conversations
listlengths
3
3
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps Server 2013 SP1, and SharePoint Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka \"Microsoft Office Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0052." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, and 4.6.1 does not prevent recursive compilation of XSLT transforms, which allows remote attackers to cause a denial of service (performance degradation) via crafted XSLT data, aka \".NET Framework Stack Overflow Denial of Service Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-94\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-94\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The Remote Desktop Protocol (RDP) implementation in Microsoft Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 allows remote authenticated users to execute arbitrary code via crafted data, aka \"Remote Desktop Protocol (RDP) Elevation of Privilege Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The forms-based authentication implementation in Active Directory Federation Services (ADFS) 3.0 in Microsoft Windows Server 2012 R2 allows remote attackers to cause a denial of service (daemon outage) via crafted data, aka \"Microsoft Active Directory Federation Services Denial of Service Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Windows Journal in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted Journal file, aka \"Windows Journal Memory Corruption Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Cross-site scripting (XSS) vulnerability in SharePoint Server in Microsoft SharePoint Foundation 2013 SP1 allows remote attackers to inject arbitrary web script or HTML via a crafted request, aka \"Microsoft SharePoint XSS Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Sync Framework in Microsoft Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1 allows remote attackers to cause a denial of service (SyncShareSvc service outage) via crafted \"change batch\" data, aka \"Windows DLL Loading Denial of Service Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Windows Reader in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 allows remote attackers to execute arbitrary code via a crafted Reader file, aka \"Microsoft Windows Reader Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "WinForms in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, and 4.6.1 allows remote attackers to obtain sensitive information from process memory via crafted icon data, aka \"Windows Forms Information Disclosure Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allow local users to gain privileges via a crafted application, aka \"Win32k Elevation of Privilege Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Kerberos in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 Gold and 1511 does not properly validate password changes, which allows remote attackers to bypass authentication by deploying a crafted Key Distribution Center (KDC) and then performing a sign-in action, aka \"Windows Kerberos Security Feature Bypass.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-255\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: HIGH\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-255\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Network Policy Server (NPS) in Microsoft Windows Server 2008 SP2 and R2 SP1 and Server 2012 Gold and R2 misparses username queries, which allows remote attackers to cause a denial of service (RADIUS authentication outage) via crafted requests, aka \"Network Policy Server RADIUS Implementation Denial of Service Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The WebDAV client in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka \"WebDAV Elevation of Privilege Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps Server 2013 SP1, and SharePoint Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka \"Microsoft Office Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0022." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps Server 2013 SP1, and SharePoint Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka \"Microsoft Office Memory Corruption Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Excel for Mac 2011, Excel 2016 for Mac, Office Compatibility Pack SP3, Excel Viewer, Excel Services on SharePoint Server 2007 SP3, Excel Services on SharePoint Server 2010 SP2, Excel Services on SharePoint Server 2013 SP1, and Office Web Apps 2010 SP2 allow remote attackers to execute arbitrary code via a crafted Office document, aka \"Microsoft Office Memory Corruption Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Microsoft Office 2007 SP3 allows remote attackers to execute arbitrary code via a crafted Office document, aka \"Microsoft Office Memory Corruption Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka \"Microsoft Office Memory Corruption Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Buffer overflow in the PDF Library in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 allows remote attackers to execute arbitrary code via a crafted PDF document that triggers API calls, aka \"Microsoft PDF Library Buffer Overflow Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The Hyperlink Object Library in Microsoft Internet Explorer 9 through 11 allows remote attackers to obtain sensitive information from process memory via a crafted URL in a (1) e-mail message or (2) Office document, aka \"Internet Explorer Information Disclosure Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Microsoft Browser Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0061, CVE-2016-0063, CVE-2016-0067, and CVE-2016-0072." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Microsoft Browser Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0060, CVE-2016-0063, CVE-2016-0067, and CVE-2016-0072." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Microsoft Browser Memory Corruption Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Internet Explorer Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0060, CVE-2016-0061, CVE-2016-0067, and CVE-2016-0072." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Internet Explorer Memory Corruption Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Internet Explorer Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0060, CVE-2016-0061, CVE-2016-0063, and CVE-2016-0072." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Internet Explorer Memory Corruption Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Internet Explorer Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0060, CVE-2016-0061, CVE-2016-0063, and CVE-2016-0067." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Microsoft Internet Explorer 9 through 11 and Microsoft Edge misparse HTTP responses, which allows remote attackers to spoof web sites via a crafted URL, aka \"Microsoft Browser Spoofing Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-19\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-19\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Microsoft Edge mishandles exceptions during window-message dispatch operations, which allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka \"Microsoft Edge ASLR Bypass.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Microsoft Edge Memory Corruption Vulnerability.\"" }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The \"Send as attachment\" feature in Ipswitch MOVEit DMZ before 8.2 and MOVEit Mobile before 1.2.2 allow remote authenticated users to bypass authorization and read uploaded files via a valid FileID in the (1) serverFileIds parameter to mobile/sendMsg or (2) arg01 parameter to human.aspx." }, { "from": "gpt", "value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The MOVEitISAPI service in Ipswitch MOVEit DMZ before 8.2 provides different error messages depending on whether a FileID exists, which allows remote authenticated users to enumerate FileIDs via the X-siLock-FileID parameter in a download action to MOVEitISAPI/MOVEitISAPI.dll." }, { "from": "gpt", "value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in Ipswitch MOVEit Mobile 1.2.0.962 and earlier allow remote attackers to hijack the authentication of unspecified victims via unknown vectors." }, { "from": "gpt", "value": "CWE-ID: CWE-352\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-352\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Cross-site scripting (XSS) vulnerability in Ipswitch MOVEit Mobile before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via the query string to mobile/." }, { "from": "gpt", "value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Ipswitch MOVEit DMZ before 8.2 provides different error messages for authentication attempts depending on whether the user account exists, which allows remote attackers to enumerate usernames via a series of SOAP requests to machine.aspx." }, { "from": "gpt", "value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Cross-site request forgery (CSRF) vulnerability in Adobe Connect before 9.5.2 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors." }, { "from": "gpt", "value": "CWE-ID: CWE-352\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-352\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Adobe Connect before 9.5.2 allows remote attackers to spoof the user interface via unspecified vectors." }, { "from": "gpt", "value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Adobe Photoshop CC 2014 before 15.2.4, Photoshop CC 2015 before 16.1.2, and Bridge CC before 6.2 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0952 and CVE-2016-0953." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Adobe Photoshop CC 2014 before 15.2.4, Photoshop CC 2015 before 16.1.2, and Bridge CC before 6.2 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0951 and CVE-2016-0953." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Adobe Photoshop CC 2014 before 15.2.4, Photoshop CC 2015 before 16.1.2, and Bridge CC before 6.2 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0951 and CVE-2016-0952." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Cross-site scripting (XSS) vulnerability in Adobe Experience Manager (AEM) 6.1.0 allows remote authenticated users to inject arbitrary web script or HTML via a folder title field that is mishandled in the Deletion popup dialog." }, { "from": "gpt", "value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The Servlets Post component 2.3.6 in Apache Sling, as used in Adobe Experience Manager 5.6.1, 6.0.0, and 6.1.0, allows remote attackers to obtain sensitive information via unspecified vectors." }, { "from": "gpt", "value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Adobe Experience Manager 5.6.1, 6.0.0, and 6.1.0 might allow remote attackers to have an unspecified impact via a crafted serialized Java object." }, { "from": "gpt", "value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Buffer overflow in the IKEv1 and IKEv2 implementations in Cisco ASA Software before 8.4(7.30), 8.7 before 8.7(1.18), 9.0 before 9.0(4.38), 9.1 before 9.1(7), 9.2 before 9.2(4.5), 9.3 before 9.3(3.7), 9.4 before 9.4(2.4), and 9.5 before 9.5(2.2) on ASA 5500 devices, ASA 5500-X devices, ASA Services Module for Cisco Catalyst 6500 and Cisco 7600 devices, ASA 1000V devices, Adaptive Security Virtual Appliance (aka ASAv), Firepower 9300 ASA Security Module, and ISA 3000 devices allows remote attackers to execute arbitrary code or cause a denial of service (device reload) via crafted UDP packets, aka Bug IDs CSCux29978 and CSCux42019." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "EMC Documentum xCP 2.1 before patch 23 and 2.2 before patch 11 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and obtain sensitive repository information by appending a query to a REST request." }, { "from": "gpt", "value": "CWE-ID: CWE-74\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-74\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The proxy engine in Cisco Advanced Malware Protection (AMP), when used with Email Security Appliance (ESA) 9.5.0-201, 9.6.0-051, and 9.7.0-125, allows remote attackers to bypass intended content restrictions via a malformed e-mail message containing an encoded file, aka Bug ID CSCux45338." }, { "from": "gpt", "value": "CWE-ID: CWE-284\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: HIGH\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-284\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The CLI in Cisco Prime Collaboration 9.0 and 11.0 allows local users to execute arbitrary OS commands as root by leveraging administrator privileges, aka Bug ID CSCux69286." }, { "from": "gpt", "value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: HIGH\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The REST interface in Cisco Spark 2015-07-04 allows remote attackers to bypass intended access restrictions and create arbitrary user accounts via unspecified web requests, aka Bug ID CSCuv72584." }, { "from": "gpt", "value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: HIGH\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The REST interface in Cisco Spark 2015-06 allows remote authenticated users to obtain sensitive information via a request for an unspecified file, aka Bug ID CSCuv84048." }, { "from": "gpt", "value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The REST interface in Cisco Spark 2015-06 allows remote attackers to cause a denial of service (resource outage) by accessing an administrative page, aka Bug ID CSCuv84125." }, { "from": "gpt", "value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "HP Continuous Delivery Automation (CDA) 1.30 allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections library." }, { "from": "gpt", "value": "CWE-ID: CWE-94\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-94\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Integer overflow in the asf_write_packet function in libavformat/asfenc.c in FFmpeg before 2.8.5 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PTS (aka presentation timestamp) value in a .mov file." }, { "from": "gpt", "value": "CWE-ID: CWE-190\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-190\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "libavcodec/pngenc.c in FFmpeg before 2.8.5 uses incorrect line sizes in certain row calculations, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via a crafted .avi file, related to the apng_encode_frame and encode_apng functions." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "libswscale/swscale_unscaled.c in FFmpeg before 2.8.6 does not validate certain height values, which allows remote attackers to cause a denial of service (out-of-bounds array read access) or possibly have unspecified other impact via a crafted .cine file, related to the bayer_to_rgb24_wrapper and bayer_to_yv12_wrapper functions." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "libavcodec/tiff.c in FFmpeg before 2.8.6 does not properly validate RowsPerStrip values and YCbCr chrominance subsampling factors, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via a crafted TIFF file, related to the tiff_decode_tag and decode_frame functions." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "libavcodec/gif.c in FFmpeg before 2.8.6 does not properly calculate a buffer size, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via a crafted .tga file, related to the gif_image_write_image, gif_encode_init, and gif_encode_close functions." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Cross-site request forgery (CSRF) vulnerability in Tollgrade SmartGrid LightHouse Sensor Management System (SMS) Software EMS before 5.1, and 4.1.0 Build 16, allows remote attackers to hijack the authentication of arbitrary users." }, { "from": "gpt", "value": "CWE-ID: CWE-352\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-352\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Tollgrade SmartGrid LightHouse Sensor Management System (SMS) Software EMS before 5.1, and 4.1.0 Build 16, allows remote attackers to obtain sensitive report and username information via unspecified vectors." }, { "from": "gpt", "value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Tollgrade SmartGrid LightHouse Sensor Management System (SMS) Software EMS before 5.1, and 4.1.0 Build 16, allows remote authenticated users to change arbitrary passwords via unspecified vectors." }, { "from": "gpt", "value": "CWE-ID: CWE-255\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-255\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Cross-site scripting (XSS) vulnerability in Tollgrade SmartGrid LightHouse Sensor Management System (SMS) Software EMS before 5.1, and 4.1.0 Build 16, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." }, { "from": "gpt", "value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The directrun function in directmachine.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, does not validate a certain skip operation, which allows remote attackers to execute arbitrary code, obtain sensitive information, or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Code.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, does not consider recursive load calls during a size check, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via a crafted Graphite smart font." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Directory traversal vulnerability in data/config/image.do in NETGEAR Management System NMS300 1.5.0.11 and earlier allows remote authenticated users to read arbitrary files via a .. (dot dot) in the realName parameter." }, { "from": "gpt", "value": "CWE-ID: CWE-22\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: CHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-22\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The TtfUtil:LocaLookup function in TtfUtil.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, incorrectly validates a size value, which allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Mozilla Firefox before 44.0.2 does not properly restrict the interaction between Service Workers and plugins, which allows remote attackers to bypass the Same Origin Policy via a crafted web site that triggers spoofed responses to requests that use NPAPI, as demonstrated by a request for a crossdomain.xml file." }, { "from": "gpt", "value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The Extensions subsystem in Google Chrome before 48.0.2564.109 does not prevent use of the Object.defineProperty method to override intended extension behavior, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code." }, { "from": "gpt", "value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The DOM implementation in Google Chrome before 48.0.2564.109 does not properly restrict frame-attach operations from occurring during or after frame-detach operations, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, related to FrameLoader.cpp, HTMLFrameOwnerElement.h, LocalFrame.cpp, and WebLocalFrameImpl.cpp." }, { "from": "gpt", "value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Integer underflow in the ProcessCommandsInternal function in dec/decode.c in Brotli, as used in Google Chrome before 48.0.2564.109, allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted data with brotli compression." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The Chrome Instant feature in Google Chrome before 48.0.2564.109 does not ensure that a New Tab Page (NTP) navigation target is on the most-visited or suggestions list, which allows remote attackers to bypass intended restrictions via unspecified vectors, related to instant_service.cc and search_tab_helper.cc." }, { "from": "gpt", "value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The opj_pi_update_decode_poc function in pi.c in OpenJPEG, as used in PDFium in Google Chrome before 48.0.2564.109, miscalculates a certain layer index value, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document." }, { "from": "gpt", "value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The Developer Tools (aka DevTools) subsystem in Google Chrome before 48.0.2564.109 does not validate URL schemes and ensure that the remoteBase parameter is associated with a chrome-devtools-frontend.appspot.com URL, which allows remote attackers to bypass intended access restrictions via a crafted URL, related to browser/devtools/devtools_ui_bindings.cc and WebKit/Source/devtools/front_end/Runtime.js." }, { "from": "gpt", "value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "IBM Security QRadar SIEM 7.1.x before 7.1 MR2 Patch 12 and 7.2.x before 7.2.5 Patch 6 does not properly expire sessions, which allows remote attackers to obtain sensitive information by leveraging an unattended workstation." }, { "from": "gpt", "value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "IBM Security QRadar SIEM 7.1.x before 7.1 MR2 Patch 12 and 7.2.x before 7.2.6 includes SSH private keys during backup operations, which allows remote authenticated administrators to obtain sensitive information by reading a backup archive." }, { "from": "gpt", "value": "CWE-ID: CWE-284\nVector string: CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: HIGH\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-284\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions." }, { "from": "gpt", "value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The Web UI in IBM Security QRadar SIEM 7.1.x before 7.1 MR2 Patch 12 allows remote authenticated users to execute unspecified OS commands via unknown vectors." }, { "from": "gpt", "value": "CWE-ID: CWE-78\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-78\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Cross-site scripting (XSS) vulnerability in the Web UI in IBM Security QRadar SIEM 7.1.x before 7.1 MR2 Patch 12 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL." }, { "from": "gpt", "value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "IBM SPSS Modeler 14.2 through FP3 IF027, 15 through FP3 IF015, 16 through FP2 IF012, 17 through FP1 IF018, and 17.1 through IF008 includes unspecified cleartext data in memory dumps, which allows local users to obtain sensitive information by reading a dump file." }, { "from": "gpt", "value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "IBM Security Access Manager for Web 7.0 before 7.0.0 IF21, 8.0 before 8.0.1.3 IF4, and 9.0 before 9.0.0.1 IF1 does not have a lockout mechanism for invalid login attempts, which makes it easier for remote attackers to obtain access via a brute-force attack." }, { "from": "gpt", "value": "CWE-ID: CWE-254\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-254\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The SSH implementation on IBM Security Access Manager for Web appliances 7.0 before 7.0.0 FP19, 8.0 before 8.0.1.3 IF3, and 9.0 before 9.0.0.0 IF1 does not properly restrict the set of MAC algorithms, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors." }, { "from": "gpt", "value": "CWE-ID: CWE-310\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-310\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "IBM Emptoris Contract Management 9.5.0.x before 9.5.0.6 iFix15, 10.0.0.x and 10.0.1.x before 10.0.1.5 iFix5, 10.0.2.x before 10.0.2.7 iFix4, and 10.0.4.x before 10.0.4.0 iFix3 allows remote attackers to execute arbitrary code by including a crafted Flash file." }, { "from": "gpt", "value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: HIGH\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Cross-site request forgery (CSRF) vulnerability in IBM Emptoris Contract Management 9.5.0.x before 9.5.0.6 iFix15, 10.0.0.x and 10.0.1.x before 10.0.1.5 iFix5, 10.0.2.x before 10.0.2.7 iFix4, and 10.0.4.x before 10.0.4.0 iFix3 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences." }, { "from": "gpt", "value": "CWE-ID: CWE-352\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-352\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Cross-site scripting (XSS) vulnerability in IBM Emptoris Contract Management 9.5.0.x before 9.5.0.6 iFix15, 10.0.0.x and 10.0.1.x before 10.0.1.5 iFix5, 10.0.2.x before 10.0.2.7 iFix4, and 10.0.4.x before 10.0.4.0 iFix3 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL." }, { "from": "gpt", "value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The server in IBM Spectrum Protect (aka Tivoli Storage Manager) 5.5 and 6.x before 6.3.5.1 and 7.x before 7.1.4 does not properly restrict use of the ASNODENAME option, which allows remote attackers to read or write to backup data by leveraging proxy authority." }, { "from": "gpt", "value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The Update Installer in IBM WebSphere Commerce Enterprise 7.0.0.8 and 7.0.0.9 does not properly replicate the search index, which allows attackers to obtain sensitive information via unspecified vectors." }, { "from": "gpt", "value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Cross-site scripting (XSS) vulnerability in Reference Data Management (RDM) in IBM InfoSphere Master Data Management 10.1, 11.0 before FP5, 11.3, 11.4, and 11.5 before FP1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL." }, { "from": "gpt", "value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Cross-site scripting (XSS) vulnerability in IBM Security Access Manager for Web 8.0 before 8.0.1.3 IF4 and 9.0 before 9.0.0.1 IF1 allows remote attackers to inject arbitrary web script or HTML via a crafted URL." }, { "from": "gpt", "value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the Admin UI in Apache Solr before 5.1 allow remote attackers to inject arbitrary web script or HTML via crafted fields that are mishandled during the rendering of the (1) Analysis page, related to webapp/web/js/scripts/analysis.js or (2) Schema-Browser page, related to webapp/web/js/scripts/schema-browser.js." }, { "from": "gpt", "value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Cross-site scripting (XSS) vulnerability in webapp/web/js/scripts/schema-browser.js in the Admin UI in Apache Solr before 5.3 allows remote attackers to inject arbitrary web script or HTML via a crafted schema-browse URL." }, { "from": "gpt", "value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Cross-site scripting (XSS) vulnerability in webapp/web/js/scripts/plugins.js in the stats page in the Admin UI in Apache Solr before 5.3.1 allows remote attackers to inject arbitrary web script or HTML via the entry parameter to a plugins/cache URI." }, { "from": "gpt", "value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file." }, { "from": "gpt", "value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The Windows-based Host Interface Program (WHIP) service on Huawei SmartAX MT882 devices V200R002B022 Arg relies on the client to send a length field that is consistent with a buffer size, which allows remote attackers to cause a denial of service (device outage) or possibly have unspecified other impact via crafted traffic on TCP port 8701." }, { "from": "gpt", "value": "CWE-ID: CWE-19\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-19\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "GlobespanVirata ftpd 1.0, as used on Huawei SmartAX MT882 devices V200R002B022 Arg, allows remote authenticated users to cause a denial of service (device outage) by using the FTP MKD command to create a directory with a long name, and then using certain other commands." }, { "from": "gpt", "value": "CWE-ID: CWE-17\nVector string: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: HIGH\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-17\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "IBM Financial Transaction Manager (FTM) for ACH Services, Check Services and Corporate Payment Services (CPS) 3.0.0 before FP12 allows remote authenticated users to obtain sensitive information by reading exception details in error logs." }, { "from": "gpt", "value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "IBM Financial Transaction Manager (FTM) for ACH Services, Check Services and Corporate Payment Services (CPS) 3.0.0 before FP12 allows remote authenticated users to obtain sensitive information by reading README files." }, { "from": "gpt", "value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Cisco Universal Small Cell devices with firmware R2.12 through R3.5 contain an image-decryption key in flash memory, which allows remote attackers to bypass a certain certificate-validation feature and obtain sensitive firmware-image and IP address data via a request to an unspecified Cisco server, aka Bug ID CSCut98082." }, { "from": "gpt", "value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Cisco IOS 15.2(4)E on Industrial Ethernet 2000 devices allows remote attackers to cause a denial of service (device reload) via crafted Cisco Discovery Protocol (CDP) packets, aka Bug ID CSCuy27746." }, { "from": "gpt", "value": "CWE-ID: CWE-399\nVector string: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: ADJACENT_NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-399\", \"vectorString\": \"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Cisco Emergency Responder 11.5(0.99833.5) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCuy10766." }, { "from": "gpt", "value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences." }, { "from": "gpt", "value": "CWE-ID: CWE-254\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-254\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\"}" } ]
[ { "from": "system", "value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values." }, { "from": "human", "value": "activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature." }, { "from": "gpt", "value": "CWE-ID: CWE-284\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-284\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\"}" } ]