messages
listlengths 3
3
|
---|
[
{
"role": "system",
"content": "Identify the affected product in <CVE-2024-28859>."
},
{
"role": "user",
"content": "Which product is affected by <CVE-2024-28859>?"
},
{
"role": "assistant",
"content": "The affected product is symfony1 and version: >= 1.3.0, < 1.5.18."
}
] |
[
{
"role": "system",
"content": "State the CVSS score for <CVE-2024-28859>."
},
{
"role": "user",
"content": "What is the CVSS score of <CVE-2024-28859>?"
},
{
"role": "assistant",
"content": "The CVSS score and severity for <CVE-2024-28859> is 5(MEDIUM)."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28859>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28859>?"
},
{
"role": "assistant",
"content": "References are available at: https://github.com/FriendsOfSymfony1/symfony1/security/advisories/GHSA-wjv8-pxr6-5f4r, https://github.com/FriendsOfSymfony1/symfony1/commit/edb850f94fb4de18ca53d0d1824910d6e8130166."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28859>."
},
{
"role": "user",
"content": "When was <CVE-2024-28859> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28859> was published on 2024-03-15T22:32:56.078Z."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28623>."
},
{
"role": "user",
"content": "What is <CVE-2024-28623>?"
},
{
"role": "assistant",
"content": "RiteCMS v3.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component main_menu/edit_section.."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28623>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28623>?"
},
{
"role": "assistant",
"content": "References are available at: https://github.com/GURJOTEXPERT/ritecms."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28623>."
},
{
"role": "user",
"content": "When was <CVE-2024-28623> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28623> was published on 2024-03-13T00:00:00."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28009>."
},
{
"role": "user",
"content": "What is <CVE-2024-28009>?"
},
{
"role": "assistant",
"content": "Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN MR02LN, WG1810HP(JE) and WG1810HP(MF) all versions allows a attacker to execute an arbitrary command with the root privilege via the internet.."
}
] |
[
{
"role": "system",
"content": "Identify the affected product in <CVE-2024-28009>."
},
{
"role": "user",
"content": "Which product is affected by <CVE-2024-28009>?"
},
{
"role": "assistant",
"content": "The affected product is WG1800HP4 and version: all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions, all versions."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28009>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28009>?"
},
{
"role": "assistant",
"content": "References are available at: https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28009>."
},
{
"role": "user",
"content": "When was <CVE-2024-28009> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28009> was published on 2024-03-28T00:53:39.156Z."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28320>."
},
{
"role": "user",
"content": "What is <CVE-2024-28320>?"
},
{
"role": "assistant",
"content": "Insecure Direct Object References (IDOR) vulnerability in Hospital Management System 1.0 allows attackers to manipulate user parameters for unauthorized access and modifications via crafted POST request to /patient/edit-user.php.."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28320>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28320>?"
},
{
"role": "assistant",
"content": "References are available at: https://packetstormsecurity.com/files/177326/Hospital-Management-System-1.0-Insecure-Direct-Object-Reference-Account-Takeover.html, https://sospiro014.github.io/Hospital-Management-System-1.0-Insecure-Direct-Object-Reference-+-Account-Takeover."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28320>."
},
{
"role": "user",
"content": "When was <CVE-2024-28320> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28320> was published on 2024-04-29T00:00:00."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28635>."
},
{
"role": "user",
"content": "What is <CVE-2024-28635>?"
},
{
"role": "assistant",
"content": "Cross Site Scripting (XSS) vulnerability in SurveyJS Survey Creator v.1.9.132 and before, allows attackers to execute arbitrary code and obtain sensitive information via the title parameter in form.."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28635>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28635>?"
},
{
"role": "assistant",
"content": "References are available at: https://github.com/surveyjs/survey-creator/issues/5285, https://packetstormsecurity.com/2403-exploits/surveyjssurveycreator19132-xss.txt."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28635>."
},
{
"role": "user",
"content": "When was <CVE-2024-28635> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28635> was published on 2024-03-21T00:00:00."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28265>."
},
{
"role": "user",
"content": "What is <CVE-2024-28265>?"
},
{
"role": "assistant",
"content": "IBOS v4.5.5 has an arbitrary file deletion vulnerability via \\system\\modules\\dashboard\\controllers\\LoginController.php.."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28265>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28265>?"
},
{
"role": "assistant",
"content": "References are available at: https://gitee.com/ibos/IBOS, https://github.com/A7cc/cve/issues/1."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28265>."
},
{
"role": "user",
"content": "When was <CVE-2024-28265> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28265> was published on 2024-11-01T00:00:00."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28818>."
},
{
"role": "user",
"content": "What is <CVE-2024-28818>?"
},
{
"role": "assistant",
"content": "An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, Exynos 990, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 2400, Exynos Modem 5123, Exynos Modem 5300. The baseband software does not properly check states specified by the RRC (Radio Resource Control) module. This can lead to disclosure of sensitive information.."
}
] |
[
{
"role": "system",
"content": "State the CVSS score for <CVE-2024-28818>."
},
{
"role": "user",
"content": "What is the CVSS score of <CVE-2024-28818>?"
},
{
"role": "assistant",
"content": "The CVSS score and severity for <CVE-2024-28818> is 5.9(MEDIUM)."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28818>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28818>?"
},
{
"role": "assistant",
"content": "References are available at: https://semiconductor.samsung.com/support/quality-support/product-security-updates/."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28818>."
},
{
"role": "user",
"content": "When was <CVE-2024-28818> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28818> was published on 2024-06-05T00:00:00."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28232>."
},
{
"role": "user",
"content": "What is <CVE-2024-28232>?"
},
{
"role": "assistant",
"content": "Go package IceWhaleTech/CasaOS-UserService provides user management functionalities to CasaOS. The Casa OS Login page has disclosed the username enumeration vulnerability in the login page which was patched in version 0.4.7. This issue in CVE-2024-28232 has been patched in version 0.4.8 but that version has not yet been uploaded to Go's package manager.\n."
}
] |
[
{
"role": "system",
"content": "Identify the affected product in <CVE-2024-28232>."
},
{
"role": "user",
"content": "Which product is affected by <CVE-2024-28232>?"
},
{
"role": "assistant",
"content": "The affected product is CasaOS-UserService and version: = 0.4.7."
}
] |
[
{
"role": "system",
"content": "State the CVSS score for <CVE-2024-28232>."
},
{
"role": "user",
"content": "What is the CVSS score of <CVE-2024-28232>?"
},
{
"role": "assistant",
"content": "The CVSS score and severity for <CVE-2024-28232> is 6.2(MEDIUM)."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28232>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28232>?"
},
{
"role": "assistant",
"content": "References are available at: https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-hcw2-2r9c-gc6p, https://github.com/IceWhaleTech/CasaOS-UserService/commit/dd927fe1c805e53790f73cfe10c7a4ded3bc5bdb."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28232>."
},
{
"role": "user",
"content": "When was <CVE-2024-28232> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28232> was published on 2024-04-01T16:42:05.726Z."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28662>."
},
{
"role": "user",
"content": "What is <CVE-2024-28662>?"
},
{
"role": "assistant",
"content": "A Cross Site Scripting vulnerability exists in Piwigo before 14.3.0 script because of missing sanitization in create_tag in admin/include/functions.php.."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28662>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28662>?"
},
{
"role": "assistant",
"content": "References are available at: https://github.com/Piwigo/Piwigo/security/advisories/GHSA-8g2g-6f2c-6h7j, https://github.com/Piwigo/Piwigo/commit/5069610aaeb1da6d96d389651a5ba9b38690c580, https://github.com/Piwigo/Piwigo/compare/14.2.0...14.3.0."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28662>."
},
{
"role": "user",
"content": "When was <CVE-2024-28662> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28662> was published on 2024-03-13T00:00:00."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28926>."
},
{
"role": "user",
"content": "What is <CVE-2024-28926>?"
},
{
"role": "assistant",
"content": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability."
}
] |
[
{
"role": "system",
"content": "Identify the affected product in <CVE-2024-28926>."
},
{
"role": "user",
"content": "Which product is affected by <CVE-2024-28926>?"
},
{
"role": "assistant",
"content": "The affected product is Microsoft SQL Server 2022 for (CU 12) and version: 16.0.0, 15.0.0, 15.0.0, 16.0.0, 19.0.0, 18.0.0."
}
] |
[
{
"role": "system",
"content": "State the CVSS score for <CVE-2024-28926>."
},
{
"role": "user",
"content": "What is the CVSS score of <CVE-2024-28926>?"
},
{
"role": "assistant",
"content": "The CVSS score and severity for <CVE-2024-28926> is 8.8(HIGH)."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28926>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28926>?"
},
{
"role": "assistant",
"content": "References are available at: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28926."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28926>."
},
{
"role": "user",
"content": "When was <CVE-2024-28926> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28926> was published on 2024-04-09T17:01:12.323Z."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28025>."
},
{
"role": "user",
"content": "What is <CVE-2024-28025>?"
},
{
"role": "assistant",
"content": "Three OS command injection vulnerabilities exist in the web interface I/O configuration functionality of MC Technologies MC LR Router 2.10.5. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability refers to the authenticated OS Command Injection that occurs through the attacker-controlled `btn1` parameter, at offset `0x8eb0`.."
}
] |
[
{
"role": "system",
"content": "Identify the affected product in <CVE-2024-28025>."
},
{
"role": "user",
"content": "Which product is affected by <CVE-2024-28025>?"
},
{
"role": "assistant",
"content": "The affected product is MC LR Router and version: 2.10.5 (QEMU)."
}
] |
[
{
"role": "system",
"content": "State the CVSS score for <CVE-2024-28025>."
},
{
"role": "user",
"content": "What is the CVSS score of <CVE-2024-28025>?"
},
{
"role": "assistant",
"content": "The CVSS score and severity for <CVE-2024-28025> is 7.2(HIGH)."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28025>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28025>?"
},
{
"role": "assistant",
"content": "References are available at: https://talosintelligence.com/vulnerability_reports/TALOS-2024-1953."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28025>."
},
{
"role": "user",
"content": "When was <CVE-2024-28025> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28025> was published on 2024-11-21T14:41:20.018Z."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28160>."
},
{
"role": "user",
"content": "What is <CVE-2024-28160>?"
},
{
"role": "assistant",
"content": "Jenkins iceScrum Plugin 1.1.6 and earlier does not sanitize iceScrum project URLs on build views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure jobs.."
}
] |
[
{
"role": "system",
"content": "Identify the affected product in <CVE-2024-28160>."
},
{
"role": "user",
"content": "Which product is affected by <CVE-2024-28160>?"
},
{
"role": "assistant",
"content": "The affected product is Jenkins iceScrum Plugin and version: 0."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28160>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28160>?"
},
{
"role": "assistant",
"content": "References are available at: https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3248, http://www.openwall.com/lists/oss-security/2024/03/06/3."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28160>."
},
{
"role": "user",
"content": "When was <CVE-2024-28160> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28160> was published on 2024-03-06T17:02:01.368Z."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28863>."
},
{
"role": "user",
"content": "What is <CVE-2024-28863>?"
},
{
"role": "assistant",
"content": "node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-folders created in the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running node-tar and even crash the Node.js client within few seconds of running it using a path with too many sub-folders inside. Version 6.2.1 fixes this issue by preventing extraction in excessively deep sub-folders.."
}
] |
[
{
"role": "system",
"content": "Identify the affected product in <CVE-2024-28863>."
},
{
"role": "user",
"content": "Which product is affected by <CVE-2024-28863>?"
},
{
"role": "assistant",
"content": "The affected product is node-tar and version: < 6.2.1."
}
] |
[
{
"role": "system",
"content": "State the CVSS score for <CVE-2024-28863>."
},
{
"role": "user",
"content": "What is the CVSS score of <CVE-2024-28863>?"
},
{
"role": "assistant",
"content": "The CVSS score and severity for <CVE-2024-28863> is 6.5(MEDIUM)."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28863>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28863>?"
},
{
"role": "assistant",
"content": "References are available at: https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36, https://github.com/isaacs/node-tar/commit/fe8cd57da5686f8695415414bda49206a545f7f7, https://security.netapp.com/advisory/ntap-20240524-0005/."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28863>."
},
{
"role": "user",
"content": "When was <CVE-2024-28863> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28863> was published on 2024-03-21T22:10:23.603Z."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28249>."
},
{
"role": "user",
"content": "What is <CVE-2024-28249>?"
},
{
"role": "assistant",
"content": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.13.13, 1.14.8, and 1.15.2, in Cilium clusters with IPsec enabled and traffic matching Layer 7 policies, IPsec-eligible traffic between a node's Envoy proxy and pods on other nodes is sent unencrypted and IPsec-eligible traffic between a node's DNS proxy and pods on other nodes is sent unencrypted. This issue has been resolved in Cilium 1.15.2, 1.14.8, and 1.13.13. There is no known workaround for this issue.."
}
] |
[
{
"role": "system",
"content": "Identify the affected product in <CVE-2024-28249>."
},
{
"role": "user",
"content": "Which product is affected by <CVE-2024-28249>?"
},
{
"role": "assistant",
"content": "The affected product is cilium and version: < 1.13.13, >= 1.14.0, < 1.14.8, >= 1.15.0, < 1.15.2."
}
] |
[
{
"role": "system",
"content": "State the CVSS score for <CVE-2024-28249>."
},
{
"role": "user",
"content": "What is the CVSS score of <CVE-2024-28249>?"
},
{
"role": "assistant",
"content": "The CVSS score and severity for <CVE-2024-28249> is 6.1(MEDIUM)."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28249>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28249>?"
},
{
"role": "assistant",
"content": "References are available at: https://github.com/cilium/cilium/security/advisories/GHSA-j89h-qrvr-xc36, https://github.com/cilium/cilium/releases/tag/v1.13.13, https://github.com/cilium/cilium/releases/tag/v1.14.8, https://github.com/cilium/cilium/releases/tag/v1.15.2."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28249>."
},
{
"role": "user",
"content": "When was <CVE-2024-28249> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28249> was published on 2024-03-18T21:36:10.510Z."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28072>."
},
{
"role": "user",
"content": "What is <CVE-2024-28072>?"
},
{
"role": "assistant",
"content": "A highly privileged account can overwrite arbitrary files on the system with log output. The log file path tags were not sanitized properly. \n\n\n\n\n\n\n."
}
] |
[
{
"role": "system",
"content": "Identify the affected product in <CVE-2024-28072>."
},
{
"role": "user",
"content": "Which product is affected by <CVE-2024-28072>?"
},
{
"role": "assistant",
"content": "The affected product is Serv-U and version: 15.4.2 and Previous Versions ."
}
] |
[
{
"role": "system",
"content": "State the CVSS score for <CVE-2024-28072>."
},
{
"role": "user",
"content": "What is the CVSS score of <CVE-2024-28072>?"
},
{
"role": "assistant",
"content": "The CVSS score and severity for <CVE-2024-28072> is 5.7(MEDIUM)."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28072>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28072>?"
},
{
"role": "assistant",
"content": "References are available at: https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28072, https://solarwindscore.my.site.com/SuccessCenter/s/article/Serv-U-15-4-2-Hotfix-1-Release-Notes?language=en_US."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28072>."
},
{
"role": "user",
"content": "When was <CVE-2024-28072> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28072> was published on 2024-05-03T07:50:00.696Z."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28971>."
},
{
"role": "user",
"content": "What is <CVE-2024-28971>?"
},
{
"role": "assistant",
"content": "Dell Update Manager Plugin, versions 1.4.0 through 1.5.0, contains a Plain-text Password Storage Vulnerability in Log file. A remote high privileged attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.."
}
] |
[
{
"role": "system",
"content": "Identify the affected product in <CVE-2024-28971>."
},
{
"role": "user",
"content": "Which product is affected by <CVE-2024-28971>?"
},
{
"role": "assistant",
"content": "The affected product is Update Manager Plugin and version: 1.4.0."
}
] |
[
{
"role": "system",
"content": "State the CVSS score for <CVE-2024-28971>."
},
{
"role": "user",
"content": "What is the CVSS score of <CVE-2024-28971>?"
},
{
"role": "assistant",
"content": "The CVSS score and severity for <CVE-2024-28971> is 3.5(LOW)."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28971>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28971>?"
},
{
"role": "assistant",
"content": "References are available at: https://www.dell.com/support/kbdoc/en-us/000224849/dsa-2024-209-security-update-for-dell-update-manager-plugin-vulnerability."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28971>."
},
{
"role": "user",
"content": "When was <CVE-2024-28971> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28971> was published on 2024-05-08T15:37:31.837Z."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28834>."
},
{
"role": "user",
"content": "What is <CVE-2024-28834>?"
},
{
"role": "assistant",
"content": "A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.."
}
] |
[
{
"role": "system",
"content": "State the CVSS score for <CVE-2024-28834>."
},
{
"role": "user",
"content": "What is the CVSS score of <CVE-2024-28834>?"
},
{
"role": "assistant",
"content": "The CVSS score and severity for <CVE-2024-28834> is 5.3(MEDIUM)."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28834>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28834>?"
},
{
"role": "assistant",
"content": "References are available at: https://access.redhat.com/errata/RHSA-2024:1784, https://access.redhat.com/errata/RHSA-2024:1879, https://access.redhat.com/errata/RHSA-2024:1997, https://access.redhat.com/errata/RHSA-2024:2044, https://access.redhat.com/errata/RHSA-2024:2570, https://access.redhat.com/errata/RHSA-2024:2889, https://access.redhat.com/security/cve/CVE-2024-28834, https://bugzilla.redhat.com/show_bug.cgi?id=2269228, https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html, https://minerva.crocs.fi.muni.cz/."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28834>."
},
{
"role": "user",
"content": "When was <CVE-2024-28834> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28834> was published on 2024-03-21T13:29:11.532Z."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28137>."
},
{
"role": "user",
"content": "What is <CVE-2024-28137>?"
},
{
"role": "assistant",
"content": "\n\t\n\t\t\n\t\t\n\t\n\t\n\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\t\t\n\n\t\n\t\t\n\t\t\n\t\n\t\n\t\t\n\n\n\t\t\t\n\t\t\t\t\n\t\t\t\t\tA local attacker with low privileges can perform a privilege escalation with an init script due to a TOCTOU vulnerability.\n\n\n\n\n\n\n\n\n\n\n\t\t\t\t\n\n\n\t\t\t\n\n\n\t\t\n\n\n\t\n."
}
] |
[
{
"role": "system",
"content": "Identify the affected product in <CVE-2024-28137>."
},
{
"role": "user",
"content": "Which product is affected by <CVE-2024-28137>?"
},
{
"role": "assistant",
"content": "The affected product is CHARX SEC-3000 and version: 0, 0, 0, 0."
}
] |
[
{
"role": "system",
"content": "State the CVSS score for <CVE-2024-28137>."
},
{
"role": "user",
"content": "What is the CVSS score of <CVE-2024-28137>?"
},
{
"role": "assistant",
"content": "The CVSS score and severity for <CVE-2024-28137> is 7.8(HIGH)."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28137>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28137>?"
},
{
"role": "assistant",
"content": "References are available at: https://cert.vde.com/en/advisories/VDE-2024-019."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28137>."
},
{
"role": "user",
"content": "When was <CVE-2024-28137> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28137> was published on 2024-05-14T08:10:06.014Z."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28567>."
},
{
"role": "user",
"content": "What is <CVE-2024-28567>?"
},
{
"role": "assistant",
"content": "Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to cause a denial of service (DoS) via the FreeImage_CreateICCProfile() function when reading images in TIFF format.."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28567>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28567>?"
},
{
"role": "assistant",
"content": "References are available at: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28567>."
},
{
"role": "user",
"content": "When was <CVE-2024-28567> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28567> was published on 2024-03-20T00:00:00."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28967>."
},
{
"role": "user",
"content": "What is <CVE-2024-28967>?"
},
{
"role": "assistant",
"content": "Dell SCG, versions prior to 5.24.00.00, contain an Improper Access Control vulnerability in the SCG exposed for an internal maintenance REST API (if enabled by Admin user from UI). A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain APIs applicable only for Admin Users on the application's backend database that could potentially allow an unauthorized user access to restricted resources and change of state.."
}
] |
[
{
"role": "system",
"content": "Identify the affected product in <CVE-2024-28967>."
},
{
"role": "user",
"content": "Which product is affected by <CVE-2024-28967>?"
},
{
"role": "assistant",
"content": "The affected product is Secure Connect Gateway-Application and version: 5.18.00.20, 5.18.00.20."
}
] |
[
{
"role": "system",
"content": "State the CVSS score for <CVE-2024-28967>."
},
{
"role": "user",
"content": "What is the CVSS score of <CVE-2024-28967>?"
},
{
"role": "assistant",
"content": "The CVSS score and severity for <CVE-2024-28967> is 5.4(MEDIUM)."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28967>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28967>?"
},
{
"role": "assistant",
"content": "References are available at: https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28967>."
},
{
"role": "user",
"content": "When was <CVE-2024-28967> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28967> was published on 2024-06-13T14:57:23.532Z."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28434>."
},
{
"role": "user",
"content": "What is <CVE-2024-28434>?"
},
{
"role": "assistant",
"content": "The CRM platform Twenty is vulnerable to stored cross site scripting via file upload in version 0.3.0. A crafted svg file can trigger the execution of the javascript code.."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28434>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28434>?"
},
{
"role": "assistant",
"content": "References are available at: https://github.com/twentyhq/twenty, https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-28434."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28434>."
},
{
"role": "user",
"content": "When was <CVE-2024-28434> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28434> was published on 2024-03-25T00:00:00."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28064>."
},
{
"role": "user",
"content": "What is <CVE-2024-28064>?"
},
{
"role": "assistant",
"content": "Kiteworks Totemomail 7.x and 8.x before 8.3.0 allows /responsiveUI/EnvelopeOpenServlet messageId directory traversal for unauthenticated file read and delete operations (with displayLoginChunkedImages) and write operations (with storeLoginChunkedImages).."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28064>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28064>?"
},
{
"role": "assistant",
"content": "References are available at: https://www.objectif-securite.ch/advisories/totemomail-path-traversal.txt."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28571>."
},
{
"role": "user",
"content": "What is <CVE-2024-28571>?"
},
{
"role": "assistant",
"content": "Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to cause a denial of service (DoS) via the fill_input_buffer() function when reading images in JPEG format.."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28571>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28571>?"
},
{
"role": "assistant",
"content": "References are available at: https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28571>."
},
{
"role": "user",
"content": "When was <CVE-2024-28571> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28571> was published on 2024-03-20T00:00:00."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28121>."
},
{
"role": "user",
"content": "What is <CVE-2024-28121>?"
},
{
"role": "assistant",
"content": "stimulus_reflex is a system to extend the capabilities of both Rails and Stimulus by intercepting user interactions and passing them to Rails over real-time websockets. In affected versions more methods than expected can be called on reflex instances. Being able to call some of them has security implications. To invoke a reflex a websocket message of the following shape is sent: `\\\"target\\\":\\\"[class_name]#[method_name]\\\",\\\"args\\\":[]`. The server will proceed to instantiate `reflex` using the provided `class_name` as long as it extends `StimulusReflex::Reflex`. It then attempts to call `method_name` on the instance with the provided arguments. This is problematic as `reflex.method method_name` can be more methods that those explicitly specified by the developer in their reflex class. A good example is the instance_variable_set method. This vulnerability has been patched in versions 3.4.2 and 3.5.0.rc4. Users unable to upgrade should: see the backing GHSA advisory for mitigation advice.."
}
] |
[
{
"role": "system",
"content": "Identify the affected product in <CVE-2024-28121>."
},
{
"role": "user",
"content": "Which product is affected by <CVE-2024-28121>?"
},
{
"role": "assistant",
"content": "The affected product is stimulus_reflex and version: >= 3.5.0.rc1, < 3.5.0.rc4, < 3.4.2."
}
] |
[
{
"role": "system",
"content": "State the CVSS score for <CVE-2024-28121>."
},
{
"role": "user",
"content": "What is the CVSS score of <CVE-2024-28121>?"
},
{
"role": "assistant",
"content": "The CVSS score and severity for <CVE-2024-28121> is 8.8(HIGH)."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28121>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28121>?"
},
{
"role": "assistant",
"content": "References are available at: https://github.com/stimulusreflex/stimulus_reflex/security/advisories/GHSA-f78j-4w3g-4q65, https://github.com/stimulusreflex/stimulus_reflex/commit/538582d240439aab76066c72335ea92096cd0c7f, https://github.com/stimulusreflex/stimulus_reflex/blob/0211cad7d60fe96838587f159d657e44cee51b9b/app/channels/stimulus_reflex/channel.rb#L83, https://github.com/stimulusreflex/stimulus_reflex/releases/tag/v3.4.2, https://github.com/stimulusreflex/stimulus_reflex/releases/tag/v3.5.0.rc4, http://seclists.org/fulldisclosure/2024/Mar/16."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28121>."
},
{
"role": "user",
"content": "When was <CVE-2024-28121> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28121> was published on 2024-03-12T19:44:29.591Z."
}
] |
[
{
"role": "system",
"content": "Describe <CVE-2024-28033>."
},
{
"role": "user",
"content": "What is <CVE-2024-28033>?"
},
{
"role": "assistant",
"content": "OS command injection vulnerability exists in WebProxy 1.7.8 and 1.7.9, which may allow a remote unauthenticated attacker to execute an arbitrary OS command with the privilege of the running web server. Note that the developer was unreachable, therefore, users should consider stop using WebProxy 1.7.8 and 1.7.9.."
}
] |
[
{
"role": "system",
"content": "Identify the affected product in <CVE-2024-28033>."
},
{
"role": "user",
"content": "Which product is affected by <CVE-2024-28033>?"
},
{
"role": "assistant",
"content": "The affected product is WebProxy and version: 1.7.8, 1.7.9."
}
] |
[
{
"role": "system",
"content": "Provide references for <CVE-2024-28033>."
},
{
"role": "user",
"content": "Where can I find more information about <CVE-2024-28033>?"
},
{
"role": "assistant",
"content": "References are available at: https://jvn.jp/en/jp/JVN22376992/."
}
] |
[
{
"role": "system",
"content": "State the publication date of <CVE-2024-28033>."
},
{
"role": "user",
"content": "When was <CVE-2024-28033> published?"
},
{
"role": "assistant",
"content": "<CVE-2024-28033> was published on 2024-03-26T09:34:07.760Z."
}
] |
Subsets and Splits