ASA) Software 9.4.1 through 9.5.1 allows remote authenticated users to bypass an intended DCERPC-only ACL by sending arbitrary network traffic, aka Bug ID CSCuu67782."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Web Viewer 1.0.0.193 on Samsung SRN-1670D devices allows remote attackers to read arbitrary files via a request to an unspecified PHP script."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: CHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Web Viewer 1.0.0.193 on Samsung SRN-1670D devices allows remote attackers to discover credentials by reading detailed error messages."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Web Viewer 1.0.0.193 on Samsung SRN-1670D devices allows attackers to bypass filesystem encryption via XOR calculations."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-310\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-310\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Advantech WebAccess before 8.1 allows remote attackers to cause a denial of service (out-of-bounds memory access) via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Advantech WebAccess before 8.1 allows remote attackers to bypass an intended administrative requirement and obtain file or folder access via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Advantech WebAccess before 8.1 allows remote attackers to obtain sensitive information via crafted input."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Directory traversal vulnerability in Advantech WebAccess before 8.1 allows remote attackers to list arbitrary virtual-directory files via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-22\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-22\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Multiple stack-based buffer overflows in Advantech WebAccess before 8.1 allow remote attackers to execute arbitrary code via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Multiple heap-based buffer overflows in Advantech WebAccess before 8.1 allow remote attackers to execute arbitrary code via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Race condition in Advantech WebAccess before 8.1 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via a crafted request."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Integer overflow in the Kernel service in Advantech WebAccess before 8.1 allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted RPC request."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-189\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-189\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Buffer overflow in the BwpAlarm subsystem in Advantech WebAccess before 8.1 allows remote attackers to cause a denial of service via a crafted RPC request."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "FFmpeg 2.x allows remote attackers to conduct cross-origin attacks and read arbitrary files by using the concat protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains the first line of a local file."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "FFmpeg 2.x allows remote attackers to conduct cross-origin attacks and read arbitrary files by using the subfile protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains an arbitrary line of a local file."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Huawei S5300 Campus Series switches with software before V200R005SPH008 do not mask the password when uploading files, which allows physically proximate attackers to obtain sensitive password information by reading the display."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-255\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-255\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr ERP/CRM 3.8.3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) external calendar url or (2) the bank name field in the \"import external calendar\" page."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Gajim before 0.16.5 allows remote attackers to modify the roster and intercept messages via a crafted roster-push IQ stanza."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The volume_utils._parse_volume_info function in OpenStack Compute (Nova) before 2015.1.3 (kilo) and 12.0.x before 12.0.1 (liberty) includes the connection_info dictionary in the StorageError message when using the Xen backend, which might allow attackers to obtain sensitive password information by reading log files or other unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Juniper Junos OS before 12.1X44-D55, 12.1X46 before 12.1X46-D40, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R10, 12.3X48 before 12.3X48-D20, 13.2 before 13.2R8, 13.2X51 before 13.2X51-D40, 13.3 before 13.3R7, 14.1 before 14.1R5, 14.1X53 before 14.1X53-D18 or 14.1X53-D30, 14.1X55 before 14.1X55-D25, 14.2 before 14.2R4, 15.1 before 15.1R2, and 15.1X49 before 15.1X49-D10 allow remote attackers to cause a denial of service via a malformed IGMPv3 packet, aka a \"multicast denial of service.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-399\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-399\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The Routing Engine in Juniper Junos OS 13.2R5 through 13.2R8, 13.3R1 before 13.3R8, 13.3R7 before 13.3R7-S3, 14.1R1 before 14.1R6, 14.1R3 before 14.1R3-S9, 14.1R4 before 14.1R4-S7, 14.1X51 before 14.1X51-D65, 14.1X53 before 14.1X53-D12, 14.1X53 before 14.1X53-D28, 14.1X53 before 4.1X53-D35, 14.2R1 before 14.2R5, 14.2R3 before 14.2R3-S4, 14.2R4 before 14.2R4-S1, 15.1 before 15.1R3, 15.1F2 before 15.1F2-S2, and 15.1X49 before 15.1X49-D40, when LDP is enabled, allows remote attackers to cause a denial of service (RPD routing process crash) via a crafted LDP packet."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Embedthis Appweb, as used in J-Web in Juniper Junos OS before 12.1X44-D60, 12.1X46 before 12.1X46-D45, 12.1X47 before 12.1X47-D30, 12.3 before 12.3R10, 12.3X48 before 12.3X48-D20, 13.2X51 before 13.2X51-D20, 13.3 before 13.3R8, 14.1 before 14.1R6, and 14.2 before 14.2R5, allows remote attackers to cause a denial of service (J-Web crash) via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Juniper Junos OS before 13.2X51-D36, 14.1X53 before 14.1X53-D25, and 15.2 before 15.2R1 on EX4300 series switches allow remote attackers to cause a denial of service (network loop and bandwidth consumption) via unspecified vectors related to Spanning Tree Protocol (STP) traffic."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-399\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-399\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Juniper Junos OS before 12.1X46-D45, 12.1X47 before 12.1X47-D30, 12.1X48 before 12.3X48-D20, and 15.1X49 before 15.1X49-D30 on SRX series devices, when the Real Time Streaming Protocol Application Layer Gateway (RTSP ALG) is enabled, allow remote attackers to cause a denial of service (flowd crash) via a crafted RTSP packet."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Fortinet FortiAnalyzer before 5.0.12 and 5.2.x before 5.2.5; FortiSwitch 3.3.x before 3.3.3; FortiCache 3.0.x before 3.0.8; and FortiOS 4.1.x before 4.1.11, 4.2.x before 4.2.16, 4.3.x before 4.3.17 and 5.0.x before 5.0.8 have a hardcoded passphrase for the Fortimanager_Access account, which allows remote attackers to obtain administrative access via an SSH session."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The User Management Engine (UME) in SAP NetWeaver 7.4 allows attackers to decrypt unspecified data via unknown vectors, aka SAP Security Note 2191290."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in SAP NetWeaver 7.4 allow remote attackers to inject arbitrary web script or HTML via vectors related to the (1) Runtime Workbench (RWB) or (2) Pmitest servlet in the Process Monitoring Infrastructure (PMI), aka SAP Security Notes 2206793 and 2234918."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr ERP/CRM 3.8.3 allow remote authenticated users to inject arbitrary web script or HTML via the (1) lastname, (2) firstname, (3) email, (4) job, or (5) signature parameter to htdocs/user/card.php."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the Redhen module 7.x-1.x before 7.x-1.11 for Drupal allow remote authenticated users with certain access to inject arbitrary web script or HTML via unspecified vectors, related to (1) individual contacts, (2) notes, or (3) engagement scores."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "HPE ArcSight Logger before 6.1P1 allows remote attackers to execute arbitrary code via unspecified input to the (1) Intellicus or (2) client-certificate upload component."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "HPE ArcSight Logger before 6.1P1 allows remote authenticated users to execute arbitrary code via unspecified input to the (1) Intellicus or (2) client-certificate upload component."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-78\nVector string: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: HIGH\nUser Interaction: NONE\nScope: CHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-78\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the Management Center in Cisco FireSIGHT System Software 6.0.0 and 6.0.1 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCux40414."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site scripting (XSS) vulnerability in the Management Center in Cisco FireSIGHT System Software 6.0.1 allows remote attackers to inject arbitrary web script or HTML via a crafted cookie, aka Bug ID CSCuw89094."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cisco Adaptive Security Appliance (ASA) Software 8.4 allows remote attackers to obtain sensitive information via an AnyConnect authentication attempt, aka Bug ID CSCuo65775."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "IBM InfoSphere Master Data Management - Collaborative Edition 9.1, 10.1, 11.0 before 11.0.0.0 IF11, 11.3 before 11.3.0.0 IF7, and 11.4 before 11.4.0.4 IF1 does not properly restrict browser caching, which allows local users to obtain sensitive information by reading cache files."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.