conversations
listlengths 3
3
|
|---|
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The setGlobalContext method in org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M3 does not consider whether ResourceLinkFactory.setGlobalContext callers are authorized, which allows remote authenticated users to bypass intended SecurityManager restrictions and read or write to arbitrary application data, or cause a denial of service (application disruption), via a web application that sets a crafted global context."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The Device Manager GUI in Cisco Application Control Engine (ACE) 4710 A5 before A5(3.1) allows remote authenticated users to bypass intended RBAC restrictions and execute arbitrary CLI commands with admin privileges via an unspecified parameter in a POST request, aka Bug ID CSCul84801."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-78\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-78\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The device login page in Cisco FirePOWER Management Center 5.3 through 6.0.0.1 allows remote attackers to obtain potentially sensitive software-version information by reading help files, aka Bug ID CSCuy36654."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The FTP service in QNAP iArtist Lite before 1.4.54, as distributed with QNAP Signage Station before 2.0.1, has hardcoded credentials, which makes it easier for remote attackers to obtain access via a session on TCP port 21."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-255\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-255\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "QNAP iArtist Lite before 1.4.54, as distributed with QNAP Signage Station before 2.0.1, allows remote authenticated users to gain privileges by registering an executable file, and then waiting for this file to be run in a privileged context after a reboot."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-18\nVector string: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-18\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not properly append data to String objects, which allows remote servers to cause a denial of service (assertion failure and daemon exit) via a long string, as demonstrated by a crafted HTTP Vary header."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The Edge Side Includes (ESI) parser in Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not check buffer limits during XML parsing, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a crafted XML document, related to esi/CustomParser.cc and esi/CustomParser.h."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "http.cc in Squid 3.x before 3.5.15 and 4.x before 4.0.7 proceeds with the storage of certain data after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Untrusted search path vulnerability in the WiresharkApplication class in ui/qt/wireshark_application.cpp in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 on Windows allows local users to gain privileges via a Trojan horse riched20.dll.dll file in the current working directory, related to use of QLibrary."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The dissect_ber_constrained_bitstring function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 2.0.x before 2.0.2 does not verify that a certain length is nonzero, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The dnp3_al_process_object function in epan/dissectors/packet-dnp.c in the DNP3 dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-399\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-399\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "epan/dissectors/packet-x509af.c in the X.509AF dissector in Wireshark 2.0.x before 2.0.2 mishandles the algorithm ID, which allows remote attackers to cause a denial of service (application crash) via a crafted packet."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "epan/dissectors/packet-http2.c in the HTTP/2 dissector in Wireshark 2.0.x before 2.0.2 does not limit the amount of header data, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "epan/dissectors/packet-hiqnet.c in the HiQnet dissector in Wireshark 2.0.x before 2.0.2 does not validate the data type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "wiretap/nettrace_3gpp_32_423.c in the 3GPP TS 32.423 Trace file parser in Wireshark 2.0.x before 2.0.2 does not ensure that a '\\0' character is present at the end of certain strings, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted file."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The dissect_nhdr_extopt function in epan/dissectors/packet-lbmc.c in the LBMC dissector in Wireshark 2.0.x before 2.0.2 does not validate length values, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The iseries_check_file_type function in wiretap/iseries.c in the iSeries file parser in Wireshark 2.0.x before 2.0.2 does not consider that a line may lack the \"OBJECT PROTOCOL\" substring, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 mishandles the case of an unrecognized TLV type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet, a different vulnerability than CVE-2016-2531."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Off-by-one error in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that triggers a 0xff tag value, a different vulnerability than CVE-2016-2530."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The dissect_llrp_parameters function in epan/dissectors/packet-llrp.c in the LLRP dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 does not limit the recursion depth, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "IBM WebSphere Portal 7.x through 7.0.0.2 CF29, 8.0.x before 8.0.0.1 CF20, and 8.5.x before 8.5.0.0 CF09 uses weak permissions for content items, which allows remote authenticated users to make modifications via the authoring UI."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 8.0.x before 8.0.0.1 CF20 and 8.5.x before 8.5.0.0 CF09 allows remote attackers to inject arbitrary web script or HTML via a crafted URL."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 8.0.x before 8.0.0.1 CF20 and 8.5.x before 8.5.0.0 CF09 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site scripting (XSS) vulnerability in Process Portal in IBM Business Process Manager 8.5.0.x through 8.5.0.2, 8.5.5.x through 8.5.5.0, and 8.5.6.x through 8.5.6.2 allows remote attackers to inject arbitrary web script or HTML via a crafted URL."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Stack-based buffer overflow in IBM Tivoli Storage Manager FastBack 5.5 and 6.1.x through 6.1.11.1 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors, a different vulnerability than CVE-2016-0213 and CVE-2016-0216."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Stack-based buffer overflow in IBM Tivoli Storage Manager FastBack 5.5 and 6.1.x through 6.1.11.1 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors, a different vulnerability than CVE-2016-0212 and CVE-2016-0216."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Stack-based buffer overflow in IBM Tivoli Storage Manager FastBack 5.5 and 6.1.x through 6.1.11.1 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors, a different vulnerability than CVE-2016-0212 and CVE-2016-0213."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "IBM WebSphere Commerce 6.x through 6.0.0.11 and 7.x through 7.0.0.9 allows remote authenticated Commerce Accelerator administrators to obtain sensitive information via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: HIGH\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 6.1.0.x through 6.1.0.6 CF27, 6.1.5.x through 6.1.5.3 CF27, 7.x through 7.0.0.2 CF29, 8.0.x before 8.0.0.1 CF20, and 8.5.x before 8.5.0.0 CF09 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, a different vulnerability than CVE-2016-0244."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 6.1.0.x through 6.1.0.6 CF27, 6.1.5.x through 6.1.5.3 CF27, 7.x through 7.0.0.2 CF29, 8.0.x before 8.0.0.1 CF20, and 8.5.x before 8.5.0.0 CF09 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, a different vulnerability than CVE-2016-0243."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The TCP implementation in Cisco Videoscape Distribution Suite for Internet Streaming (VDS-IS) 3.3(0), 3.3(1), 4.0(0), and 4.1(0) does not properly initiate new TCP sessions when a previous session is in a FIN wait state, which allows remote attackers to cause a denial of service (TCP outage) via vectors involving FIN packets, aka Bug ID CSCuy45136."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-399\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-399\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site scripting (XSS) vulnerability in the format function in libraries/sql-parser/src/Utils/Error.php in the SQL parser in phpMyAdmin 4.5.x before 4.5.5.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted query."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.15, 4.4.x before 4.4.15.5, and 4.5.x before 4.5.5.1 allow remote attackers to inject arbitrary web script or HTML via (1) a crafted Host HTTP header, related to libraries/Config.class.php; (2) crafted JSON data, related to file_echo.php; (3) a crafted SQL query, related to js/functions.js; (4) the initial parameter to libraries/server_privileges.lib.php in the user accounts page; or (5) the it parameter to libraries/controllers/TableSearchController.class.php in the zoom search page."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.4.x before 4.4.15.5 and 4.5.x before 4.5.5.1 allow remote authenticated users to inject arbitrary web script or HTML via (1) normalization.php or (2) js/normalization.js in the database normalization page, (3) templates/database/structure/sortable_header.phtml in the database structure page, or (4) the pos parameter to db_central_columns.php in the central columns page."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The checkHTTP function in libraries/Config.class.php in phpMyAdmin 4.5.x before 4.5.5.1 does not verify X.509 certificates from api.github.com SSL servers, which allows man-in-the-middle attackers to spoof these servers and obtain sensitive information via a crafted certificate."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: CHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: HIGH\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a \"DROWN\" attack."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Schneider Electric Struxureware Building Operations Automation Server AS 1.7 and earlier and AS-P 1.7 and earlier allows remote authenticated administrators to execute arbitrary OS commands by defeating an msh (aka Minimal Shell) protection mechanism."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-284\nVector string: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: HIGH\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-284\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cisco NX-OS 6.0(2)U6(1) through 6.0(2)U6(5) on Nexus 3000 devices and 6.0(2)A6(1) through 6.0(2)A6(5) and 6.0(2)A7(1) on Nexus 3500 devices has hardcoded credentials, which allows remote attackers to obtain root privileges via a (1) TELNET or (2) SSH session, aka Bug ID CSCuy25800."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-287\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-287\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site scripting (XSS) vulnerability in Cisco Unified Communications Domain Manager (UCDM) 8.x before 8.1.1 allows remote attackers to inject arbitrary web script or HTML via crafted markup data, aka Bug ID CSCud41176."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site scripting (XSS) vulnerability in the Device Management UI in the management interface in Cisco FireSIGHT System Software 6.1.0 allows remote attackers to inject arbitrary web script or HTML via a crafted value, aka Bug ID CSCuy41687."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-399\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-399\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The doapr_outch function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not verify that a certain memory allocation succeeds, which allows remote attackers to cause a denial of service (out-of-bounds write or memory consumption) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-0799."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cisco NX-OS 4.0 through 6.1 on Nexus 1000V 3000, 4000, 5000, 6000, and 7000 devices and Unified Computing System (UCS) platforms allows remote attackers to cause a denial of service (TCP stack reload) by sending crafted TCP packets to a device that has a TIME_WAIT TCP session, aka Bug ID CSCub70579."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-399\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-399\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cisco NX-OS 7.1(1)N1(1) on Nexus 5500, 5600, and 6000 devices does not properly validate PDUs in SNMP packets, which allows remote attackers to cause a denial of service (SNMP application restart) via a crafted packet, aka Bug ID CSCut84645."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "IBM InfoSphere Information Server 8.5 through FP3, 8.7 through FP2, 9.1 through 9.1.2.0, 11.3 through 11.3.1.2, and 11.5 allows remote authenticated users to bypass intended access restrictions via a modified cookie."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-284\nVector string: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-284\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site scripting (XSS) vulnerability in the document-list control implementation in IBM Business Process Manager (BPM) 8.0 through 8.0.1.3, 8.5.0 through 8.5.0.2, and 8.5.5 and 8.5.6 through 8.5.6.2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site request forgery (CSRF) vulnerability on Corega CG-WLBARGMH and CG-WLBARGNL devices allows remote attackers to hijack the authentication of administrators for requests that perform administrative functions."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-352\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-352\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The HTTPS Proxy feature in Cisco AsyncOS before 8.5.3-051 and 9.x before 9.0.0-485 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (service outage) by leveraging certain intranet connectivity and sending a malformed HTTPS request, aka Bug ID CSCuu24840."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cisco FireSIGHT System Software 6.1.0 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to enumerate valid usernames by measuring timing differences, aka Bug ID CSCuy41615."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-255\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-255\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The password-management administration component in Cisco Policy Suite (CPS) 7.0.1.3, 7.0.2, 7.0.2-att, 7.0.3-att, 7.0.4-att, and 7.5.0 allows remote attackers to bypass intended RBAC restrictions and read unspecified data via unknown vectors, aka Bug ID CSCut85211."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cisco Prime Infrastructure 2.2, 3.0, and 3.1(0.0) allows remote authenticated users to read arbitrary files or cause a denial of service via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, aka Bug ID CSCuw81497."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: LOW\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cisco Prime Infrastructure 3.0 allows remote authenticated users to execute arbitrary code via a crafted HTTP request that is mishandled during viewing of a log file, aka Bug ID CSCuw81494."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Sure Start on HP Commercial PCs 2015 allows local users to cause a denial of service (BIOS recovery failure) by leveraging administrative access."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-284\nVector string: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: HIGH\nUser Interaction: NONE\nScope: CHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-284\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "HP LaserJet printers and MFPs and OfficeJet Enterprise printers with firmware before 3.7.01 allow remote attackers to obtain sensitive information via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Moxa ioLogik E2200 devices before 3.12 and ioAdmin Configuration Utility before 3.18 do not properly encrypt credentials, which makes it easier for remote attackers to obtain the associated cleartext via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-255\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-255\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Moxa ioLogik E2200 devices before 3.12 and ioAdmin Configuration Utility before 3.18 do not properly encrypt data, which makes it easier for remote attackers to obtain the associated cleartext via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-255\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-255\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The ContainerNode::parserRemoveChild function in WebKit/Source/core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 49.0.2623.75, mishandles widget updates, which makes it easier for remote attackers to bypass the Same Origin Policy via a crafted web site."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The PPB_Flash_MessageLoop_Impl::InternalRun function in content/renderer/pepper/ppb_flash_message_loop_impl.cc in the Pepper plugin in Google Chrome before 49.0.2623.75 mishandles nested message loops, which allows remote attackers to bypass the Same Origin Policy via a crafted web site."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly maintain own properties, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code that triggers an incorrect cast, related to extensions/renderer/v8_helpers.h and gin/converter.h."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The PendingScript::notifyFinished function in WebKit/Source/core/dom/PendingScript.cpp in Google Chrome before 49.0.2623.75 relies on memory-cache information about integrity-check occurrences instead of integrity-check successes, which allows remote attackers to bypass the Subresource Integrity (aka SRI) protection mechanism by triggering two loads of the same resource."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The SkATan2_255 function in effects/gradients/SkSweepGradient.cpp in Skia, as used in Google Chrome before 49.0.2623.75, mishandles arctangent calculations, which allows remote attackers to obtain sensitive information via a crafted web site."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "extensions/renderer/resources/platform_app.js in the Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly restrict use of Web APIs, which allows remote attackers to bypass intended access restrictions via a crafted platform app."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-284\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-284\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The Web Store inline-installer implementation in the Extensions UI in Google Chrome before 49.0.2623.75 does not block installations upon deletion of an installation frame, which makes it easier for remote attackers to trick a user into believing that an installation request originated from the user's next navigation target via a crafted web site."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-17\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-17\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "WebKit/Source/core/layout/LayoutBlock.cpp in Blink, as used in Google Chrome before 49.0.2623.75, does not properly determine when anonymous block wrappers may exist, which allows remote attackers to cause a denial of service (incorrect cast and assertion failure) or possibly have unspecified other impact via crafted JavaScript code."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 49.0.2623.75, does not ignore a URL's path component in the case of a ServiceWorker fetch, which allows remote attackers to obtain sensitive information about visited web pages by reading CSP violation reports, related to FrameFetchContext.cpp and ResourceFetcher.cpp."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft InfoPath 2007 SP3, 2010 SP2, and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka \"Microsoft Office Memory Corruption Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2016 does not properly sign an unspecified binary file, which allows local users to gain privileges via a Trojan horse file with a crafted signature, aka \"Microsoft Office Security Feature Bypass Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 do not properly validate handles, which allows local users to gain privileges via a crafted application, aka \"Windows Elevation of Privilege Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "OLE in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted file, aka \"Windows OLE Memory Remote Code Execution Vulnerability,\" a different vulnerability than CVE-2016-0092."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "OLE in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted file, aka \"Windows OLE Memory Remote Code Execution Vulnerability,\" a different vulnerability than CVE-2016-0091."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka \"Win32k Elevation of Privilege Vulnerability,\" a different vulnerability than CVE-2016-0094, CVE-2016-0095, and CVE-2016-0096."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka \"Win32k Elevation of Privilege Vulnerability,\" a different vulnerability than CVE-2016-0093, CVE-2016-0095, and CVE-2016-0096."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka \"Win32k Elevation of Privilege Vulnerability,\" a different vulnerability than CVE-2016-0093, CVE-2016-0094, and CVE-2016-0096."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka \"Win32k Elevation of Privilege Vulnerability,\" a different vulnerability than CVE-2016-0093, CVE-2016-0094, and CVE-2016-0095."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 allow remote attackers to execute arbitrary code via crafted media content, aka \"Windows Media Parsing Remote Code Execution Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Windows Vista SP2 and Server 2008 SP2 mishandle library loading, which allows local users to gain privileges via a crafted application, aka \"Library Loading Input Validation Remote Code Execution Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allow remote attackers to execute arbitrary code via crafted media content, aka \"Windows Media Parsing Remote Code Execution Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Microsoft Browser Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0103, CVE-2016-0106, CVE-2016-0108, CVE-2016-0109, and CVE-2016-0114."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Internet Explorer Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0102, CVE-2016-0106, CVE-2016-0108, CVE-2016-0109, and CVE-2016-0114."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Internet Explorer Memory Corruption Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Microsoft Browser Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0107, CVE-2016-0111, CVE-2016-0112, and CVE-2016-0113."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Internet Explorer Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0102, CVE-2016-0103, CVE-2016-0108, CVE-2016-0109, and CVE-2016-0114."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Internet Explorer Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0105, CVE-2016-0111, CVE-2016-0112, and CVE-2016-0113."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Internet Explorer Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0102, CVE-2016-0103, CVE-2016-0106, CVE-2016-0109, and CVE-2016-0114."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Microsoft Browser Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0102, CVE-2016-0103, CVE-2016-0106, CVE-2016-0108, and CVE-2016-0114."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Internet Explorer 10 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Microsoft Browser Memory Corruption Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Microsoft Browser Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0105, CVE-2016-0107, CVE-2016-0112, and CVE-2016-0113."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Internet Explorer Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0105, CVE-2016-0107, CVE-2016-0111, and CVE-2016-0113."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Internet Explorer Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0105, CVE-2016-0107, CVE-2016-0111, and CVE-2016-0112."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Internet Explorer Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0102, CVE-2016-0103, CVE-2016-0106, CVE-2016-0108, and CVE-2016-0109."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Microsoft Edge Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0123, CVE-2016-0124, CVE-2016-0129, and CVE-2016-0130."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The PDF library in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted PDF document, aka \"Windows Remote Code Execution Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The PDF library in Microsoft Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted PDF document, aka \"Windows Remote Code Execution Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows remote attackers to cause a denial of service (system hang) via a crafted OpenType font, aka \"OpenType Font Parsing Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted OpenType font, aka \"OpenType Font Parsing Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Microsoft Edge Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0116, CVE-2016-0124, CVE-2016-0129, and CVE-2016-0130."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.