conversations
listlengths 3
3
|
|---|
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Microsoft Edge Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0116, CVE-2016-0123, CVE-2016-0129, and CVE-2016-0130."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Edge mishandles the Referer policy, which allows remote attackers to obtain sensitive browser-history and request information via a crafted HTTPS web site, aka \"Microsoft Edge Information Disclosure Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Microsoft Edge Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0116, CVE-2016-0123, CVE-2016-0124, and CVE-2016-0130."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Microsoft Edge Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-0116, CVE-2016-0123, CVE-2016-0124, and CVE-2016-0129."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, and 4.6.1 mishandles signature validation for unspecified elements of XML documents, which allows remote attackers to spoof signatures via a modified document, aka \".NET XML Validation Security Feature Bypass.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The USB Mass Storage Class driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows physically proximate attackers to execute arbitrary code by inserting a crafted USB device, aka \"USB Mass Storage Elevation of Privilege Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: PHYSICAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, Office Web Apps 2010 SP2, and Web Apps Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka \"Microsoft Office Memory Corruption Vulnerability.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Adobe Digital Editions before 4.5.1 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Adobe Reader and Acrobat before 11.0.15, Acrobat and Acrobat Reader DC Classic before 15.006.30121, and Acrobat and Acrobat Reader DC Continuous before 15.010.20060 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1009."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Untrusted search path vulnerability in Adobe Reader and Acrobat before 11.0.15, Acrobat and Acrobat Reader DC Classic before 15.006.30121, and Acrobat and Acrobat Reader DC Continuous before 15.010.20060 on Windows and OS X allows local users to gain privileges via a Trojan horse DLL in an unspecified directory."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Adobe Reader and Acrobat before 11.0.15, Acrobat and Acrobat Reader DC Classic before 15.006.30121, and Acrobat and Acrobat Reader DC Continuous before 15.010.20060 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1007."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The HTTPS inspection engine in the Content Security and Control Security Services Module (CSC-SSM) 6.6 before 6.6.1164.0 for Cisco ASA 5500 devices allows remote attackers to cause a denial of service (memory consumption or device reload) via a flood of HTTPS packets, aka Bug ID CSCue76147."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The administration interface on Cisco DPC3939B and DPC3941 devices allows remote attackers to obtain sensitive information via a crafted HTTP request, aka Bug ID CSCus49506."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The administration interface on Cisco DPQ3925 devices with firmware r1 allows remote attackers to cause a denial of service (device restart) via a crafted HTTP request, aka Bug ID CSCup48105."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-399\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-399\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Buffer overflow in the web server on Cisco DPC2203 and EPC2203 devices with firmware r1_customer_image allows remote attackers to execute arbitrary code via a crafted HTTP request, aka Bug ID CSCuv05935."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "EMC Documentum xCP 2.1 before patch 24 and 2.2 before patch 12 allows remote authenticated users to obtain sensitive user-account metadata via a members/xcp_member API call."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "resolver.c in named in ISC BIND 9.10.x before 9.10.3-P4, when DNS cookies are enabled, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed packet with more than one cookie option."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: CHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Schneider Electric Telvent Sage 2300 RTUs with firmware before C3413-500-S01, and LANDAC II-2, Sage 1410, Sage 1430, Sage 1450, Sage 2400, and Sage 3030M RTUs with firmware before C3414-500-S02J2, allow remote attackers to obtain sensitive information from device memory by reading a padding field of an Ethernet packet."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The portal client in IBM Tivoli Monitoring (ITM) 6.2.2 through FP9, 6.2.3 through FP5, and 6.3.0 through FP6 allows remote authenticated users to gain privileges via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: CHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cisco TelePresence Video Communication Server (VCS) X8.5.1 and X8.5.2 allows remote authenticated users to cause a denial of service (VoIP outage) via a crafted SIP message, aka Bug ID CSCuu43026."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cisco Prime LAN Management Solution (LMS) through 4.2.5 uses the same database decryption key across different customers' installations, which allows local users to obtain cleartext data by leveraging console connectivity, aka Bug ID CSCuw85390."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cisco IOS XR through 4.3.2 on Gigabit Switch Router (GSR) 12000 devices does not properly check for a Bidirectional Forwarding Detection (BFD) header in a UDP packet, which allows remote attackers to cause a denial of service (line-card restart) via a crafted packet, aka Bug ID CSCuw56900."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-399\nVector string: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: ADJACENT_NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-399\", \"vectorString\": \"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The REST API in the DTE Energy Insight application before 1.7.8 for Android allows remote authenticated users to obtain unspecified customer information via a SQL expression in the filter parameter."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site request forgery (CSRF) vulnerability in IBM Flash System V9000 7.4 before 7.4.1.4, 7.5 before 7.5.1.3, and 7.6 before 7.6.0.4 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-352\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-352\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "SQL injection vulnerability in IBM Maximo Asset Management 7.1 through 7.1.1.13, 7.5.0 before 7.5.0.9 IFIX003, and 7.6.0 before 7.6.0.3 IFIX001; Maximo Asset Management 7.5.0 before 7.5.0.9 IFIX003, 7.5.1, and 7.6.0 before 7.6.0.3 IFIX001 for SmartCloud Control Desk; and Maximo Asset Management 7.1 through 7.1.1.13 and 7.2 for Tivoli IT Asset Management for IT and certain other products allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-89\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-89\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The MPEG4Source::fragmentedRead function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.x before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 26365349."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-20\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-20\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "mediaserver in Android 6.x before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, related to decoder/ih264d_parse_islice.c and decoder/ih264d_parse_pslice.c, aka internal bug 25928803."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The caching functionality in the TrustManagerImpl class in TrustManagerImpl.java in Conscrypt in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.x before 2016-03-01 mishandles the distinction between an intermediate CA and a trusted root CA, which allows man-in-the-middle attackers to spoof servers by leveraging access to an intermediate CA to issue a certificate, aka internal bug 26232830."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-254\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: HIGH\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-254\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The Qualcomm performance component in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.x before 2016-03-01 allows attackers to gain privileges via a crafted application, aka internal bug 25364034."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The MediaTek Wi-Fi kernel driver in Android 6.0.1 before 2016-03-01 allows attackers to gain privileges via a crafted application, aka internal bug 26267358."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The MediaTek connectivity kernel driver in Android 6.0.1 before 2016-03-01 allows attackers to gain privileges via a crafted application that leverages conn_launcher access, aka internal bug 25873324."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "libmpeg2 in libstagefright in Android 6.x before 2016-03-01 allows attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via crafted Bitstream data, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 25765591."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The Widevine Trusted Application in Android 6.0.1 before 2016-03-01 allows attackers to obtain sensitive TrustZone secure-storage information by leveraging kernel access, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 20860039."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "libcameraservice in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.x before 2016-03-01 does not require use of the ICameraService::dump method for a camera service dump, which allows attackers to gain privileges via a crafted application that directly dumps, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 26265403."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Multiple integer overflows in libeffects in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.x before 2016-03-01 allow attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, related to EffectBundle.cpp and EffectReverb.cpp, aka internal bug 26347509."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-189\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-189\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The BnGraphicBufferConsumer::onTransact function in libs/gui/IGraphicBufferConsumer.cpp in mediaserver in Android 5.x before 5.1.1 LMY49H and 6.x before 2016-03-01 does not initialize a certain slot variable, which allows attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, by triggering an ATTACH_BUFFER action, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 26338113."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The BnGraphicBufferProducer::onTransact function in libs/gui/IGraphicBufferConsumer.cpp in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.x before 2016-03-01 does not initialize a certain output data structure, which allows attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, by triggering a QUEUE_BUFFER action, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 26338109."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "btif_config.c in Bluetooth in Android 6.x before 2016-03-01 allows remote attackers to cause a denial of service (memory corruption and persistent daemon crash) by triggering a large number of configuration entries, and consequently exceeding the maximum size of a configuration file, aka internal bug 26071376."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: ADJACENT_NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The getDeviceIdForPhone function in internal/telephony/PhoneSubInfoController.java in Telephony in Android 5.x before 5.1.1 LMY49H and 6.x before 2016-03-01 does not check for the READ_PHONE_STATE permission, which allows attackers to obtain sensitive information via a crafted application, aka internal bug 25778215."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Setup Wizard in Android 5.1.x before LMY49H and 6.x before 2016-03-01 allows physically proximate attackers to bypass the Factory Reset Protection protection mechanism and delete data via unspecified vectors, aka internal bug 25955042."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-254\nVector string: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H\n\nDetails about vector string:\nAttack Vector: PHYSICAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-254\", \"vectorString\": \"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "libvpx in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.0 before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, related to libwebm/mkvparser.cpp and other files, aka internal bug 23452792."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to js/src/jit/arm/Assembler-arm.cpp, and unknown other vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The nsCSPContext::SendReports function in dom/security/nsCSPContext.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not prevent use of a non-HTTP report-uri for a Content Security Policy (CSP) violation report, which allows remote attackers to cause a denial of service (data overwrite) or possibly gain privileges by specifying a URL of a local file."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Mozilla Firefox before 45.0 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information by reading a Content Security Policy (CSP) violation report that contains path information associated with an IFRAME element."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Mozilla Firefox before 45.0 on Linux, when an Intel video driver is used, allows remote attackers to cause a denial of service (memory consumption or stack memory corruption) by triggering use of a WebGL shader."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-399\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-399\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Memory leak in libstagefright in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to cause a denial of service (memory consumption) via an MPEG-4 file that triggers a delete operation on an array."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "browser/base/content/browser.js in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to spoof the address bar via a javascript: URL."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-254\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-254\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The ServiceWorkerManager class in Mozilla Firefox before 45.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read and memory corruption) via unspecified use of the Clients API."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The FileReader class in Mozilla Firefox before 45.0 allows local users to gain privileges or cause a denial of service (memory corruption) by changing a file during a FileReader API read operation."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 mishandle a navigation sequence that returns to the original page, which allows remote attackers to spoof the address bar via vectors involving the history.back method and the location.protocol property."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-254\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-254\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Mozilla Firefox before 45.0 does not properly restrict the availability of IFRAME Resource Timing API times, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that leverages history.back and performance.getEntries calls after restoring a browser session. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-7207."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Integer underflow in Brotli, as used in Mozilla Firefox before 45.0, allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted data with brotli compression."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-189\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-189\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The setAttr function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.6.1, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted Graphite smart font."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Integer underflow in the srtp_unprotect function in the WebRTC implementation in Mozilla Firefox before 45.0 on Windows might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The I420VideoFrame::CreateFrame function in the WebRTC implementation in Mozilla Firefox before 45.0 on Windows omits an unspecified status check, which might allow remote attackers to cause a denial of service (memory corruption) or possibly have other impact via unknown vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The nsScannerString::AppendUnicodeTo function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not verify that memory allocation succeeds, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via crafted Unicode data in an HTML, XML, or SVG document."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Multiple race conditions in dom/media/systemservices/CamerasChild.cpp in the WebRTC implementation in Mozilla Firefox before 45.0 on Windows might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-362\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-362\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The Machine::Code::decoder::analysis::set_ref function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted Graphite smart font."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The graphite2::TtfUtil::GetTableInfo function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-19\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-19\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The graphite2::GlyphCache::glyph function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2800."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "CachedCmap.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The graphite2::TtfUtil::CmapSubtable12NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The graphite2::FileFace::get_table_fn function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-19\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-19\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Heap-based buffer overflow in the graphite2::vm::Machine::Code::Code function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The graphite2::TtfUtil::CmapSubtable12Lookup function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2801."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The graphite2::GlyphCache::Loader::Loader function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Heap-based buffer overflow in the graphite2::Slot::setAttr function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2792."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The graphite2::TtfUtil::CmapSubtable12Lookup function in TtfUtil.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2797."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The graphite2::TtfUtil::CmapSubtable4NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The internal DNS server in Samba 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4, when an AD DC is configured, allows remote authenticated users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory by uploading a crafted DNS TXT record."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The ImageInputType::ensurePrimaryContent function in WebKit/Source/core/html/forms/ImageInputType.cpp in Blink, as used in Google Chrome before 49.0.2623.87, does not properly maintain the user agent shadow DOM, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage \"type confusion.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-361\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-361\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "IBM WebSphere Commerce 6.x through 6.0.0.11, 7.x through 7.0.0.9, and 8.x before 8.0.0.3 allows remote attackers to cause a denial of service (order-processing outage) via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-284\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: NONE\nAvailability Impact: LOW\n\n{\"CWE-ID\": \"CWE-284\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "IBM Maximo Asset Management 7.6 before 7.6.0.3 IFIX001 allows remote authenticated users to bypass intended access restrictions and read arbitrary purchase-order work logs via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-284\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-284\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 7.1.1 through 7.1.1.3, 7.5.0 before 7.5.0.9 IFIX004, and 7.6.0 before 7.6.0.3 IFIX001 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Apple Software Update before 2.2 on Windows does not use HTTPS, which makes it easier for man-in-the-middle attackers to spoof updates by modifying the client-server data stream."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-310\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: NONE\nIntegrity Impact: HIGH\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-310\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "pt_chown in the glibc package before 2.19-18+deb8u4 on Debian jessie; the elibc package before 2.15-0ubuntu10.14 on Ubuntu 12.04 LTS and before 2.19-0ubuntu6.8 on Ubuntu 14.04 LTS; and the glibc package before 2.21-0ubuntu4.2 on Ubuntu 15.10 and before 2.23-0ubuntu1 on Ubuntu 16.04 LTS and 16.10 lacks a namespace check associated with file-descriptor passing, which allows local users to capture keystrokes and spoof data, and possibly gain privileges, via pts read and write operations, related to debian/sysdeps/linux.mk. NOTE: this is not considered a vulnerability in the upstream GNU C Library because the upstream documentation has a clear security recommendation against the --enable-pt_chown option."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site scripting (XSS) vulnerability in VMware vRealize Automation 6.x before 6.2.4 on Linux allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "HPE ArcSight ESM 5.x before 5.6, 6.0, 6.5.x before 6.5C SP1 Patch 2, and 6.8c before P1, and ArcSight ESM Express before 6.9.1, allows local users to gain privileges for command execution via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Siemens SIMATIC S7-1200 CPU devices before 4.0 allow remote attackers to bypass a \"user program block\" protection mechanism via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-254\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-254\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "HPE ArcSight ESM before 6.8c, and ArcSight ESM Express before 6.9.1, allows remote authenticated users to obtain sensitive information via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted packet."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: HIGH\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Stack-based buffer overflow in dwrcs.exe in the dwmrcs daemon in SolarWinds DameWare Mini Remote Control 12.0 allows remote attackers to execute arbitrary code via a crafted string."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-119\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-119\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site scripting (XSS) vulnerability in Novell Filr 1.2 before Hot Patch 4 allows remote attackers to inject arbitrary web script or HTML via a crafted URL."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "HPE System Management Homepage before 7.5.4 allows remote authenticated users to obtain sensitive information via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "IBM Tivoli NetView Access Services (NVAS) allows remote authenticated users to gain privileges by entering the ADM command and modifying a \"page ID\" field to the EMSPG2 transaction code. NOTE: the vendor's perspective is that configuration and use of available security controls in the NVAS product mitigates the reported vulnerability"
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site request forgery (CSRF) vulnerability in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6-MP4 allows remote authenticated users to hijack the authentication of administrators for requests that execute arbitrary code by adding lines to a logging script."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-352\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-352\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "SQL injection vulnerability in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6-MP4 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-89\nVector string: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: LOW\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-89\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "The SysPlant.sys driver in the Application and Device Control (ADC) component in the client in Symantec Endpoint Protection (SEP) 12.1 before RU6-MP4 allows remote attackers to execute arbitrary code via a crafted HTML document, related to \"RWX Permissions.\""
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Untrusted search path vulnerability in ABB Panel Builder 800 5.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-264\nVector string: CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: HIGH\nPrivileges Required: HIGH\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-264\", \"vectorString\": \"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Siemens APOGEE Insight uses weak permissions for the application folder, which allows local users to obtain sensitive information or modify data via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: LOCAL\nAttack Complexity: LOW\nPrivileges Required: HIGH\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "lms/templates/footer-edx-new.html in Open edX edx-platform before 2015-01-29 does not properly restrict links on the password-reset page, which allows user-assisted remote attackers to discover password-reset tokens by reading a referer log after a victim navigates from this page to a social-sharing site."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-200\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: NONE\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-200\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site scripting (XSS) vulnerability in XZERES 442SR OS on 442SR wind turbines allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "Cross-site scripting (XSS) vulnerability in the OpenID Connect (OIDC) client web application in IBM WebSphere Application Server (WAS) Liberty Profile 8.5.5 before 8.5.5.9 allows remote attackers to inject arbitrary web script or HTML via a crafted URL."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-79\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: REQUIRED\nScope: CHANGED\nConfidentiality Impact: LOW\nIntegrity Impact: LOW\nAvailability Impact: NONE\n\n{\"CWE-ID\": \"CWE-79\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\"}"
}
] |
[
{
"from": "system",
"value": "Analyze the following CVE description and map it to the appropriate CWE, and generate the resulting vector string (for metrics). Your response should be in JSON (dictionary) format with 'CWE-ID' and 'vectorString' as keys with their respective values."
},
{
"from": "human",
"value": "HP Support Assistant before 8.1.52.1 allows remote attackers to bypass authentication via unspecified vectors."
},
{
"from": "gpt",
"value": "CWE-ID: CWE-287\nVector string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\nDetails about vector string:\nAttack Vector: NETWORK\nAttack Complexity: LOW\nPrivileges Required: NONE\nUser Interaction: NONE\nScope: UNCHANGED\nConfidentiality Impact: HIGH\nIntegrity Impact: HIGH\nAvailability Impact: HIGH\n\n{\"CWE-ID\": \"CWE-287\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\"}"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.