Delete cve50_label v4.csv
Browse files- cve50_label v4.csv +0 -11
cve50_label v4.csv
DELETED
@@ -1,11 +0,0 @@
|
|
1 |
-
text,keyphrase
|
2 |
-
"[""NICM.SYS"", ""driver"", ""3.0.0.4,"", ""as"", ""used"", ""in"", ""Novell"", ""NetWare"", ""Client"", ""4.91"", ""SP4,"", ""allows"", ""local"", ""users"", ""to"", ""execute"", ""arbitrary"", ""code"", ""by"", ""opening"", ""the"", ""\\\\.\\nicm"", ""device"", ""and"", ""providing"", ""crafted"", ""kernel"", ""addresses"", ""via"", ""IOCTLs"", ""with"", ""the"", ""METHOD_NEITHER"", ""buffering"", ""mode.""]",['arbitrary code execution']
|
3 |
-
"[""WebKit"", ""before"", ""r53525,"", ""as"", ""used"", ""in"", ""Google"", ""Chrome"", ""before"", ""4.0.249.89,"", ""allows"", ""remote"", ""attackers"", ""to"", ""execute"", ""arbitrary"", ""code"", ""in"", ""the"", ""Chrome"", ""sandbox"", ""via"", ""a"", ""malformed"", ""RUBY"", ""element,"", ""as"", ""demonstrated"", ""by"", ""a"", ""<ruby>><table><rt>"", ""sequence.""]",['arbitrary code execution']
|
4 |
-
"[""The"", ""affected"", ""product"", ""is"", ""vulnerable"", ""to"", ""an"", ""out-of-bounds"", ""write"", ""while"", ""processing"", ""project"", ""files,"", ""which"", ""allows"", ""an"", ""attacker"", ""to"", ""craft"", ""a"", ""project"", ""file"", ""that"", ""would"", ""allow"", ""arbitrary"", ""code"", ""execution.""]",['arbitrary code execution']
|
5 |
-
"[""Iris"", ""3.8"", ""before"", ""build"", ""1548,"", ""as"", ""used"", ""in"", ""Xpient"", ""point"", ""of"", ""sale"", ""(POS)"", ""systems,"", ""allows"", ""remote"", ""attackers"", ""to"", ""execute"", ""arbitrary"", ""commands"", ""via"", ""a"", ""crafted"", ""request"", ""to"", ""TCP"", ""port"", ""7510,"", ""as"", ""demonstrated"", ""by"", ""opening"", ""the"", ""cash"", ""drawer.""]",['arbitrary command execution']
|
6 |
-
"[""An"", ""access"", ""issue"", ""was"", ""addressed"", ""with"", ""additional"", ""sandbox"", ""restrictions."", ""This"", ""issue"", ""is"", ""fixed"", ""in"", ""iOS"", ""12.3."", ""A"", ""sandboxed"", ""process"", ""may"", ""be"", ""able"", ""to"", ""circumvent"", ""sandbox"", ""restrictions.""]",['circumvent sandbox restrictions']
|
7 |
-
"[""An"", ""access"", ""issue"", ""was"", ""addressed"", ""with"", ""improved"", ""access"", ""restrictions."", ""This"", ""issue"", ""is"", ""fixed"", ""in"", ""macOS"", ""Big"", ""Sur"", ""11.5,"", ""Security"", ""Update"", ""2021-004"", ""Catalina,"", ""Security"", ""Update"", ""2021-005"", ""Mojave."", ""A"", ""sandboxed"", ""process"", ""may"", ""be"", ""able"", ""to"", ""circumvent"", ""sandbox"", ""restrictions.""]",['circumvent sandbox restrictions']
|
8 |
-
"[""The"", ""affected"", ""product"", ""is"", ""vulnerable"", ""due"", ""to"", ""cleartext"", ""transmission"", ""of"", ""credentials"", ""seen"", ""in"", ""the"", ""CIMPLICITY"", ""network,"", ""which"", ""can"", ""be"", ""easily"", ""spoofed"", ""and"", ""used"", ""to"", ""log"", ""in"", ""to"", ""make"", ""operational"", ""changes"", ""to"", ""the"", ""system.""]",['cleartext transmission']
|
9 |
-
"[""A"", ""vulnerability"", ""in"", ""the"", ""web-based"", ""management"", ""interface"", ""of"", ""Cisco"", ""Firepower"", ""Management"", ""Center"", ""(FMC)"", ""could"", ""allow"", ""an"", ""unauthenticated,"", ""remote"", ""attacker"", ""to"", ""conduct"", ""a"", ""cross-site"", ""scripting"", ""(XSS)"", ""attack"", ""against"", ""a"", ""user"", ""of"", ""the"", ""web-based"", ""management"", ""interface"", ""of"", ""an"", ""affected"", ""system."", ""The"", ""vulnerability"", ""is"", ""due"", ""to"", ""insufficient"", ""validation"", ""of"", ""user-supplied"", ""input"", ""by"", ""the"", ""web-based"", ""management"", ""interface"", ""of"", ""the"", ""affected"", ""system."", ""An"", ""attacker"", ""could"", ""exploit"", ""this"", ""vulnerability"", ""by"", ""persuading"", ""a"", ""user"", ""of"", ""the"", ""interface"", ""to"", ""click"", ""a"", ""maliciously"", ""crafted"", ""link."", ""A"", ""successful"", ""exploit"", ""could"", ""allow"", ""the"", ""attacker"", ""to"", ""execute"", ""arbitrary"", ""script"", ""code"", ""in"", ""the"", ""context"", ""of"", ""the"", ""affected"", ""interface"", ""or"", ""access"", ""sensitive,"", ""browser-based"", ""information.""]",['cross site scripting vulnerability']
|
10 |
-
"[""SAP"", ""Information"", ""Steward,"", ""version"", ""4.2,"", ""does"", ""not"", ""sufficiently"", ""encode"", ""user-controlled"", ""inputs,"", ""resulting"", ""in"", ""Cross-Site"", ""Scripting"", ""(XSS)"", ""vulnerability.""]",['cross site scripting vulnerability']
|
11 |
-
"[""A"", ""persistent"", ""cross-site"", ""scripting"", ""(XSS)"", ""vulnerability"", ""in"", ""the"", ""Snort"", ""Rules"", ""configuration"", ""of"", ""Juniper"", ""ATP"", ""may"", ""allow"", ""authenticated"", ""user"", ""to"", ""inject"", ""arbitrary"", ""script"", ""and"", ""steal"", ""sensitive"", ""data"", ""and"", ""credentials"", ""from"", ""a"", ""web"", ""administration"", ""session,"", ""possibly"", ""tricking"", ""a"", ""follow-on"", ""administrative"", ""user"", ""to"", ""perform"", ""administrative"", ""actions"", ""on"", ""the"", ""device."", ""This"", ""issue"", ""affects"", ""Juniper"", ""ATP"", ""5.0"", ""versions"", ""prior"", ""to"", ""5.0.3.""]",['cross site scripting vulnerability']
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|